Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MqN5lD3LGo.exe

Overview

General Information

Sample name:MqN5lD3LGo.exe
renamed because original name is a hash value
Original sample name:c6c9f27d335d4e47b5ea12653e806be6.exe
Analysis ID:1462554
MD5:c6c9f27d335d4e47b5ea12653e806be6
SHA1:e53242d463e2c94383ec646e7e04504b96b4d176
SHA256:514efbae5faa43878c743c3db36f81c25ab5d6da93b879b6e88e7a63b1b19769
Tags:32exetrojan
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected RisePro Stealer
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found API chain indicative of sandbox detection
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for sample
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • MqN5lD3LGo.exe (PID: 4508 cmdline: "C:\Users\user\Desktop\MqN5lD3LGo.exe" MD5: C6C9F27D335D4E47B5EA12653E806BE6)
    • conhost.exe (PID: 6576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 4012 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • WerFault.exe (PID: 3536 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4508 -s 308 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: RegAsm.exe PID: 4012JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    No Sigma rule has matched
    Timestamp:06/25/24-18:12:57.603058
    SID:2049060
    Source Port:49705
    Destination Port:50500
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:06/25/24-18:12:58.145124
    SID:2046266
    Source Port:50500
    Destination Port:49705
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:06/25/24-18:16:59.942935
    SID:2046269
    Source Port:49705
    Destination Port:50500
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: MqN5lD3LGo.exeReversingLabs: Detection: 73%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: MqN5lD3LGo.exeJoe Sandbox ML: detected
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004C6B00 CryptUnprotectData,CryptUnprotectData,LocalFree,LocalFree,3_2_004C6B00
    Source: MqN5lD3LGo.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: MqN5lD3LGo.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: RegAsm.pdb source: RegAsm.exe, 00000003.00000002.4473702920.0000000001546000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000003.00000002.4473702920.0000000001546000.00000004.00000020.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: 0_2_000CC8CD FindFirstFileExW,0_2_000CC8CD
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004C6000 CreateDirectoryA,FindFirstFileA,FindNextFileA,GetLastError,FindClose,3_2_004C6000
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00432022 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,3_2_00432022
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004E6770 FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,GetLastError,std::_Throw_Cpp_error,std::_Throw_Cpp_error,CreateDirectoryA,std::_Throw_Cpp_error,std::_Throw_Cpp_error,3_2_004E6770
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004938D0 FindFirstFileA,FindNextFileA,GetLastError,FindClose,3_2_004938D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00493B60 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,SHGetFolderPathA,FindFirstFileA,FindNextFileA,FindClose,CreateDirectoryA,CreateDirectoryA,CreateDirectoryA,CopyFileA,CreateDirectoryA,CreateDirectoryA,CopyFileA,CopyFileA,3_2_00493B60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0044FC2F FindFirstFileExW,3_2_0044FC2F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004DFF00 CreateDirectoryA,FindFirstFileA,CreateDirectoryA,CopyFileA,FindNextFileA,FindClose,GetLastError,GetLastError,3_2_004DFF00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00431F9C FindClose,FindFirstFileExW,GetLastError,3_2_00431F9C

    Networking

    barindex
    Source: TrafficSnort IDS: 2049060 ET TROJAN RisePro TCP Heartbeat Packet 192.168.2.5:49705 -> 5.42.67.8:50500
    Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 5.42.67.8:50500 -> 192.168.2.5:49705
    Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.5:49705 -> 5.42.67.8:50500
    Source: global trafficTCP traffic: 192.168.2.5:49705 -> 5.42.67.8:50500
    Source: Joe Sandbox ViewIP Address: 5.42.67.8 5.42.67.8
    Source: Joe Sandbox ViewASN Name: RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004C8590 recv,WSAStartup,getaddrinfo,closesocket,socket,connect,closesocket,freeaddrinfo,WSACleanup,freeaddrinfo,3_2_004C8590
    Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
    Source: RegAsm.exe, 00000003.00000002.4473702920.0000000001546000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
    Source: MqN5lD3LGo.exe, 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, RegAsm.exe, 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
    Source: RegAsm.exeString found in binary or memory: https://ipinfo.io/
    Source: MqN5lD3LGo.exe, 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
    Source: RegAsm.exe, 00000003.00000002.4473702920.00000000014FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
    Source: RegAsm.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: 0_2_000D09FC0_2_000D09FC
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: 0_2_000C2C200_2_000C2C20
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: 0_2_000CBC920_2_000CBC92
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: 0_2_000D0DD40_2_000D0DD4
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: 0_2_000BFF040_2_000BFF04
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: 0_2_000C77820_2_000C7782
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004E4BD03_2_004E4BD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0044002D3_2_0044002D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005220D03_2_005220D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004F60E03_2_004F60E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004C00A03_2_004C00A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004EE1703_2_004EE170
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005081203_2_00508120
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004A62503_2_004A6250
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005122603_2_00512260
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040A2C03_2_0040A2C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0050A2B03_2_0050A2B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0044036F3_2_0044036F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004A43203_2_004A4320
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004BE3C03_2_004BE3C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004F04503_2_004F0450
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004DE4303_2_004DE430
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004B84D03_2_004B84D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004FA4803_2_004FA480
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005145503_2_00514550
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004F85F03_2_004F85F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004906003_2_00490600
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004526103_2_00452610
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005486C03_2_005486C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004E06D03_2_004E06D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004547BF3_2_004547BF
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004F28203_2_004F2820
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004A88B03_2_004A88B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043C9603_2_0043C960
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005469703_2_00546970
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043A9283_2_0043A928
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004FA9303_2_004FA930
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004F8B403_2_004F8B40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00500BA03_2_00500BA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00458BB03_2_00458BB0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004EEC403_2_004EEC40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00534D403_2_00534D40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004FAD003_2_004FAD00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00546D203_2_00546D20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0053AE203_2_0053AE20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00458E303_2_00458E30
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00506EA03_2_00506EA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00516EA03_2_00516EA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004ECF203_2_004ECF20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004F2FD03_2_004F2FD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004D70F03_2_004D70F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004930803_2_00493080
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004371A03_2_004371A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005031A03_2_005031A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004A93803_2_004A9380
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004D14503_2_004D1450
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0053F5503_2_0053F550
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042F5803_2_0042F580
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0048F5903_2_0048F590
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004B36003_2_004B3600
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004A36103_2_004A3610
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004B16303_2_004B1630
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005477603_2_00547760
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004F77303_2_004F7730
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004E77E03_2_004E77E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004957903_2_00495790
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005397B03_2_005397B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004F79603_2_004F7960
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0047B9703_2_0047B970
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004EF9A03_2_004EF9A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004CBAC03_2_004CBAC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0044DA863_2_0044DA86
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004A9B503_2_004A9B50
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00493B603_2_00493B60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004ADB203_2_004ADB20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0051DBB03_2_0051DBB0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004EFC403_2_004EFC40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004F7C003_2_004F7C00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00503CC03_2_00503CC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00409C903_2_00409C90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004F9D703_2_004F9D70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004F7D003_2_004F7D00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00545DE03_2_00545DE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00541F003_2_00541F00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004C1F203_2_004C1F20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00501FE03_2_00501FE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004FFFA03_2_004FFFA0
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: String function: 000BA0C0 appears 50 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00547510 appears 102 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434380 appears 54 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0041ACE0 appears 104 times
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4508 -s 308
    Source: MqN5lD3LGo.exe, 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedotnet.exe6 vs MqN5lD3LGo.exe
    Source: MqN5lD3LGo.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: MqN5lD3LGo.exeStatic PE information: Section: .data ZLIB complexity 0.9968365897495362
    Source: classification engineClassification label: mal100.troj.evad.winEXE@5/6@0/1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005447E0 GetLastError,GetVersionExA,FormatMessageW,LocalFree,FormatMessageA,3_2_005447E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00544A40 GetDiskFreeSpaceW,GetDiskFreeSpaceA,3_2_00544A40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004E06D0 CreateDirectoryA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,3_2_004E06D0
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6576:120:WilError_03
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4508
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\trixyjpd7CYIHOzrDJump to behavior
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: MqN5lD3LGo.exe, 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, RegAsm.exe, 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
    Source: MqN5lD3LGo.exe, 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
    Source: MqN5lD3LGo.exeReversingLabs: Detection: 73%
    Source: RegAsm.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
    Source: unknownProcess created: C:\Users\user\Desktop\MqN5lD3LGo.exe "C:\Users\user\Desktop\MqN5lD3LGo.exe"
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4508 -s 308
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: d3d11.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: resourcepolicyclient.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: d3d10warp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dxcore.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: devobj.dllJump to behavior
    Source: MqN5lD3LGo.exeStatic file information: File size 1870848 > 1048576
    Source: MqN5lD3LGo.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x194400
    Source: MqN5lD3LGo.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: MqN5lD3LGo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: RegAsm.pdb source: RegAsm.exe, 00000003.00000002.4473702920.0000000001546000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000003.00000002.4473702920.0000000001546000.00000004.00000020.00020000.00000000.sdmp
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,3_2_004CF280
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: 0_2_000B9AAF push ecx; ret 0_2_000B9AC2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00433F59 push ecx; ret 3_2_00433F6C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004EE170 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,3_2_004EE170
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSandbox detection routine: GetCursorPos, DecisionNode, Sleepgraph_3-78728
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_3-78729
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeStalling execution: Execution stalls by calling Sleepgraph_3-79174
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetCursorPos,GetCursorPos,GetCursorPos,Sleep,GetCursorPos,Sleep,GetCursorPos,3_2_0045DB00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 3695Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 6190Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_3-79221
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_3-79855
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeAPI coverage: 9.4 %
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI coverage: 5.9 %
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 4092Thread sleep count: 3695 > 30Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 4092Thread sleep time: -373195s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 4092Thread sleep count: 6190 > 30Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 4092Thread sleep time: -625190s >= -30000sJump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeLast function: Thread delayed
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeLast function: Thread delayed
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005449B0 GetSystemTime followed by cmp: cmp eax, 04h and CTI: jc 005449F1h3_2_005449B0
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: 0_2_000CC8CD FindFirstFileExW,0_2_000CC8CD
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004C6000 CreateDirectoryA,FindFirstFileA,FindNextFileA,GetLastError,FindClose,3_2_004C6000
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00432022 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,3_2_00432022
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004E6770 FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,GetLastError,std::_Throw_Cpp_error,std::_Throw_Cpp_error,CreateDirectoryA,std::_Throw_Cpp_error,std::_Throw_Cpp_error,3_2_004E6770
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004938D0 FindFirstFileA,FindNextFileA,GetLastError,FindClose,3_2_004938D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00493B60 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,SHGetFolderPathA,FindFirstFileA,FindNextFileA,FindClose,CreateDirectoryA,CreateDirectoryA,CreateDirectoryA,CopyFileA,CreateDirectoryA,CreateDirectoryA,CopyFileA,CopyFileA,3_2_00493B60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0044FC2F FindFirstFileExW,3_2_0044FC2F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004DFF00 CreateDirectoryA,FindFirstFileA,CreateDirectoryA,CopyFileA,FindNextFileA,FindClose,GetLastError,GetLastError,3_2_004DFF00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00431F9C FindClose,FindFirstFileExW,GetLastError,3_2_00431F9C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004580D8 VirtualQuery,GetSystemInfo,3_2_004580D8
    Source: Amcache.hve.6.drBinary or memory string: VMware
    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
    Source: RegAsm.exe, 00000003.00000002.4473702920.00000000014FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
    Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
    Source: RegAsm.exe, 00000003.00000002.4473702920.00000000014FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}=
    Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: RegAsm.exe, 00000003.00000002.4473702920.0000000001563000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0
    Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: RegAsm.exe, 00000003.00000002.4473600885.000000000133C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}t
    Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: RegAsm.exe, 00000003.00000002.4473702920.000000000156D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}FKP
    Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: RegAsm.exe, 00000003.00000002.4473702920.0000000001546000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: RegAsm.exe, 00000003.00000002.4473702920.000000000156B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11
    Source: RegAsm.exe, 00000003.00000002.4473702920.00000000014F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
    Source: Amcache.hve.6.drBinary or memory string: vmci.sys
    Source: Amcache.hve.6.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
    Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.6.drBinary or memory string: VMware20,1
    Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: 0_2_000BDED3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000BDED3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,3_2_004CF280
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: 0_2_000C3A8C mov ecx, dword ptr fs:[00000030h]0_2_000C3A8C
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: 0_2_000C85C5 mov eax, dword ptr fs:[00000030h]0_2_000C85C5
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0045DB00 mov eax, dword ptr fs:[00000030h]3_2_0045DB00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0045DB00 mov eax, dword ptr fs:[00000030h]3_2_0045DB00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004D6280 mov eax, dword ptr fs:[00000030h]3_2_004D6280
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004C86C0 mov eax, dword ptr fs:[00000030h]3_2_004C86C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004C6D80 mov eax, dword ptr fs:[00000030h]3_2_004C6D80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004D3070 mov ecx, dword ptr fs:[00000030h]3_2_004D3070
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00495790 mov eax, dword ptr fs:[00000030h]3_2_00495790
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: 0_2_000CDAB5 GetProcessHeap,0_2_000CDAB5
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: 0_2_000BA04B SetUnhandledExceptionFilter,0_2_000BA04B
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: 0_2_000BA105 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_000BA105
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: 0_2_000BDED3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000BDED3
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: 0_2_000B9EEF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000B9EEF
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00434184 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00434184
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00434311 SetUnhandledExceptionFilter,3_2_00434311
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043451D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0043451D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00438A64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00438A64

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: 0_2_007F018D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_007F018D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,3_2_004CF280
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 55D000Jump to behavior
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 585000Jump to behavior
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 58A000Jump to behavior
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 58C000Jump to behavior
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 10C4008Jump to behavior
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: 0_2_000B9C95 cpuid 0_2_000B9C95
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_000D0033
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: GetLocaleInfoW,0_2_000CF8CA
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: GetLocaleInfoW,0_2_000C70FB
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: EnumSystemLocalesW,0_2_000CF971
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: EnumSystemLocalesW,0_2_000CF9BC
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: EnumSystemLocalesW,0_2_000CFA57
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_000CFAE2
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: EnumSystemLocalesW,0_2_000C6BD5
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: GetLocaleInfoW,0_2_000CFD35
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_000CFE5E
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_000CF6CF
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: GetLocaleInfoW,0_2_000CFF64
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: CreateDirectoryA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,3_2_004E06D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,3_2_00452B5A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,3_2_00452D5F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,3_2_00452E51
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,3_2_00452E06
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,3_2_00452EEC
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_00452F77
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,3_2_004531CA
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,3_2_0044B1B1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_004532F3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,3_2_004533F9
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_004534CF
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,3_2_0044B734
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoEx,FormatMessageA,3_2_00431D94
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\MqN5lD3LGo.exeCode function: 0_2_000BA302 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_000BA302
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004E06D0 CreateDirectoryA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,3_2_004E06D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004E06D0 CreateDirectoryA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,3_2_004E06D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005447E0 GetLastError,GetVersionExA,FormatMessageW,LocalFree,FormatMessageA,3_2_005447E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4012, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4012, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    511
    Process Injection
    12
    Virtualization/Sandbox Evasion
    OS Credential Dumping12
    System Time Discovery
    Remote Services1
    Archive Collected Data
    2
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts12
    Native API
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    511
    Process Injection
    LSASS Memory151
    Security Software Discovery
    Remote Desktop ProtocolData from Removable Media1
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Deobfuscate/Decode Files or Information
    Security Account Manager12
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive1
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
    Obfuscated Files or Information
    NTDS1
    Process Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Software Packing
    LSA Secrets1
    Application Window Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain Credentials1
    Account Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
    System Owner/User Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
    File and Directory Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow36
    System Information Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    MqN5lD3LGo.exe74%ReversingLabsWin32.Trojan.LummaStealer
    MqN5lD3LGo.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://upx.sf.net0%URL Reputationsafe
    https://ipinfo.io/0%URL Reputationsafe
    http://www.microsoft.0%Avira URL Cloudsafe
    https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
    https://www.maxmind.com/en/locate-my-ip-address0%Avira URL Cloudsafe
    http://www.winimage.com/zLibDll0%Avira URL Cloudsafe
    https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllMqN5lD3LGo.exe, 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://www.winimage.com/zLibDllMqN5lD3LGo.exe, 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, RegAsm.exe, 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://upx.sf.netAmcache.hve.6.drfalse
    • URL Reputation: safe
    unknown
    https://t.me/RiseProSUPPORTRegAsm.exe, 00000003.00000002.4473702920.00000000014FA000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://www.microsoft.RegAsm.exe, 00000003.00000002.4473702920.0000000001546000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://ipinfo.io/RegAsm.exefalse
    • URL Reputation: safe
    unknown
    https://www.maxmind.com/en/locate-my-ip-addressRegAsm.exefalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    5.42.67.8
    unknownRussian Federation
    39493RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUtrue
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1462554
    Start date and time:2024-06-25 18:12:07 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 7m 22s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:10
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:MqN5lD3LGo.exe
    renamed because original name is a hash value
    Original Sample Name:c6c9f27d335d4e47b5ea12653e806be6.exe
    Detection:MAL
    Classification:mal100.troj.evad.winEXE@5/6@0/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 82%
    • Number of executed functions: 30
    • Number of non-executed functions: 156
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Override analysis time to 240000 for current running targets taking high CPU consumption
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.42.73.29
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: MqN5lD3LGo.exe
    TimeTypeDescription
    12:13:13API Interceptor1x Sleep call for process: WerFault.exe modified
    12:13:29API Interceptor1493643x Sleep call for process: RegAsm.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    5.42.67.81kBeqS7E3z.exeGet hashmaliciousLummaC, RisePro Stealer, VidarBrowse
      BY1Fwf74x3.exeGet hashmaliciousRisePro Stealer, VidarBrowse
        SecuriteInfo.com.Win64.Evo-gen.4435.12354.exeGet hashmaliciousCryptOne, GCleaner, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
          CHA0VZiz8y.exeGet hashmaliciousCryptOne, Djvu, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, VidarBrowse
            SecuriteInfo.com.Win64.Evo-gen.30302.14698.exeGet hashmaliciousCryptOne, Djvu, GCleaner, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
              WaGiUWSpyO.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                BI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                  1n4J6tLgsc.exeGet hashmaliciousRisePro StealerBrowse
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUfile.exeGet hashmaliciousRedLineBrowse
                    • 5.42.65.92
                    file.exeGet hashmaliciousRedLineBrowse
                    • 5.42.65.92
                    file.exeGet hashmaliciousUnknownBrowse
                    • 5.42.66.10
                    file.exeGet hashmaliciousRedLineBrowse
                    • 5.42.65.92
                    adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93_dump.exeGet hashmaliciousRedLineBrowse
                    • 5.42.65.92
                    file.exeGet hashmaliciousRedLineBrowse
                    • 5.42.65.92
                    DqnftBv2b9.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                    • 5.42.104.211
                    1kBeqS7E3z.exeGet hashmaliciousLummaC, RisePro Stealer, VidarBrowse
                    • 5.42.65.116
                    file.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                    • 5.42.65.92
                    AgHiy5gaGp.exeGet hashmaliciousAmadey, PureLog StealerBrowse
                    • 5.42.66.47
                    No context
                    No context
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):65536
                    Entropy (8bit):0.7031833735538131
                    Encrypted:false
                    SSDEEP:192:PuvH3ALb0yDBFFbhjG1zuiFWZ24IO8r6:WH3ALoyDBftjkzuiFWY4IO8r
                    MD5:8EFFC19778CC4CEB675C1B5CEEDD70F7
                    SHA1:9EA94C97AB91C6D28CB2D7D0CAD92F87EA65605D
                    SHA-256:8EFB9EDA0D319C5A4DB129708687DEDF2C28D1A386DF5E74C04860C3291F022E
                    SHA-512:B5F88D19033E01F825D337BBCC59C99B346B7CA032EA37BA9A72A90A7B13D398BA5FE09334EBAECC4DB371B7E171128E874245A2D8CB871BB90934A92E887897
                    Malicious:true
                    Reputation:low
                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.3.8.0.5.5.7.5.9.4.6.7.5.0.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.3.8.0.5.5.7.6.2.5.9.2.5.9.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.2.3.2.b.0.0.1.-.d.7.a.8.-.4.b.5.8.-.a.9.e.e.-.9.2.c.2.9.8.c.6.3.7.9.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.b.e.b.f.1.f.5.-.6.0.d.3.-.4.a.2.c.-.9.c.6.7.-.0.a.8.d.a.4.0.4.e.9.7.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.M.q.N.5.l.D.3.L.G.o...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.1.9.c.-.0.0.0.1.-.0.0.1.4.-.a.e.1.a.-.8.2.8.9.1.a.c.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.8.f.9.5.a.8.a.0.5.4.6.c.a.f.d.b.6.2.0.f.0.3.f.5.2.c.7.6.9.6.0.0.0.0.0.f.f.f.f.!.0.0.0.0.e.5.3.2.4.2.d.4.6.3.e.2.c.9.4.3.8.3.e.c.6.4.6.e.7.e.0.4.5.0.4.b.9.6.b.4.d.1.7.6.!.M.q.N.5.l.D.3.L.G.o...e.x.e.....T.a.r.g.e.t.A.p.p.
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Mini DuMP crash report, 14 streams, Tue Jun 25 16:12:56 2024, 0x1205a4 type
                    Category:dropped
                    Size (bytes):47006
                    Entropy (8bit):1.8304097743762475
                    Encrypted:false
                    SSDEEP:192:KUpgnQwPOWdHGV+8K/8EkRDCBrDpupbG4MuwTNoJb:kQwGDUj/ODCBrd0jMuA
                    MD5:0C32A9AF45188EA3F61B54999D05442F
                    SHA1:334562DBDB899BE74B51141A7286A45FDEC2D3E6
                    SHA-256:2788A3A49ED71A8C5F0836AFCB2A9413517267A44E4FB27A9032C89C60FD65FA
                    SHA-512:F635B2F17C88270CDB56C37BF82D5420056238E17EE449F9674808BC0C394BDFD978F46F2114C0C2719BBC441AC0C0018033FA861D6474328ED7DD7B05425AC5
                    Malicious:false
                    Reputation:low
                    Preview:MDMP..a..... .........zf........................X...............R#..........T.......8...........T...........................T...........@...............................................................................eJ..............GenuineIntel............T.............zf.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):8352
                    Entropy (8bit):3.706626244168962
                    Encrypted:false
                    SSDEEP:192:R6l7wVeJo5666YEIISU9YujrgmfnJjS89apr089bIUsfI4m:R6lXJO666YEHSU9YujrgmfnJjSVIHf+
                    MD5:7EF2501F4632338FC348882B7421FE1D
                    SHA1:30C9A2D3A572EE4291005C37AF29CD75DB258FA1
                    SHA-256:38ABB97F297D83DE66F710D6B1EEFB2D0F337BFD0113281C8209ABB00634F630
                    SHA-512:26DC8BE284EA2D16D203123FA1F7E8A9A1FF3FF3650D52CC8FD9B5F8EE697F73D78550858801148EC37916BB278E4DB8073932C3AAA57B794A04BC4F0F5C5BE9
                    Malicious:false
                    Reputation:low
                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.5.0.8.<./.P.i.
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4635
                    Entropy (8bit):4.5185388407303355
                    Encrypted:false
                    SSDEEP:48:cvIwWl8zsKJg77aI9PMWpW8VYeNYm8M4J7fFb+q8vVVkOBRVd:uIjfYI7Zl7V3MJxuVkOjVd
                    MD5:C91C770972935825DD3C8EEE1F49C985
                    SHA1:1B94D76C16D51D8623D62A92BB4213A4B27D1E3D
                    SHA-256:70BBA580C86ECC658D40FC28DCEE52193FF19033D219B4E87CC8169621EB3F89
                    SHA-512:7FEE19F60AC54A3B4D50B53B6A05C7CBCE20EDECF79F50F10780C80169AF699A34574D8D8CE134F0A66A174F4D7EFD2C4E122A9FD62C197D1E2FF16C23B1CCAB
                    Malicious:false
                    Reputation:low
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="383475" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:MS Windows registry file, NT/2000 or above
                    Category:dropped
                    Size (bytes):1835008
                    Entropy (8bit):4.421577314132633
                    Encrypted:false
                    SSDEEP:6144:NSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNY0uhiTwb:0vloTMW+EZMM6DFyu03wb
                    MD5:AC755C0149B41AE4185ADCD68353B26C
                    SHA1:A25D3F3712E76A5652EBDCC864501218A7837CC7
                    SHA-256:738F38D91930DB1B29F172D4CAF52A4665C84CA785F542CA2D1306B283CDFA3E
                    SHA-512:5F876785BFD508F2E9FD9FAC629BF424B4B3CFECD0DFFC4EDCA5A0FB6E8E9DF8FF82DEE708ACE956D53A4D51698CE84CE8016964350EA1B640BFED0B4515824E
                    Malicious:false
                    Reputation:low
                    Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.t...................................................................................................................................................................................................................................................................................................................................................y.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\MqN5lD3LGo.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):14
                    Entropy (8bit):3.3248629576173565
                    Encrypted:false
                    SSDEEP:3:oJCVNV:o8/V
                    MD5:2C34338A8C340C46983875A53A889FC3
                    SHA1:5EF486E22F88756BE456209030D46D3D94C21952
                    SHA-256:511FF7ADE84BB22C9B35B62A64FC4100A1958E8D20CB795031199748A926E507
                    SHA-512:61A221F599A577BC988C6CFF3319F214A62F066B5086C7D8841E8B88BC9FB6CC4F93E8E48E25382BB8148C8F26D045AD15A927ACF0742E69E24923A4659FF633
                    Malicious:false
                    Reputation:low
                    Preview:Illkjmuueghu 0
                    File type:PE32 executable (console) Intel 80386, for MS Windows
                    Entropy (8bit):7.948024837182058
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:MqN5lD3LGo.exe
                    File size:1'870'848 bytes
                    MD5:c6c9f27d335d4e47b5ea12653e806be6
                    SHA1:e53242d463e2c94383ec646e7e04504b96b4d176
                    SHA256:514efbae5faa43878c743c3db36f81c25ab5d6da93b879b6e88e7a63b1b19769
                    SHA512:7e00bdac39c89821b776dda372693d29e0e7188f8ef747037b971461af79545908f8fc8c9bbf7a30f1b0cc4ceea45632e91c1093e784002994808c19bd2a7347
                    SSDEEP:49152:KWPLwXMkW4itwCBDtixjSzceiLYtV25Mm8eEMMd:tPLPkW4IwcOj6iLYtV+Mw8
                    TLSH:6C852300F4908073C562167706E4DFB69A7EB9714B725CDB6BA44FBF4F306C09632A6A
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........@.}.@.}.@.}...~.Q.}...x...}...y.V.}..sy.R.}...|.G.}.@.|...}..sx...}..s~.X.}..px.A.}..p..A.}.Rich@.}.................PE..L..
                    Icon Hash:00928e8e8686b000
                    Entrypoint:0x409aa5
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows cui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66789839 [Sun Jun 23 21:48:41 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:e4019b337e6aa53400bb9378be49b858
                    Instruction
                    call 00007EFC9CE8270Ah
                    jmp 00007EFC9CE81CD9h
                    mov ecx, dword ptr [ebp-0Ch]
                    mov dword ptr fs:[00000000h], ecx
                    pop ecx
                    pop edi
                    pop edi
                    pop esi
                    pop ebx
                    mov esp, ebp
                    pop ebp
                    push ecx
                    ret
                    mov ecx, dword ptr [ebp-10h]
                    xor ecx, ebp
                    call 00007EFC9CE81BC5h
                    jmp 00007EFC9CE81E42h
                    push eax
                    push dword ptr fs:[00000000h]
                    lea eax, dword ptr [esp+0Ch]
                    sub esp, dword ptr [esp+0Ch]
                    push ebx
                    push esi
                    push edi
                    mov dword ptr [eax], ebp
                    mov ebp, eax
                    mov eax, dword ptr [005C69C0h]
                    xor eax, ebp
                    push eax
                    push dword ptr [ebp-04h]
                    mov dword ptr [ebp-04h], FFFFFFFFh
                    lea eax, dword ptr [ebp-0Ch]
                    mov dword ptr fs:[00000000h], eax
                    ret
                    push eax
                    push dword ptr fs:[00000000h]
                    lea eax, dword ptr [esp+0Ch]
                    sub esp, dword ptr [esp+0Ch]
                    push ebx
                    push esi
                    push edi
                    mov dword ptr [eax], ebp
                    mov ebp, eax
                    mov eax, dword ptr [005C69C0h]
                    xor eax, ebp
                    push eax
                    mov dword ptr [ebp-10h], eax
                    push dword ptr [ebp-04h]
                    mov dword ptr [ebp-04h], FFFFFFFFh
                    lea eax, dword ptr [ebp-0Ch]
                    mov dword ptr fs:[00000000h], eax
                    ret
                    push eax
                    push dword ptr fs:[00000000h]
                    lea eax, dword ptr [esp+0Ch]
                    sub esp, dword ptr [esp+0Ch]
                    push ebx
                    push esi
                    push edi
                    mov dword ptr [eax], ebp
                    mov ebp, eax
                    mov eax, dword ptr [005C69C0h]
                    xor eax, ebp
                    push eax
                    mov dword ptr [ebp-10h], esp
                    push dword ptr [ebp-04h]
                    mov dword ptr [ebp-04h], FFFFFFFFh
                    lea eax, dword ptr [ebp-0Ch]
                    mov dword ptr fs:[00000000h], eax
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x335940x50.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1ca0000x21f0.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x30a680x1c.rdata
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x30ac00x18.rdata
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x309a80x40.rdata
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x280000x180.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x251c20x25200ad92eac1a3518c94a50c469e832eda52False0.5649134574915825data6.636592053866142IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .BSs0x270000xe1d0x100074293e678f0de25bb463c0dccc7904d8False0.583740234375data6.002868469254389IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x280000xbe860xc000b0aa40c4aa7dfc2011d6ffe63826f1cdFalse0.41448974609375data4.98810951337647IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x340000x19534c0x1944004d397285c775cfc4554c7ce0ca0071fcFalse0.9968365897495362data7.999224560090972IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .reloc0x1ca0000x21f00x2200f4f8da3f2dfcb44938435d58d7a1d96fFalse0.7734375data6.553528678280142IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    DLLImport
                    GDI32.dllPolyline, RectVisible
                    USER32.dllOffsetRect
                    KERNEL32.dllCreateFileW, HeapSize, SetStdHandle, WaitForSingleObject, CreateThread, VirtualAlloc, FreeConsole, RaiseException, InitOnceBeginInitialize, InitOnceComplete, CloseHandle, GetCurrentThreadId, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, WakeAllConditionVariable, SleepConditionVariableSRW, GetLastError, FreeLibraryWhenCallbackReturns, CreateThreadpoolWork, SubmitThreadpoolWork, CloseThreadpoolWork, GetModuleHandleExW, IsProcessorFeaturePresent, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, QueryPerformanceCounter, EncodePointer, DecodePointer, MultiByteToWideChar, WideCharToMultiByte, LCMapStringEx, GetSystemTimeAsFileTime, GetModuleHandleW, GetProcAddress, GetStringTypeW, GetCPInfo, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetCurrentProcess, TerminateProcess, GetCurrentProcessId, InitializeSListHead, GetProcessHeap, RtlUnwind, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, ExitProcess, GetModuleFileNameW, GetStdHandle, WriteFile, GetCommandLineA, GetCommandLineW, HeapFree, HeapAlloc, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, GetFileSizeEx, SetFilePointerEx, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, WriteConsoleW
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    06/25/24-18:12:57.603058TCP2049060ET TROJAN RisePro TCP Heartbeat Packet4970550500192.168.2.55.42.67.8
                    06/25/24-18:12:58.145124TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)50500497055.42.67.8192.168.2.5
                    06/25/24-18:16:59.942935TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4970550500192.168.2.55.42.67.8
                    TimestampSource PortDest PortSource IPDest IP
                    Jun 25, 2024 18:12:57.589859962 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:12:57.594804049 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:12:57.594891071 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:12:57.603058100 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:12:57.607947111 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:12:58.145123959 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:12:58.194113016 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:13:01.287981987 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:13:01.292901039 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:13:32.631783962 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:13:32.636841059 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:13:51.444434881 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:13:51.451287031 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:14:00.835055113 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:14:00.841197014 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:14:03.975673914 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:14:03.980700016 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:14:07.101018906 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:14:07.107686996 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:14:10.241226912 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:14:10.246524096 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:14:13.366247892 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:14:13.371164083 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:14:16.506866932 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:14:16.511805058 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:14:19.647525072 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:14:19.652843952 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:14:22.788155079 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:14:22.793284893 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:14:25.929023981 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:14:25.934446096 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:14:29.053817987 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:14:29.058727980 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:14:32.178858042 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:14:32.183923960 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:14:35.319411993 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:14:35.324887991 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:14:38.460120916 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:14:38.465010881 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:14:41.600847006 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:14:41.608042955 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:14:44.725697994 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:14:44.730870962 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:14:47.866508007 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:14:47.871398926 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:14:50.991391897 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:14:50.996503115 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:14:54.132021904 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:14:54.136972904 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:14:57.256982088 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:14:57.261903048 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:15:00.382127047 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:15:00.387090921 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:15:03.522605896 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:15:03.527616978 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:15:06.647850037 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:15:06.652848959 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:15:09.772627115 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:15:09.777631044 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:15:12.913299084 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:15:12.918267012 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:15:16.038249016 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:15:16.043116093 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:15:19.179094076 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:15:19.186846972 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:15:22.305229902 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:15:22.310864925 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:15:25.429091930 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:15:25.434027910 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:15:28.554105997 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:15:28.559413910 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:15:31.679120064 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:15:31.683969021 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:15:34.819679022 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:15:34.825444937 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:15:37.960181952 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:15:37.965126038 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:15:41.100912094 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:15:41.108592033 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:15:44.225826025 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:15:44.230895042 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:15:47.366687059 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:15:47.371661901 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:15:50.491511106 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:15:50.497765064 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:15:53.632509947 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:15:53.824331999 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:15:56.757078886 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:15:56.761936903 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:15:59.897741079 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:15:59.903954029 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:16:03.046962023 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:16:03.052200079 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:16:06.163400888 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:16:06.367072105 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:16:09.288505077 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:16:09.298954964 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:16:12.429179907 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:16:12.434616089 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:16:15.554155111 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:16:15.559185982 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:16:18.694617033 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:16:18.700160027 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:16:21.835403919 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:16:21.840472937 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:16:24.976248980 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:16:24.981411934 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:16:28.100905895 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:16:28.105873108 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:16:31.241559029 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:16:31.246587038 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:16:34.366552114 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:16:34.371695995 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:16:37.491601944 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:16:37.496442080 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:16:40.616661072 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:16:40.621546984 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:16:43.757167101 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:16:43.762044907 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:16:46.897917032 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:16:46.907032013 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:16:50.038639069 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:16:50.043551922 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:16:53.163711071 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:16:53.168991089 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:16:56.288558960 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:16:56.293798923 CEST50500497055.42.67.8192.168.2.5
                    Jun 25, 2024 18:16:59.942934990 CEST4970550500192.168.2.55.42.67.8
                    Jun 25, 2024 18:16:59.951035023 CEST50500497055.42.67.8192.168.2.5
                    TimestampSource PortDest PortSource IPDest IP
                    Jun 25, 2024 18:13:16.644701004 CEST53575761.1.1.1192.168.2.5

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:12:12:55
                    Start date:25/06/2024
                    Path:C:\Users\user\Desktop\MqN5lD3LGo.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\MqN5lD3LGo.exe"
                    Imagebase:0xb0000
                    File size:1'870'848 bytes
                    MD5 hash:C6C9F27D335D4E47B5EA12653E806BE6
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:12:12:55
                    Start date:25/06/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:3
                    Start time:12:12:55
                    Start date:25/06/2024
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    Imagebase:0xf90000
                    File size:65'440 bytes
                    MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:6
                    Start time:12:12:55
                    Start date:25/06/2024
                    Path:C:\Windows\SysWOW64\WerFault.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4508 -s 308
                    Imagebase:0x1e0000
                    File size:483'680 bytes
                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:4.2%
                      Dynamic/Decrypted Code Coverage:0.3%
                      Signature Coverage:3%
                      Total number of Nodes:2000
                      Total number of Limit Nodes:52
                      execution_graph 21397 b8843 21399 b884f 21397->21399 21398 b8886 21399->21398 21403 c2944 21399->21403 21404 c2957 _Fputc 21403->21404 21413 c287b 21404->21413 21406 c296c 21407 bde0b _Fputc 41 API calls 21406->21407 21408 b8873 21407->21408 21408->21398 21409 b8229 21408->21409 21410 b8248 21409->21410 21412 b826a 21410->21412 21447 bed01 21410->21447 21412->21398 21414 c288d 21413->21414 21415 c28b0 21413->21415 21416 be052 __strnicoll 41 API calls 21414->21416 21415->21414 21418 c28d7 21415->21418 21417 c28a8 21416->21417 21417->21406 21421 c2780 21418->21421 21422 c278c __FrameHandler3::FrameUnwindToState 21421->21422 21429 bed47 EnterCriticalSection 21422->21429 21424 c279a 21430 c27db 21424->21430 21426 c27a7 21439 c27cf 21426->21439 21429->21424 21431 c1b3e ___scrt_uninitialize_crt 66 API calls 21430->21431 21432 c27f6 21431->21432 21442 c73fd 21432->21442 21435 c6b6b __dosmaperr 14 API calls 21436 c283f 21435->21436 21437 c663b ___free_lconv_mon 14 API calls 21436->21437 21438 c281b 21437->21438 21438->21426 21446 bed5b LeaveCriticalSection 21439->21446 21441 c27b8 21441->21406 21443 c2800 21442->21443 21444 c7414 21442->21444 21443->21435 21443->21438 21444->21443 21445 c663b ___free_lconv_mon 14 API calls 21444->21445 21445->21443 21446->21441 21448 bed0d 21447->21448 21449 bed22 21447->21449 21450 c2b87 __dosmaperr 14 API calls 21448->21450 21449->21412 21451 bed12 21450->21451 21452 be0cf __strnicoll 41 API calls 21451->21452 21453 bed1d 21452->21453 21453->21412 21926 b889b 21927 b88d3 21926->21927 21928 b88a4 21926->21928 21928->21927 21931 c1c15 21928->21931 21930 b88c6 21932 c1c27 21931->21932 21935 c1c30 ___scrt_uninitialize_crt 21931->21935 21933 c1a99 ___scrt_uninitialize_crt 70 API calls 21932->21933 21934 c1c2d 21933->21934 21934->21930 21936 c1c41 21935->21936 21939 c1a39 21935->21939 21936->21930 21940 c1a45 __FrameHandler3::FrameUnwindToState 21939->21940 21947 bed47 EnterCriticalSection 21940->21947 21942 c1a53 21943 c1ba7 ___scrt_uninitialize_crt 70 API calls 21942->21943 21944 c1a64 21943->21944 21948 c1a8d 21944->21948 21947->21942 21951 bed5b LeaveCriticalSection 21948->21951 21950 c1a76 21950->21930 21951->21950 22225 becb5 22226 c1c0c ___scrt_uninitialize_crt 70 API calls 22225->22226 22227 becbd 22226->22227 22235 c7352 22227->22235 22229 becc2 22230 c73fd 14 API calls 22229->22230 22231 becd1 DeleteCriticalSection 22230->22231 22231->22229 22232 becec 22231->22232 22233 c663b ___free_lconv_mon 14 API calls 22232->22233 22234 becf7 22233->22234 22236 c735e __FrameHandler3::FrameUnwindToState 22235->22236 22245 c0cb9 EnterCriticalSection 22236->22245 22238 c73d5 22252 c73f4 22238->22252 22240 c7369 22240->22238 22242 c73a9 DeleteCriticalSection 22240->22242 22246 c18d1 22240->22246 22243 c663b ___free_lconv_mon 14 API calls 22242->22243 22243->22240 22245->22240 22247 c18e4 _Fputc 22246->22247 22255 c17ac 22247->22255 22249 c18f0 22250 bde0b _Fputc 41 API calls 22249->22250 22251 c18fc 22250->22251 22251->22240 22327 c0d01 LeaveCriticalSection 22252->22327 22254 c73e1 22254->22229 22256 c17b8 __FrameHandler3::FrameUnwindToState 22255->22256 22257 c17e5 22256->22257 22258 c17c2 22256->22258 22260 c17dd 22257->22260 22266 bed47 EnterCriticalSection 22257->22266 22259 be052 __strnicoll 41 API calls 22258->22259 22259->22260 22260->22249 22262 c1803 22267 c1843 22262->22267 22264 c1810 22281 c183b 22264->22281 22266->22262 22268 c1850 22267->22268 22269 c1873 22267->22269 22270 be052 __strnicoll 41 API calls 22268->22270 22271 c1b3e ___scrt_uninitialize_crt 66 API calls 22269->22271 22279 c186b 22269->22279 22270->22279 22272 c188b 22271->22272 22273 c73fd 14 API calls 22272->22273 22274 c1893 22273->22274 22275 c8464 __fread_nolock 41 API calls 22274->22275 22276 c189f 22275->22276 22284 c97a1 22276->22284 22279->22264 22280 c663b ___free_lconv_mon 14 API calls 22280->22279 22326 bed5b LeaveCriticalSection 22281->22326 22283 c1841 22283->22260 22285 c97ca 22284->22285 22290 c18a6 22284->22290 22286 c9819 22285->22286 22288 c97f1 22285->22288 22287 be052 __strnicoll 41 API calls 22286->22287 22287->22290 22291 c9710 22288->22291 22290->22279 22290->22280 22292 c971c __FrameHandler3::FrameUnwindToState 22291->22292 22299 cde13 EnterCriticalSection 22292->22299 22294 c972a 22295 c975b 22294->22295 22300 c9844 22294->22300 22313 c9795 22295->22313 22299->22294 22301 cdeea __fread_nolock 41 API calls 22300->22301 22302 c9854 22301->22302 22303 c985a 22302->22303 22305 c988c 22302->22305 22307 cdeea __fread_nolock 41 API calls 22302->22307 22316 cde59 22303->22316 22305->22303 22306 cdeea __fread_nolock 41 API calls 22305->22306 22308 c9898 CloseHandle 22306->22308 22309 c9883 22307->22309 22308->22303 22310 c98a4 GetLastError 22308->22310 22311 cdeea __fread_nolock 41 API calls 22309->22311 22310->22303 22311->22305 22312 c98b2 __fread_nolock 22312->22295 22325 cde36 LeaveCriticalSection 22313->22325 22315 c977e 22315->22290 22317 cdecf 22316->22317 22318 cde68 22316->22318 22319 c2b87 __dosmaperr 14 API calls 22317->22319 22318->22317 22324 cde92 22318->22324 22320 cded4 22319->22320 22321 c2b74 __dosmaperr 14 API calls 22320->22321 22322 cdebf 22321->22322 22322->22312 22323 cdeb9 SetStdHandle 22323->22322 22324->22322 22324->22323 22325->22315 22326->22283 22327->22254 23913 b86b4 23914 b86c8 23913->23914 23920 b8723 23914->23920 23921 b80be 23914->23921 23917 b8710 23917->23920 23933 c1db2 23917->23933 23924 b80d8 23921->23924 23926 b8127 23921->23926 23922 b982d __ehhandler$___std_fs_change_permissions@12 5 API calls 23923 b813e 23922->23923 23923->23917 23923->23920 23927 c2444 23923->23927 23925 c2746 69 API calls 23924->23925 23924->23926 23925->23926 23926->23922 23928 c2457 _Fputc 23927->23928 23947 c21e3 23928->23947 23931 bde0b _Fputc 41 API calls 23932 c2479 23931->23932 23932->23917 23934 c1dbd 23933->23934 23935 c1dd2 23933->23935 23936 c2b87 __dosmaperr 14 API calls 23934->23936 23937 c1def 23935->23937 23938 c1dda 23935->23938 23940 c1dc2 23936->23940 23976 cac79 23937->23976 23941 c2b87 __dosmaperr 14 API calls 23938->23941 23942 be0cf __strnicoll 41 API calls 23940->23942 23943 c1ddf 23941->23943 23944 c1dcd 23942->23944 23945 be0cf __strnicoll 41 API calls 23943->23945 23944->23920 23946 c1dea 23945->23946 23946->23920 23950 c21ef __FrameHandler3::FrameUnwindToState 23947->23950 23948 c21f5 23949 be052 __strnicoll 41 API calls 23948->23949 23957 c2210 23949->23957 23950->23948 23951 c2229 23950->23951 23958 bed47 EnterCriticalSection 23951->23958 23953 c2235 23959 c2358 23953->23959 23955 c224c 23968 c2275 23955->23968 23957->23931 23958->23953 23960 c237e 23959->23960 23961 c236b 23959->23961 23971 c227f 23960->23971 23961->23955 23963 c23a1 23964 c1b3e ___scrt_uninitialize_crt 66 API calls 23963->23964 23967 c242f 23963->23967 23965 c23cf 23964->23965 23966 cb87a ___scrt_uninitialize_crt 43 API calls 23965->23966 23966->23967 23967->23955 23975 bed5b LeaveCriticalSection 23968->23975 23970 c227d 23970->23957 23972 c2290 23971->23972 23974 c22e8 23971->23974 23973 cb83a __fread_nolock 43 API calls 23972->23973 23972->23974 23973->23974 23974->23963 23975->23970 23977 cac8d _Fputc 23976->23977 23982 ca68e 23977->23982 23980 bde0b _Fputc 41 API calls 23981 caca7 23980->23981 23981->23946 23983 ca69a __FrameHandler3::FrameUnwindToState 23982->23983 23984 ca6c4 23983->23984 23985 ca6a1 23983->23985 23993 bed47 EnterCriticalSection 23984->23993 23986 be052 __strnicoll 41 API calls 23985->23986 23989 ca6ba 23986->23989 23988 ca6d2 23994 ca71d 23988->23994 23989->23980 23991 ca6e1 24007 ca713 23991->24007 23993->23988 23995 ca72c 23994->23995 23996 ca754 23994->23996 23997 be052 __strnicoll 41 API calls 23995->23997 23998 c8464 __fread_nolock 41 API calls 23996->23998 24005 ca747 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 23997->24005 23999 ca75d 23998->23999 24010 cb81c 23999->24010 24002 ca807 24013 caa7d 24002->24013 24004 ca81e 24004->24005 24025 ca8be 24004->24025 24005->23991 24032 bed5b LeaveCriticalSection 24007->24032 24009 ca71b 24009->23989 24011 cb633 45 API calls 24010->24011 24012 ca77b 24011->24012 24012->24002 24012->24004 24012->24005 24014 caa8c ___scrt_uninitialize_crt 24013->24014 24015 c8464 __fread_nolock 41 API calls 24014->24015 24017 caaa8 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 24015->24017 24016 b982d __ehhandler$___std_fs_change_permissions@12 5 API calls 24018 cac26 24016->24018 24019 cb81c 45 API calls 24017->24019 24024 caab4 24017->24024 24018->24005 24020 cab08 24019->24020 24021 cab3a ReadFile 24020->24021 24020->24024 24022 cab61 24021->24022 24021->24024 24023 cb81c 45 API calls 24022->24023 24023->24024 24024->24016 24026 c8464 __fread_nolock 41 API calls 24025->24026 24027 ca8d1 24026->24027 24028 cb81c 45 API calls 24027->24028 24031 ca919 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 24027->24031 24029 ca96c 24028->24029 24030 cb81c 45 API calls 24029->24030 24029->24031 24030->24031 24031->24005 24032->24009 24033 cdac7 24034 cdae0 24033->24034 24035 cdafe 24033->24035 24034->24035 24036 c74f3 2 API calls 24034->24036 24036->24034 22483 b88da 22485 b88e6 __EH_prolog3_GS 22483->22485 22484 b88fd 22486 b9ac3 std::_Throw_Cpp_error 5 API calls 22484->22486 22485->22484 22488 b894c 22485->22488 22489 b8933 22485->22489 22487 b8a67 22486->22487 22502 c1ca6 22488->22502 22499 b7c4e 22489->22499 22493 b2e80 std::_Throw_Cpp_error 41 API calls 22493->22484 22494 b896b 22495 b8a0b 22494->22495 22496 b8a24 22494->22496 22498 c1ca6 43 API calls 22494->22498 22522 b5f60 22494->22522 22495->22493 22496->22495 22533 c2a77 22496->22533 22498->22494 22500 c1ca6 43 API calls 22499->22500 22501 b7c59 22500->22501 22501->22484 22503 c1cb2 __FrameHandler3::FrameUnwindToState 22502->22503 22504 c1cbc 22503->22504 22505 c1cd4 22503->22505 22507 c2b87 __dosmaperr 14 API calls 22504->22507 22546 bed47 EnterCriticalSection 22505->22546 22509 c1cc1 22507->22509 22508 c1cde 22511 c1d7a 22508->22511 22512 c8464 __fread_nolock 41 API calls 22508->22512 22510 be0cf __strnicoll 41 API calls 22509->22510 22521 c1ccc _Fputc 22510->22521 22547 c1c6a 22511->22547 22516 c1cfb 22512->22516 22514 c1d80 22554 c1daa 22514->22554 22516->22511 22517 c1d52 22516->22517 22518 c2b87 __dosmaperr 14 API calls 22517->22518 22519 c1d57 22518->22519 22520 be0cf __strnicoll 41 API calls 22519->22520 22520->22521 22521->22494 22523 b5f72 22522->22523 22524 b5f94 22522->22524 22523->22494 22525 b606f 22524->22525 22526 b5fa6 22524->22526 22527 b55c0 std::_Throw_Cpp_error 113 API calls 22525->22527 22528 b1900 std::_Throw_Cpp_error 113 API calls 22526->22528 22530 b5fde _Yarn 22527->22530 22528->22530 22529 be0df std::_Throw_Cpp_error 41 API calls 22531 b6079 22529->22531 22530->22529 22532 b602f _Yarn shared_ptr 22530->22532 22532->22494 22534 c2a83 __FrameHandler3::FrameUnwindToState 22533->22534 22535 c2a9f 22534->22535 22536 c2a8a 22534->22536 22558 bed47 EnterCriticalSection 22535->22558 22537 c2b87 __dosmaperr 14 API calls 22536->22537 22539 c2a8f 22537->22539 22541 be0cf __strnicoll 41 API calls 22539->22541 22540 c2aa9 22559 c297e 22540->22559 22543 c2a9a 22541->22543 22543->22496 22546->22508 22548 c1c76 22547->22548 22551 c1c8b __fread_nolock 22547->22551 22549 c2b87 __dosmaperr 14 API calls 22548->22549 22550 c1c7b 22549->22550 22552 be0cf __strnicoll 41 API calls 22550->22552 22551->22514 22553 c1c86 22552->22553 22553->22514 22557 bed5b LeaveCriticalSection 22554->22557 22556 c1db0 22556->22521 22557->22556 22558->22540 22560 c2996 22559->22560 22562 c2a06 22559->22562 22561 c8464 __fread_nolock 41 API calls 22560->22561 22566 c299c 22561->22566 22563 cb898 14 API calls 22562->22563 22564 c29fe 22562->22564 22563->22564 22570 c2ae2 22564->22570 22565 c29ee 22567 c2b87 __dosmaperr 14 API calls 22565->22567 22566->22562 22566->22565 22568 c29f3 22567->22568 22569 be0cf __strnicoll 41 API calls 22568->22569 22569->22564 22573 bed5b LeaveCriticalSection 22570->22573 22572 c2ae8 22572->22543 22573->22572 24303 b8aef 24305 b8b01 _Yarn 24303->24305 24304 b8b07 24305->24304 24306 b8bb1 24305->24306 24309 c1ff3 24305->24309 24306->24304 24308 c1ff3 __fread_nolock 55 API calls 24306->24308 24308->24304 24312 c2010 24309->24312 24313 c201c __FrameHandler3::FrameUnwindToState 24312->24313 24314 c2066 24313->24314 24320 c202f __fread_nolock 24313->24320 24324 c200b 24313->24324 24325 bed47 EnterCriticalSection 24314->24325 24316 c2b87 __dosmaperr 14 API calls 24318 c2049 24316->24318 24317 c2070 24326 c1e0d 24317->24326 24321 be0cf __strnicoll 41 API calls 24318->24321 24320->24316 24321->24324 24324->24305 24325->24317 24327 c1e3a 24326->24327 24330 c1e1e __fread_nolock 24326->24330 24339 c20a5 24327->24339 24328 c1e2a 24329 c2b87 __dosmaperr 14 API calls 24328->24329 24338 c1e2f 24329->24338 24330->24327 24330->24328 24332 c1e7c __fread_nolock 24330->24332 24331 be0cf __strnicoll 41 API calls 24331->24327 24332->24327 24333 c20ad __fread_nolock 41 API calls 24332->24333 24334 c8464 __fread_nolock 41 API calls 24332->24334 24335 c1fa3 __fread_nolock 24332->24335 24337 cb294 __fread_nolock 53 API calls 24332->24337 24333->24332 24334->24332 24336 c2b87 __dosmaperr 14 API calls 24335->24336 24336->24338 24337->24332 24338->24331 24342 bed5b LeaveCriticalSection 24339->24342 24341 c20ab 24341->24324 24342->24341 22614 ca4f4 22615 ca501 22614->22615 22619 ca519 22614->22619 22616 c2b87 __dosmaperr 14 API calls 22615->22616 22617 ca506 22616->22617 22618 be0cf __strnicoll 41 API calls 22617->22618 22620 ca511 22618->22620 22619->22620 22621 ca578 22619->22621 22623 cb898 14 API calls 22619->22623 22622 c8464 __fread_nolock 41 API calls 22621->22622 22624 ca591 22622->22624 22623->22621 22634 cb180 22624->22634 22627 c8464 __fread_nolock 41 API calls 22628 ca5ca 22627->22628 22628->22620 22629 c8464 __fread_nolock 41 API calls 22628->22629 22630 ca5d8 22629->22630 22630->22620 22631 c8464 __fread_nolock 41 API calls 22630->22631 22632 ca5e6 22631->22632 22633 c8464 __fread_nolock 41 API calls 22632->22633 22633->22620 22635 cb18c __FrameHandler3::FrameUnwindToState 22634->22635 22636 cb1ac 22635->22636 22637 cb194 22635->22637 22638 cb269 22636->22638 22643 cb1e2 22636->22643 22639 c2b74 __dosmaperr 14 API calls 22637->22639 22641 c2b74 __dosmaperr 14 API calls 22638->22641 22640 cb199 22639->22640 22642 c2b87 __dosmaperr 14 API calls 22640->22642 22644 cb26e 22641->22644 22663 ca599 22642->22663 22645 cb1eb 22643->22645 22646 cb200 22643->22646 22647 c2b87 __dosmaperr 14 API calls 22644->22647 22648 c2b74 __dosmaperr 14 API calls 22645->22648 22664 cde13 EnterCriticalSection 22646->22664 22650 cb1f8 22647->22650 22651 cb1f0 22648->22651 22653 be0cf __strnicoll 41 API calls 22650->22653 22654 c2b87 __dosmaperr 14 API calls 22651->22654 22652 cb206 22655 cb237 22652->22655 22656 cb222 22652->22656 22653->22663 22654->22650 22665 cb294 22655->22665 22657 c2b87 __dosmaperr 14 API calls 22656->22657 22659 cb227 22657->22659 22661 c2b74 __dosmaperr 14 API calls 22659->22661 22660 cb232 22728 cb261 22660->22728 22661->22660 22663->22620 22663->22627 22664->22652 22666 cb2be 22665->22666 22667 cb2a6 22665->22667 22669 cb614 22666->22669 22674 cb304 22666->22674 22668 c2b74 __dosmaperr 14 API calls 22667->22668 22670 cb2ab 22668->22670 22671 c2b74 __dosmaperr 14 API calls 22669->22671 22672 c2b87 __dosmaperr 14 API calls 22670->22672 22673 cb619 22671->22673 22675 cb2b3 22672->22675 22676 c2b87 __dosmaperr 14 API calls 22673->22676 22674->22675 22677 cb30f 22674->22677 22683 cb33f 22674->22683 22675->22660 22679 cb31c 22676->22679 22678 c2b74 __dosmaperr 14 API calls 22677->22678 22680 cb314 22678->22680 22681 be0cf __strnicoll 41 API calls 22679->22681 22682 c2b87 __dosmaperr 14 API calls 22680->22682 22681->22675 22682->22679 22684 cb358 22683->22684 22685 cb372 22683->22685 22686 cb3a3 22683->22686 22684->22685 22687 cb35d 22684->22687 22688 c2b74 __dosmaperr 14 API calls 22685->22688 22689 c762f __fread_nolock 15 API calls 22686->22689 22691 d215c __fread_nolock 41 API calls 22687->22691 22690 cb377 22688->22690 22692 cb3b4 22689->22692 22693 c2b87 __dosmaperr 14 API calls 22690->22693 22698 cb4f0 22691->22698 22694 c663b ___free_lconv_mon 14 API calls 22692->22694 22695 cb37e 22693->22695 22699 cb3bd 22694->22699 22696 be0cf __strnicoll 41 API calls 22695->22696 22727 cb389 __fread_nolock 22696->22727 22697 cb564 22700 cb568 ReadFile 22697->22700 22698->22697 22701 cb509 GetConsoleMode 22698->22701 22702 c663b ___free_lconv_mon 14 API calls 22699->22702 22703 cb5dc GetLastError 22700->22703 22704 cb580 22700->22704 22701->22697 22705 cb51a 22701->22705 22706 cb3c4 22702->22706 22707 cb5e9 22703->22707 22708 cb540 22703->22708 22704->22703 22709 cb559 22704->22709 22705->22700 22710 cb520 ReadConsoleW 22705->22710 22711 cb3ce 22706->22711 22712 cb3e9 22706->22712 22713 c2b87 __dosmaperr 14 API calls 22707->22713 22708->22727 22737 c2b2d 22708->22737 22723 cb5bc 22709->22723 22724 cb5a5 22709->22724 22709->22727 22710->22709 22715 cb53a GetLastError 22710->22715 22717 c2b87 __dosmaperr 14 API calls 22711->22717 22731 cb83a 22712->22731 22718 cb5ee 22713->22718 22715->22708 22716 c663b ___free_lconv_mon 14 API calls 22716->22675 22720 cb3d3 22717->22720 22722 c2b74 __dosmaperr 14 API calls 22718->22722 22721 c2b74 __dosmaperr 14 API calls 22720->22721 22721->22727 22722->22727 22723->22727 22755 cae06 22723->22755 22742 cafae 22724->22742 22727->22716 22767 cde36 LeaveCriticalSection 22728->22767 22730 cb267 22730->22663 22732 cb84e _Fputc 22731->22732 22733 cb759 __fread_nolock 43 API calls 22732->22733 22734 cb863 22733->22734 22735 bde0b _Fputc 41 API calls 22734->22735 22736 cb872 22735->22736 22736->22687 22738 c2b74 __dosmaperr 14 API calls 22737->22738 22739 c2b38 __dosmaperr 22738->22739 22740 c2b87 __dosmaperr 14 API calls 22739->22740 22741 c2b4b 22740->22741 22741->22727 22761 cacba 22742->22761 22744 cc34e __strnicoll MultiByteToWideChar 22745 cb0c2 22744->22745 22749 cb0cb GetLastError 22745->22749 22752 caff6 22745->22752 22746 cb050 22753 cb00a 22746->22753 22754 cb83a __fread_nolock 43 API calls 22746->22754 22747 cb040 22750 c2b87 __dosmaperr 14 API calls 22747->22750 22751 c2b2d __dosmaperr 14 API calls 22749->22751 22750->22752 22751->22752 22752->22727 22753->22744 22754->22753 22756 cae3d 22755->22756 22757 caecd 22756->22757 22758 caed2 ReadFile 22756->22758 22757->22727 22758->22757 22759 caeef 22758->22759 22759->22757 22760 cb83a __fread_nolock 43 API calls 22759->22760 22760->22757 22762 cacee 22761->22762 22763 cad5d ReadFile 22762->22763 22764 cad58 22762->22764 22763->22764 22765 cad76 22763->22765 22764->22746 22764->22747 22764->22752 22764->22753 22765->22764 22766 cb83a __fread_nolock 43 API calls 22765->22766 22766->22764 22767->22730 18831 b9923 18832 b992f __FrameHandler3::FrameUnwindToState 18831->18832 18857 b959d 18832->18857 18834 b9936 18835 b9a8f 18834->18835 18844 b9960 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock std::locale::_Setgloballocale 18834->18844 18897 b9eef IsProcessorFeaturePresent 18835->18897 18837 b9a96 18901 c3b99 18837->18901 18842 b997f 18843 b9a00 18868 c4160 18843->18868 18844->18842 18844->18843 18879 c3b73 18844->18879 18847 b9a06 18872 d7d50 18847->18872 18852 b9a2b 18853 b9a34 18852->18853 18888 c3b4e 18852->18888 18891 b970e 18853->18891 18858 b95a6 18857->18858 18907 b9c95 IsProcessorFeaturePresent 18858->18907 18862 b95b7 18863 b95bb 18862->18863 18917 c45b6 18862->18917 18863->18834 18866 b95d2 18866->18834 18869 c4169 18868->18869 18870 c416e 18868->18870 18989 c3eba 18869->18989 18870->18847 19641 b6330 18872->19641 18876 b9a1d 18886 ba009 GetModuleHandleW 18876->18886 18877 d7d9e 18877->18876 19655 d7590 18877->19655 18880 c3b89 std::_Lockit::_Lockit 18879->18880 18881 c08ab __FrameHandler3::FrameUnwindToState 18879->18881 18880->18843 18882 c6350 __Getctype 41 API calls 18881->18882 18883 c08bc 18882->18883 18884 be14b __purecall 41 API calls 18883->18884 18885 c08e6 _unexpected 18884->18885 18885->18843 18887 b9a27 18886->18887 18887->18837 18887->18852 20794 c3981 18888->20794 18892 b971a 18891->18892 18893 b9730 18892->18893 20869 c45c8 18892->20869 18893->18842 18895 b9728 18896 bc89b ___scrt_uninitialize_crt 7 API calls 18895->18896 18896->18893 18898 b9f05 __fread_nolock std::locale::_Setgloballocale 18897->18898 18899 b9fb0 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18898->18899 18900 b9ff4 std::locale::_Setgloballocale 18899->18900 18900->18837 18902 c3981 std::locale::_Setgloballocale 23 API calls 18901->18902 18903 b9a9c 18902->18903 18904 c3b5d 18903->18904 18905 c3981 std::locale::_Setgloballocale 23 API calls 18904->18905 18906 b9aa4 18905->18906 18908 b95b2 18907->18908 18909 bc87c 18908->18909 18926 bd94c 18909->18926 18912 bc885 18912->18862 18914 bc88d 18915 bc898 18914->18915 18940 bd988 18914->18940 18915->18862 18980 cdad0 18917->18980 18920 bc89b 18921 bc8ae 18920->18921 18922 bc8a4 18920->18922 18921->18863 18923 bcbc0 ___vcrt_uninitialize_ptd 6 API calls 18922->18923 18924 bc8a9 18923->18924 18925 bd988 ___vcrt_uninitialize_locks DeleteCriticalSection 18924->18925 18925->18921 18927 bd955 18926->18927 18929 bd97e 18927->18929 18931 bc881 18927->18931 18944 bdd01 18927->18944 18930 bd988 ___vcrt_uninitialize_locks DeleteCriticalSection 18929->18930 18930->18931 18931->18912 18932 bcb8d 18931->18932 18961 bdc12 18932->18961 18935 bcba2 18935->18914 18938 bcbbd 18938->18914 18941 bd9b2 18940->18941 18942 bd993 18940->18942 18941->18912 18943 bd99d DeleteCriticalSection 18942->18943 18943->18941 18943->18943 18949 bdb27 18944->18949 18947 bdd39 InitializeCriticalSectionAndSpinCount 18948 bdd24 18947->18948 18948->18927 18950 bdb48 18949->18950 18951 bdb44 18949->18951 18950->18951 18952 bdbb0 GetProcAddress 18950->18952 18954 bdba1 18950->18954 18956 bdbc7 LoadLibraryExW 18950->18956 18951->18947 18951->18948 18952->18951 18954->18952 18955 bdba9 FreeLibrary 18954->18955 18955->18952 18957 bdbde GetLastError 18956->18957 18958 bdc0e 18956->18958 18957->18958 18959 bdbe9 ___vcrt_FlsGetValue 18957->18959 18958->18950 18959->18958 18960 bdbff LoadLibraryExW 18959->18960 18960->18950 18962 bdb27 ___vcrt_FlsGetValue 5 API calls 18961->18962 18963 bdc2c 18962->18963 18964 bdc45 TlsAlloc 18963->18964 18965 bcb97 18963->18965 18965->18935 18966 bdcc3 18965->18966 18967 bdb27 ___vcrt_FlsGetValue 5 API calls 18966->18967 18968 bdcdd 18967->18968 18969 bdcf8 TlsSetValue 18968->18969 18970 bcbb0 18968->18970 18969->18970 18970->18938 18971 bcbc0 18970->18971 18972 bcbca 18971->18972 18974 bcbd0 18971->18974 18975 bdc4d 18972->18975 18974->18935 18976 bdb27 ___vcrt_FlsGetValue 5 API calls 18975->18976 18977 bdc67 18976->18977 18978 bdc7f TlsFree 18977->18978 18979 bdc73 18977->18979 18978->18979 18979->18974 18981 cdae0 18980->18981 18982 b95c4 18980->18982 18981->18982 18984 c74f3 18981->18984 18982->18866 18982->18920 18985 c74fa 18984->18985 18986 c753d GetStdHandle 18985->18986 18987 c759f 18985->18987 18988 c7550 GetFileType 18985->18988 18986->18985 18987->18981 18988->18985 18990 c3ec3 18989->18990 18993 c3ed9 18989->18993 18990->18993 18995 c3ee6 18990->18995 18992 c3ed0 18992->18993 19012 c4051 18992->19012 18993->18870 18996 c3eef 18995->18996 18997 c3ef2 18995->18997 18996->18992 19020 cd31e 18997->19020 19002 c3f0f 19053 c3f40 19002->19053 19003 c3f03 19047 c663b 19003->19047 19008 c663b ___free_lconv_mon 14 API calls 19009 c3f33 19008->19009 19010 c663b ___free_lconv_mon 14 API calls 19009->19010 19011 c3f39 19010->19011 19011->18992 19013 c40c2 19012->19013 19014 c4060 19012->19014 19013->18993 19014->19013 19015 c6b6b __dosmaperr 14 API calls 19014->19015 19017 cc3ca WideCharToMultiByte std::_Locinfo::_Locinfo_ctor 19014->19017 19018 c40c6 19014->19018 19019 c663b ___free_lconv_mon 14 API calls 19014->19019 19015->19014 19016 c663b ___free_lconv_mon 14 API calls 19016->19013 19017->19014 19018->19016 19019->19014 19021 cd327 19020->19021 19022 c3ef8 19020->19022 19075 c640b 19021->19075 19026 cd620 GetEnvironmentStringsW 19022->19026 19027 c3efd 19026->19027 19028 cd638 19026->19028 19027->19002 19027->19003 19029 cc3ca std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 19028->19029 19030 cd655 19029->19030 19031 cd65f FreeEnvironmentStringsW 19030->19031 19032 cd66a 19030->19032 19031->19027 19033 c762f __fread_nolock 15 API calls 19032->19033 19034 cd671 19033->19034 19035 cd679 19034->19035 19036 cd68a 19034->19036 19037 c663b ___free_lconv_mon 14 API calls 19035->19037 19038 cc3ca std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 19036->19038 19040 cd67e FreeEnvironmentStringsW 19037->19040 19039 cd69a 19038->19039 19041 cd6a9 19039->19041 19042 cd6a1 19039->19042 19040->19027 19044 c663b ___free_lconv_mon 14 API calls 19041->19044 19043 c663b ___free_lconv_mon 14 API calls 19042->19043 19045 cd6a7 FreeEnvironmentStringsW 19043->19045 19044->19045 19045->19027 19048 c6646 RtlFreeHeap 19047->19048 19049 c3f09 19047->19049 19048->19049 19050 c665b GetLastError 19048->19050 19049->18992 19051 c6668 __dosmaperr 19050->19051 19052 c2b87 __dosmaperr 12 API calls 19051->19052 19052->19049 19054 c3f55 19053->19054 19055 c6b6b __dosmaperr 14 API calls 19054->19055 19056 c3f7c 19055->19056 19057 c3f8e 19056->19057 19058 c3f84 19056->19058 19061 c3feb 19057->19061 19063 c6b6b __dosmaperr 14 API calls 19057->19063 19064 c3ffa 19057->19064 19069 c4015 19057->19069 19070 c663b ___free_lconv_mon 14 API calls 19057->19070 19622 c5ef7 19057->19622 19059 c663b ___free_lconv_mon 14 API calls 19058->19059 19060 c3f16 19059->19060 19060->19008 19062 c663b ___free_lconv_mon 14 API calls 19061->19062 19062->19060 19063->19057 19631 c4022 19064->19631 19068 c663b ___free_lconv_mon 14 API calls 19072 c4007 19068->19072 19637 be0fc IsProcessorFeaturePresent 19069->19637 19070->19057 19074 c663b ___free_lconv_mon 14 API calls 19072->19074 19073 c4021 19074->19060 19076 c641c 19075->19076 19077 c6416 19075->19077 19097 c6422 19076->19097 19128 c70b9 19076->19128 19123 c707a 19077->19123 19085 c644e 19087 c70b9 __dosmaperr 6 API calls 19085->19087 19086 c6463 19088 c70b9 __dosmaperr 6 API calls 19086->19088 19089 c645a 19087->19089 19090 c646f 19088->19090 19093 c663b ___free_lconv_mon 14 API calls 19089->19093 19091 c6482 19090->19091 19092 c6473 19090->19092 19140 c617e 19091->19140 19094 c70b9 __dosmaperr 6 API calls 19092->19094 19093->19097 19094->19089 19099 c6427 19097->19099 19145 be14b 19097->19145 19098 c663b ___free_lconv_mon 14 API calls 19098->19099 19100 cd129 19099->19100 19427 cd27e 19100->19427 19106 cd17d 19107 cd185 19106->19107 19108 cd193 19106->19108 19109 c663b ___free_lconv_mon 14 API calls 19107->19109 19452 cd379 19108->19452 19111 cd16c 19109->19111 19111->19022 19113 cd1cb 19114 c2b87 __dosmaperr 14 API calls 19113->19114 19115 cd1d0 19114->19115 19119 c663b ___free_lconv_mon 14 API calls 19115->19119 19116 cd212 19118 cd25b 19116->19118 19463 ccd9b 19116->19463 19117 cd1e6 19117->19116 19120 c663b ___free_lconv_mon 14 API calls 19117->19120 19122 c663b ___free_lconv_mon 14 API calls 19118->19122 19119->19111 19120->19116 19122->19111 19156 c6e69 19123->19156 19125 c7096 19126 c70b1 TlsGetValue 19125->19126 19127 c709f 19125->19127 19127->19076 19129 c6e69 std::_Lockit::_Lockit 5 API calls 19128->19129 19130 c70d5 19129->19130 19131 c6436 19130->19131 19132 c70f3 TlsSetValue 19130->19132 19131->19097 19133 c6b6b 19131->19133 19138 c6b78 __dosmaperr 19133->19138 19134 c6bb8 19173 c2b87 19134->19173 19135 c6ba3 HeapAlloc 19136 c6446 19135->19136 19135->19138 19136->19085 19136->19086 19138->19134 19138->19135 19170 c365b 19138->19170 19210 c6012 19140->19210 19312 c6743 19145->19312 19149 be165 IsProcessorFeaturePresent 19152 be171 19149->19152 19150 c3b5d std::locale::_Setgloballocale 23 API calls 19153 be18e 19150->19153 19151 be15b 19151->19149 19155 be184 19151->19155 19342 bded3 19152->19342 19155->19150 19157 c6e97 19156->19157 19161 c6e93 std::_Lockit::_Lockit 19156->19161 19157->19161 19162 c6d9e 19157->19162 19160 c6eb1 GetProcAddress 19160->19161 19161->19125 19168 c6daf ___vcrt_FlsGetValue 19162->19168 19163 c6e45 19163->19160 19163->19161 19164 c6dcd LoadLibraryExW 19165 c6e4c 19164->19165 19166 c6de8 GetLastError 19164->19166 19165->19163 19167 c6e5e FreeLibrary 19165->19167 19166->19168 19167->19163 19168->19163 19168->19164 19169 c6e1b LoadLibraryExW 19168->19169 19169->19165 19169->19168 19176 c3688 19170->19176 19187 c64a1 GetLastError 19173->19187 19175 c2b8c 19175->19136 19177 c3694 __FrameHandler3::FrameUnwindToState 19176->19177 19182 c0cb9 EnterCriticalSection 19177->19182 19179 c369f 19183 c36db 19179->19183 19182->19179 19186 c0d01 LeaveCriticalSection 19183->19186 19185 c3666 19185->19138 19186->19185 19188 c64b7 19187->19188 19189 c64bd 19187->19189 19190 c707a __dosmaperr 6 API calls 19188->19190 19191 c70b9 __dosmaperr 6 API calls 19189->19191 19193 c64c1 SetLastError 19189->19193 19190->19189 19192 c64d9 19191->19192 19192->19193 19195 c6b6b __dosmaperr 12 API calls 19192->19195 19193->19175 19196 c64ee 19195->19196 19197 c64f6 19196->19197 19198 c6507 19196->19198 19200 c70b9 __dosmaperr 6 API calls 19197->19200 19199 c70b9 __dosmaperr 6 API calls 19198->19199 19201 c6513 19199->19201 19207 c6504 19200->19207 19202 c652e 19201->19202 19203 c6517 19201->19203 19206 c617e __dosmaperr 12 API calls 19202->19206 19204 c70b9 __dosmaperr 6 API calls 19203->19204 19204->19207 19205 c663b ___free_lconv_mon 12 API calls 19205->19193 19208 c6539 19206->19208 19207->19205 19209 c663b ___free_lconv_mon 12 API calls 19208->19209 19209->19193 19211 c601e __FrameHandler3::FrameUnwindToState 19210->19211 19224 c0cb9 EnterCriticalSection 19211->19224 19213 c6028 19225 c6058 19213->19225 19216 c6124 19217 c6130 __FrameHandler3::FrameUnwindToState 19216->19217 19229 c0cb9 EnterCriticalSection 19217->19229 19219 c613a 19230 c6305 19219->19230 19221 c6152 19234 c6172 19221->19234 19224->19213 19228 c0d01 LeaveCriticalSection 19225->19228 19227 c6046 19227->19216 19228->19227 19229->19219 19231 c6314 __Getctype 19230->19231 19232 c633b __Getctype 19230->19232 19231->19232 19237 cecb6 19231->19237 19232->19221 19311 c0d01 LeaveCriticalSection 19234->19311 19236 c6160 19236->19098 19239 ced36 19237->19239 19240 ceccc 19237->19240 19241 c663b ___free_lconv_mon 14 API calls 19239->19241 19264 ced84 19239->19264 19240->19239 19245 c663b ___free_lconv_mon 14 API calls 19240->19245 19247 cecff 19240->19247 19242 ced58 19241->19242 19243 c663b ___free_lconv_mon 14 API calls 19242->19243 19248 ced6b 19243->19248 19244 c663b ___free_lconv_mon 14 API calls 19249 ced2b 19244->19249 19251 cecf4 19245->19251 19246 ced92 19250 cedf2 19246->19250 19257 c663b 14 API calls ___free_lconv_mon 19246->19257 19252 c663b ___free_lconv_mon 14 API calls 19247->19252 19263 ced21 19247->19263 19253 c663b ___free_lconv_mon 14 API calls 19248->19253 19254 c663b ___free_lconv_mon 14 API calls 19249->19254 19255 c663b ___free_lconv_mon 14 API calls 19250->19255 19265 cdf6c 19251->19265 19258 ced16 19252->19258 19259 ced79 19253->19259 19254->19239 19262 cedf8 19255->19262 19257->19246 19293 ce420 19258->19293 19261 c663b ___free_lconv_mon 14 API calls 19259->19261 19261->19264 19262->19232 19263->19244 19305 cee27 19264->19305 19266 cdf7d 19265->19266 19292 ce066 19265->19292 19267 cdf8e 19266->19267 19268 c663b ___free_lconv_mon 14 API calls 19266->19268 19269 c663b ___free_lconv_mon 14 API calls 19267->19269 19271 cdfa0 19267->19271 19268->19267 19269->19271 19270 cdfb2 19273 cdfc4 19270->19273 19274 c663b ___free_lconv_mon 14 API calls 19270->19274 19271->19270 19272 c663b ___free_lconv_mon 14 API calls 19271->19272 19272->19270 19274->19273 19292->19247 19294 ce42d 19293->19294 19295 ce485 19293->19295 19296 ce43d 19294->19296 19297 c663b ___free_lconv_mon 14 API calls 19294->19297 19295->19263 19298 ce44f 19296->19298 19299 c663b ___free_lconv_mon 14 API calls 19296->19299 19297->19296 19300 ce461 19298->19300 19301 c663b ___free_lconv_mon 14 API calls 19298->19301 19299->19298 19301->19300 19306 cee34 19305->19306 19310 cee53 19305->19310 19307 ce93b __Getctype 14 API calls 19306->19307 19306->19310 19308 cee4d 19307->19308 19309 c663b ___free_lconv_mon 14 API calls 19308->19309 19309->19310 19310->19246 19311->19236 19348 c6675 19312->19348 19315 c6788 19316 c6794 __FrameHandler3::FrameUnwindToState 19315->19316 19317 c67c1 std::locale::_Setgloballocale 19316->19317 19318 c64a1 __dosmaperr 14 API calls 19316->19318 19322 c67bb std::locale::_Setgloballocale 19316->19322 19325 c6834 19317->19325 19362 c0cb9 EnterCriticalSection 19317->19362 19318->19322 19319 c6808 19320 c2b87 __dosmaperr 14 API calls 19319->19320 19321 c680d 19320->19321 19359 be0cf 19321->19359 19322->19317 19322->19319 19331 c67f2 19322->19331 19326 c6876 19325->19326 19327 c6967 19325->19327 19339 c68a5 19325->19339 19326->19339 19363 c6350 GetLastError 19326->19363 19330 c6972 19327->19330 19394 c0d01 LeaveCriticalSection 19327->19394 19333 c3b5d std::locale::_Setgloballocale 23 API calls 19330->19333 19331->19151 19335 c697a 19333->19335 19336 c6350 __Getctype 41 API calls 19340 c68fa 19336->19340 19338 c6350 __Getctype 41 API calls 19338->19339 19390 c6914 19339->19390 19340->19331 19341 c6350 __Getctype 41 API calls 19340->19341 19341->19331 19343 bdeef __fread_nolock std::locale::_Setgloballocale 19342->19343 19344 bdf1b IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 19343->19344 19345 bdfec std::locale::_Setgloballocale 19344->19345 19419 b982d 19345->19419 19347 be00a 19347->19155 19349 c6681 __FrameHandler3::FrameUnwindToState 19348->19349 19354 c0cb9 EnterCriticalSection 19349->19354 19351 c668f 19355 c66cd 19351->19355 19354->19351 19358 c0d01 LeaveCriticalSection 19355->19358 19357 be150 19357->19151 19357->19315 19358->19357 19395 be01b 19359->19395 19362->19325 19364 c6366 19363->19364 19365 c636c 19363->19365 19367 c707a __dosmaperr 6 API calls 19364->19367 19366 c70b9 __dosmaperr 6 API calls 19365->19366 19369 c6370 SetLastError 19365->19369 19368 c6388 19366->19368 19367->19365 19368->19369 19371 c6b6b __dosmaperr 14 API calls 19368->19371 19373 c6405 19369->19373 19374 c6400 19369->19374 19372 c639d 19371->19372 19375 c63a5 19372->19375 19376 c63b6 19372->19376 19377 be14b __purecall 39 API calls 19373->19377 19374->19338 19379 c70b9 __dosmaperr 6 API calls 19375->19379 19380 c70b9 __dosmaperr 6 API calls 19376->19380 19378 c640a 19377->19378 19387 c63b3 19379->19387 19381 c63c2 19380->19381 19382 c63dd 19381->19382 19383 c63c6 19381->19383 19386 c617e __dosmaperr 14 API calls 19382->19386 19384 c70b9 __dosmaperr 6 API calls 19383->19384 19384->19387 19385 c663b ___free_lconv_mon 14 API calls 19385->19369 19388 c63e8 19386->19388 19387->19385 19389 c663b ___free_lconv_mon 14 API calls 19388->19389 19389->19369 19391 c691a 19390->19391 19392 c68eb 19390->19392 19418 c0d01 LeaveCriticalSection 19391->19418 19392->19331 19392->19336 19392->19340 19394->19330 19396 be02d _Fputc 19395->19396 19401 be052 19396->19401 19398 be045 19412 bde0b 19398->19412 19402 be062 19401->19402 19404 be069 19401->19404 19403 bde70 __strnicoll 16 API calls 19402->19403 19403->19404 19405 bde47 __strnicoll GetLastError SetLastError 19404->19405 19408 be077 19404->19408 19406 be09e 19405->19406 19407 be0fc __Getctype 11 API calls 19406->19407 19406->19408 19409 be0ce 19407->19409 19408->19398 19410 be01b __strnicoll 41 API calls 19409->19410 19411 be0db 19410->19411 19411->19398 19413 bde17 19412->19413 19414 bde2e 19413->19414 19415 bdeb6 _Fputc 41 API calls 19413->19415 19416 bdeb6 _Fputc 41 API calls 19414->19416 19417 bde41 19414->19417 19415->19414 19416->19417 19417->19331 19418->19392 19420 b9836 IsProcessorFeaturePresent 19419->19420 19421 b9835 19419->19421 19423 ba142 19420->19423 19421->19347 19426 ba105 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 19423->19426 19425 ba225 19425->19347 19426->19425 19428 cd28a __FrameHandler3::FrameUnwindToState 19427->19428 19430 cd2a4 19428->19430 19471 c0cb9 EnterCriticalSection 19428->19471 19431 cd153 19430->19431 19433 be14b __purecall 41 API calls 19430->19433 19438 ccea9 19431->19438 19432 cd2e0 19472 cd2fd 19432->19472 19435 cd31d 19433->19435 19436 cd2b4 19436->19432 19437 c663b ___free_lconv_mon 14 API calls 19436->19437 19437->19432 19476 c2b9a 19438->19476 19441 ccedc 19443 ccee1 GetACP 19441->19443 19444 ccef3 19441->19444 19442 cceca GetOEMCP 19442->19444 19443->19444 19444->19111 19445 c762f 19444->19445 19446 c766d 19445->19446 19451 c763d __dosmaperr 19445->19451 19447 c2b87 __dosmaperr 14 API calls 19446->19447 19449 c766b 19447->19449 19448 c7658 HeapAlloc 19448->19449 19448->19451 19449->19106 19450 c365b std::ios_base::_Init 2 API calls 19450->19451 19451->19446 19451->19448 19451->19450 19453 ccea9 43 API calls 19452->19453 19454 cd399 19453->19454 19456 cd3d6 IsValidCodePage 19454->19456 19460 cd412 __fread_nolock 19454->19460 19455 b982d __ehhandler$___std_fs_change_permissions@12 5 API calls 19457 cd1c0 19455->19457 19458 cd3e8 19456->19458 19456->19460 19457->19113 19457->19117 19459 cd417 GetCPInfo 19458->19459 19462 cd3f1 __fread_nolock 19458->19462 19459->19460 19459->19462 19460->19455 19518 ccf7d 19462->19518 19464 ccda7 __FrameHandler3::FrameUnwindToState 19463->19464 19596 c0cb9 EnterCriticalSection 19464->19596 19466 ccdb1 19597 ccde8 19466->19597 19471->19436 19475 c0d01 LeaveCriticalSection 19472->19475 19474 cd304 19474->19430 19475->19474 19477 c2bb8 19476->19477 19483 c2bb1 19476->19483 19478 c6350 __Getctype 41 API calls 19477->19478 19477->19483 19479 c2bd9 19478->19479 19484 c6aaf 19479->19484 19483->19441 19483->19442 19485 c6ac2 19484->19485 19487 c2bef 19484->19487 19485->19487 19492 cef02 19485->19492 19488 c6b0d 19487->19488 19489 c6b35 19488->19489 19490 c6b20 19488->19490 19489->19483 19490->19489 19513 cd366 19490->19513 19493 cef0e __FrameHandler3::FrameUnwindToState 19492->19493 19494 c6350 __Getctype 41 API calls 19493->19494 19495 cef17 19494->19495 19496 cef5d 19495->19496 19505 c0cb9 EnterCriticalSection 19495->19505 19496->19487 19498 cef35 19506 cef83 19498->19506 19503 be14b __purecall 41 API calls 19504 cef82 19503->19504 19505->19498 19507 cef91 __Getctype 19506->19507 19509 cef46 19506->19509 19508 cecb6 __Getctype 14 API calls 19507->19508 19507->19509 19508->19509 19510 cef62 19509->19510 19511 c0d01 std::_Lockit::~_Lockit LeaveCriticalSection 19510->19511 19512 cef59 19511->19512 19512->19496 19512->19503 19514 c6350 __Getctype 41 API calls 19513->19514 19515 cd36b 19514->19515 19516 cd27e __strnicoll 41 API calls 19515->19516 19517 cd376 19516->19517 19517->19489 19519 ccfa5 GetCPInfo 19518->19519 19528 cd06e 19518->19528 19525 ccfbd 19519->19525 19519->19528 19521 b982d __ehhandler$___std_fs_change_permissions@12 5 API calls 19523 cd127 19521->19523 19523->19460 19529 c936c 19525->19529 19528->19521 19530 c2b9a __strnicoll 41 API calls 19529->19530 19531 c938c 19530->19531 19549 cc34e 19531->19549 19533 c9450 19535 b982d __ehhandler$___std_fs_change_permissions@12 5 API calls 19533->19535 19534 c9448 19552 b92ec 19534->19552 19539 c9473 19535->19539 19536 c93b9 19536->19533 19536->19534 19538 c762f __fread_nolock 15 API calls 19536->19538 19540 c93de __fread_nolock __alloca_probe_16 19536->19540 19538->19540 19540->19534 19541 cc34e __strnicoll MultiByteToWideChar 19540->19541 19542 c9429 19541->19542 19542->19534 19551 cc35f MultiByteToWideChar 19549->19551 19551->19536 19553 b9307 19552->19553 19554 b92f6 19552->19554 19553->19533 19554->19553 19596->19466 19607 c20ad 19597->19607 19599 cce0a 19600 c20ad __fread_nolock 41 API calls 19599->19600 19602 cce29 19600->19602 19608 c20be 19607->19608 19617 c20ba _Yarn 19607->19617 19609 c20c5 19608->19609 19612 c20d8 __fread_nolock 19608->19612 19610 c2b87 __dosmaperr 14 API calls 19609->19610 19611 c20ca 19610->19611 19614 c210f 19612->19614 19615 c2106 19612->19615 19612->19617 19614->19617 19619 c2b87 __dosmaperr 14 API calls 19614->19619 19616 c2b87 __dosmaperr 14 API calls 19615->19616 19617->19599 19623 c5f05 19622->19623 19624 c5f13 19622->19624 19623->19624 19629 c5f2b 19623->19629 19625 c2b87 __dosmaperr 14 API calls 19624->19625 19626 c5f1b 19625->19626 19627 be0cf __strnicoll 41 API calls 19626->19627 19628 c5f25 19627->19628 19628->19057 19629->19628 19630 c2b87 __dosmaperr 14 API calls 19629->19630 19630->19626 19632 c4000 19631->19632 19633 c402f 19631->19633 19632->19068 19634 c4046 19633->19634 19635 c663b ___free_lconv_mon 14 API calls 19633->19635 19636 c663b ___free_lconv_mon 14 API calls 19634->19636 19635->19633 19636->19632 19638 be108 19637->19638 19639 bded3 std::locale::_Setgloballocale 8 API calls 19638->19639 19640 be11d GetCurrentProcess TerminateProcess 19639->19640 19640->19073 19642 b633c 19641->19642 19660 c0807 19642->19660 19645 b94e4 19646 b94e9 19645->19646 19648 b9503 19646->19648 19649 c365b std::ios_base::_Init 2 API calls 19646->19649 19651 b9505 std::ios_base::_Init 19646->19651 20128 c0d2f 19646->20128 19648->18877 19649->19646 19650 b9ec0 std::ios_base::_Init 19652 ba530 Concurrency::cancel_current_task RaiseException 19650->19652 19651->19650 20137 ba530 19651->20137 19654 b9edd 19652->19654 20140 b1660 19655->20140 19659 d75a8 shared_ptr 19659->18876 19661 c081b _Fputc 19660->19661 19662 c083d 19661->19662 19664 c0864 19661->19664 19663 be052 __strnicoll 41 API calls 19662->19663 19665 c0858 19663->19665 19669 bed6f 19664->19669 19667 bde0b _Fputc 41 API calls 19665->19667 19668 b6357 FreeConsole 19667->19668 19668->19645 19670 bed7b __FrameHandler3::FrameUnwindToState 19669->19670 19677 bed47 EnterCriticalSection 19670->19677 19672 bed89 19678 bf8ef 19672->19678 19677->19672 19692 c84db 19678->19692 19680 bf916 19701 bfafa 19680->19701 19687 b982d __ehhandler$___std_fs_change_permissions@12 5 API calls 19688 bed96 19687->19688 19689 bedbe 19688->19689 20127 bed5b LeaveCriticalSection 19689->20127 19691 beda7 19691->19665 19723 c84a0 19692->19723 19694 c84ec 19695 c853c 19694->19695 19696 c8565 19694->19696 19697 c762f __fread_nolock 15 API calls 19695->19697 19696->19680 19698 c8546 19697->19698 19699 c663b ___free_lconv_mon 14 API calls 19698->19699 19700 c854f 19699->19700 19700->19696 19745 c0641 19701->19745 19704 bfb23 19706 be052 __strnicoll 41 API calls 19704->19706 19705 bf95d 19716 bf8b1 19705->19716 19706->19705 19711 bfb4e std::_Locinfo::_Locinfo_ctor 19711->19705 19712 bfd2b 19711->19712 19751 bea70 19711->19751 19758 bfa82 19711->19758 19761 bfda6 19711->19761 19795 bff04 19711->19795 19713 be052 __strnicoll 41 API calls 19712->19713 19714 bfd47 19713->19714 19715 be052 __strnicoll 41 API calls 19714->19715 19715->19705 19717 c663b ___free_lconv_mon 14 API calls 19716->19717 19718 bf8c1 19717->19718 19719 c8587 19718->19719 19720 c8592 19719->19720 19721 bf977 19719->19721 19720->19721 20027 c1b3e 19720->20027 19721->19687 19724 c84ac 19723->19724 19725 c84cd 19724->19725 19729 c8464 19724->19729 19725->19694 19727 c84c7 19736 d215c 19727->19736 19730 c8485 19729->19730 19731 c8470 19729->19731 19730->19727 19732 c2b87 __dosmaperr 14 API calls 19731->19732 19733 c8475 19732->19733 19734 be0cf __strnicoll 41 API calls 19733->19734 19735 c8480 19734->19735 19735->19727 19737 d2169 19736->19737 19739 d2176 19736->19739 19738 c2b87 __dosmaperr 14 API calls 19737->19738 19742 d216e 19738->19742 19740 d2182 19739->19740 19741 c2b87 __dosmaperr 14 API calls 19739->19741 19740->19725 19743 d21a3 19741->19743 19742->19725 19744 be0cf __strnicoll 41 API calls 19743->19744 19744->19742 19746 c064c 19745->19746 19747 c066e 19745->19747 19748 be052 __strnicoll 41 API calls 19746->19748 19824 c0679 19747->19824 19750 bfb15 19748->19750 19750->19704 19750->19705 19750->19711 19832 bdeb6 19751->19832 19873 bee94 19758->19873 19760 bfabd 19760->19711 19762 bfdad 19761->19762 19763 bfdc4 19761->19763 19765 bff99 19762->19765 19766 bff28 19762->19766 19767 bfe03 19762->19767 19764 be052 __strnicoll 41 API calls 19763->19764 19763->19767 19768 bfdf8 19764->19768 19771 bff9e 19765->19771 19772 bffec 19765->19772 19769 bff2e 19766->19769 19770 bffc6 19766->19770 19767->19711 19768->19711 19777 bff6b 19769->19777 19780 bff34 19769->19780 19915 bf23e 19770->19915 19773 bffe0 19771->19773 19774 bffa0 19771->19774 19772->19770 19772->19777 19794 bff50 19772->19794 19932 c05ba 19773->19932 19778 bffa5 19774->19778 19779 bff42 19774->19779 19782 bff64 19777->19782 19896 bf3bb 19777->19896 19778->19770 19784 bffaa 19778->19784 19779->19782 19779->19794 19922 c02fa 19779->19922 19780->19779 19783 bff80 19780->19783 19780->19794 19790 b982d __ehhandler$___std_fs_change_permissions@12 5 API calls 19782->19790 19783->19782 19903 c0484 19783->19903 19785 bffaf 19784->19785 19786 bffbd 19784->19786 19785->19782 19907 c059d 19785->19907 19911 c0519 19786->19911 19792 c024a 19790->19792 19792->19711 19794->19782 19935 c81c7 19794->19935 19796 bff99 19795->19796 19797 bff28 19795->19797 19800 bff9e 19796->19800 19801 bffec 19796->19801 19798 bff2e 19797->19798 19799 bffc6 19797->19799 19804 bff6b 19798->19804 19810 bff34 19798->19810 19805 bf23e 42 API calls 19799->19805 19802 bffe0 19800->19802 19803 bffa0 19800->19803 19801->19799 19801->19804 19822 bff50 19801->19822 19808 c05ba 42 API calls 19802->19808 19806 bffa5 19803->19806 19807 bff42 19803->19807 19813 bf3bb 42 API calls 19804->19813 19823 bff64 19804->19823 19805->19822 19806->19799 19812 bffaa 19806->19812 19811 c02fa 44 API calls 19807->19811 19807->19822 19807->19823 19808->19822 19809 bff80 19817 c0484 43 API calls 19809->19817 19809->19823 19810->19807 19810->19809 19810->19822 19811->19822 19814 bffaf 19812->19814 19815 bffbd 19812->19815 19813->19822 19819 c059d 42 API calls 19814->19819 19814->19823 19816 c0519 41 API calls 19815->19816 19816->19822 19817->19822 19818 b982d __ehhandler$___std_fs_change_permissions@12 5 API calls 19820 c024a 19818->19820 19819->19822 19820->19711 19821 c81c7 43 API calls 19821->19822 19822->19821 19822->19823 19823->19818 19825 c068d 19824->19825 19831 c06f7 19824->19831 19826 c8464 __fread_nolock 41 API calls 19825->19826 19828 c0694 19826->19828 19827 c2b87 __dosmaperr 14 API calls 19829 c06ec 19827->19829 19828->19827 19828->19831 19830 be0cf __strnicoll 41 API calls 19829->19830 19830->19831 19831->19750 19833 bdec9 19832->19833 19834 bdec0 19832->19834 19839 c6adc 19833->19839 19847 bde70 GetLastError 19834->19847 19836 bdec5 19836->19833 19837 be14b __purecall 41 API calls 19836->19837 19838 bded2 19837->19838 19840 bea9d 19839->19840 19841 c6af3 19839->19841 19843 c6b3a 19840->19843 19841->19840 19842 cef02 __Getctype 41 API calls 19841->19842 19842->19840 19844 beaaa 19843->19844 19845 c6b51 19843->19845 19844->19711 19845->19844 19846 cd366 __strnicoll 41 API calls 19845->19846 19846->19844 19848 bde89 19847->19848 19851 c6552 19848->19851 19852 c656b 19851->19852 19853 c6565 19851->19853 19854 c70b9 __dosmaperr 6 API calls 19852->19854 19872 bdea1 SetLastError 19852->19872 19855 c707a __dosmaperr 6 API calls 19853->19855 19856 c6585 19854->19856 19855->19852 19857 c6b6b __dosmaperr 14 API calls 19856->19857 19856->19872 19858 c6595 19857->19858 19859 c659d 19858->19859 19860 c65b2 19858->19860 19861 c70b9 __dosmaperr 6 API calls 19859->19861 19862 c70b9 __dosmaperr 6 API calls 19860->19862 19863 c65a9 19861->19863 19864 c65be 19862->19864 19869 c663b ___free_lconv_mon 14 API calls 19863->19869 19865 c65d1 19864->19865 19866 c65c2 19864->19866 19868 c617e __dosmaperr 14 API calls 19865->19868 19867 c70b9 __dosmaperr 6 API calls 19866->19867 19867->19863 19870 c65dc 19868->19870 19869->19872 19871 c663b ___free_lconv_mon 14 API calls 19870->19871 19871->19872 19872->19836 19883 beacb 19873->19883 19875 beebb 19877 be052 __strnicoll 41 API calls 19875->19877 19876 beea6 19876->19875 19878 beeee 19876->19878 19882 beed6 std::_Locinfo::_Locinfo_ctor 19876->19882 19877->19882 19879 bef85 19878->19879 19890 bea11 19878->19890 19880 bea11 41 API calls 19879->19880 19880->19882 19882->19760 19884 beae3 19883->19884 19885 bead0 19883->19885 19884->19876 19886 c2b87 __dosmaperr 14 API calls 19885->19886 19887 bead5 19886->19887 19888 be0cf __strnicoll 41 API calls 19887->19888 19889 beae0 19888->19889 19889->19876 19891 bea36 19890->19891 19892 bea22 19890->19892 19891->19879 19892->19891 19893 c2b87 __dosmaperr 14 API calls 19892->19893 19894 bea2b 19893->19894 19895 be0cf __strnicoll 41 API calls 19894->19895 19895->19891 19897 bf3cf 19896->19897 19898 bf3f1 19897->19898 19900 bf418 19897->19900 19899 be052 __strnicoll 41 API calls 19898->19899 19901 bf40e 19899->19901 19900->19901 19945 bede2 19900->19945 19901->19794 19904 c049f 19903->19904 19905 c04d6 19904->19905 19906 c81c7 43 API calls 19904->19906 19905->19794 19906->19905 19908 c05a9 19907->19908 19959 bf0c1 19908->19959 19910 c05b9 19910->19794 19914 c052e 19911->19914 19912 be052 __strnicoll 41 API calls 19913 c054f 19912->19913 19913->19794 19914->19912 19914->19913 19916 bf252 19915->19916 19917 bf274 19916->19917 19919 bf29b 19916->19919 19918 be052 __strnicoll 41 API calls 19917->19918 19920 bf291 19918->19920 19919->19920 19921 bede2 15 API calls 19919->19921 19920->19794 19921->19920 19923 c0314 19922->19923 19924 bede2 15 API calls 19923->19924 19925 c0355 19924->19925 19966 c8046 19925->19966 19928 c0403 19930 bea70 std::_Locinfo::_Locinfo_ctor 41 API calls 19928->19930 19931 c0436 19928->19931 19929 bea70 std::_Locinfo::_Locinfo_ctor 41 API calls 19929->19928 19930->19931 19931->19794 19931->19931 19933 bf3bb 42 API calls 19932->19933 19934 c05cf 19933->19934 19934->19794 19936 c81dc 19935->19936 19937 c821d 19936->19937 19939 bea70 std::_Locinfo::_Locinfo_ctor 41 API calls 19936->19939 19940 c81e0 __fread_nolock std::_Locinfo::_Locinfo_ctor 19936->19940 19941 c8209 __fread_nolock 19936->19941 19937->19940 19937->19941 19942 cc3ca std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 19937->19942 19938 be052 __strnicoll 41 API calls 19938->19940 19939->19937 19940->19794 19941->19938 19941->19940 19943 c82d8 19942->19943 19943->19940 19944 c82ee GetLastError 19943->19944 19944->19940 19944->19941 19946 bee09 19945->19946 19947 bedf7 19945->19947 19946->19947 19948 c762f __fread_nolock 15 API calls 19946->19948 19947->19901 19949 bee2d 19948->19949 19950 bee40 19949->19950 19951 bee35 19949->19951 19956 bf8cb 19950->19956 19952 c663b ___free_lconv_mon 14 API calls 19951->19952 19952->19947 19955 c663b ___free_lconv_mon 14 API calls 19955->19947 19957 c663b ___free_lconv_mon 14 API calls 19956->19957 19958 bee4b 19957->19958 19958->19955 19960 bf0d5 19959->19960 19961 bf0f7 19960->19961 19963 bf11e 19960->19963 19962 be052 __strnicoll 41 API calls 19961->19962 19964 bf114 19962->19964 19963->19964 19965 bede2 15 API calls 19963->19965 19964->19910 19965->19964 19967 c807b 19966->19967 19969 c8057 19966->19969 19967->19969 19970 c80ae 19967->19970 19968 be052 __strnicoll 41 API calls 19979 c03df 19968->19979 19969->19968 19971 c8116 19970->19971 19974 c80e7 19970->19974 19972 c813f 19971->19972 19973 c8144 19971->19973 19977 c816c 19972->19977 19978 c81a6 19972->19978 19993 c7782 19973->19993 19985 c7eea 19974->19985 19980 c818c 19977->19980 19981 c8171 19977->19981 20020 c7aae 19978->20020 19979->19928 19979->19929 20013 c7c97 19980->20013 20003 c7e1b 19981->20003 19986 c7f00 19985->19986 19987 c7f0b 19985->19987 19986->19979 19988 c5ef7 std::invalid_argument::invalid_argument 41 API calls 19987->19988 19990 c7f66 19988->19990 19989 c7f70 19989->19979 19990->19989 19991 be0fc __Getctype 11 API calls 19990->19991 19994 c7795 19993->19994 19995 c77a4 19994->19995 19996 c77c6 19994->19996 19997 be052 __strnicoll 41 API calls 19995->19997 19998 c77e0 19996->19998 20000 c7835 19996->20000 20004 d09fc 43 API calls 20003->20004 20021 d09fc 43 API calls 20020->20021 20028 c1b7e 20027->20028 20029 c1b57 20027->20029 20028->19721 20029->20028 20030 c8464 __fread_nolock 41 API calls 20029->20030 20031 c1b73 20030->20031 20033 ca1ec 20031->20033 20036 ca1f8 __FrameHandler3::FrameUnwindToState 20033->20036 20034 ca200 20034->20028 20035 ca2bc 20037 be052 __strnicoll 41 API calls 20035->20037 20036->20034 20036->20035 20038 ca24d 20036->20038 20037->20034 20044 cde13 EnterCriticalSection 20038->20044 20040 ca253 20041 ca270 20040->20041 20045 ca2f4 20040->20045 20073 ca2b4 20041->20073 20044->20040 20046 ca319 20045->20046 20069 ca33c __fread_nolock 20045->20069 20047 ca31d 20046->20047 20049 ca37b 20046->20049 20048 be052 __strnicoll 41 API calls 20047->20048 20048->20069 20050 ca392 20049->20050 20090 cb87a 20049->20090 20076 c9e78 20050->20076 20069->20041 20126 cde36 LeaveCriticalSection 20073->20126 20075 ca2ba 20075->20034 20126->20075 20127->19691 20130 c762f 20128->20130 20129 c766d 20131 c2b87 __dosmaperr 14 API calls 20129->20131 20130->20129 20132 c7658 HeapAlloc 20130->20132 20135 c7641 __dosmaperr 20130->20135 20133 c7672 20131->20133 20134 c766b 20132->20134 20132->20135 20133->19646 20134->20133 20135->20129 20135->20132 20136 c365b std::ios_base::_Init 2 API calls 20135->20136 20136->20135 20138 ba577 RaiseException 20137->20138 20139 ba54a 20137->20139 20138->19650 20139->20138 20141 b1696 20140->20141 20162 b2d20 20141->20162 20144 b16e3 20147 b16e8 20144->20147 20167 b6250 20144->20167 20145 b181d 20154 b2010 20145->20154 20146 b180a 20146->20145 20170 b4af0 20146->20170 20147->20146 20148 b1843 std::ios_base::_Init 20147->20148 20174 b2ac0 20148->20174 20155 b2030 20154->20155 20492 b2090 20155->20492 20157 b203a 20521 b6080 20157->20521 20160 b59f0 113 API calls 20161 b2075 20160->20161 20161->19659 20164 b2d37 20162->20164 20163 b2d4b 20163->20144 20164->20163 20188 b59f0 20164->20188 20200 b8cc6 20167->20200 20168 b6263 20168->20147 20171 b4b53 20170->20171 20172 b4b2e 20170->20172 20171->20145 20172->20171 20247 b61e0 20172->20247 20175 b2b00 20174->20175 20175->20175 20258 b1960 20175->20258 20177 b2b14 20266 b2480 20177->20266 20179 b2b22 20180 b2b4a shared_ptr 20179->20180 20183 b2b71 20179->20183 20181 b982d __ehhandler$___std_fs_change_permissions@12 5 API calls 20180->20181 20182 b1877 20181->20182 20286 be0df 20183->20286 20189 b5a31 20188->20189 20193 b2d67 20188->20193 20190 b2d20 113 API calls 20189->20190 20191 b5a3a 20190->20191 20192 b5ab2 20191->20192 20195 b5aeb std::ios_base::_Init 20191->20195 20192->20193 20194 b4af0 113 API calls 20192->20194 20193->20144 20194->20193 20196 b2ac0 std::ios_base::_Init 113 API calls 20195->20196 20197 b5b1d 20196->20197 20198 ba530 Concurrency::cancel_current_task RaiseException 20197->20198 20199 b5b2b 20198->20199 20201 b8cd5 20200->20201 20202 b8ce8 _Yarn 20200->20202 20201->20168 20202->20201 20204 c2746 20202->20204 20205 c2759 _Fputc 20204->20205 20210 c2525 20205->20210 20207 c276e 20208 bde0b _Fputc 41 API calls 20207->20208 20209 c277b 20208->20209 20209->20201 20211 c2533 20210->20211 20216 c255b 20210->20216 20212 c2540 20211->20212 20213 c2562 20211->20213 20211->20216 20215 be052 __strnicoll 41 API calls 20212->20215 20218 c247e 20213->20218 20215->20216 20216->20207 20219 c248a __FrameHandler3::FrameUnwindToState 20218->20219 20226 bed47 EnterCriticalSection 20219->20226 20221 c2498 20227 c24d9 20221->20227 20226->20221 20228 c84db 42 API calls 20227->20228 20229 c24f1 20228->20229 20237 c259c 20229->20237 20232 c8587 66 API calls 20233 c24a5 20232->20233 20234 c24cd 20233->20234 20246 bed5b LeaveCriticalSection 20234->20246 20236 c24b6 20236->20207 20240 c25ae 20237->20240 20241 c250f 20237->20241 20238 c25bc 20239 be052 __strnicoll 41 API calls 20238->20239 20239->20241 20240->20238 20240->20241 20244 c25f2 _Yarn _Fputc 20240->20244 20241->20232 20242 c1b3e ___scrt_uninitialize_crt 66 API calls 20242->20244 20243 c8464 __fread_nolock 41 API calls 20243->20244 20244->20241 20244->20242 20244->20243 20245 ca1ec ___scrt_uninitialize_crt 66 API calls 20244->20245 20245->20244 20246->20236 20250 b5740 20247->20250 20249 b61fe 20249->20171 20251 b5754 20250->20251 20253 b575d std::ios_base::_Init 20250->20253 20252 ba530 Concurrency::cancel_current_task RaiseException 20251->20252 20251->20253 20252->20253 20253->20249 20254 b2ac0 std::ios_base::_Init 113 API calls 20253->20254 20255 b57a3 20254->20255 20256 ba530 Concurrency::cancel_current_task RaiseException 20255->20256 20257 b57b2 20256->20257 20259 b19e9 20258->20259 20260 b1970 20258->20260 20305 b55c0 20259->20305 20262 b1975 _Yarn 20260->20262 20291 b1900 20260->20291 20262->20177 20265 b19c3 _Yarn 20265->20177 20267 b24a8 20266->20267 20268 b2665 20267->20268 20272 b24b9 20267->20272 20269 b55c0 std::_Throw_Cpp_error 113 API calls 20268->20269 20271 b266a 20269->20271 20270 b24be _Yarn 20270->20271 20278 b25aa shared_ptr 20270->20278 20273 be0df std::_Throw_Cpp_error 41 API calls 20271->20273 20272->20270 20275 b1900 std::_Throw_Cpp_error 113 API calls 20272->20275 20274 b266f 20273->20274 20276 be0df std::_Throw_Cpp_error 41 API calls 20274->20276 20275->20270 20277 b2674 20276->20277 20279 ba4ae std::invalid_argument::invalid_argument 42 API calls 20277->20279 20280 ba4ae std::invalid_argument::invalid_argument 42 API calls 20278->20280 20281 b26a2 20279->20281 20282 b25ff 20280->20282 20281->20179 20282->20274 20283 b2630 shared_ptr 20282->20283 20284 b982d __ehhandler$___std_fs_change_permissions@12 5 API calls 20283->20284 20285 b265f 20284->20285 20285->20179 20292 b1933 20291->20292 20293 b1910 20291->20293 20296 b1944 20292->20296 20298 b94e4 std::ios_base::_Init 16 API calls 20292->20298 20294 b194a 20293->20294 20295 b1917 20293->20295 20325 b5360 20294->20325 20297 b94e4 std::ios_base::_Init 16 API calls 20295->20297 20296->20265 20300 b191d 20297->20300 20301 b193d 20298->20301 20302 b1926 20300->20302 20303 be0df std::_Throw_Cpp_error 41 API calls 20300->20303 20301->20265 20302->20265 20304 b1954 20303->20304 20481 b64e0 20305->20481 20326 b536b std::ios_base::_Init 20325->20326 20327 ba530 Concurrency::cancel_current_task RaiseException 20326->20327 20328 b537a 20327->20328 20329 ba530 Concurrency::cancel_current_task RaiseException 20328->20329 20330 b539a 20329->20330 20364 b2bc0 20330->20364 20333 ba530 Concurrency::cancel_current_task RaiseException 20334 b53be 20333->20334 20367 b7043 20334->20367 20365 ba4ae std::invalid_argument::invalid_argument 42 API calls 20364->20365 20366 b2bee 20365->20366 20366->20333 20419 b7072 GetCurrentThreadId 20367->20419 20486 b6477 20481->20486 20484 ba530 Concurrency::cancel_current_task RaiseException 20485 b64ff 20484->20485 20489 b2a00 20486->20489 20490 ba4ae std::invalid_argument::invalid_argument 42 API calls 20489->20490 20491 b2a2e 20490->20491 20491->20484 20532 b6389 20492->20532 20495 b6389 std::_Lockit::_Lockit 7 API calls 20496 b20c4 20495->20496 20538 b63e1 20496->20538 20497 b2214 20498 b63e1 std::_Lockit::~_Lockit 2 API calls 20497->20498 20500 b222d 20498->20500 20499 b20e5 20499->20497 20502 b2132 20499->20502 20503 b2147 20499->20503 20500->20157 20504 b63e1 std::_Lockit::~_Lockit 2 API calls 20502->20504 20505 b94e4 std::ios_base::_Init 16 API calls 20503->20505 20506 b213d 20504->20506 20509 b214e 20505->20509 20506->20157 20507 b21ea 20508 b220e 20507->20508 20566 b2f90 20507->20566 20581 b7554 20508->20581 20509->20507 20510 b6389 std::_Lockit::_Lockit 7 API calls 20509->20510 20513 b2182 20510->20513 20514 b21c8 20513->20514 20515 b2237 20513->20515 20545 b7684 20514->20545 20584 b6500 20515->20584 20522 b2d20 113 API calls 20521->20522 20523 b60be 20522->20523 20524 b6148 20523->20524 20525 b6183 std::ios_base::_Init 20523->20525 20526 b206e 20524->20526 20527 b4af0 113 API calls 20524->20527 20528 b2ac0 std::ios_base::_Init 113 API calls 20525->20528 20526->20160 20527->20526 20529 b61b5 20528->20529 20530 ba530 Concurrency::cancel_current_task RaiseException 20529->20530 20533 b6398 20532->20533 20534 b639f 20532->20534 20589 c0d18 20533->20589 20536 b20aa 20534->20536 20594 b8fef EnterCriticalSection 20534->20594 20536->20495 20536->20499 20539 b63eb 20538->20539 20540 c0d26 20538->20540 20544 b63fe 20539->20544 20646 b8ffd LeaveCriticalSection 20539->20646 20647 c0d01 LeaveCriticalSection 20540->20647 20543 c0d2d 20543->20499 20544->20499 20648 c1128 20545->20648 20787 b76cf 20566->20787 20569 b2fa9 20571 b2fc0 20569->20571 20572 be130 ___std_exception_destroy 14 API calls 20569->20572 20570 be130 ___std_exception_destroy 14 API calls 20570->20569 20573 b2fd7 20571->20573 20575 be130 ___std_exception_destroy 14 API calls 20571->20575 20572->20571 20574 b2fee 20573->20574 20576 be130 ___std_exception_destroy 14 API calls 20573->20576 20577 b3005 20574->20577 20578 be130 ___std_exception_destroy 14 API calls 20574->20578 20575->20573 20576->20574 20578->20577 20582 b94e4 std::ios_base::_Init 16 API calls 20581->20582 20583 b755f 20582->20583 20583->20497 20791 b2ce0 20584->20791 20587 ba530 Concurrency::cancel_current_task RaiseException 20595 c72d1 20589->20595 20594->20536 20616 c6c80 20595->20616 20617 c6e69 std::_Lockit::_Lockit 5 API calls 20616->20617 20618 c6c96 20617->20618 20619 c6c9a 20618->20619 20620 c6e69 std::_Lockit::_Lockit 5 API calls 20619->20620 20621 c6cb0 20620->20621 20622 c6cb4 20621->20622 20623 c6e69 std::_Lockit::_Lockit 5 API calls 20622->20623 20624 c6cca 20623->20624 20625 c6cce 20624->20625 20626 c6e69 std::_Lockit::_Lockit 5 API calls 20625->20626 20627 c6ce4 20626->20627 20646->20544 20647->20543 20649 c72d1 std::_Lockit::_Lockit 5 API calls 20648->20649 20650 c1135 20649->20650 20659 c0ed3 20650->20659 20788 b76db 20787->20788 20789 b2f99 20787->20789 20790 c1128 std::_Locinfo::_Locinfo_ctor 68 API calls 20788->20790 20789->20569 20789->20570 20790->20789 20792 ba4ae std::invalid_argument::invalid_argument 42 API calls 20791->20792 20793 b2d0e 20792->20793 20793->20587 20795 c39ae 20794->20795 20796 c39bf 20794->20796 20805 c3a49 GetModuleHandleW 20795->20805 20812 c382a 20796->20812 20801 c39fd 20801->18853 20806 c39b3 20805->20806 20806->20796 20807 c3aae GetModuleHandleExW 20806->20807 20808 c3aed GetProcAddress 20807->20808 20809 c3b01 20807->20809 20808->20809 20810 c3b1d 20809->20810 20811 c3b14 FreeLibrary 20809->20811 20810->20796 20811->20810 20813 c3836 __FrameHandler3::FrameUnwindToState 20812->20813 20827 c0cb9 EnterCriticalSection 20813->20827 20815 c3840 20828 c3896 20815->20828 20817 c384d 20832 c386b 20817->20832 20820 c3a18 20857 c3a8c 20820->20857 20823 c3a36 20825 c3aae std::locale::_Setgloballocale 3 API calls 20823->20825 20824 c3a26 GetCurrentProcess TerminateProcess 20824->20823 20826 c3a3e ExitProcess 20825->20826 20827->20815 20829 c38a2 __FrameHandler3::FrameUnwindToState 20828->20829 20830 c3909 std::locale::_Setgloballocale 20829->20830 20835 c4421 20829->20835 20830->20817 20856 c0d01 LeaveCriticalSection 20832->20856 20834 c3859 20834->20801 20834->20820 20836 c442d __EH_prolog3 20835->20836 20839 c4179 20836->20839 20838 c4454 std::ios_base::_Init 20838->20830 20840 c4185 __FrameHandler3::FrameUnwindToState 20839->20840 20847 c0cb9 EnterCriticalSection 20840->20847 20842 c4193 20848 c4331 20842->20848 20847->20842 20849 c4350 20848->20849 20850 c41a0 20848->20850 20849->20850 20851 c663b ___free_lconv_mon 14 API calls 20849->20851 20852 c41c8 20850->20852 20851->20850 20855 c0d01 LeaveCriticalSection 20852->20855 20854 c41b1 20854->20838 20855->20854 20856->20834 20862 c85c5 GetPEB 20857->20862 20860 c3a22 20860->20823 20860->20824 20861 c3a96 GetPEB 20861->20860 20863 c3a91 20862->20863 20864 c85df 20862->20864 20863->20860 20863->20861 20866 c6eec 20864->20866 20867 c6e69 std::_Lockit::_Lockit 5 API calls 20866->20867 20868 c6f08 20867->20868 20868->20863 20870 c45e5 ___scrt_uninitialize_crt 20869->20870 20871 c45d3 20869->20871 20870->18895 20872 c45e1 20871->20872 20874 c1c0c 20871->20874 20872->18895 20877 c1a99 20874->20877 20880 c198d 20877->20880 20881 c1999 __FrameHandler3::FrameUnwindToState 20880->20881 20888 c0cb9 EnterCriticalSection 20881->20888 20883 c1a0f 20897 c1a2d 20883->20897 20886 c19a3 ___scrt_uninitialize_crt 20886->20883 20889 c1901 20886->20889 20888->20886 20890 c190d __FrameHandler3::FrameUnwindToState 20889->20890 20900 bed47 EnterCriticalSection 20890->20900 20892 c1917 ___scrt_uninitialize_crt 20893 c1950 20892->20893 20901 c1ba7 20892->20901 20914 c1981 20893->20914 20962 c0d01 LeaveCriticalSection 20897->20962 20899 c1a1b 20899->20872 20900->20892 20902 c1bbc _Fputc 20901->20902 20903 c1bce 20902->20903 20904 c1bc3 20902->20904 20906 c1b3e ___scrt_uninitialize_crt 66 API calls 20903->20906 20905 c1a99 ___scrt_uninitialize_crt 70 API calls 20904->20905 20907 c1bc9 20905->20907 20908 c1bd8 20906->20908 20909 bde0b _Fputc 41 API calls 20907->20909 20908->20907 20911 c8464 __fread_nolock 41 API calls 20908->20911 20910 c1c06 20909->20910 20910->20893 20912 c1bef 20911->20912 20917 c99c1 20912->20917 20961 bed5b LeaveCriticalSection 20914->20961 20916 c196f 20916->20886 20918 c99d2 20917->20918 20922 c99df 20917->20922 20961->20916 20962->20899 20963 b8522 20964 b853e 20963->20964 20969 b8545 20963->20969 20965 b982d __ehhandler$___std_fs_change_permissions@12 5 API calls 20964->20965 20966 b8628 20965->20966 20967 b858e 20967->20964 20972 b7c6e 20967->20972 20969->20964 20969->20967 20970 b85eb 20969->20970 20970->20964 20971 c2746 69 API calls 20970->20971 20971->20964 20975 c0e94 20972->20975 20976 c0ea7 _Fputc 20975->20976 20981 c0d3a 20976->20981 20978 c0eb6 20979 bde0b _Fputc 41 API calls 20978->20979 20980 b7c7e 20979->20980 20980->20964 20982 c0d46 __FrameHandler3::FrameUnwindToState 20981->20982 20983 c0d4f 20982->20983 20984 c0d73 20982->20984 20985 be052 __strnicoll 41 API calls 20983->20985 20995 bed47 EnterCriticalSection 20984->20995 20994 c0d68 _Fputc 20985->20994 20987 c0d7c 20988 c0e27 _Fputc 20987->20988 20989 c8464 __fread_nolock 41 API calls 20987->20989 20996 c0e5f 20988->20996 20991 c0d95 20989->20991 20991->20988 20992 c0df6 20991->20992 20993 be052 __strnicoll 41 API calls 20992->20993 20993->20994 20994->20978 20995->20987 20999 bed5b LeaveCriticalSection 20996->20999 20998 c0e65 20998->20994 20999->20998 21000 be130 21001 c663b ___free_lconv_mon 14 API calls 21000->21001 21002 be148 21001->21002 21003 b4d60 21004 b4d68 21003->21004 21005 b61d0 43 API calls 21004->21005 21006 b4d8a 21005->21006 21009 b45a0 21006->21009 21007 b4d9c 21010 b45ab 21009->21010 21011 b45b0 Concurrency::cancel_current_task 21009->21011 21015 d7ab0 21010->21015 21011->21007 21012 ba530 Concurrency::cancel_current_task RaiseException 21011->21012 21013 b64df 21012->21013 21016 d7bc0 21015->21016 21026 d7ada shared_ptr 21015->21026 21018 d7c09 21016->21018 21020 d7beb shared_ptr 21016->21020 21017 b982d __ehhandler$___std_fs_change_permissions@12 5 API calls 21019 d7c03 21017->21019 21021 be0df std::_Throw_Cpp_error 41 API calls 21018->21021 21019->21011 21020->21017 21023 d7c0e CreateThread WaitForSingleObject 21021->21023 21022 b2010 111 API calls 21022->21026 21023->21011 21061 d7c30 21023->21061 21024 b1660 111 API calls 21024->21026 21026->21016 21026->21018 21026->21022 21026->21024 21027 beb9e 21026->21027 21028 bebb1 _Fputc 21027->21028 21033 be1c0 21028->21033 21030 bebcb 21031 bde0b _Fputc 41 API calls 21030->21031 21032 bebd8 21031->21032 21032->21026 21034 beacb std::_Locinfo::_Locinfo_ctor 41 API calls 21033->21034 21036 be1d2 21034->21036 21035 be21a 21038 bea70 std::_Locinfo::_Locinfo_ctor 41 API calls 21035->21038 21041 be23e 21035->21041 21036->21035 21037 be1e7 21036->21037 21046 be202 std::_Locinfo::_Locinfo_ctor 21036->21046 21039 be052 __strnicoll 41 API calls 21037->21039 21038->21041 21039->21046 21043 be262 21041->21043 21047 beb08 21041->21047 21042 be2ea 21044 bea11 41 API calls 21042->21044 21043->21042 21045 bea11 41 API calls 21043->21045 21044->21046 21045->21042 21046->21030 21048 beb2a 21047->21048 21049 beb14 21047->21049 21051 beb3a 21048->21051 21054 c69e4 21048->21054 21050 c1160 __Getctype 41 API calls 21049->21050 21052 beb1f std::_Locinfo::_Locinfo_ctor 21050->21052 21051->21041 21052->21041 21055 c2b9a __strnicoll 41 API calls 21054->21055 21057 c6a01 21055->21057 21056 c6a11 21059 b982d __ehhandler$___std_fs_change_permissions@12 5 API calls 21056->21059 21057->21056 21058 c936c std::_Locinfo::_Locinfo_ctor 44 API calls 21057->21058 21058->21056 21060 c6aad 21059->21060 21060->21051 21062 b1900 std::_Throw_Cpp_error 112 API calls 21061->21062 21063 d7c5e 21062->21063 21064 b94e4 std::ios_base::_Init 16 API calls 21063->21064 21065 d7c9a 21064->21065 21066 d7cb2 VirtualAlloc 21065->21066 21077 d78a0 21066->21077 21068 d7cd0 _Yarn 21098 d75d0 21068->21098 21070 d7d2b shared_ptr 21072 b982d __ehhandler$___std_fs_change_permissions@12 5 API calls 21070->21072 21074 d7d42 21072->21074 21073 d7d46 21075 be0df std::_Throw_Cpp_error 41 API calls 21073->21075 21076 d7d4b 21075->21076 21078 b94e4 std::ios_base::_Init 16 API calls 21077->21078 21079 d78bf shared_ptr 21078->21079 21080 d7aa3 21079->21080 21082 d7983 21079->21082 21116 b1d60 21079->21116 21083 be0df std::_Throw_Cpp_error 41 API calls 21080->21083 21086 d7a99 21082->21086 21087 d79db 21082->21087 21088 d7a06 21082->21088 21095 d79ec _Yarn 21082->21095 21084 d7aa8 21083->21084 21085 d7ab0 113 API calls 21093 d7a4e shared_ptr 21085->21093 21090 b5360 std::_Throw_Cpp_error 113 API calls 21086->21090 21087->21086 21089 d79e6 21087->21089 21092 b94e4 std::ios_base::_Init 16 API calls 21088->21092 21088->21095 21091 b94e4 std::ios_base::_Init 16 API calls 21089->21091 21090->21080 21091->21095 21092->21095 21093->21080 21094 d7a7c shared_ptr 21093->21094 21096 b982d __ehhandler$___std_fs_change_permissions@12 5 API calls 21094->21096 21095->21080 21095->21085 21097 d7a95 21096->21097 21097->21068 21099 b94e4 std::ios_base::_Init 16 API calls 21098->21099 21102 d7609 21099->21102 21100 b1660 111 API calls 21100->21102 21101 b2010 111 API calls 21101->21102 21102->21100 21102->21101 21104 d7679 21102->21104 21103 b1660 111 API calls 21103->21104 21104->21103 21105 b2010 111 API calls 21104->21105 21112 d76d0 shared_ptr 21104->21112 21105->21104 21106 d770e OffsetRect Polyline 21166 b19f0 21106->21166 21108 d7852 shared_ptr 21110 b982d __ehhandler$___std_fs_change_permissions@12 5 API calls 21108->21110 21111 d7885 21110->21111 21111->21070 21111->21073 21112->21106 21112->21108 21113 d788c 21112->21113 21179 b1ba0 21112->21179 21114 be0df std::_Throw_Cpp_error 41 API calls 21113->21114 21115 d7891 21114->21115 21117 b1db0 21116->21117 21121 b1dec _Yarn 21116->21121 21123 b18a0 21117->21123 21119 be0df std::_Throw_Cpp_error 41 API calls 21120 b1ec6 21119->21120 21121->21119 21122 b1e71 shared_ptr 21121->21122 21122->21079 21124 b18ad 21123->21124 21128 b18ed std::ios_base::_Init 21123->21128 21126 b18be 21124->21126 21124->21128 21132 b18c4 21124->21132 21125 b18cd 21125->21121 21129 b94e4 std::ios_base::_Init 16 API calls 21126->21129 21127 b94e4 std::ios_base::_Init 16 API calls 21130 b18e6 21127->21130 21131 ba530 Concurrency::cancel_current_task RaiseException 21128->21131 21129->21132 21130->21121 21133 b537a 21131->21133 21132->21125 21132->21127 21134 ba530 Concurrency::cancel_current_task RaiseException 21133->21134 21135 b539a 21134->21135 21136 b2bc0 42 API calls 21135->21136 21137 b53af 21136->21137 21138 ba530 Concurrency::cancel_current_task RaiseException 21137->21138 21139 b53be 21138->21139 21140 b7043 12 API calls 21139->21140 21141 b53d4 21140->21141 21142 b53db 21141->21142 21143 b543c 21141->21143 21144 b5443 21142->21144 21149 b53e5 21142->21149 21145 b73c0 std::_Throw_Cpp_error 113 API calls 21143->21145 21146 b73c0 std::_Throw_Cpp_error 113 API calls 21144->21146 21148 b544e 21146->21148 21147 b5423 21150 b5433 21147->21150 21154 b7054 ReleaseSRWLockExclusive 21147->21154 21151 b545e 21148->21151 21152 b4ad0 21148->21152 21149->21147 21153 b71ef 43 API calls 21149->21153 21150->21121 21156 b5515 21151->21156 21159 b5470 113 API calls 21151->21159 21155 b2c40 42 API calls 21152->21155 21153->21149 21154->21150 21157 b4ae0 21155->21157 21160 b5470 113 API calls 21156->21160 21163 b553c 21156->21163 21158 ba530 Concurrency::cancel_current_task RaiseException 21157->21158 21161 b4aef 21158->21161 21159->21156 21160->21163 21162 b5544 21162->21121 21163->21162 21164 b4d60 113 API calls 21163->21164 21165 b55af 21164->21165 21167 b1a3c 21166->21167 21168 b1b84 21166->21168 21169 b1a56 21167->21169 21170 b1aa4 21167->21170 21171 b1a94 21167->21171 21173 b5360 std::_Throw_Cpp_error 113 API calls 21168->21173 21172 b94e4 std::ios_base::_Init 16 API calls 21169->21172 21174 b94e4 std::ios_base::_Init 16 API calls 21170->21174 21177 b1a69 _Yarn 21170->21177 21171->21168 21171->21169 21172->21177 21173->21177 21174->21177 21175 be0df std::_Throw_Cpp_error 41 API calls 21176 b1b93 21175->21176 21177->21175 21178 b1b38 shared_ptr 21177->21178 21178->21112 21180 b1bf2 21179->21180 21194 b1c4d _Yarn 21179->21194 21181 b1d34 21180->21181 21184 b1c69 21180->21184 21185 b1c3c 21180->21185 21182 b5360 std::_Throw_Cpp_error 113 API calls 21181->21182 21182->21194 21183 be0df std::_Throw_Cpp_error 41 API calls 21186 b1d43 21183->21186 21190 b94e4 std::ios_base::_Init 16 API calls 21184->21190 21184->21194 21185->21181 21187 b1c47 21185->21187 21196 b5830 21186->21196 21189 b94e4 std::ios_base::_Init 16 API calls 21187->21189 21189->21194 21190->21194 21191 b1d51 21192 ba530 Concurrency::cancel_current_task RaiseException 21191->21192 21193 b1d5a 21192->21193 21194->21183 21195 b1cff shared_ptr 21194->21195 21195->21112 21197 b5857 shared_ptr 21196->21197 21198 b5847 21196->21198 21197->21191 21198->21197 21199 be0df std::_Throw_Cpp_error 41 API calls 21198->21199 21200 b586b 21199->21200 21200->21191 24736 b837b 24737 b83ce 24736->24737 24738 b8382 24736->24738 24741 bed47 EnterCriticalSection 24738->24741 24740 b8387 24741->24740 21201 c87d2 21202 c8464 __fread_nolock 41 API calls 21201->21202 21203 c87df 21202->21203 21204 c87eb 21203->21204 21205 c8837 21203->21205 21224 c899a 21203->21224 21205->21204 21207 c8899 21205->21207 21208 c84a0 41 API calls 21205->21208 21213 c88c8 21207->21213 21210 c888c 21208->21210 21210->21207 21232 cb898 21210->21232 21214 c8464 __fread_nolock 41 API calls 21213->21214 21215 c88d7 21214->21215 21216 c897d 21215->21216 21217 c88ea 21215->21217 21218 ca1ec ___scrt_uninitialize_crt 66 API calls 21216->21218 21219 c8907 21217->21219 21222 c892e 21217->21222 21220 c88aa 21218->21220 21221 ca1ec ___scrt_uninitialize_crt 66 API calls 21219->21221 21221->21220 21222->21220 21237 cb7dc 21222->21237 21225 c89b4 21224->21225 21226 c89b0 21224->21226 21227 cdeea __fread_nolock 41 API calls 21225->21227 21229 c8a03 21225->21229 21226->21205 21228 c89d5 21227->21228 21228->21229 21230 c89dd SetFilePointerEx 21228->21230 21229->21205 21230->21229 21231 c89f4 GetFileSizeEx 21230->21231 21231->21229 21233 c6b6b __dosmaperr 14 API calls 21232->21233 21234 cb8b5 21233->21234 21235 c663b ___free_lconv_mon 14 API calls 21234->21235 21236 cb8bf 21235->21236 21236->21207 21238 cb7f0 _Fputc 21237->21238 21243 cb633 21238->21243 21241 bde0b _Fputc 41 API calls 21242 cb814 21241->21242 21242->21220 21246 cb63f __FrameHandler3::FrameUnwindToState 21243->21246 21244 cb647 21244->21241 21245 cb71d 21247 be052 __strnicoll 41 API calls 21245->21247 21246->21244 21246->21245 21248 cb69b 21246->21248 21247->21244 21254 cde13 EnterCriticalSection 21248->21254 21250 cb6a1 21251 cb6c6 21250->21251 21255 cb759 21250->21255 21261 cb715 21251->21261 21254->21250 21256 cdeea __fread_nolock 41 API calls 21255->21256 21257 cb76b 21256->21257 21258 cb787 SetFilePointerEx 21257->21258 21260 cb773 __fread_nolock 21257->21260 21259 cb79f GetLastError 21258->21259 21258->21260 21259->21260 21260->21251 21264 cde36 LeaveCriticalSection 21261->21264 21263 cb71b 21263->21244 21264->21263 18824 7f018d 18827 7f01c5 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 18824->18827 18826 7f03a2 WriteProcessMemory 18828 7f03e7 18826->18828 18827->18826 18829 7f03ec WriteProcessMemory 18828->18829 18830 7f0429 WriteProcessMemory Wow64SetThreadContext ResumeThread 18828->18830 18829->18828

                      Control-flow Graph

                      APIs
                      • CreateProcessA.KERNELBASE(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,007F00FF,007F00EF), ref: 007F02FC
                      • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 007F030F
                      • Wow64GetThreadContext.KERNEL32(000000F4,00000000), ref: 007F032D
                      • ReadProcessMemory.KERNELBASE(000000F8,?,007F0143,00000004,00000000), ref: 007F0351
                      • VirtualAllocEx.KERNELBASE(000000F8,?,?,00003000,00000040), ref: 007F037C
                      • WriteProcessMemory.KERNELBASE(000000F8,00000000,?,?,00000000,?), ref: 007F03D4
                      • WriteProcessMemory.KERNELBASE(000000F8,00400000,?,?,00000000,?,00000028), ref: 007F041F
                      • WriteProcessMemory.KERNELBASE(000000F8,?,?,00000004,00000000), ref: 007F045D
                      • Wow64SetThreadContext.KERNEL32(000000F4,00BD0000), ref: 007F0499
                      • ResumeThread.KERNELBASE(000000F4), ref: 007F04A8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189758207.00000000007F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 007F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7f0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$CreateProcessA$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                      • API String ID: 2687962208-1257834847
                      • Opcode ID: 6ed679946abb4a161c9f75f6101290084365813039212a6bd0c7882d8dd446c2
                      • Instruction ID: c3292326410d98d99da4159f2e3343151b0f0e2a3e7f144517251735dfe2070f
                      • Opcode Fuzzy Hash: 6ed679946abb4a161c9f75f6101290084365813039212a6bd0c7882d8dd446c2
                      • Instruction Fuzzy Hash: 0DB1D77664024AAFDB60CF68CC80BDA77A5FF88714F158524EA0CEB341D774FA518B94

                      Control-flow Graph

                      APIs
                      • OffsetRect.USER32(00000000,00000000,00000000), ref: 000D7718
                      • Polyline.GDI32(00000000,00000000,00000000), ref: 000D7739
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: OffsetPolylineRect
                      • String ID: dsdsww$regwgrrwr$size of vector
                      • API String ID: 1418762327-435021585
                      • Opcode ID: d7f1ea7a8883ad3bb1e1dd592cd213499679fc4eaa8f1d32e12d3a93d022424f
                      • Instruction ID: a2c65cb317d8c251195285abc80441497651885895c671133e733043bb59750f
                      • Opcode Fuzzy Hash: d7f1ea7a8883ad3bb1e1dd592cd213499679fc4eaa8f1d32e12d3a93d022424f
                      • Instruction Fuzzy Hash: CC71E0712493809FD314EF28D859BAFBBE0AF84308F58096EF59987392D779D504CB62

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 72 d7ab0-d7ad4 73 d7ada-d7ae2 72->73 74 d7bc4-d7bc6 72->74 73->74 75 d7ae8-d7b8c call b1660 call b2010 call b1660 call b2010 call b55e0 call beb9e 73->75 76 d7bc8-d7bd9 74->76 77 d7bf5-d7c06 call b982d 74->77 99 d7b8e-d7b9b 75->99 100 d7bb7-d7bba 75->100 78 d7beb-d7bf2 call b9514 76->78 79 d7bdb-d7be9 76->79 78->77 79->78 82 d7c09-d7c2e call be0df CreateThread WaitForSingleObject 79->82 101 d7bad-d7bb4 call b9514 99->101 102 d7b9d-d7bab 99->102 100->75 103 d7bc0 100->103 101->100 102->82 102->101 103->74
                      APIs
                      • CreateThread.KERNELBASE(00000000,00000000,000D7C30,00000000,00000000,00000000), ref: 000D7C1F
                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 000D7C28
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: CreateObjectSingleThreadWait
                      • String ID: 4$Earth$Own head
                      • API String ID: 1891408510-3926490352
                      • Opcode ID: 384e79e13365fcca30e7663401413bfbec04b194c32b65f7d4d8567de85a4bae
                      • Instruction ID: 45d2245cc8cf003da5e42d62d03c6d9e8c9e3c0fcf823b8407bb5d046995fa78
                      • Opcode Fuzzy Hash: 384e79e13365fcca30e7663401413bfbec04b194c32b65f7d4d8567de85a4bae
                      • Instruction Fuzzy Hash: 4A417F316043405BCB10AF388C46BDFB7D1AF85714F648A5EF5989B287E734DA408762

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 132 d7d50-d7d99 call b6330 FreeConsole call b94e4 136 d7d9e-d7da3 132->136 137 d7db9-d7dd3 136->137 138 d7da5-d7dae call d7010 136->138 138->137 141 d7db0-d7db4 call d7590 138->141 141->137
                      APIs
                      • FreeConsole.KERNELBASE(00000000,0000001F), ref: 000D7D8A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ConsoleFree
                      • String ID: Illkjmuueghu %d
                      • API String ID: 771614528-1805681028
                      • Opcode ID: fa90d7689816ab3cce768f16906b4963f7738cdc3b725875a676c74bfdd1a516
                      • Instruction ID: ef1cbc889eb3b6ab99555257623b2b7ced6030998416906ab199da1a2a5855e2
                      • Opcode Fuzzy Hash: fa90d7689816ab3cce768f16906b4963f7738cdc3b725875a676c74bfdd1a516
                      • Instruction Fuzzy Hash: BD01DB75A04704EBDB109B65DC06B9ABBF8EB04720F000627FE18D63C2FB76950046B5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 143 ca2f4-ca313 144 ca4ed 143->144 145 ca319-ca31b 143->145 148 ca4ef-ca4f3 144->148 146 ca31d-ca33c call be052 145->146 147 ca347-ca36d 145->147 154 ca33f-ca342 146->154 150 ca36f-ca371 147->150 151 ca373-ca379 147->151 150->151 153 ca37b-ca385 150->153 151->146 151->153 155 ca395-ca3a0 call c9e78 153->155 156 ca387-ca392 call cb87a 153->156 154->148 161 ca3e2-ca3f4 155->161 162 ca3a2-ca3a7 155->162 156->155 165 ca445-ca465 WriteFile 161->165 166 ca3f6-ca3fc 161->166 163 ca3cc-ca3e0 call c9a3e 162->163 164 ca3a9-ca3ad 162->164 185 ca3c5-ca3c7 163->185 167 ca4b5-ca4c7 164->167 168 ca3b3-ca3c2 call c9e10 164->168 170 ca467-ca46d GetLastError 165->170 171 ca470 165->171 172 ca3fe-ca401 166->172 173 ca433-ca43e call c9ef6 166->173 174 ca4c9-ca4cf 167->174 175 ca4d1-ca4e3 167->175 168->185 170->171 179 ca473-ca47e 171->179 180 ca421-ca431 call ca0ba 172->180 181 ca403-ca406 172->181 184 ca443 173->184 174->144 174->175 175->154 186 ca4e8-ca4eb 179->186 187 ca480-ca485 179->187 190 ca41c-ca41f 180->190 181->167 188 ca40c-ca417 call c9fd1 181->188 184->190 185->179 186->148 191 ca487-ca48c 187->191 192 ca4b3 187->192 188->190 190->185 194 ca48e-ca4a0 191->194 195 ca4a5-ca4ae call c2b50 191->195 192->167 194->154 195->154
                      APIs
                        • Part of subcall function 000C9A3E: GetConsoleOutputCP.KERNEL32(C825D32E,00000000,00000000,00000000), ref: 000C9AA1
                      • WriteFile.KERNEL32(?,00000000,00000000,000C1810,00000000,00000000,00000000,00000000,00000000,?,000C1810,00000000,?,000E3088,00000010,00000000), ref: 000CA45D
                      • GetLastError.KERNEL32(?,000C1810,00000000,?,000E3088,00000010,00000000,00000000,00000000,00000000,00000000), ref: 000CA467
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ConsoleErrorFileLastOutputWrite
                      • String ID:
                      • API String ID: 2915228174-0
                      • Opcode ID: abcbccb0ebc976195f0976642ae6d743b863197e3a3f15a5e1ef002a977a88f8
                      • Instruction ID: d4e3d7d920431d110ecf5b5c7cb7d9b3cd4b68da7d13628d5e134c635914685a
                      • Opcode Fuzzy Hash: abcbccb0ebc976195f0976642ae6d743b863197e3a3f15a5e1ef002a977a88f8
                      • Instruction Fuzzy Hash: 28618171A0424DAFDF15CFA8C848FEEBBB9AF4A318F144059F800A7252D375DA45CB62

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 198 c9ef6-c9f4b call ba460 201 c9f4d 198->201 202 c9fc0-c9fd0 call b982d 198->202 204 c9f53 201->204 206 c9f59-c9f5b 204->206 207 c9f5d-c9f62 206->207 208 c9f75-c9f9a WriteFile 206->208 211 c9f6b-c9f73 207->211 212 c9f64-c9f6a 207->212 209 c9f9c-c9fa7 208->209 210 c9fb8-c9fbe GetLastError 208->210 209->202 213 c9fa9-c9fb4 209->213 210->202 211->206 211->208 212->211 213->204 214 c9fb6 213->214 214->202
                      APIs
                      • WriteFile.KERNELBASE(?,?,?,?,00000000,00000000,00000000,00000000,?,000CA443,?,00000000,00000000,00000000,00000000,00000000), ref: 000C9F92
                      • GetLastError.KERNEL32(?,000CA443,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,000C1810,00000000,?,000E3088,00000010), ref: 000C9FB8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ErrorFileLastWrite
                      • String ID:
                      • API String ID: 442123175-0
                      • Opcode ID: eb91084312b2759bfc3392693126dbeb543b5ffe228dfef7d37ef6cb147d1cc0
                      • Instruction ID: a0946d4cd1e0b5dc285fcf30274e52525d8fe75bc2f3cb7c6e228367e798fbde
                      • Opcode Fuzzy Hash: eb91084312b2759bfc3392693126dbeb543b5ffe228dfef7d37ef6cb147d1cc0
                      • Instruction Fuzzy Hash: 32217135A00219DBCF15CF29DC88AEDB7B9EF49305F1484AEE90AD7211D630DE86CB64

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 215 c74f3-c74f8 216 c74fa-c7512 215->216 217 c7514-c7518 216->217 218 c7520-c7529 216->218 217->218 219 c751a-c751e 217->219 220 c753b 218->220 221 c752b-c752e 218->221 222 c7595-c7599 219->222 225 c753d-c754a GetStdHandle 220->225 223 c7537-c7539 221->223 224 c7530-c7535 221->224 222->216 226 c759f-c75a2 222->226 223->225 224->225 227 c754c-c754e 225->227 228 c7577-c7589 225->228 227->228 230 c7550-c7559 GetFileType 227->230 228->222 229 c758b-c758e 228->229 229->222 230->228 231 c755b-c7564 230->231 232 c756c-c756f 231->232 233 c7566-c756a 231->233 232->222 234 c7571-c7575 232->234 233->222 234->222
                      APIs
                      • GetStdHandle.KERNEL32(000000F6), ref: 000C753F
                      • GetFileType.KERNELBASE(00000000), ref: 000C7551
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: FileHandleType
                      • String ID:
                      • API String ID: 3000768030-0
                      • Opcode ID: 21b5db10e3b02a33544274b6ebd447bcda6b4a0069af77dd87e13b102b090e16
                      • Instruction ID: 87aceb4f5c7a179c3134923c77da4a1ea6d753b085d6c8cef5902c18bfd3cce1
                      • Opcode Fuzzy Hash: 21b5db10e3b02a33544274b6ebd447bcda6b4a0069af77dd87e13b102b090e16
                      • Instruction Fuzzy Hash: 3111A27150CB418AC7744B3E9C88F2E6AD4A75A370B380B1ED5BE861F1C6B0D986DA51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 235 c663b-c6644 236 c6646-c6659 RtlFreeHeap 235->236 237 c6673-c6674 235->237 236->237 238 c665b-c6672 GetLastError call c2aea call c2b87 236->238 238->237
                      APIs
                      • RtlFreeHeap.NTDLL(00000000,00000000,?,000CE6B3,?,00000000,?,?,000CE954,?,00000007,?,?,000CEE4D,?,?), ref: 000C6651
                      • GetLastError.KERNEL32(?,?,000CE6B3,?,00000000,?,?,000CE954,?,00000007,?,?,000CEE4D,?,?), ref: 000C665C
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 485612231-0
                      • Opcode ID: bfb1ae529354327127decadf397b5b007aebf538174ce13465289b9a19d5c407
                      • Instruction ID: b74becf79768a2c995cb0a06ccbe938a1ab54e5373237560b4049e729ebd2ed5
                      • Opcode Fuzzy Hash: bfb1ae529354327127decadf397b5b007aebf538174ce13465289b9a19d5c407
                      • Instruction Fuzzy Hash: 06E08C32100204ABDB212FA0FC08F9E3BA8AB00759F04406AFA0C964A1CA3589D1CBA8

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 275 b8522-b853c 276 b853e-b8540 275->276 277 b8545-b854d 275->277 278 b861c-b8629 call b982d 276->278 279 b854f-b8559 277->279 280 b8571-b8575 277->280 279->280 282 b855b-b856c 279->282 283 b857b-b858c call b8389 280->283 284 b8618 280->284 287 b8614-b8616 282->287 290 b858e-b8592 283->290 291 b8594-b85c8 283->291 285 b861b 284->285 285->278 287->285 292 b85db call b7c6e 290->292 298 b85eb-b85f3 291->298 299 b85ca-b85cd 291->299 295 b85e0-b85e4 292->295 295->287 297 b85e6-b85e9 295->297 297->287 301 b8608-b8612 298->301 302 b85f5-b8606 call c2746 298->302 299->298 300 b85cf-b85d3 299->300 300->284 303 b85d5-b85d8 300->303 301->284 301->287 302->284 302->301 303->292
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9c546512051b9939892528b7729b8b3441245e0164141ba3acf388da5f28dfac
                      • Instruction ID: 63147693314d5fb19fc1a7cc15542ecadb3c0cddf83227c598dd148100554101
                      • Opcode Fuzzy Hash: 9c546512051b9939892528b7729b8b3441245e0164141ba3acf388da5f28dfac
                      • Instruction Fuzzy Hash: 4631633290151AAFCB64DF68C8848EEB7FDBF19310B14916AE501A36A1DB31E944CBA0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 306 d7c30-d7c9f call b1900 call b94e4 311 d7ca1-d7caf call d70c0 306->311 312 d7cb2-d7d0c VirtualAlloc call d78a0 call ba950 call d75d0 306->312 311->312 322 d7d0e-d7d19 312->322 323 d7d35-d7d45 call b982d 312->323 324 d7d2b-d7d2d call b9514 322->324 325 d7d1b-d7d29 322->325 330 d7d32 324->330 325->324 327 d7d46-d7d4b call be0df 325->327 330->323
                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,000004AC,00001000,00000040), ref: 000D7CC0
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 9db7ea8073a89437822192aa8e7580b862d14fb887df84d2e965d7beea381515
                      • Instruction ID: 8963bd0fb0f7eceed6856e16b9024aca3813676e3efede9bf586d600f2700db4
                      • Opcode Fuzzy Hash: 9db7ea8073a89437822192aa8e7580b862d14fb887df84d2e965d7beea381515
                      • Instruction Fuzzy Hash: FE31B571E40748AAD710EF64DC46BEDB7B4AF49300F14425AFA0477283EB746A808775
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: __floor_pentium4
                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                      • API String ID: 4168288129-2761157908
                      • Opcode ID: df08674e1e9282235e40f877abafb43c6350b0c48ede6aca0e914587a4cd3c80
                      • Instruction ID: 9c348bcd0fd6d49d2e97418ef6cf5162576f887e839b71eaa9fa175e7661a1bc
                      • Opcode Fuzzy Hash: df08674e1e9282235e40f877abafb43c6350b0c48ede6aca0e914587a4cd3c80
                      • Instruction Fuzzy Hash: ADD20571E082299FDB65CE28DD407EAB7B5EB48305F1445EBD80DE7240EB78AE818F51
                      APIs
                      • GetLocaleInfoW.KERNEL32(?,2000000B,000D017C,00000002,00000000,?,?,?,000D017C,?,00000000), ref: 000CFEF7
                      • GetLocaleInfoW.KERNEL32(?,20001004,000D017C,00000002,00000000,?,?,?,000D017C,?,00000000), ref: 000CFF20
                      • GetACP.KERNEL32(?,?,000D017C,?,00000000), ref: 000CFF35
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: InfoLocale
                      • String ID: ACP$OCP
                      • API String ID: 2299586839-711371036
                      • Opcode ID: 2d3aa4cb86d034aaef4619356b30863209df72b7c2cdcb5201125391ef387411
                      • Instruction ID: a8a85e06f7edfc8147118eb81e764d698179efeffdb4f63732f5e4ee8cacbe59
                      • Opcode Fuzzy Hash: 2d3aa4cb86d034aaef4619356b30863209df72b7c2cdcb5201125391ef387411
                      • Instruction Fuzzy Hash: 41219222600102A6E7748F24C905FBF73E7EF51B50B56847CE906D7122EB32DD42D351
                      APIs
                        • Part of subcall function 000C6350: GetLastError.KERNEL32(?,00000008,000C694F), ref: 000C6354
                        • Part of subcall function 000C6350: SetLastError.KERNEL32(00000000,00000001,00000005,000000FF), ref: 000C63F6
                      • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 000D013F
                      • IsValidCodePage.KERNEL32(00000000), ref: 000D0188
                      • IsValidLocale.KERNEL32(?,00000001), ref: 000D0197
                      • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 000D01DF
                      • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 000D01FE
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                      • String ID:
                      • API String ID: 415426439-0
                      • Opcode ID: 6434d90fe7aa953ddaf033c67c4726ce15b0557fc11f652efad01a8f4021973b
                      • Instruction ID: 0655cd603e50caeae5577117eaf32d48fce5405616cd8b9cea2d7818c21d3436
                      • Opcode Fuzzy Hash: 6434d90fe7aa953ddaf033c67c4726ce15b0557fc11f652efad01a8f4021973b
                      • Instruction Fuzzy Hash: B8516E75A0030AABEB50DFA5DC45FBE77F8EF44700F04442AE919EB291DB709A458B71
                      APIs
                        • Part of subcall function 000C6350: GetLastError.KERNEL32(?,00000008,000C694F), ref: 000C6354
                        • Part of subcall function 000C6350: SetLastError.KERNEL32(00000000,00000001,00000005,000000FF), ref: 000C63F6
                      • GetACP.KERNEL32(?,?,?,?,?,?,000C4EF0,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 000CF790
                      • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,000C4EF0,?,?,?,00000055,?,-00000050,?,?), ref: 000CF7BB
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 000CF91E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ErrorLast$CodeInfoLocalePageValid
                      • String ID: utf8
                      • API String ID: 607553120-905460609
                      • Opcode ID: 0155f88504d9863d4cb85fb8fdd27c71360c1726711d6d7baf062dd3b8bf5e94
                      • Instruction ID: bae90ac46386bb425d8223d9dd7dcdadd588f0f6f72992532b264f19941b47b4
                      • Opcode Fuzzy Hash: 0155f88504d9863d4cb85fb8fdd27c71360c1726711d6d7baf062dd3b8bf5e94
                      • Instruction Fuzzy Hash: E471C632604603ABEB24AB74CC46FBE73EAEF44700F14457EFA05D7182EA74D9458762
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: _strrchr
                      • String ID:
                      • API String ID: 3213747228-0
                      • Opcode ID: c6eacb7953bbba39f711a7e71ff673c16b34cf1b21946f2f6922c52105c3e655
                      • Instruction ID: d0b1e536c15fa4f511097d42d2ff841ca6cb42ee0e79f924542fd6ee17ff6ebc
                      • Opcode Fuzzy Hash: c6eacb7953bbba39f711a7e71ff673c16b34cf1b21946f2f6922c52105c3e655
                      • Instruction Fuzzy Hash: 13B11732A082459FDB15CF68C881FFEBBE5EF95314F14816EE909AB242D6349D05CFA1
                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 000B9EFB
                      • IsDebuggerPresent.KERNEL32 ref: 000B9FC7
                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 000B9FE0
                      • UnhandledExceptionFilter.KERNEL32(?), ref: 000B9FEA
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                      • String ID:
                      • API String ID: 254469556-0
                      • Opcode ID: 72601f5a6c477b33b9c5e8b3d7f91af4df1404c211073dbcb33a84bacc407974
                      • Instruction ID: ff5fcbff2fd73e191862d301c2936a4001b5151b6887e4daec2c7e73f1cd864c
                      • Opcode Fuzzy Hash: 72601f5a6c477b33b9c5e8b3d7f91af4df1404c211073dbcb33a84bacc407974
                      • Instruction Fuzzy Hash: 7E31F575D1131C9BDF60EFA4D889BCDBBB8AF08300F1041AAE40DAB250EB759A858F55
                      APIs
                        • Part of subcall function 000C6350: GetLastError.KERNEL32(?,00000008,000C694F), ref: 000C6354
                        • Part of subcall function 000C6350: SetLastError.KERNEL32(00000000,00000001,00000005,000000FF), ref: 000C63F6
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 000CFB36
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 000CFB80
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 000CFC46
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: InfoLocale$ErrorLast
                      • String ID:
                      • API String ID: 661929714-0
                      • Opcode ID: 7c4166dd00803e3555625b6d9337fa2a6b4394f2a5fd7ddada74dbbd9c9c4a85
                      • Instruction ID: 003603f0b4850630a0fb6a82295f074af30314e8000774f3d801ef3baa1f31be
                      • Opcode Fuzzy Hash: 7c4166dd00803e3555625b6d9337fa2a6b4394f2a5fd7ddada74dbbd9c9c4a85
                      • Instruction Fuzzy Hash: 41617F716002079BEB689F28D982FBE77EAEF04314F20807EED05C6586EB34D991CB51
                      APIs
                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000001), ref: 000BDFCB
                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000001), ref: 000BDFD5
                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000001), ref: 000BDFE2
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                      • String ID:
                      • API String ID: 3906539128-0
                      • Opcode ID: 07ed5bda2ea875785fecfe6efd552952e5eb1b1908d617ef4e4d4e7a0cc9740d
                      • Instruction ID: 67a75ed54d7ed144727059a14239da947703d0c4837ad47716af2bcce02e8fc2
                      • Opcode Fuzzy Hash: 07ed5bda2ea875785fecfe6efd552952e5eb1b1908d617ef4e4d4e7a0cc9740d
                      • Instruction Fuzzy Hash: 5F31C174902229ABCB61DF24D888BD9BBB8BF08310F5041EAE41CA6251EB709B858F55
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2692ef2465f7c715e646551b9f84a9b96eae746530df55d46b013212d61f18f7
                      • Instruction ID: 596021a3d8fa3a84c42fc0f009ab32cc13b170ea14f3fbb33c9f8194a9429779
                      • Opcode Fuzzy Hash: 2692ef2465f7c715e646551b9f84a9b96eae746530df55d46b013212d61f18f7
                      • Instruction Fuzzy Hash: A4F11B71E002199FDB14CFA8C894BADB7F1EF88314F25826DE815AB785D731AE41CB90
                      APIs
                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,000CBC8D,?,?,00000008,?,?,000D4202,00000000), ref: 000CBEBF
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ExceptionRaise
                      • String ID:
                      • API String ID: 3997070919-0
                      • Opcode ID: 54e5c190ad7ea94b1658875c02c91b858a525bc0e0fadb0c74e88cc04ffe6a4b
                      • Instruction ID: 892582661bb2859b34d8e675ee643e22a86ea4491b84b2865f0b72c3d632adff
                      • Opcode Fuzzy Hash: 54e5c190ad7ea94b1658875c02c91b858a525bc0e0fadb0c74e88cc04ffe6a4b
                      • Instruction Fuzzy Hash: 31B118316106089FDB64CF28C486FA97BE0FF45364F25865CE99ACF2A1C735E992CB40
                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 000B9CAB
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: FeaturePresentProcessor
                      • String ID:
                      • API String ID: 2325560087-0
                      • Opcode ID: 74072c1f3f17d076d3e513c7d1358f09a269eabb0505bc348e562d5b4176dda2
                      • Instruction ID: 43c5d1703d47ed4b45f5873e3c3557ea4a3be59805624528b4f46644ac275313
                      • Opcode Fuzzy Hash: 74072c1f3f17d076d3e513c7d1358f09a269eabb0505bc348e562d5b4176dda2
                      • Instruction Fuzzy Hash: 3F5181B1A006098FDB58CF5AE8897AEBBF4FB54310F24842AD519EB361D774D944CF50
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7157ab50b705600cea3a1206a82191ed5efd9262240fa0126aaf4e6d010e85bc
                      • Instruction ID: 6ee60d57fc46b36ba53d788594e5f66c051948447e037d79c17306e2721e1cf7
                      • Opcode Fuzzy Hash: 7157ab50b705600cea3a1206a82191ed5efd9262240fa0126aaf4e6d010e85bc
                      • Instruction Fuzzy Hash: 2541A0B5805219AEDB60DF69CC89EEEBBB8EF45304F1442DDE40DD3201DA359E858F20
                      APIs
                        • Part of subcall function 000C6350: GetLastError.KERNEL32(?,00000008,000C694F), ref: 000C6354
                        • Part of subcall function 000C6350: SetLastError.KERNEL32(00000000,00000001,00000005,000000FF), ref: 000C63F6
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 000CFD89
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ErrorLast$InfoLocale
                      • String ID:
                      • API String ID: 3736152602-0
                      • Opcode ID: 0b7f843a6b1a88e81c7aa0a7e7f2ab3f2616fa19c5c83b9deef15e69b5d7c895
                      • Instruction ID: aa368396bdd62d2667706292b7028737759363ccfe08765afded01cfcdd9f670
                      • Opcode Fuzzy Hash: 0b7f843a6b1a88e81c7aa0a7e7f2ab3f2616fa19c5c83b9deef15e69b5d7c895
                      • Instruction Fuzzy Hash: 78218072611207ABEB289F25DC42FBE73AAEF44314B10407EFD06DA142EB75ED448B52
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0
                      • API String ID: 0-4108050209
                      • Opcode ID: ae54fa01aa5c856c6d46355344a0445a233b50918a082372f76ae9a58ece7c05
                      • Instruction ID: 8d91ba87978e37b6c564f8bc707d5c09d8e020ab3abe0621a9b79a5641d60688
                      • Opcode Fuzzy Hash: ae54fa01aa5c856c6d46355344a0445a233b50918a082372f76ae9a58ece7c05
                      • Instruction Fuzzy Hash: 46B1C07090060BCBCB788F68C995FFEB7E5AF06304F24462ED996D7292C735A942CB51
                      APIs
                        • Part of subcall function 000C6350: GetLastError.KERNEL32(?,00000008,000C694F), ref: 000C6354
                        • Part of subcall function 000C6350: SetLastError.KERNEL32(00000000,00000001,00000005,000000FF), ref: 000C63F6
                      • EnumSystemLocalesW.KERNEL32(000CFAE2,00000001,00000000,?,-00000050,?,000D0113,00000000,?,?,?,00000055,?), ref: 000CFA2E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ErrorLast$EnumLocalesSystem
                      • String ID:
                      • API String ID: 2417226690-0
                      • Opcode ID: d81d5758cc4a164c26e85630ca511e28a1b245aeb7126dc988fe4c9457bb8357
                      • Instruction ID: 56ffb361546bf227dbdf3fa7cd960f12bbf699df31f819a2128ec00ab608272e
                      • Opcode Fuzzy Hash: d81d5758cc4a164c26e85630ca511e28a1b245aeb7126dc988fe4c9457bb8357
                      • Instruction Fuzzy Hash: 2911C6766007029FDB189F398891BBEB7D2FF84358B14443DE98B87B41E7756942C740
                      APIs
                        • Part of subcall function 000C6350: GetLastError.KERNEL32(?,00000008,000C694F), ref: 000C6354
                        • Part of subcall function 000C6350: SetLastError.KERNEL32(00000000,00000001,00000005,000000FF), ref: 000C63F6
                      • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,000CFDDF,00000000,00000000,?), ref: 000CFF90
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ErrorLast$InfoLocale
                      • String ID:
                      • API String ID: 3736152602-0
                      • Opcode ID: b7b7f0af24dd6dc5d8abe6c594294bd72b5f6f45f5fb38b916da4f50f50e564a
                      • Instruction ID: 7ead61be412cde94c214da124fba48551da38e609de3ea9daf42f690eb5265da
                      • Opcode Fuzzy Hash: b7b7f0af24dd6dc5d8abe6c594294bd72b5f6f45f5fb38b916da4f50f50e564a
                      • Instruction Fuzzy Hash: B6F086366001276BDB3897258805FBE77A9DF41754F15443DED16A3180DB74EE42C691
                      APIs
                        • Part of subcall function 000C6350: GetLastError.KERNEL32(?,00000008,000C694F), ref: 000C6354
                        • Part of subcall function 000C6350: SetLastError.KERNEL32(00000000,00000001,00000005,000000FF), ref: 000C63F6
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 000CF91E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ErrorLast$InfoLocale
                      • String ID: utf8
                      • API String ID: 3736152602-905460609
                      • Opcode ID: 5750c0e2a31426a20dcba89d7af8bc2ffb51477fca5b38341ed20b4c465a02ef
                      • Instruction ID: f578bf2728d0d5adbba2edce7d8c3f1ab270e615bdec9951151983901781fd79
                      • Opcode Fuzzy Hash: 5750c0e2a31426a20dcba89d7af8bc2ffb51477fca5b38341ed20b4c465a02ef
                      • Instruction Fuzzy Hash: 2FF0A472601105ABDB14AB34DC4AFFE33E9DB45710F15007EB607D7242DA79AD058790
                      APIs
                        • Part of subcall function 000C6350: GetLastError.KERNEL32(?,00000008,000C694F), ref: 000C6354
                        • Part of subcall function 000C6350: SetLastError.KERNEL32(00000000,00000001,00000005,000000FF), ref: 000C63F6
                      • EnumSystemLocalesW.KERNEL32(000CFD35,00000001,?,?,-00000050,?,000D00D7,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 000CFAA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ErrorLast$EnumLocalesSystem
                      • String ID:
                      • API String ID: 2417226690-0
                      • Opcode ID: c4d94c8093f40ca84d4800e9bc8eea9ed1c2a662c6f6ed3ae0f54045a4799e7f
                      • Instruction ID: ea2972be8e5593928223650ec3ec465ed3aa0a2a0917b5d930b23e1eda8ba466
                      • Opcode Fuzzy Hash: c4d94c8093f40ca84d4800e9bc8eea9ed1c2a662c6f6ed3ae0f54045a4799e7f
                      • Instruction Fuzzy Hash: 5BF0C2762003065FDB249F359881F7EBBE6EB80368F05443DFA4A4B691CAB19C028651
                      APIs
                        • Part of subcall function 000C0CB9: EnterCriticalSection.KERNEL32(?,?,000C369F,00000000,000E31C8,0000000C,000C3666,?,?,000C6B9E,?,?,000C64EE,00000001,00000364,?), ref: 000C0CC8
                      • EnumSystemLocalesW.KERNEL32(000C6BC8,00000001,000E33B8,0000000C,000C6FF7,00000000), ref: 000C6C0D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: CriticalEnterEnumLocalesSectionSystem
                      • String ID:
                      • API String ID: 1272433827-0
                      • Opcode ID: c98139a302345b402c6daea0c7df55b2a73cf2fb0c3ac51240c10443dce60520
                      • Instruction ID: b0621a7b6df3359b380ef7251137bbbe548230748d1bd24a9f95e74e716ee24d
                      • Opcode Fuzzy Hash: c98139a302345b402c6daea0c7df55b2a73cf2fb0c3ac51240c10443dce60520
                      • Instruction Fuzzy Hash: 8DF03C32A50304EFD710EF58E846BAC77F0EB45720F10411AF9149B2A1CB754A84CF81
                      APIs
                        • Part of subcall function 000C6350: GetLastError.KERNEL32(?,00000008,000C694F), ref: 000C6354
                        • Part of subcall function 000C6350: SetLastError.KERNEL32(00000000,00000001,00000005,000000FF), ref: 000C63F6
                      • EnumSystemLocalesW.KERNEL32(000CF8CA,00000001,?,?,?,000D0135,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 000CF9A8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ErrorLast$EnumLocalesSystem
                      • String ID:
                      • API String ID: 2417226690-0
                      • Opcode ID: 7a2588841d2b7a0d1c92ab6d427e3a88e43c171c572036abeb817c657054d49f
                      • Instruction ID: a5dc8e562af15098efb5c601f0df22790ee0e7f2e0fac435ae3de9e75f6972f0
                      • Opcode Fuzzy Hash: 7a2588841d2b7a0d1c92ab6d427e3a88e43c171c572036abeb817c657054d49f
                      • Instruction Fuzzy Hash: ACF0553A30020667CF149F35D815F7EBFD5EFC2750B0A406DEA0A8B280C6369843C7A0
                      APIs
                      • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,000C5A56,?,20001004,00000000,00000002,?,?,000C5058), ref: 000C712F
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: InfoLocale
                      • String ID:
                      • API String ID: 2299586839-0
                      • Opcode ID: fea8e22b1ef4220aedc2bfef063ed56e23f14b7ad279b602e195f4b104658576
                      • Instruction ID: 9195330b285c642ed5aaf2b51b5968c2865467c2877a93e82c1466ae530fc19b
                      • Opcode Fuzzy Hash: fea8e22b1ef4220aedc2bfef063ed56e23f14b7ad279b602e195f4b104658576
                      • Instruction Fuzzy Hash: 98E04F75505218BBCF122F61DC09FEE7F69EF44761F088015FD0965161CB368D21ABE0
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(Function_0000A057,000B9916), ref: 000BA050
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: 35878dd40727449e780769cb58a5d95d20d905301b1a36c01a1a6aed5738fa0c
                      • Instruction ID: e2b217b683b32c47de295e4778440a7c7f5cd6e2f1b506d9dfa518010af5d0b2
                      • Opcode Fuzzy Hash: 35878dd40727449e780769cb58a5d95d20d905301b1a36c01a1a6aed5738fa0c
                      • Instruction Fuzzy Hash:
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: HeapProcess
                      • String ID:
                      • API String ID: 54951025-0
                      • Opcode ID: 137b2bac0c190b53edbe2a07ca99991f187fb844152c8597f6fa705cd086f761
                      • Instruction ID: 88fd163e3a5076d7ab9a6bc808beebb0a26f2a63f673f316d68dfbf7e35d7526
                      • Opcode Fuzzy Hash: 137b2bac0c190b53edbe2a07ca99991f187fb844152c8597f6fa705cd086f761
                      • Instruction Fuzzy Hash: DFA00470541701CF57404F357D4D74D3FD557455D17154155D40DC5170DF3445D45F55
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7be8c9aeac7cf8cb0888785fe6c153c98cd036d3724c06c4a810145b4a55ffb7
                      • Instruction ID: df407817308755c269c2cfabb66c4bfd47dfc7102d762e1c6c296d97ce7fbb9d
                      • Opcode Fuzzy Hash: 7be8c9aeac7cf8cb0888785fe6c153c98cd036d3724c06c4a810145b4a55ffb7
                      • Instruction Fuzzy Hash: 32D10871E082289FDB65DF28DC40BE9B7B6EB85351F1441EBD84DA7240DB78AE818F50
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 913097a76a2aa3f9716249509b8196a2f4b16ccbac58342a843d0fa289859693
                      • Instruction ID: 20b0048b21142fda5f7337dfa9e794a38b1b1d941f04f2dcdc774a54a94e8930
                      • Opcode Fuzzy Hash: 913097a76a2aa3f9716249509b8196a2f4b16ccbac58342a843d0fa289859693
                      • Instruction Fuzzy Hash: 2EE08C32A11228EBCB25DBCCC904E8EF3ECEB44B00B11409AF501D3101C6B1DE00C7D4
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ad2e9a7be51ed71085fad7bcd48806db607c783d97970506649736f56e1902a2
                      • Instruction ID: 648754a034d292c46a9da4cd4860b1ab6b1cbcc8e7c450697a324c88637600aa
                      • Opcode Fuzzy Hash: ad2e9a7be51ed71085fad7bcd48806db607c783d97970506649736f56e1902a2
                      • Instruction Fuzzy Hash: CCC08C35020E0046CE298B1082B1BAC33F4B3D5782F80848CC4430B682CA1E9D83EF02
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 000B20A5
                      • std::_Lockit::_Lockit.LIBCPMT ref: 000B20BF
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 000B20E0
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 000B2138
                      • std::_Lockit::_Lockit.LIBCPMT ref: 000B217D
                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 000B21CE
                      • __Getctype.LIBCPMT ref: 000B21E5
                      • std::_Facet_Register.LIBCPMT ref: 000B220F
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 000B2228
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeLocinfo::_Locinfo_ctorRegister
                      • String ID: bad locale name
                      • API String ID: 2236780835-1405518554
                      • Opcode ID: 58e47e267114976112245cac9d0c7ad32ea6449fa04feb4cc150232968364659
                      • Instruction ID: 421ea30945693e99e23e7b2ee4ce03e8616713a1488b1ae677c5f9ccec59fae0
                      • Opcode Fuzzy Hash: 58e47e267114976112245cac9d0c7ad32ea6449fa04feb4cc150232968364659
                      • Instruction Fuzzy Hash: 2541C0715043408FC361DF58D884BDBB7E0AFA4B10F15495DF9889B362DB36E946CBA2
                      APIs
                      • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 000B9450
                      • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 000B945E
                      • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 000B946F
                      • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 000B9480
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: AddressProc$HandleModule
                      • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                      • API String ID: 667068680-1247241052
                      • Opcode ID: 8e8e52ce2c519f0980c150180e0a8306c3a90a217322fe75d0c2cd32c7251273
                      • Instruction ID: 5f9275008e14a5a1573ca601831e52da111d5c33ce59b96fa1ecc918467b5e34
                      • Opcode Fuzzy Hash: 8e8e52ce2c519f0980c150180e0a8306c3a90a217322fe75d0c2cd32c7251273
                      • Instruction Fuzzy Hash: 00E08C35992710ABA381AFB4BC0C8857FA8EB047123048067FB0AC2325DF7800448FB0
                      APIs
                      • type_info::operator==.LIBVCRUNTIME ref: 000BCF51
                      • ___TypeMatch.LIBVCRUNTIME ref: 000BD05F
                      • _UnwindNestedFrames.LIBCMT ref: 000BD1B1
                      • CallUnexpected.LIBVCRUNTIME ref: 000BD1CC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                      • String ID: csm$csm$csm
                      • API String ID: 2751267872-393685449
                      • Opcode ID: a104103d313a3a9b19f7ba72e911f773d33dcb5a1f822e1183062c0004d83dbb
                      • Instruction ID: 4703ed5147095a59be42c5933a9a465706e6e436d86a8d0831069217ccef219f
                      • Opcode Fuzzy Hash: a104103d313a3a9b19f7ba72e911f773d33dcb5a1f822e1183062c0004d83dbb
                      • Instruction Fuzzy Hash: 1BB14871900209EFDF29DFA8C9819EEBBB6BF14310F14456AE8156B212E731DE51CB92
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID: 0-3907804496
                      • Opcode ID: ca52d48533a7c6e658e772cf5124e9f7e6a8b2b34d1a5937c3ca0c0e69c1fbb0
                      • Instruction ID: 8a3da9e237ebd9dbfe896627d9cc3f2ea07431dfff71860a580690aedacfe556
                      • Opcode Fuzzy Hash: ca52d48533a7c6e658e772cf5124e9f7e6a8b2b34d1a5937c3ca0c0e69c1fbb0
                      • Instruction Fuzzy Hash: 82B1EFB0A04249AFDB15DFA8C882FAEBBF5BF55314F14815DE404AB292C7709D82CF60
                      APIs
                      • GetCPInfo.KERNEL32(00BF5448,00BF5448,?,7FFFFFFF,?,000D47E4,00BF5448,00BF5448,?,00BF5448,?,?,?,?,00BF5448,?), ref: 000D45BA
                      • __alloca_probe_16.LIBCMT ref: 000D4675
                      • __alloca_probe_16.LIBCMT ref: 000D4704
                      • __freea.LIBCMT ref: 000D474F
                      • __freea.LIBCMT ref: 000D4755
                      • __freea.LIBCMT ref: 000D478B
                      • __freea.LIBCMT ref: 000D4791
                      • __freea.LIBCMT ref: 000D47A1
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: __freea$__alloca_probe_16$Info
                      • String ID:
                      • API String ID: 127012223-0
                      • Opcode ID: 969d1fc1bab07b5b7af2065ec4ec3e6826ec1a9cf91ba716393f450d79ad7847
                      • Instruction ID: b8dcdb4c8df5df1e6c6964278cbd2246e55fa78c0e2d712532e4e18b3eec1782
                      • Opcode Fuzzy Hash: 969d1fc1bab07b5b7af2065ec4ec3e6826ec1a9cf91ba716393f450d79ad7847
                      • Instruction Fuzzy Hash: E271B372904745ABDF209F949C82FEE7BE99F4A310F29005AE909A7382D735DC008BB1
                      APIs
                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 000B9169
                      • __alloca_probe_16.LIBCMT ref: 000B9195
                      • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 000B91D4
                      • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 000B91F1
                      • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 000B9230
                      • __alloca_probe_16.LIBCMT ref: 000B924D
                      • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 000B928F
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 000B92B2
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ByteCharMultiStringWide$__alloca_probe_16
                      • String ID:
                      • API String ID: 2040435927-0
                      • Opcode ID: 3d5454b2bd22a26e18fb437a16790985cab574997f061a8356a445103f62939c
                      • Instruction ID: d5dd9f37c83471b7d7eb25458c0e356a287f42144aef31a7833e90b98a883e48
                      • Opcode Fuzzy Hash: 3d5454b2bd22a26e18fb437a16790985cab574997f061a8356a445103f62939c
                      • Instruction Fuzzy Hash: DA518B7290020ABBEF209FA4CC45FEE7BB9EF45750F148429FE05A6160DB359D10DBA0
                      APIs
                      • _ValidateLocalCookies.LIBCMT ref: 000BC937
                      • ___except_validate_context_record.LIBVCRUNTIME ref: 000BC93F
                      • _ValidateLocalCookies.LIBCMT ref: 000BC9C8
                      • __IsNonwritableInCurrentImage.LIBCMT ref: 000BC9F3
                      • _ValidateLocalCookies.LIBCMT ref: 000BCA48
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                      • String ID: csm
                      • API String ID: 1170836740-1018135373
                      • Opcode ID: 9665e11ba4669e1c915ec537962e44bfa148afccb358633ba2e7941e9cbf46ac
                      • Instruction ID: 0af9b7725110ce8d7dac8139e065562be0a332af969a51f344ef332bee0313b9
                      • Opcode Fuzzy Hash: 9665e11ba4669e1c915ec537962e44bfa148afccb358633ba2e7941e9cbf46ac
                      • Instruction Fuzzy Hash: 75419334A00209EBEF10DF68C885EEEBBF5EF45314F148066E819AB392D771DA15CB91
                      APIs
                      • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,C825D32E,?,000C6EAB,?,?,?,00000000), ref: 000C6E5F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID: api-ms-$ext-ms-
                      • API String ID: 3664257935-537541572
                      • Opcode ID: 33f5f87b516f7d0c55dc889cc554ed8271f7c58e2b235dfcef66df6e9f87a679
                      • Instruction ID: d3d2175b59b92cbb65adfea59377c77af7fe653fa073334aa1d785b654c93720
                      • Opcode Fuzzy Hash: 33f5f87b516f7d0c55dc889cc554ed8271f7c58e2b235dfcef66df6e9f87a679
                      • Instruction Fuzzy Hash: ED21D835A01220A7DB719B65DC44F5F3BA9EB41760B25412BFD06AB291DB31ED00C6F0
                      APIs
                      • GetLastError.KERNEL32(?,?,000BCABB,000BB083,000B6E89,C825D32E,?,?,?,00000000,000D5C52,000000FF,?,000B57DE,?,?), ref: 000BCAD2
                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 000BCAE0
                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 000BCAF9
                      • SetLastError.KERNEL32(00000000,?,000BCABB,000BB083,000B6E89,C825D32E,?,?,?,00000000,000D5C52,000000FF,?,000B57DE,?,?), ref: 000BCB4B
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ErrorLastValue___vcrt_
                      • String ID:
                      • API String ID: 3852720340-0
                      • Opcode ID: 90435c8f257e5040fedf472c2a1220faaee58777d8544c7ebf5ba590081f8a73
                      • Instruction ID: 82fbd47bbc476f6b886c25d7266c2e1a4fdecd372c064da9f0d7c22e3f4bfa14
                      • Opcode Fuzzy Hash: 90435c8f257e5040fedf472c2a1220faaee58777d8544c7ebf5ba590081f8a73
                      • Instruction Fuzzy Hash: 9801283222DA126EF76827757C8EDEF6B84EB01731B24423AF515601E3EF510C009694
                      APIs
                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,C825D32E,?,?,00000000,000D5E79,000000FF,?,000C3A3E,?,?,000C3A12,00000016), ref: 000C3AE3
                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 000C3AF5
                      • FreeLibrary.KERNEL32(00000000,?,00000000,000D5E79,000000FF,?,000C3A3E,?,?,000C3A12,00000016), ref: 000C3B17
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: AddressFreeHandleLibraryModuleProc
                      • String ID: CorExitProcess$mscoree.dll
                      • API String ID: 4061214504-1276376045
                      • Opcode ID: 397ccd1b2f244dce51774e319f2a70d89933f38946985361f3346217d0ff87a3
                      • Instruction ID: ada0283dfab0902b44b3d228457c9eeb3fbddeea0a505c3abf85e9b64f550b78
                      • Opcode Fuzzy Hash: 397ccd1b2f244dce51774e319f2a70d89933f38946985361f3346217d0ff87a3
                      • Instruction Fuzzy Hash: A601A731A14A19EFDB519B50DC09FAEBBB8FB04B10F00452AFD12A2290DB749904CB60
                      APIs
                      • __alloca_probe_16.LIBCMT ref: 000C94FC
                      • __alloca_probe_16.LIBCMT ref: 000C95BD
                      • __freea.LIBCMT ref: 000C9624
                        • Part of subcall function 000C762F: HeapAlloc.KERNEL32(00000000,?,?,?,000B94FE,?,?,000B193D,?,?,000D7C5E,?,?), ref: 000C7661
                      • __freea.LIBCMT ref: 000C9639
                      • __freea.LIBCMT ref: 000C9649
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: __freea$__alloca_probe_16$AllocHeap
                      • String ID:
                      • API String ID: 1096550386-0
                      • Opcode ID: fb9f8ec860d46d36df379d99f17f1cf8353bab07a205ea6d5e9b94a52c395c04
                      • Instruction ID: 3bb8d98a155f385b590938bf581487d41a2637d90faa6b9bdb4df91cf80a32dd
                      • Opcode Fuzzy Hash: fb9f8ec860d46d36df379d99f17f1cf8353bab07a205ea6d5e9b94a52c395c04
                      • Instruction Fuzzy Hash: D2519E72A01606AFEB659FA4DC89FFF3AE9EB44350F15016CFD08D6291EA71CD1097A0
                      APIs
                      • GetCurrentThreadId.KERNEL32 ref: 000B7086
                      • AcquireSRWLockExclusive.KERNEL32(?,?,00000000,?,000B53D4,?,?,?,?,?), ref: 000B70A5
                      • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,?,000B53D4,?,?,?,?,?), ref: 000B70D3
                      • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,?,000B53D4,?,?,?,?,?), ref: 000B712E
                      • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,?,000B53D4,?,?,?,?,?), ref: 000B7145
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: AcquireExclusiveLock$CurrentThread
                      • String ID:
                      • API String ID: 66001078-0
                      • Opcode ID: 428592d1929d3a21fbfd7b57b40f3481a39326edbd6c34afb0a0ae6aa53a22cb
                      • Instruction ID: 9d616554981693d5e4ee4e64d4bc434bce9efcc77dced6dfe3a541d3150bb0cb
                      • Opcode Fuzzy Hash: 428592d1929d3a21fbfd7b57b40f3481a39326edbd6c34afb0a0ae6aa53a22cb
                      • Instruction Fuzzy Hash: A4412931A08606DFCB60DF6DC9859EAB7F9FF88350B10492AE54AD7640E730E985CB61
                      APIs
                      • __EH_prolog3.LIBCMT ref: 000B7C8F
                      • std::_Lockit::_Lockit.LIBCPMT ref: 000B7C99
                        • Part of subcall function 000B33F0: std::_Lockit::_Lockit.LIBCPMT ref: 000B33FF
                        • Part of subcall function 000B33F0: std::_Lockit::~_Lockit.LIBCPMT ref: 000B341A
                      • codecvt.LIBCPMT ref: 000B7CD3
                      • std::_Facet_Register.LIBCPMT ref: 000B7CEA
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 000B7D0A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                      • String ID:
                      • API String ID: 712880209-0
                      • Opcode ID: 35ea9ab8da9f26e718fdcde46401f43d1c1211693b442e7ca5468c78f145558d
                      • Instruction ID: 364ad3be9f55ea81ee3c0d27256c5f70a1451f570753cbc0069de4454651350e
                      • Opcode Fuzzy Hash: 35ea9ab8da9f26e718fdcde46401f43d1c1211693b442e7ca5468c78f145558d
                      • Instruction Fuzzy Hash: FE11AF71900215AFCB15EB68D8466EE7BF8EF84720F24050AE809A7382DF74AE01CB91
                      APIs
                      • __EH_prolog3.LIBCMT ref: 000B758D
                      • std::_Lockit::_Lockit.LIBCPMT ref: 000B7598
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 000B7606
                        • Part of subcall function 000B76E9: std::locale::_Locimp::_Locimp.LIBCPMT ref: 000B7701
                      • std::locale::_Setgloballocale.LIBCPMT ref: 000B75B3
                      • _Yarn.LIBCPMT ref: 000B75C9
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                      • String ID:
                      • API String ID: 1088826258-0
                      • Opcode ID: db8fc4b7b2c39d9219c9402481d9c6a8c86bb8d01ee0581e8d6dde63088fc46c
                      • Instruction ID: 520342ae85868b56974bc04afb0755f13df55b318f896d457156b5c80c674199
                      • Opcode Fuzzy Hash: db8fc4b7b2c39d9219c9402481d9c6a8c86bb8d01ee0581e8d6dde63088fc46c
                      • Instruction Fuzzy Hash: 45018F75A05611ABD706EB20E8595FD7BB5BFC4740B19400AED0A57382DF38AF42CBE1
                      APIs
                      • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,000BDB78,?,?,00000000,?,?,?,000BDCA2,00000002,FlsGetValue,000DA0D0,FlsGetValue), ref: 000BDBD4
                      • GetLastError.KERNEL32(?,000BDB78,?,?,00000000,?,?,?,000BDCA2,00000002,FlsGetValue,000DA0D0,FlsGetValue,?,?,000BCAE5), ref: 000BDBDE
                      • LoadLibraryExW.KERNEL32(?,00000000,00000000,000E2844,ios_base::failbit set,00000000), ref: 000BDC06
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: LibraryLoad$ErrorLast
                      • String ID: api-ms-
                      • API String ID: 3177248105-2084034818
                      • Opcode ID: c17fb9004f7b4371656f46653280eec3b8a1e475b18f991e8f6bed09df0dfe32
                      • Instruction ID: fea9a46573ca8952e72f2625f17ae0a82d1d4722977d7c66f74fc8bd79363765
                      • Opcode Fuzzy Hash: c17fb9004f7b4371656f46653280eec3b8a1e475b18f991e8f6bed09df0dfe32
                      • Instruction Fuzzy Hash: FBE01230680209F6FF511B61DD06B597F59AB00B50F108432F90DA80E2EBA6E9549A64
                      APIs
                      • GetConsoleOutputCP.KERNEL32(C825D32E,00000000,00000000,00000000), ref: 000C9AA1
                        • Part of subcall function 000CC3CA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,000C961A,?,00000000,-00000008), ref: 000CC476
                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 000C9CFC
                      • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 000C9D44
                      • GetLastError.KERNEL32 ref: 000C9DE7
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                      • String ID:
                      • API String ID: 2112829910-0
                      • Opcode ID: 241c4d71cb697e7e69c5b1e441c351f4980adc1f4067e942104a489ff4ea2e91
                      • Instruction ID: 8149ba17dff8763773ac62febf87139eb1e6b641793c8fbf23d1b3291159d686
                      • Opcode Fuzzy Hash: 241c4d71cb697e7e69c5b1e441c351f4980adc1f4067e942104a489ff4ea2e91
                      • Instruction Fuzzy Hash: F5D148B5D002589FCB15CFA8D884AEDBBB5FF49310F18852EE856EB352E730A951CB50
                      APIs
                      • std::_Throw_Cpp_error.LIBCPMT ref: 000B47F6
                      • std::_Throw_Cpp_error.LIBCPMT ref: 000B4801
                      • std::_Throw_Cpp_error.LIBCPMT ref: 000B4905
                      • std::_Throw_Cpp_error.LIBCPMT ref: 000B4910
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: Cpp_errorThrow_std::_
                      • String ID:
                      • API String ID: 2134207285-0
                      • Opcode ID: 5aa551c2e007ad71110fac8a0eca4de03544fd426d23c165351cf009ee830d3b
                      • Instruction ID: 569b06fce45e0628a825d79030c3f4fd27d5a1f70b753bc0f3e23a5f790065a0
                      • Opcode Fuzzy Hash: 5aa551c2e007ad71110fac8a0eca4de03544fd426d23c165351cf009ee830d3b
                      • Instruction Fuzzy Hash: CE5101718083806BD725BB7498467DABBE89F51300F040D6DF99A12693DBB1E60CC7A3
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: AdjustPointer
                      • String ID:
                      • API String ID: 1740715915-0
                      • Opcode ID: 7c9dd6493d377d25b028be2dbbab41bbd17bae535fe16109b6e81f2054247c39
                      • Instruction ID: 7af3571ce33bbe181f7784eafb86ba5c3f17f187bf8e379eee07eca826243205
                      • Opcode Fuzzy Hash: 7c9dd6493d377d25b028be2dbbab41bbd17bae535fe16109b6e81f2054247c39
                      • Instruction Fuzzy Hash: 9A51AD76600606AFFB299F14D841FEA7BA4EF54710F28453DE81A97692E731ED80CB90
                      APIs
                      • InitOnceBeginInitialize.KERNEL32(002782A4,00000000,?,00000000,00000000,?,00000000), ref: 000B5B61
                      • InitOnceComplete.KERNEL32(002782A4,00000000,00000000), ref: 000B5B84
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: InitOnce$BeginCompleteInitialize
                      • String ID:
                      • API String ID: 51270584-0
                      • Opcode ID: d75df0d675b4887a9c39a9199b20fd905fa566d2a31f22deae7e07040912a893
                      • Instruction ID: b46d71823e2290b29cbd66429b08576c6190c12151555ba6734929af410102c7
                      • Opcode Fuzzy Hash: d75df0d675b4887a9c39a9199b20fd905fa566d2a31f22deae7e07040912a893
                      • Instruction Fuzzy Hash: 6531F271A00704EFD710EF64DC06BDAB7A4EF44711F10826AFA19972C2DB31A904CB96
                      APIs
                        • Part of subcall function 000CC3CA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,000C961A,?,00000000,-00000008), ref: 000CC476
                      • GetLastError.KERNEL32 ref: 000CC6EE
                      • __dosmaperr.LIBCMT ref: 000CC6F5
                      • GetLastError.KERNEL32(?,?,?,?), ref: 000CC72F
                      • __dosmaperr.LIBCMT ref: 000CC736
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                      • String ID:
                      • API String ID: 1913693674-0
                      • Opcode ID: 67b2cf67d66fe735c8dcacc8c6a488a34642bb67c8549f2fac7f90e3fea3c5ec
                      • Instruction ID: 87a5392f075317718ffd1e3fbd727085ad6515730ae58e12540edb040bbd98b2
                      • Opcode Fuzzy Hash: 67b2cf67d66fe735c8dcacc8c6a488a34642bb67c8549f2fac7f90e3fea3c5ec
                      • Instruction Fuzzy Hash: A6216271604606AFEB64AF65C881FAFB7A9FF043647108A1DF91D97552D730EC409FA0
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 053a37a9d1a1356250c21472fc8a780d5149855e5dfcd067ddf705d5c40848bb
                      • Instruction ID: bfee6e9386ffc0f0fdf8913c3baaab30a402489d99e1beffb48ab66556fefb78
                      • Opcode Fuzzy Hash: 053a37a9d1a1356250c21472fc8a780d5149855e5dfcd067ddf705d5c40848bb
                      • Instruction Fuzzy Hash: F4216D72610205AFDF60AF65DC81FAF77A9EF00368710C62DF92597592DB31EE008BA1
                      APIs
                      • GetEnvironmentStringsW.KERNEL32 ref: 000CD628
                        • Part of subcall function 000CC3CA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,000C961A,?,00000000,-00000008), ref: 000CC476
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 000CD660
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 000CD680
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                      • String ID:
                      • API String ID: 158306478-0
                      • Opcode ID: 936474d25547e5b4261c55cb710b3e4ade798fffac7feba63522d3c4f61a4033
                      • Instruction ID: 0afaedb17bb130d97a537124c526ca09b0c320be6b5e0de73384bc4a4ba4cda0
                      • Opcode Fuzzy Hash: 936474d25547e5b4261c55cb710b3e4ade798fffac7feba63522d3c4f61a4033
                      • Instruction Fuzzy Hash: 0A11C4F65016157F772127769C8AEAF2A9CDF45394710053FF80AD1102FE24DE02D6B4
                      APIs
                      • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,000D2B84,00000000,00000001,00000000,00000000,?,000C9E3B,00000000,00000000,00000000), ref: 000D4360
                      • GetLastError.KERNEL32(?,000D2B84,00000000,00000001,00000000,00000000,?,000C9E3B,00000000,00000000,00000000,00000000,00000000,?,000CA3C2,?), ref: 000D436C
                        • Part of subcall function 000D4332: CloseHandle.KERNEL32(FFFFFFFE,000D437C,?,000D2B84,00000000,00000001,00000000,00000000,?,000C9E3B,00000000,00000000,00000000,00000000,00000000), ref: 000D4342
                      • ___initconout.LIBCMT ref: 000D437C
                        • Part of subcall function 000D42F4: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,000D4323,000D2B71,00000000,?,000C9E3B,00000000,00000000,00000000,00000000), ref: 000D4307
                      • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,?,000D2B84,00000000,00000001,00000000,00000000,?,000C9E3B,00000000,00000000,00000000,00000000), ref: 000D4391
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                      • String ID:
                      • API String ID: 2744216297-0
                      • Opcode ID: edd768627acc43b70170f1e53a3ac49e34de397fa69ef123fbdcbcc3540e5d35
                      • Instruction ID: a12eb51c244e96f81e4d65fa7be79caf60e34d543f58d30d3e708040778109a8
                      • Opcode Fuzzy Hash: edd768627acc43b70170f1e53a3ac49e34de397fa69ef123fbdcbcc3540e5d35
                      • Instruction Fuzzy Hash: 9FF0303A001215FBCF221F95EC0899D3F6AFF083A0B448455FE1896230CA328920AFA1
                      APIs
                        • Part of subcall function 000C663B: RtlFreeHeap.NTDLL(00000000,00000000,?,000CE6B3,?,00000000,?,?,000CE954,?,00000007,?,?,000CEE4D,?,?), ref: 000C6651
                        • Part of subcall function 000C663B: GetLastError.KERNEL32(?,?,000CE6B3,?,00000000,?,?,000CE954,?,00000007,?,?,000CEE4D,?,?), ref: 000C665C
                      • ___free_lconv_mon.LIBCMT ref: 000CECFA
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ErrorFreeHeapLast___free_lconv_mon
                      • String ID: 8l'$dk'
                      • API String ID: 4068849827-1236948204
                      • Opcode ID: 781fc13a6db4d55f77c60e6ab488858e17f6ccc392b13b516c38a33e52e3c500
                      • Instruction ID: 149103a97d54cb5456d16064c9aaabebf5121e7cca752ce281b3e6d302581ba2
                      • Opcode Fuzzy Hash: 781fc13a6db4d55f77c60e6ab488858e17f6ccc392b13b516c38a33e52e3c500
                      • Instruction Fuzzy Hash: 053128726007419FEB71AB79D945F9E77E8AF10350F24482DE05AD72A2DB35EC81CB24
                      APIs
                      • EncodePointer.KERNEL32(00000000,?), ref: 000BD1FC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: EncodePointer
                      • String ID: MOC$RCC
                      • API String ID: 2118026453-2084237596
                      • Opcode ID: dc343ac89ed305fd69420ed4fe1fa8d4c9035403d441081402dd497977cc4283
                      • Instruction ID: 99924aae05db2cd89a36b3be4b5360dc937c8cfc0d623769aac1ee328a9db3df
                      • Opcode Fuzzy Hash: dc343ac89ed305fd69420ed4fe1fa8d4c9035403d441081402dd497977cc4283
                      • Instruction Fuzzy Hash: B4417971900249AFCF16DF98CC81AEEBBB5BF48304F18805AF908A7252E335DA50DF51
                      APIs
                      • __alloca_probe_16.LIBCMT ref: 000B6FD2
                      • RaiseException.KERNEL32(?,?,?,?,00000000,00000000), ref: 000B6FF7
                        • Part of subcall function 000BA530: RaiseException.KERNEL32(E06D7363,00000001,00000003,000B9EDD,?,?,?,?,000B9EDD,?,000E273C), ref: 000BA590
                        • Part of subcall function 000BE14B: IsProcessorFeaturePresent.KERNEL32(00000017,000BDED2,?,000BDE41,00000001,00000016,000BE050,?,?,?,?,?,00000000), ref: 000BE167
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: ExceptionRaise$FeaturePresentProcessor__alloca_probe_16
                      • String ID: csm
                      • API String ID: 1924019822-1018135373
                      • Opcode ID: df2eb1b089ac5f54cba2ee35a226faa1f4fbdeb7deb81032e03fe1bdb6d49c74
                      • Instruction ID: 23d8540aed3abd817b9c4e66cca54b385662256cc8134400679b44d199812df2
                      • Opcode Fuzzy Hash: df2eb1b089ac5f54cba2ee35a226faa1f4fbdeb7deb81032e03fe1bdb6d49c74
                      • Instruction Fuzzy Hash: 06219031D0021CDBCF25EF94D945AEDB7B9EF54710F28001AE409AB251C776AD45CB80
                      APIs
                      • std::_Throw_Cpp_error.LIBCPMT ref: 000B52E6
                      • std::_Throw_Cpp_error.LIBCPMT ref: 000B52F1
                        • Part of subcall function 000B7054: ReleaseSRWLockExclusive.KERNEL32(000B54A2,?,000B54AA,00000000,?,?,?,00000006,?,?,?), ref: 000B7068
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: Cpp_errorThrow_std::_$ExclusiveLockRelease
                      • String ID: v'
                      • API String ID: 3666349979-459535593
                      • Opcode ID: 5500a90c6bbeb7c657c7a3fb667d8582e470c5c03bb5abe20e85fc42a040c023
                      • Instruction ID: bbba50b9787b201223db01022d5c4c390348a11f3e49040b27c59940dbd92a9e
                      • Opcode Fuzzy Hash: 5500a90c6bbeb7c657c7a3fb667d8582e470c5c03bb5abe20e85fc42a040c023
                      • Instruction Fuzzy Hash: 6201F5315047416FD711EB28DC01BCBBBE4AFA5311F00845AF65C872A2D770E859CB92
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 000B23C5
                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 000B240A
                        • Part of subcall function 000B7684: _Yarn.LIBCPMT ref: 000B76A3
                        • Part of subcall function 000B7684: _Yarn.LIBCPMT ref: 000B76C7
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: Yarnstd::_$Locinfo::_Locinfo_ctorLockitLockit::_
                      • String ID: bad locale name
                      • API String ID: 1908188788-1405518554
                      • Opcode ID: 3a58c1b5e662f7f9a7d30bd3a4c93a024be2510da9451e7498aa0d7bb1df52ed
                      • Instruction ID: b6a3e0bfa32eb6d95b99d34a6749fbfa9fc25c27d062543aec7e1e9f3832fba0
                      • Opcode Fuzzy Hash: 3a58c1b5e662f7f9a7d30bd3a4c93a024be2510da9451e7498aa0d7bb1df52ed
                      • Instruction Fuzzy Hash: E9F01760505B408ED370DF398415787BEE0AF29714F048E1EE5CAC7A42E375E508CBA6
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2189262775.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000B0000, based on PE: true
                      • Associated: 00000000.00000002.2189247892.00000000000B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189284953.00000000000D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189302259.00000000000E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2189453484.000000000027A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_b0000_MqN5lD3LGo.jbxd
                      Similarity
                      • API ID: H_prolog3
                      • String ID: <i'$h'
                      • API String ID: 431132790-1572006799
                      • Opcode ID: 108548eafaaae24ed0eee7b8713c9133da570d655412df0d7773bccfaac90a20
                      • Instruction ID: 075b38f6162f77c3122692a477febdedb3eeef37afb65c144aa07356e85bfe83
                      • Opcode Fuzzy Hash: 108548eafaaae24ed0eee7b8713c9133da570d655412df0d7773bccfaac90a20
                      • Instruction Fuzzy Hash: C2E04F70D91B09EBDB00ABD1CD0F7DD79A4EB00314FA08155A2647B3C2DBFA4A149B66

                      Execution Graph

                      Execution Coverage:1.2%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:2.7%
                      Total number of Nodes:789
                      Total number of Limit Nodes:13
                      execution_graph 78727 45db00 GetCursorPos 78728 45db15 GetCursorPos 78727->78728 78729 45dbe8 GetPEB 78728->78729 78731 45db27 78728->78731 78729->78731 78730 45db33 GetPEB 78730->78731 78731->78729 78731->78730 78732 45dc5d Sleep 78731->78732 78733 45dba8 Sleep GetCursorPos 78731->78733 78734 45dc87 78731->78734 78732->78728 78733->78729 78733->78731 78735 44c993 78736 44c9a0 78735->78736 78740 44c9b8 78735->78740 78792 4416ff 14 API calls __dosmaperr 78736->78792 78738 44c9a5 78793 438c60 41 API calls _strftime 78738->78793 78741 44ca17 78740->78741 78742 44c9b0 78740->78742 78794 44d685 14 API calls 2 library calls 78740->78794 78755 44a1e9 78741->78755 78745 44ca30 78762 4487f7 78745->78762 78748 44a1e9 __fread_nolock 41 API calls 78749 44ca69 78748->78749 78749->78742 78750 44a1e9 __fread_nolock 41 API calls 78749->78750 78751 44ca77 78750->78751 78751->78742 78752 44a1e9 __fread_nolock 41 API calls 78751->78752 78753 44ca85 78752->78753 78754 44a1e9 __fread_nolock 41 API calls 78753->78754 78754->78742 78756 44a1f5 78755->78756 78757 44a20a 78755->78757 78795 4416ff 14 API calls __dosmaperr 78756->78795 78757->78745 78759 44a1fa 78796 438c60 41 API calls _strftime 78759->78796 78761 44a205 78761->78745 78763 448803 __FrameHandler3::FrameUnwindToState 78762->78763 78764 44880b 78763->78764 78767 448826 78763->78767 78863 4416ec 14 API calls __dosmaperr 78764->78863 78766 448810 78864 4416ff 14 API calls __dosmaperr 78766->78864 78768 44883d 78767->78768 78771 448878 78767->78771 78865 4416ec 14 API calls __dosmaperr 78768->78865 78773 448896 78771->78773 78774 448881 78771->78774 78772 448842 78866 4416ff 14 API calls __dosmaperr 78772->78866 78797 44e6c4 EnterCriticalSection 78773->78797 78868 4416ec 14 API calls __dosmaperr 78774->78868 78775 448818 78775->78742 78775->78748 78779 44889c 78782 4488d0 78779->78782 78783 4488bb 78779->78783 78780 44884a 78867 438c60 41 API calls _strftime 78780->78867 78781 448886 78869 4416ff 14 API calls __dosmaperr 78781->78869 78798 448910 78782->78798 78870 4416ff 14 API calls __dosmaperr 78783->78870 78788 4488c0 78871 4416ec 14 API calls __dosmaperr 78788->78871 78789 4488cb 78872 448908 LeaveCriticalSection __wsopen_s 78789->78872 78792->78738 78793->78742 78794->78741 78795->78759 78796->78761 78797->78779 78799 448922 78798->78799 78800 44893a 78798->78800 78882 4416ec 14 API calls __dosmaperr 78799->78882 78802 448c7c 78800->78802 78808 44897d 78800->78808 78907 4416ec 14 API calls __dosmaperr 78802->78907 78803 448927 78883 4416ff 14 API calls __dosmaperr 78803->78883 78806 448c81 78908 4416ff 14 API calls __dosmaperr 78806->78908 78809 448988 78808->78809 78810 44892f 78808->78810 78814 4489b8 78808->78814 78884 4416ec 14 API calls __dosmaperr 78809->78884 78810->78789 78811 448995 78909 438c60 41 API calls _strftime 78811->78909 78813 44898d 78885 4416ff 14 API calls __dosmaperr 78813->78885 78817 4489d1 78814->78817 78818 448a0c 78814->78818 78819 4489de 78814->78819 78817->78819 78823 4489fa 78817->78823 78889 44b094 78818->78889 78886 4416ec 14 API calls __dosmaperr 78819->78886 78822 4489e3 78887 4416ff 14 API calls __dosmaperr 78822->78887 78873 453be3 78823->78873 78828 4489ea 78888 438c60 41 API calls _strftime 78828->78888 78829 448b58 78832 448bcc 78829->78832 78835 448b71 GetConsoleMode 78829->78835 78830 448a26 78897 44b01a 14 API calls __dosmaperr 78830->78897 78834 448bd0 ReadFile 78832->78834 78837 448c44 GetLastError 78834->78837 78838 448be8 78834->78838 78835->78832 78839 448b82 78835->78839 78836 448a2d 78841 448a37 78836->78841 78842 448a52 78836->78842 78843 448c51 78837->78843 78844 448ba8 78837->78844 78838->78837 78845 448bc1 78838->78845 78839->78834 78840 448b88 ReadConsoleW 78839->78840 78840->78845 78846 448ba2 GetLastError 78840->78846 78898 4416ff 14 API calls __dosmaperr 78841->78898 78900 4425fd 43 API calls 2 library calls 78842->78900 78905 4416ff 14 API calls __dosmaperr 78843->78905 78860 4489f5 __fread_nolock 78844->78860 78901 4416a5 14 API calls __dosmaperr 78844->78901 78854 448c24 78845->78854 78855 448c0d 78845->78855 78845->78860 78846->78844 78852 448a3c 78899 4416ec 14 API calls __dosmaperr 78852->78899 78853 448c56 78906 4416ec 14 API calls __dosmaperr 78853->78906 78859 448c3d 78854->78859 78854->78860 78903 448622 46 API calls 3 library calls 78855->78903 78904 448468 44 API calls __fread_nolock 78859->78904 78902 44b01a 14 API calls __dosmaperr 78860->78902 78862 448c42 78862->78860 78863->78766 78864->78775 78865->78772 78866->78780 78867->78775 78868->78781 78869->78780 78870->78788 78871->78789 78872->78775 78874 453bf0 78873->78874 78875 453bfd 78873->78875 78910 4416ff 14 API calls __dosmaperr 78874->78910 78878 453c09 78875->78878 78911 4416ff 14 API calls __dosmaperr 78875->78911 78877 453bf5 78877->78829 78878->78829 78880 453c2a 78912 438c60 41 API calls _strftime 78880->78912 78882->78803 78883->78810 78884->78813 78885->78811 78886->78822 78887->78828 78888->78860 78890 44b0d2 78889->78890 78891 44b0a2 _strftime 78889->78891 78914 4416ff 14 API calls __dosmaperr 78890->78914 78891->78890 78893 44b0bd RtlAllocateHeap 78891->78893 78913 445a89 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 78891->78913 78893->78891 78894 448a1d 78893->78894 78896 44b01a 14 API calls __dosmaperr 78894->78896 78896->78830 78897->78836 78898->78852 78899->78860 78900->78823 78901->78860 78902->78810 78903->78860 78904->78862 78905->78853 78906->78860 78907->78806 78908->78811 78909->78810 78910->78877 78911->78880 78912->78877 78913->78891 78914->78894 78915 45098d GetEnvironmentStringsW 78916 4509a5 78915->78916 78929 450a28 78915->78929 78936 44ec55 78916->78936 78918 4509c2 78919 4509d7 78918->78919 78920 4509cc FreeEnvironmentStringsW 78918->78920 78921 44b094 _strftime 15 API calls 78919->78921 78920->78929 78922 4509de 78921->78922 78923 4509f7 78922->78923 78924 4509e6 78922->78924 78926 44ec55 _strftime WideCharToMultiByte 78923->78926 78939 44b01a 14 API calls __dosmaperr 78924->78939 78928 450a07 78926->78928 78927 4509eb FreeEnvironmentStringsW 78927->78929 78930 450a16 78928->78930 78931 450a0e 78928->78931 78941 44b01a 14 API calls __dosmaperr 78930->78941 78940 44b01a 14 API calls __dosmaperr 78931->78940 78934 450a14 FreeEnvironmentStringsW 78934->78929 78937 44ec68 _strftime 78936->78937 78938 44eca6 WideCharToMultiByte 78937->78938 78938->78918 78939->78927 78940->78934 78941->78934 78942 44ac7f 78947 44aa55 78942->78947 78946 44acbe 78948 44aa74 78947->78948 78949 44aa87 78948->78949 78957 44aa9c 78948->78957 78967 4416ff 14 API calls __dosmaperr 78949->78967 78951 44aa8c 78968 438c60 41 API calls _strftime 78951->78968 78953 44aa97 78953->78946 78964 442cb3 78953->78964 78955 44ac6d 78973 438c60 41 API calls _strftime 78955->78973 78962 44abbc 78957->78962 78969 440fae 41 API calls 2 library calls 78957->78969 78959 44ac0c 78959->78962 78970 440fae 41 API calls 2 library calls 78959->78970 78961 44ac2a 78961->78962 78971 440fae 41 API calls 2 library calls 78961->78971 78962->78953 78972 4416ff 14 API calls __dosmaperr 78962->78972 78974 44265b 78964->78974 78967->78951 78968->78953 78969->78959 78970->78961 78971->78962 78972->78955 78973->78953 78975 442667 __FrameHandler3::FrameUnwindToState 78974->78975 78976 44266e 78975->78976 78978 442699 78975->78978 78994 4416ff 14 API calls __dosmaperr 78976->78994 78985 442c45 78978->78985 78979 442673 78995 438c60 41 API calls _strftime 78979->78995 78984 44267d 78984->78946 78997 43d1a7 78985->78997 78990 442c7b 78992 4426bd 78990->78992 79052 44b01a 14 API calls __dosmaperr 78990->79052 78996 4426f0 LeaveCriticalSection __wsopen_s 78992->78996 78994->78979 78995->78984 78996->78984 79053 4395ae 78997->79053 79000 43d1cb 79002 43d18a 79000->79002 79065 43d0d8 79002->79065 79005 442cd3 79090 442a21 79005->79090 79008 442d05 79122 4416ec 14 API calls __dosmaperr 79008->79122 79009 442d1e 79108 44e79c 79009->79108 79013 442d0a 79123 4416ff 14 API calls __dosmaperr 79013->79123 79014 442d43 79121 44298c CreateFileW 79014->79121 79015 442d2c 79124 4416ec 14 API calls __dosmaperr 79015->79124 79019 442d17 79019->78990 79020 442d31 79125 4416ff 14 API calls __dosmaperr 79020->79125 79022 442df9 GetFileType 79023 442e04 GetLastError 79022->79023 79024 442e4b 79022->79024 79128 4416a5 14 API calls __dosmaperr 79023->79128 79130 44e6e7 15 API calls 2 library calls 79024->79130 79025 442dce GetLastError 79127 4416a5 14 API calls __dosmaperr 79025->79127 79028 442d7c 79028->79022 79028->79025 79126 44298c CreateFileW 79028->79126 79029 442e12 CloseHandle 79029->79013 79033 442e3b 79029->79033 79032 442dc1 79032->79022 79032->79025 79129 4416ff 14 API calls __dosmaperr 79033->79129 79034 442e6c 79036 442eb8 79034->79036 79131 442b9b 75 API calls 3 library calls 79034->79131 79041 442ebf 79036->79041 79133 442736 75 API calls 4 library calls 79036->79133 79037 442e40 79037->79013 79040 442eed 79040->79041 79042 442efb 79040->79042 79132 448dcf 44 API calls 2 library calls 79041->79132 79042->79019 79044 442f77 CloseHandle 79042->79044 79134 44298c CreateFileW 79044->79134 79046 442fa2 79047 442fac GetLastError 79046->79047 79048 442fd8 79046->79048 79135 4416a5 14 API calls __dosmaperr 79047->79135 79048->79019 79050 442fb8 79136 44e8af 15 API calls 2 library calls 79050->79136 79052->78992 79054 4395cc 79053->79054 79060 4395c5 79053->79060 79054->79060 79062 449e42 41 API calls 3 library calls 79054->79062 79056 4395ed 79063 44a12d 41 API calls __Getctype 79056->79063 79058 439603 79064 44a18b 41 API calls _strftime 79058->79064 79060->79000 79061 44b50e 5 API calls std::_Locinfo::_Locinfo_dtor 79060->79061 79061->79000 79062->79056 79063->79058 79064->79060 79066 43d100 79065->79066 79067 43d0e6 79065->79067 79069 43d107 79066->79069 79070 43d126 79066->79070 79083 43d1e6 14 API calls std::locale::_Locimp::~_Locimp 79067->79083 79074 43d0f0 79069->79074 79084 43d200 15 API calls _strftime 79069->79084 79085 44b17a MultiByteToWideChar _strftime 79070->79085 79073 43d135 79075 43d13c GetLastError 79073->79075 79076 43d162 79073->79076 79088 43d200 15 API calls _strftime 79073->79088 79074->78990 79074->79005 79086 4416a5 14 API calls __dosmaperr 79075->79086 79076->79074 79089 44b17a MultiByteToWideChar _strftime 79076->79089 79078 43d148 79087 4416ff 14 API calls __dosmaperr 79078->79087 79082 43d179 79082->79074 79082->79075 79083->79074 79084->79074 79085->79073 79086->79078 79087->79074 79088->79076 79089->79082 79091 442a42 79090->79091 79092 442a5c 79090->79092 79091->79092 79144 4416ff 14 API calls __dosmaperr 79091->79144 79137 4429b1 79092->79137 79095 442a51 79145 438c60 41 API calls _strftime 79095->79145 79097 442a94 79098 442ac3 79097->79098 79146 4416ff 14 API calls __dosmaperr 79097->79146 79106 442b16 79098->79106 79148 446a20 41 API calls 2 library calls 79098->79148 79101 442b11 79103 442b8e 79101->79103 79101->79106 79102 442ab8 79147 438c60 41 API calls _strftime 79102->79147 79149 438c8d 11 API calls std::locale::_Setgloballocale 79103->79149 79106->79008 79106->79009 79107 442b9a 79109 44e7a8 __FrameHandler3::FrameUnwindToState 79108->79109 79152 44424b EnterCriticalSection 79109->79152 79111 44e7f6 79153 44e8a6 79111->79153 79113 44e7d4 79156 44e576 15 API calls 3 library calls 79113->79156 79114 44e7af 79114->79111 79114->79113 79118 44e843 EnterCriticalSection 79114->79118 79117 44e7d9 79117->79111 79157 44e6c4 EnterCriticalSection 79117->79157 79118->79111 79120 44e850 LeaveCriticalSection 79118->79120 79120->79114 79121->79028 79122->79013 79123->79019 79124->79020 79125->79013 79126->79032 79127->79013 79128->79029 79129->79037 79130->79034 79131->79036 79132->79019 79133->79040 79134->79046 79135->79050 79136->79048 79140 4429c9 79137->79140 79138 4429e4 79138->79097 79140->79138 79150 4416ff 14 API calls __dosmaperr 79140->79150 79141 442a08 79151 438c60 41 API calls _strftime 79141->79151 79143 442a13 79143->79097 79144->79095 79145->79092 79146->79102 79147->79098 79148->79101 79149->79107 79150->79141 79151->79143 79152->79114 79158 444293 LeaveCriticalSection 79153->79158 79155 442d23 79155->79014 79155->79015 79156->79117 79157->79111 79158->79155 79159 433718 79160 433721 79159->79160 79167 433d85 IsProcessorFeaturePresent 79160->79167 79162 43372d 79168 43724d 10 API calls 2 library calls 79162->79168 79164 433732 79166 433736 79164->79166 79169 43726c 7 API calls 2 library calls 79164->79169 79167->79162 79168->79164 79169->79166 79170 4c7b00 79171 4c7ecc 79170->79171 79181 4c7b3e __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 79170->79181 79172 4c7b87 setsockopt recv WSAGetLastError 79172->79171 79172->79181 79174 4c7eb7 Sleep 79174->79171 79174->79181 79175 4c7e15 recv 79177 4c7eaf Sleep 79175->79177 79177->79174 79179 4c7c2d recv 79180 4c7c4e recv 79179->79180 79179->79181 79180->79181 79181->79172 79181->79174 79181->79175 79181->79177 79183 4c7ee1 79181->79183 79186 4c7cd6 setsockopt recv 79181->79186 79187 418dc0 43 API calls 79181->79187 79190 4c8590 WSAStartup 79181->79190 79203 418dc0 79181->79203 79212 433069 79181->79212 79215 409280 79181->79215 79231 4163b0 79181->79231 79236 4c7ef0 98 API calls std::_Throw_Cpp_error 79181->79236 79237 438c70 41 API calls 2 library calls 79183->79237 79186->79181 79187->79186 79191 4c8696 79190->79191 79192 4c85c8 79190->79192 79191->79181 79192->79191 79193 4c85fe getaddrinfo 79192->79193 79194 4c8646 79193->79194 79195 4c8690 WSACleanup 79193->79195 79196 4c86a4 freeaddrinfo 79194->79196 79197 4c8654 socket 79194->79197 79195->79191 79196->79195 79198 4c86b0 79196->79198 79197->79195 79199 4c866a connect 79197->79199 79198->79181 79200 4c867c closesocket 79199->79200 79201 4c86a0 79199->79201 79200->79197 79202 4c8686 freeaddrinfo 79200->79202 79201->79196 79202->79195 79204 418de2 __fread_nolock 79203->79204 79206 418e11 79203->79206 79204->79179 79205 418ef8 79206->79205 79238 4032d0 79206->79238 79208 418e66 __fread_nolock __Strxfrm 79209 418ecb __fread_nolock __Strxfrm 79208->79209 79252 402fe0 41 API calls 2 library calls 79208->79252 79209->79179 79211 418eb8 79211->79179 79278 43361d 79212->79278 79216 4163b0 std::_Throw_Cpp_error 43 API calls 79215->79216 79218 4092d4 79216->79218 79283 402df0 79218->79283 79219 409482 79220 418dc0 43 API calls 79219->79220 79222 409523 __Strxfrm 79219->79222 79220->79222 79221 4095f0 GetModuleHandleA GetProcAddress WSASend 79221->79222 79224 4096e2 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 79221->79224 79222->79221 79222->79224 79223 40975d std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 79223->79181 79224->79223 79294 438c70 41 API calls 2 library calls 79224->79294 79232 4163d8 79231->79232 79233 4163e7 79232->79233 79234 4032d0 std::_Throw_Cpp_error 43 API calls 79232->79234 79233->79181 79235 41642a __Strxfrm 79234->79235 79235->79181 79236->79181 79239 4032e2 79238->79239 79240 403306 79238->79240 79241 4032e9 79239->79241 79242 40331f 79239->79242 79243 403318 79240->79243 79245 433672 std::_Facet_Register 43 API calls 79240->79245 79253 433672 79241->79253 79264 402b50 43 API calls 3 library calls 79242->79264 79243->79208 79248 403310 79245->79248 79247 4032ef 79249 4032f8 79247->79249 79265 438c70 41 API calls 2 library calls 79247->79265 79248->79208 79249->79208 79252->79211 79257 433677 79253->79257 79255 433691 79255->79247 79257->79255 79259 402b50 Concurrency::cancel_current_task 79257->79259 79266 4423ec 79257->79266 79275 445a89 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 79257->79275 79258 43369d 79258->79258 79259->79258 79273 4351fb RaiseException 79259->79273 79261 402b6c 79274 434b15 42 API calls 2 library calls 79261->79274 79263 402bac 79263->79247 79264->79247 79272 44b094 _strftime 79266->79272 79267 44b0d2 79277 4416ff 14 API calls __dosmaperr 79267->79277 79269 44b0bd RtlAllocateHeap 79270 44b0d0 79269->79270 79269->79272 79270->79257 79272->79267 79272->79269 79276 445a89 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 79272->79276 79273->79261 79274->79263 79275->79257 79276->79272 79277->79270 79279 433659 GetSystemTimeAsFileTime 79278->79279 79280 43364d GetSystemTimePreciseAsFileTime 79278->79280 79281 433077 79279->79281 79280->79281 79281->79181 79284 402e13 79283->79284 79285 402e2e std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 79283->79285 79284->79285 79295 438c70 41 API calls 2 library calls 79284->79295 79285->79219 79296 4e7330 79315 41ae80 79296->79315 79302 402df0 std::_Throw_Cpp_error 43 API calls 79304 4e749d 79302->79304 79307 43d5f6 68 API calls 79308 4e743e 79307->79308 79309 418dc0 43 API calls 79308->79309 79310 4e7454 79308->79310 79309->79310 79335 44209f 79310->79335 79314 4e748e 79314->79302 79316 433672 std::_Facet_Register 43 API calls 79315->79316 79317 41aeb5 79316->79317 79344 403040 79317->79344 79319 41af08 79320 439820 79319->79320 79350 43975e 79320->79350 79323 43d5f6 79324 43d609 _strftime 79323->79324 79405 43d34d 79324->79405 79329 4393ab 79330 4393be _strftime 79329->79330 79475 438cc1 79330->79475 79333 43899c _strftime 41 API calls 79334 4393d6 79333->79334 79334->79307 79526 4420bc 79335->79526 79338 43d0a8 79339 43d0bb _strftime 79338->79339 79560 43cf83 79339->79560 79341 43d0c7 79342 43899c _strftime 41 API calls 79341->79342 79343 43d0d3 79342->79343 79343->79314 79345 4030c8 79344->79345 79347 403052 79344->79347 79346 403057 __Strxfrm 79346->79319 79347->79346 79348 4032d0 std::_Throw_Cpp_error 43 API calls 79347->79348 79349 4030a3 __Strxfrm 79348->79349 79349->79319 79353 43976a __FrameHandler3::FrameUnwindToState 79350->79353 79351 439771 79375 4416ff 14 API calls __dosmaperr 79351->79375 79353->79351 79355 439791 79353->79355 79354 439776 79376 438c60 41 API calls _strftime 79354->79376 79357 4397a3 79355->79357 79358 439796 79355->79358 79367 44a8ef 79357->79367 79377 4416ff 14 API calls __dosmaperr 79358->79377 79359 439781 79359->79314 79359->79323 79363 4397b3 79378 4416ff 14 API calls __dosmaperr 79363->79378 79364 4397c0 79379 4397fe LeaveCriticalSection __fread_nolock 79364->79379 79368 44a8fb __FrameHandler3::FrameUnwindToState 79367->79368 79380 44424b EnterCriticalSection 79368->79380 79370 44a909 79381 44a993 79370->79381 79375->79354 79376->79359 79377->79359 79378->79359 79379->79359 79380->79370 79388 44a9b6 79381->79388 79382 44aa0e 79400 44a65a 14 API calls 3 library calls 79382->79400 79384 44aa17 79401 44b01a 14 API calls __dosmaperr 79384->79401 79387 44aa20 79390 44a916 79387->79390 79402 44b7f4 6 API calls std::locale::_Setgloballocale 79387->79402 79388->79382 79388->79388 79388->79390 79398 441250 EnterCriticalSection 79388->79398 79399 441264 LeaveCriticalSection 79388->79399 79395 44a94f 79390->79395 79391 44aa3f 79403 441250 EnterCriticalSection 79391->79403 79394 44aa52 79394->79390 79404 444293 LeaveCriticalSection 79395->79404 79397 4397ac 79397->79363 79397->79364 79398->79388 79399->79388 79400->79384 79401->79387 79402->79391 79403->79394 79404->79397 79406 43d359 __FrameHandler3::FrameUnwindToState 79405->79406 79407 43d35f 79406->79407 79409 43d3a2 79406->79409 79432 438be3 41 API calls 2 library calls 79407->79432 79422 441250 EnterCriticalSection 79409->79422 79410 43d37a 79416 43899c 79410->79416 79412 43d3ae 79423 43d4d0 79412->79423 79414 43d3c4 79433 43d3ed LeaveCriticalSection __fread_nolock 79414->79433 79417 4389a8 79416->79417 79418 4389bf 79417->79418 79473 438a47 41 API calls 2 library calls 79417->79473 79420 4389d2 79418->79420 79474 438a47 41 API calls 2 library calls 79418->79474 79420->79329 79422->79412 79424 43d4e3 79423->79424 79425 43d4f6 79423->79425 79424->79414 79434 43d3f7 79425->79434 79427 43d5a7 79427->79414 79429 43d519 79429->79427 79438 439a91 79429->79438 79432->79410 79433->79410 79435 43d408 79434->79435 79437 43d460 79434->79437 79435->79437 79447 4425fd 43 API calls 2 library calls 79435->79447 79437->79429 79439 439aaa 79438->79439 79443 439ad1 79438->79443 79440 44a1e9 __fread_nolock 41 API calls 79439->79440 79439->79443 79441 439ac6 79440->79441 79448 449678 66 API calls 3 library calls 79441->79448 79444 44263d 79443->79444 79449 44251c 79444->79449 79446 442656 79446->79427 79447->79437 79448->79443 79455 44e940 79449->79455 79451 44252e 79452 44254a SetFilePointerEx 79451->79452 79454 442536 __wsopen_s 79451->79454 79453 442562 GetLastError 79452->79453 79452->79454 79453->79454 79454->79446 79456 44e962 79455->79456 79457 44e94d 79455->79457 79461 44e987 79456->79461 79470 4416ec 14 API calls __dosmaperr 79456->79470 79468 4416ec 14 API calls __dosmaperr 79457->79468 79460 44e952 79469 4416ff 14 API calls __dosmaperr 79460->79469 79461->79451 79462 44e992 79471 4416ff 14 API calls __dosmaperr 79462->79471 79465 44e95a 79465->79451 79466 44e99a 79472 438c60 41 API calls _strftime 79466->79472 79468->79460 79469->79465 79470->79462 79471->79466 79472->79465 79473->79418 79474->79420 79476 438ccd __FrameHandler3::FrameUnwindToState 79475->79476 79477 438cf5 79476->79477 79478 438cd4 79476->79478 79486 441250 EnterCriticalSection 79477->79486 79490 438be3 41 API calls 2 library calls 79478->79490 79481 438ced 79481->79333 79482 438d00 79487 438dd0 79482->79487 79486->79482 79492 438e02 79487->79492 79489 438d0f 79491 438d37 LeaveCriticalSection __fread_nolock 79489->79491 79490->79481 79491->79481 79493 438e11 79492->79493 79494 438e39 79492->79494 79509 438be3 41 API calls 2 library calls 79493->79509 79496 44a1e9 __fread_nolock 41 API calls 79494->79496 79497 438e42 79496->79497 79506 4425df 79497->79506 79500 438eec 79510 43916e 46 API calls 4 library calls 79500->79510 79502 438f03 79505 438e2c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 79502->79505 79511 438fa3 45 API calls 2 library calls 79502->79511 79503 438efb 79503->79505 79505->79489 79512 4423f7 79506->79512 79509->79505 79510->79503 79511->79505 79513 442403 __FrameHandler3::FrameUnwindToState 79512->79513 79514 442446 79513->79514 79516 44248c 79513->79516 79522 438e60 79513->79522 79524 438be3 41 API calls 2 library calls 79514->79524 79523 44e6c4 EnterCriticalSection 79516->79523 79518 442492 79519 4424b3 79518->79519 79520 44251c __fread_nolock 43 API calls 79518->79520 79525 442514 LeaveCriticalSection __wsopen_s 79519->79525 79520->79519 79522->79500 79522->79502 79522->79505 79523->79518 79524->79522 79525->79522 79528 4420c8 __FrameHandler3::FrameUnwindToState 79526->79528 79527 4420b7 79527->79338 79528->79527 79529 442112 79528->79529 79530 4420db __fread_nolock 79528->79530 79539 441250 EnterCriticalSection 79529->79539 79553 4416ff 14 API calls __dosmaperr 79530->79553 79532 44211c 79540 441ec6 79532->79540 79535 4420f5 79554 438c60 41 API calls _strftime 79535->79554 79539->79532 79543 441ed8 __fread_nolock 79540->79543 79546 441ef5 79540->79546 79541 441ee5 79556 4416ff 14 API calls __dosmaperr 79541->79556 79543->79541 79543->79546 79551 441f36 __fread_nolock 79543->79551 79544 441eea 79557 438c60 41 API calls _strftime 79544->79557 79555 442151 LeaveCriticalSection __fread_nolock 79546->79555 79547 442061 __fread_nolock 79559 4416ff 14 API calls __dosmaperr 79547->79559 79549 44a1e9 __fread_nolock 41 API calls 79549->79551 79551->79546 79551->79547 79551->79549 79552 448910 __fread_nolock 53 API calls 79551->79552 79558 43ceeb 41 API calls 4 library calls 79551->79558 79552->79551 79553->79535 79554->79527 79555->79527 79556->79544 79557->79546 79558->79551 79559->79544 79561 43cf8f __FrameHandler3::FrameUnwindToState 79560->79561 79562 43cf99 79561->79562 79563 43cfbc 79561->79563 79586 438be3 41 API calls 2 library calls 79562->79586 79570 43cfb4 79563->79570 79571 441250 EnterCriticalSection 79563->79571 79566 43cfda 79572 43d01a 79566->79572 79568 43cfe7 79587 43d012 LeaveCriticalSection __fread_nolock 79568->79587 79570->79341 79571->79566 79573 43d027 79572->79573 79574 43d04a 79572->79574 79599 438be3 41 API calls 2 library calls 79573->79599 79576 439a91 ___scrt_uninitialize_crt 66 API calls 79574->79576 79577 43d042 79574->79577 79578 43d062 79576->79578 79577->79568 79588 44b054 79578->79588 79581 44a1e9 __fread_nolock 41 API calls 79582 43d076 79581->79582 79592 448d2c 79582->79592 79586->79570 79587->79570 79589 44b06b 79588->79589 79591 43d06a 79588->79591 79589->79591 79601 44b01a 14 API calls __dosmaperr 79589->79601 79591->79581 79593 448d55 79592->79593 79596 43d07d 79592->79596 79594 448da4 79593->79594 79597 448d7c 79593->79597 79610 438be3 41 API calls 2 library calls 79594->79610 79596->79577 79600 44b01a 14 API calls __dosmaperr 79596->79600 79602 448c9b 79597->79602 79599->79577 79600->79577 79601->79591 79603 448ca7 __FrameHandler3::FrameUnwindToState 79602->79603 79611 44e6c4 EnterCriticalSection 79603->79611 79605 448cb5 79606 448ce6 79605->79606 79612 448dff 79605->79612 79625 448d20 LeaveCriticalSection __wsopen_s 79606->79625 79609 448d09 79609->79596 79610->79596 79611->79605 79613 44e940 __wsopen_s 41 API calls 79612->79613 79614 448e0f 79613->79614 79615 448e15 79614->79615 79616 448e47 79614->79616 79618 44e940 __wsopen_s 41 API calls 79614->79618 79626 44e8af 15 API calls 2 library calls 79615->79626 79616->79615 79619 44e940 __wsopen_s 41 API calls 79616->79619 79620 448e3e 79618->79620 79621 448e53 FindCloseChangeNotification 79619->79621 79622 44e940 __wsopen_s 41 API calls 79620->79622 79621->79615 79623 448e5f GetLastError 79621->79623 79622->79616 79623->79615 79624 448e6d __wsopen_s 79624->79606 79625->79609 79626->79624 79627 4e4bd0 79698 4e71e0 GetCurrentProcess IsWow64Process 79627->79698 79630 403040 std::_Throw_Cpp_error 43 API calls 79631 4e4cc8 RegOpenKeyExA 79630->79631 79632 4e4ee7 79631->79632 79633 4e4e03 RegQueryValueExA 79631->79633 79636 403040 std::_Throw_Cpp_error 43 API calls 79632->79636 79634 4e4ede RegCloseKey 79633->79634 79635 4e4ebc 79633->79635 79634->79632 79734 416130 43 API calls 2 library calls 79635->79734 79638 4e4fb0 __fread_nolock 79636->79638 79639 4e4fc4 GetCurrentHwProfileA 79638->79639 79640 4e4ffd 79639->79640 79641 4e4fd8 79639->79641 79700 4e57f0 79640->79700 79735 416130 43 API calls 2 library calls 79641->79735 79643 4e5008 79729 4e5d00 SetupDiGetClassDevsA 79643->79729 79646 4e558c 79742 438c70 41 API calls 2 library calls 79646->79742 79649 4e51ff 79737 418f00 43 API calls 3 library calls 79649->79737 79652 4e5230 79738 41abb0 43 API calls std::_Throw_Cpp_error 79652->79738 79653 4e5531 79697 4e555b std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 79653->79697 79743 438c70 41 API calls 2 library calls 79653->79743 79656 4e5295 79739 41e710 43 API calls 2 library calls 79656->79739 79660 4e52ac 79740 41abb0 43 API calls std::_Throw_Cpp_error 79660->79740 79665 4e52cb 79741 41ae20 43 API calls 79665->79741 79670 4e52e0 79672 402df0 std::_Throw_Cpp_error 43 API calls 79670->79672 79674 4e52f2 79672->79674 79676 402df0 std::_Throw_Cpp_error 43 API calls 79674->79676 79678 4e530f 79676->79678 79681 402df0 std::_Throw_Cpp_error 43 API calls 79678->79681 79683 4e531e 79681->79683 79683->79646 79684 4e5358 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 79683->79684 79685 402df0 std::_Throw_Cpp_error 43 API calls 79684->79685 79687 4e5392 79685->79687 79688 402df0 std::_Throw_Cpp_error 43 API calls 79687->79688 79689 4e53a1 79688->79689 79690 402df0 std::_Throw_Cpp_error 43 API calls 79689->79690 79691 4e53b0 __Strxfrm 79690->79691 79691->79691 79692 403040 std::_Throw_Cpp_error 43 API calls 79691->79692 79693 4e550f 79692->79693 79694 402df0 std::_Throw_Cpp_error 43 API calls 79693->79694 79695 4e5522 79694->79695 79696 402df0 std::_Throw_Cpp_error 43 API calls 79695->79696 79696->79653 79699 4e4c13 79698->79699 79699->79630 79744 4359b0 79700->79744 79703 4e589d 79705 403040 std::_Throw_Cpp_error 43 API calls 79703->79705 79704 4e5cb8 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 79704->79643 79706 4e5946 79705->79706 79707 403040 std::_Throw_Cpp_error 43 API calls 79706->79707 79708 4e59fb 79707->79708 79709 403040 std::_Throw_Cpp_error 43 API calls 79708->79709 79710 4e5a3c 79709->79710 79746 4e64d0 79710->79746 79713 4e5b78 GetVolumeInformationA 79714 4e5c7f 79713->79714 79715 4e5ba9 __fread_nolock 79713->79715 79778 4185d0 43 API calls 2 library calls 79714->79778 79776 403440 46 API calls 79715->79776 79718 4e5af1 79721 4e5ce9 79718->79721 79724 4e5b2b std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 79718->79724 79719 402df0 std::_Throw_Cpp_error 43 API calls 79719->79713 79779 438c70 41 API calls 2 library calls 79721->79779 79722 4e5c8e 79722->79704 79780 438c70 41 API calls 2 library calls 79722->79780 79723 4e5c5b 79723->79723 79777 416130 43 API calls 2 library calls 79723->79777 79724->79719 79730 4e5d79 79729->79730 79731 4e509f 79729->79731 79811 4e5db0 53 API calls 3 library calls 79730->79811 79731->79646 79736 41e8a0 43 API calls 2 library calls 79731->79736 79733 4e5d83 79733->79731 79734->79634 79735->79640 79736->79649 79737->79652 79738->79656 79739->79660 79740->79665 79741->79670 79745 4359c7 GetWindowsDirectoryA 79744->79745 79745->79703 79745->79704 79768 4e6562 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 79746->79768 79747 4e668f 79749 4e6698 79747->79749 79750 4e6713 79747->79750 79748 4e6767 79799 419e60 43 API calls 79748->79799 79781 415f60 79749->79781 79754 4e672d 79750->79754 79755 4e6722 79750->79755 79773 4e66fa 79750->79773 79751 403040 std::_Throw_Cpp_error 43 API calls 79751->79768 79797 424400 43 API calls std::_Throw_Cpp_error 79754->79797 79759 4163b0 std::_Throw_Cpp_error 43 API calls 79755->79759 79757 402df0 std::_Throw_Cpp_error 43 API calls 79763 4e6741 79757->79763 79759->79773 79761 4e66fc 79788 4242a0 79761->79788 79762 4e66b5 79765 402df0 std::_Throw_Cpp_error 43 API calls 79762->79765 79766 402df0 std::_Throw_Cpp_error 43 API calls 79763->79766 79764 4242a0 43 API calls 79764->79768 79765->79773 79769 4e5a4f 79766->79769 79768->79747 79768->79748 79768->79751 79768->79764 79772 4e6762 79768->79772 79769->79713 79775 41ab20 43 API calls 79769->79775 79771 402df0 std::_Throw_Cpp_error 43 API calls 79771->79773 79798 438c70 41 API calls 2 library calls 79772->79798 79773->79757 79775->79718 79776->79723 79777->79714 79778->79722 79782 415fe2 79781->79782 79783 415fa6 79781->79783 79800 419e60 43 API calls 79782->79800 79786 403040 std::_Throw_Cpp_error 43 API calls 79783->79786 79787 415fc0 79786->79787 79787->79761 79787->79762 79789 4242fa 79788->79789 79790 4243e9 79788->79790 79801 426ff0 79789->79801 79810 403330 43 API calls 79790->79810 79794 424336 79809 427830 43 API calls 2 library calls 79794->79809 79796 4243b0 79796->79771 79797->79773 79802 426ff9 79801->79802 79803 42703c 79801->79803 79802->79803 79804 427013 79802->79804 79807 433672 std::_Facet_Register 43 API calls 79802->79807 79803->79803 79805 42701c 79804->79805 79806 433672 std::_Facet_Register 43 API calls 79804->79806 79805->79794 79808 427035 79806->79808 79807->79804 79808->79794 79809->79796 79811->79733 79812 4e6ca0 79827 432b99 79812->79827 79815 4e6d4d 79831 432534 43 API calls 2 library calls 79815->79831 79816 4e6cd7 79818 4e6d54 79816->79818 79819 4e6ce3 79816->79819 79832 432534 43 API calls 2 library calls 79818->79832 79824 4e6cfb GetFileAttributesA 79819->79824 79826 4e6d12 79819->79826 79823 4e6d38 79825 4e6d07 GetLastError 79824->79825 79824->79826 79825->79826 79830 432baa ReleaseSRWLockExclusive 79826->79830 79833 432bc8 GetCurrentThreadId 79827->79833 79830->79823 79834 432bf2 79833->79834 79835 432c11 79833->79835 79838 432bf7 AcquireSRWLockExclusive 79834->79838 79844 432c07 79834->79844 79836 432c31 79835->79836 79837 432c1a 79835->79837 79840 432c90 79836->79840 79846 432c49 79836->79846 79839 432c25 AcquireSRWLockExclusive 79837->79839 79837->79844 79838->79844 79839->79844 79842 432c97 TryAcquireSRWLockExclusive 79840->79842 79840->79844 79842->79844 79843 432ba6 79843->79815 79843->79816 79848 433d77 79844->79848 79846->79844 79847 432c80 TryAcquireSRWLockExclusive 79846->79847 79855 43302b GetSystemTimePreciseAsFileTime GetSystemTimeAsFileTime __aulldiv __aullrem __Xtime_get_ticks 79846->79855 79847->79844 79847->79846 79849 433d80 IsProcessorFeaturePresent 79848->79849 79850 433d7f 79848->79850 79852 43455a 79849->79852 79850->79843 79856 43451d SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 79852->79856 79854 43463d 79854->79843 79855->79846 79856->79854

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 207 4e4bd0-4e4cab call 4e71e0 210 4e4cb2-4e4cb7 207->210 210->210 211 4e4cb9-4e4dfd call 403040 RegOpenKeyExA 210->211 214 4e4ee7-4e4f8a 211->214 215 4e4e03-4e4eba RegQueryValueExA 211->215 218 4e4f94-4e4f99 214->218 216 4e4ede-4e4ee1 RegCloseKey 215->216 217 4e4ebc-4e4ec2 215->217 216->214 219 4e4ec5-4e4eca 217->219 218->218 220 4e4f9b-4e4fd6 call 403040 call 4359b0 GetCurrentHwProfileA 218->220 219->219 221 4e4ecc-4e4ed9 call 416130 219->221 227 4e4ffd-4e509a call 4e57f0 call 4e5d00 220->227 228 4e4fd8-4e4fde 220->228 221->216 235 4e509f-4e51be 227->235 229 4e4fe1-4e4fe6 228->229 229->229 231 4e4fe8-4e4ff8 call 416130 229->231 231->227 236 4e51c0-4e51c5 235->236 236->236 237 4e51c7-4e51d5 236->237 238 4e558c call 402c60 237->238 239 4e51db-4e5331 call 41e8a0 call 418f00 call 41abb0 call 41e710 call 41abb0 call 41ae20 call 402df0 * 3 237->239 242 4e5591 call 438c70 238->242 287 4e5362-4e5437 call 402df0 * 3 239->287 288 4e5333-4e5342 239->288 247 4e5596-4e563a call 438c70 MultiByteToWideChar 242->247 255 4e56ee-4e570b call 402df0 247->255 256 4e5640-4e5650 call 439570 247->256 264 4e56ed 256->264 265 4e5656-4e566c MultiByteToWideChar 256->265 264->255 266 4e566e-4e5696 WideCharToMultiByte 265->266 267 4e56e4-4e56ea call 441c96 265->267 266->267 269 4e5698-4e56a7 call 439570 266->269 267->264 269->267 277 4e56a9-4e56c1 WideCharToMultiByte 269->277 279 4e56db-4e56e1 call 441c96 277->279 280 4e56c3-4e56c5 277->280 279->267 282 4e56c8-4e56cd 280->282 282->282 285 4e56cf-4e56d6 call 416130 282->285 285->279 300 4e5468-4e546a 287->300 301 4e5439-4e543e 287->301 289 4e5358-4e535f call 4338f3 288->289 290 4e5344-4e5352 288->290 289->287 290->242 290->289 302 4e546c-4e548e call 435270 300->302 303 4e5490 300->303 304 4e5440-4e545d call 4eec40 301->304 306 4e549a-4e54ad call 4ef4b0 302->306 303->306 312 4e545f-4e5465 304->312 313 4e54af-4e54d0 306->313 314 4e54d7-4e54f0 306->314 312->300 313->314 315 4e54f7-4e54fc 314->315 315->315 316 4e54fe-4e553b call 403040 call 402df0 * 2 315->316 323 4e553d-4e5549 316->323 324 4e5565-4e558b 316->324 325 4e555b-4e5562 call 4338f3 323->325 326 4e554b-4e5559 323->326 325->324 326->247 326->325
                      APIs
                        • Part of subcall function 004E71E0: GetCurrentProcess.KERNEL32(?), ref: 004E71EF
                        • Part of subcall function 004E71E0: IsWow64Process.KERNEL32(00000000), ref: 004E71F6
                      • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,-005A5B4A,00000000,?,?,00000000,-00585B31), ref: 004E4DF5
                      • RegQueryValueExA.KERNELBASE(00000000,?,00000000,00020019,?,00000400), ref: 004E4EB2
                      • RegCloseKey.ADVAPI32(00000000), ref: 004E4EE1
                      • GetCurrentHwProfileA.ADVAPI32(?), ref: 004E4FCE
                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 004E562F
                      • MultiByteToWideChar.KERNEL32(0000000F,00000000,?,000000FF,00000000,0000000F), ref: 004E5664
                      • WideCharToMultiByte.KERNEL32(000004E3,00000000,00000000,000000FF,00000000,00000000,00000000,00000000), ref: 004E568B
                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000), ref: 004E56B9
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$CurrentProcess$CloseOpenProfileQueryValueWow64
                      • String ID:
                      • API String ID: 1646947450-0
                      • Opcode ID: ae4292a958d13f34842306830b16d1fa5ccb16088a57fb5a98bfde5e58442c07
                      • Instruction ID: c0aba00e6514ac26363e67ac76cfd5322cd72c6070033efa120dba6d155bc681
                      • Opcode Fuzzy Hash: ae4292a958d13f34842306830b16d1fa5ccb16088a57fb5a98bfde5e58442c07
                      • Instruction Fuzzy Hash: 4E7255B0C042599BDB24CFA9C985BEEBBB1BF08304F204199E449B7291DB745B84CFA5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 437 4c8590-4c85c2 WSAStartup 438 4c85c8-4c85f2 call 4ea420 * 2 437->438 439 4c8696-4c869f 437->439 444 4c85fe-4c8644 getaddrinfo 438->444 445 4c85f4-4c85f8 438->445 446 4c8646-4c864c 444->446 447 4c8690 WSACleanup 444->447 445->439 445->444 448 4c864e 446->448 449 4c86a4-4c86ae freeaddrinfo 446->449 447->439 450 4c8654-4c8668 socket 448->450 449->447 451 4c86b0-4c86b8 449->451 450->447 452 4c866a-4c867a connect 450->452 453 4c867c-4c8684 closesocket 452->453 454 4c86a0 452->454 453->450 455 4c8686-4c868a freeaddrinfo 453->455 454->449 455->447
                      APIs
                      • WSAStartup.WS2_32 ref: 004C85BA
                      • getaddrinfo.WS2_32(?,?,?,00589328), ref: 004C863C
                      • socket.WS2_32(?,?,?), ref: 004C865D
                      • connect.WS2_32(00000000,00559BFC,?), ref: 004C8671
                      • closesocket.WS2_32(00000000), ref: 004C867D
                      • freeaddrinfo.WS2_32(?,?,?,?,00589328,?,?), ref: 004C868A
                      • WSACleanup.WS2_32 ref: 004C8690
                      • freeaddrinfo.WS2_32(?,?,?,?,00589328,?,?), ref: 004C86A5
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: freeaddrinfo$CleanupStartupclosesocketconnectgetaddrinfosocket
                      • String ID:
                      • API String ID: 58224237-0
                      • Opcode ID: 52d29ec15fbf37ccd53ab56e21f2e3f1d11727fcf2b6a4206c2cbc59116a4c78
                      • Instruction ID: ffa07009e3086412046aa5b15573dbd5c691e56a3beb11943292ef2f0f62f1de
                      • Opcode Fuzzy Hash: 52d29ec15fbf37ccd53ab56e21f2e3f1d11727fcf2b6a4206c2cbc59116a4c78
                      • Instruction Fuzzy Hash: 9531C1726043009BD7208F25DC48B2BB7E5FB94729F114B1EF9A4922E0D7759C089AA7

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 456 45db00-45db13 GetCursorPos 457 45db15-45db21 GetCursorPos 456->457 458 45db27-45db2d 457->458 459 45dbe8-45dbf1 GetPEB 457->459 458->459 461 45db33-45db3f GetPEB 458->461 460 45dbf4-45dc08 459->460 462 45dc59-45dc5b 460->462 463 45dc0a-45dc0f 460->463 464 45db40-45db54 461->464 462->460 463->462 465 45dc11-45dc19 463->465 466 45dba4-45dba6 464->466 467 45db56-45db5b 464->467 468 45dc20-45dc33 465->468 466->464 467->466 469 45db5d-45db63 467->469 470 45dc35-45dc48 468->470 471 45dc52-45dc57 468->471 472 45db65-45db78 469->472 470->470 475 45dc4a-45dc50 470->475 471->462 471->468 473 45db9d-45dba2 472->473 474 45db7a 472->474 473->466 473->472 476 45db80-45db93 474->476 475->471 477 45dc5d-45dc82 Sleep 475->477 476->476 478 45db95-45db9b 476->478 477->457 478->473 479 45dba8-45dbda Sleep GetCursorPos 478->479 479->459 480 45dbdc-45dbe2 479->480 480->459 481 45dc87-45dc98 call 4ea420 480->481 484 45dc9e 481->484 485 45dc9a-45dc9c 481->485 486 45dca0-45dcbd call 4ea420 484->486 485->486
                      APIs
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Cursor$Sleep
                      • String ID:
                      • API String ID: 1847515627-0
                      • Opcode ID: 64e1b3b3cfd2bc4f7f18a9e387635337b0495f42438516b07fc99cf1f27a474a
                      • Instruction ID: ab3f96cd0466869246e3b632190b9ed1b666d42f9e689fec286df2e29c35159e
                      • Opcode Fuzzy Hash: 64e1b3b3cfd2bc4f7f18a9e387635337b0495f42438516b07fc99cf1f27a474a
                      • Instruction Fuzzy Hash: E651BB35A04215CFCB25CF58C4D0EAAB7B2EF89705B2A809AD945AF352D735FD49CB80

                      Control-flow Graph

                      APIs
                      • setsockopt.WS2_32(00000338,0000FFFF,00001006,?,00000008), ref: 004C7BA6
                      • recv.WS2_32(?,00000004,00000002), ref: 004C7BC1
                      • WSAGetLastError.WS2_32 ref: 004C7BC5
                      • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 004C7C43
                      • recv.WS2_32(00000000,0000000C,00000008), ref: 004C7C64
                      • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?), ref: 004C7D00
                      • recv.WS2_32(00000000,?,00000008), ref: 004C7D1B
                        • Part of subcall function 004C8590: WSAStartup.WS2_32 ref: 004C85BA
                        • Part of subcall function 004C8590: getaddrinfo.WS2_32(?,?,?,00589328), ref: 004C863C
                        • Part of subcall function 004C8590: socket.WS2_32(?,?,?), ref: 004C865D
                        • Part of subcall function 004C8590: connect.WS2_32(00000000,00559BFC,?), ref: 004C8671
                        • Part of subcall function 004C8590: closesocket.WS2_32(00000000), ref: 004C867D
                        • Part of subcall function 004C8590: freeaddrinfo.WS2_32(?,?,?,?,00589328,?,?), ref: 004C868A
                        • Part of subcall function 004C8590: WSACleanup.WS2_32 ref: 004C8690
                      • recv.WS2_32(?,00000004,00000008), ref: 004C7E23
                      • __Xtime_get_ticks.LIBCPMT ref: 004C7E2A
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004C7E38
                      • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 004C7EB1
                      • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 004C7EB9
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: recv$Sleepsetsockopt$CleanupErrorLastStartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectfreeaddrinfogetaddrinfosocket
                      • String ID:
                      • API String ID: 4125349891-0
                      • Opcode ID: deda763b8fb6066c72b20903b58187ae793f723e7b47fea433c0891846b4f81f
                      • Instruction ID: b3d54dcccad81d83ab75f13ba9899d4b50e1d8608cabcccfb3508871926cac68
                      • Opcode Fuzzy Hash: deda763b8fb6066c72b20903b58187ae793f723e7b47fea433c0891846b4f81f
                      • Instruction Fuzzy Hash: 9EB1AC71D043089BEB10DBA8CC49BAEBBB1BB54314F24025EE815BB2D2D7785D88DF95

                      Control-flow Graph

                      APIs
                        • Part of subcall function 0044298C: CreateFileW.KERNELBASE(?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 004429A9
                      • GetLastError.KERNEL32 ref: 00442DE7
                      • __dosmaperr.LIBCMT ref: 00442DEE
                      • GetFileType.KERNELBASE(00000000), ref: 00442DFA
                      • GetLastError.KERNEL32 ref: 00442E04
                      • __dosmaperr.LIBCMT ref: 00442E0D
                      • CloseHandle.KERNEL32(00000000), ref: 00442E2D
                      • CloseHandle.KERNEL32(?), ref: 00442F7A
                      • GetLastError.KERNEL32 ref: 00442FAC
                      • __dosmaperr.LIBCMT ref: 00442FB3
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                      • String ID: H
                      • API String ID: 4237864984-2852464175
                      • Opcode ID: 899e8745e59b9231842c25977fdcfb02482e73fc2f27b2205138a63271f33108
                      • Instruction ID: 5150a9c177428a163fa7fb1c8ad58043a10a64c5935946436f9da82f6cbe0861
                      • Opcode Fuzzy Hash: 899e8745e59b9231842c25977fdcfb02482e73fc2f27b2205138a63271f33108
                      • Instruction Fuzzy Hash: 4EA15832A101149FEF19AF68DC917AE3BB1AB06314F58014EF801EF3A1CB799C56DB59

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 125 4c7930-4c7976 call 432b99 128 4c797c-4c7986 125->128 129 4c7ad9-4c7adb call 432534 125->129 130 4c798c-4c7a22 call 41ac50 128->130 131 4c7ae0-4c7b38 call 432534 128->131 129->131 137 4c7a24-4c7a60 130->137 138 4c7a62-4c7a69 call 4242a0 130->138 142 4c7ecc-4c7ee0 131->142 143 4c7b3e 131->143 140 4c7a6e-4c7ad8 call 402df0 call 432baa call 4163b0 call 409280 call 402df0 137->140 138->140 145 4c7b44-4c7b4c 143->145 147 4c7b4e-4c7b81 call 4c8590 145->147 148 4c7b87-4c7bd0 setsockopt recv WSAGetLastError 145->148 147->148 157 4c7eb7-4c7ec6 Sleep 147->157 148->142 150 4c7bd6-4c7bd9 148->150 154 4c7bdf-4c7be6 150->154 155 4c7e2a-4c7e53 call 433069 call 458660 150->155 158 4c7bec-4c7c48 call 418dc0 recv 154->158 159 4c7e15-4c7e25 recv 154->159 162 4c7eaf-4c7eb1 Sleep 155->162 174 4c7e55 155->174 157->142 157->145 169 4c7c4e-4c7c69 recv 158->169 170 4c7dc3-4c7dd0 158->170 159->162 162->157 169->170 173 4c7c6f-4c7caa 169->173 175 4c7dfe-4c7e10 170->175 176 4c7dd2-4c7dde 170->176 178 4c7cac-4c7cb1 173->178 179 4c7d1d-4c7d7d call 4163b0 call 408d50 call 4c7ef0 173->179 180 4c7e5f-4c7eaa call 409280 174->180 181 4c7e57-4c7e5d 174->181 175->162 182 4c7df4-4c7dfb call 4338f3 176->182 183 4c7de0-4c7dee 176->183 184 4c7cc7-4c7cd0 178->184 185 4c7cb3-4c7cc5 178->185 201 4c7d7f-4c7d8b 179->201 202 4c7dab-4c7dbf 179->202 180->162 181->162 181->180 182->175 183->182 187 4c7ee1-4c7ee6 call 438c70 183->187 191 4c7cd6-4c7d1b setsockopt recv 184->191 193 4c7cd1 call 418dc0 184->193 185->191 191->179 193->191 203 4c7d8d-4c7d9b 201->203 204 4c7da1-4c7da8 call 4338f3 201->204 202->170 203->187 203->204 204->202
                      APIs
                      • std::_Throw_Cpp_error.LIBCPMT ref: 004C7ADB
                      • std::_Throw_Cpp_error.LIBCPMT ref: 004C7AEC
                      • setsockopt.WS2_32(00000338,0000FFFF,00001006,?,00000008), ref: 004C7BA6
                      • recv.WS2_32(?,00000004,00000002), ref: 004C7BC1
                      • WSAGetLastError.WS2_32 ref: 004C7BC5
                      • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 004C7C43
                      • recv.WS2_32(00000000,0000000C,00000008), ref: 004C7C64
                      • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?), ref: 004C7D00
                      • recv.WS2_32(00000000,?,00000008), ref: 004C7D1B
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: recv$Cpp_errorThrow_setsockoptstd::_$ErrorLast
                      • String ID:
                      • API String ID: 4262120464-0
                      • Opcode ID: 2742313002d99ebff0b85c726cc7d50e8a722fbe449677251f19bcc81d2f59a3
                      • Instruction ID: f660aa10a7ff82edcf50d97d555a6422b1ffe0091938b4aec26a5e786c81bbb5
                      • Opcode Fuzzy Hash: 2742313002d99ebff0b85c726cc7d50e8a722fbe449677251f19bcc81d2f59a3
                      • Instruction Fuzzy Hash: 80E1ABB1C04348DBDB10DFA8CC89BAEBBB1FB18314F24425EE811AB292D7785944DF95

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 329 448910-448920 330 448922-448935 call 4416ec call 4416ff 329->330 331 44893a-44893c 329->331 347 448c94 330->347 333 448942-448948 331->333 334 448c7c-448c89 call 4416ec call 4416ff 331->334 333->334 337 44894e-448977 333->337 352 448c8f call 438c60 334->352 337->334 340 44897d-448986 337->340 343 4489a0-4489a2 340->343 344 448988-44899b call 4416ec call 4416ff 340->344 345 448c78-448c7a 343->345 346 4489a8-4489ac 343->346 344->352 351 448c97-448c9a 345->351 346->345 350 4489b2-4489b6 346->350 347->351 350->344 354 4489b8-4489cf 350->354 352->347 357 448a04-448a0a 354->357 358 4489d1-4489d4 354->358 362 448a0c-448a13 357->362 363 4489de-4489f5 call 4416ec call 4416ff call 438c60 357->363 360 4489d6-4489dc 358->360 361 4489fa-448a02 358->361 360->361 360->363 367 448a77-448a96 361->367 364 448a15 362->364 365 448a17-448a35 call 44b094 call 44b01a * 2 362->365 394 448baf 363->394 364->365 399 448a37-448a4d call 4416ff call 4416ec 365->399 400 448a52-448a75 call 4425fd 365->400 368 448b52-448b5b call 453be3 367->368 369 448a9c-448aa8 367->369 383 448bcc 368->383 384 448b5d-448b6f 368->384 369->368 372 448aae-448ab0 369->372 372->368 376 448ab6-448ad7 372->376 376->368 380 448ad9-448aef 376->380 380->368 385 448af1-448af3 380->385 387 448bd0-448be6 ReadFile 383->387 384->383 389 448b71-448b80 GetConsoleMode 384->389 385->368 390 448af5-448b18 385->390 392 448c44-448c4f GetLastError 387->392 393 448be8-448bee 387->393 389->383 395 448b82-448b86 389->395 390->368 398 448b1a-448b30 390->398 401 448c51-448c63 call 4416ff call 4416ec 392->401 402 448c68-448c6b 392->402 393->392 403 448bf0 393->403 397 448bb2-448bbc call 44b01a 394->397 395->387 396 448b88-448ba0 ReadConsoleW 395->396 404 448bc1-448bca 396->404 405 448ba2 GetLastError 396->405 397->351 398->368 409 448b32-448b34 398->409 399->394 400->367 401->394 406 448c71-448c73 402->406 407 448ba8-448bae call 4416a5 402->407 413 448bf3-448c05 403->413 404->413 405->407 406->397 407->394 409->368 416 448b36-448b4d 409->416 413->397 420 448c07-448c0b 413->420 416->368 421 448c24-448c31 420->421 422 448c0d-448c1d call 448622 420->422 428 448c33 call 448779 421->428 429 448c3d-448c42 call 448468 421->429 434 448c20-448c22 422->434 435 448c38-448c3b 428->435 429->435 434->397 435->434
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID: 0-3907804496
                      • Opcode ID: 69644da4761346a259d3ab052aa607ffb6ef80dbee7307f13448c56a9a482b41
                      • Instruction ID: d4d7462daa34083545f9d93f0c5ebf53bf58a01a885379ada905c47cec286c1a
                      • Opcode Fuzzy Hash: 69644da4761346a259d3ab052aa607ffb6ef80dbee7307f13448c56a9a482b41
                      • Instruction Fuzzy Hash: E2B1F4B0A00245AFFB11DF99C881BAE7BB1FF55304F14015EE414AB392CB78AD81CB69

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 489 409280-4092dd call 4163b0 492 409413-409521 call 402df0 call 4ea420 489->492 493 4092e3-4092e9 489->493 509 409523-409535 492->509 510 409537-40953f call 418dc0 492->510 495 4092f0-409313 493->495 497 409324-409331 495->497 498 409315-40931f 495->498 499 409342-40934f 497->499 500 409333-40933d 497->500 502 409403-409406 498->502 504 409360-40936d 499->504 505 409351-40935b 499->505 500->502 503 409409-40940d 502->503 503->492 503->495 507 40937e-40938b 504->507 508 40936f-409379 504->508 505->502 511 409399-4093a6 507->511 512 40938d-409397 507->512 508->502 513 409544-409597 call 4ea420 * 2 509->513 510->513 515 4093b4-4093c1 511->515 516 4093a8-4093b2 511->516 512->502 526 409599-4095c8 call 4ea420 call 435270 513->526 527 4095cb-4095e1 call 4ea420 513->527 518 4093c3-4093cd 515->518 519 4093cf-4093dc 515->519 516->502 518->502 521 4093ea-4093f4 519->521 522 4093de-4093e8 519->522 521->503 525 4093f6-4093ff 521->525 522->502 525->502 526->527 533 4096e2 527->533 534 4095e7-4095ed 527->534 537 4096e6-4096f0 533->537 536 4095f0-4096ce GetModuleHandleA GetProcAddress WSASend 534->536 538 4096d4-4096dc 536->538 539 40975f-409763 536->539 540 4096f2-4096fe 537->540 541 40971e-40973d 537->541 538->533 538->536 539->537 544 409700-40970e 540->544 545 409714-40971b call 4338f3 540->545 542 40976f-409796 541->542 543 40973f-40974b 541->543 546 409765-40976c call 4338f3 543->546 547 40974d-40975b 543->547 544->545 548 409797-4097fe call 438c70 call 402df0 * 2 544->548 545->541 546->542 547->548 550 40975d 547->550 550->546
                      APIs
                      • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,0054D15C,00000000,76A923A0,-00589880), ref: 004096A6
                      • GetProcAddress.KERNEL32(00000000,?), ref: 004096B4
                      • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0054D15C,00000000,76A923A0,-00589880), ref: 004096C9
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressHandleModuleProcSend
                      • String ID: Ws2_32.dll
                      • API String ID: 2819740048-3093949381
                      • Opcode ID: d946741ea927b9b060335f299eec8efad25939578b4ebaaa967d5c79e73c84d4
                      • Instruction ID: 188670ed5cfc709ed037a390f66f33add7af100e18449b0941b00ad524943a05
                      • Opcode Fuzzy Hash: d946741ea927b9b060335f299eec8efad25939578b4ebaaa967d5c79e73c84d4
                      • Instruction Fuzzy Hash: 7C02CE70D04298DEDF25CFA4C8907ADBBB0EF59304F24429EE4456B2C6D7781D86CB96

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 560 4e6ca0-4e6cd5 call 432b99 563 4e6d4d-4e6d4f call 432534 560->563 564 4e6cd7-4e6ce1 560->564 566 4e6d54-4e6d65 call 432534 563->566 564->566 567 4e6ce3-4e6ce8 564->567 569 4e6cea-4e6cef 567->569 570 4e6d25 567->570 573 4e6cf0-4e6cf5 569->573 571 4e6d27-4e6d4c call 432baa 570->571 573->573 575 4e6cf7-4e6cf9 573->575 575->570 577 4e6cfb-4e6d05 GetFileAttributesA 575->577 578 4e6d07-4e6d10 GetLastError 577->578 579 4e6d21-4e6d23 577->579 578->579 580 4e6d12-4e6d15 578->580 579->571 580->579 581 4e6d17-4e6d1a 580->581 581->579 582 4e6d1c-4e6d1f 581->582 582->570 582->579
                      APIs
                      • GetFileAttributesA.KERNELBASE(?,?,00000006,00000005,00000005,?), ref: 004E6CFC
                      • GetLastError.KERNEL32(?,?,00000006,00000005,00000005,?), ref: 004E6D07
                      • std::_Throw_Cpp_error.LIBCPMT ref: 004E6D4F
                      • std::_Throw_Cpp_error.LIBCPMT ref: 004E6D60
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Cpp_errorThrow_std::_$AttributesErrorFileLast
                      • String ID:
                      • API String ID: 995686243-0
                      • Opcode ID: 3120929ec45ee0086a62fe527d0d8f49284849e7ce8a43a234ec1e7741655826
                      • Instruction ID: 241e2f942859b358e1133ab4bf22632851a161ac9c5554c12c2f2fb0b7350d8e
                      • Opcode Fuzzy Hash: 3120929ec45ee0086a62fe527d0d8f49284849e7ce8a43a234ec1e7741655826
                      • Instruction Fuzzy Hash: DF11CE71A0028496DB205F6A5C08F6A7F60EB22772F64031BD8359B3D4DB3948058759

                      Control-flow Graph

                      APIs
                      • GetEnvironmentStringsW.KERNEL32 ref: 00450995
                        • Part of subcall function 0044EC55: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0044A862,?,00000000,-00000008), ref: 0044ECB6
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004509CD
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004509ED
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                      • String ID:
                      • API String ID: 158306478-0
                      • Opcode ID: cdbe965a3b857f3e72026c647ec4ecc001cf0e2e607b2b24cc187a0d78d85926
                      • Instruction ID: 05a916c6faf25a0682dab3744c632e1b74caa3fe19fc9bf69ed868d66b577761
                      • Opcode Fuzzy Hash: cdbe965a3b857f3e72026c647ec4ecc001cf0e2e607b2b24cc187a0d78d85926
                      • Instruction Fuzzy Hash: EB112BF6901719BF77216BB35C89CBF696CEE6839B710002AF801D1243FB29CD0591B9

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 609 4e57f0-4e5897 call 4359b0 GetWindowsDirectoryA 612 4e589d-4e592c 609->612 613 4e5cd4-4e5ce8 609->613 614 4e5930-4e5935 612->614 614->614 615 4e5937-4e59df call 403040 614->615 618 4e59e6-4e59eb 615->618 618->618 619 4e59ed-4e5a1d call 403040 618->619 622 4e5a24-4e5a29 619->622 622->622 623 4e5a2b-4e5a62 call 403040 call 4e64d0 622->623 628 4e5b78-4e5ba3 GetVolumeInformationA 623->628 629 4e5a68-4e5aff call 41ab20 623->629 630 4e5c7f-4e5c98 call 4185d0 628->630 631 4e5ba9-4e5c64 call 4359b0 call 403440 628->631 638 4e5b69-4e5b73 call 402df0 629->638 639 4e5b01-4e5b07 629->639 642 4e5c9a-4e5ca6 630->642 643 4e5cc2-4e5cd0 630->643 655 4e5c67-4e5c6c 631->655 638->628 640 4e5b09-4e5b15 639->640 641 4e5b35-4e5b66 639->641 646 4e5b2b-4e5b32 call 4338f3 640->646 647 4e5b17-4e5b25 640->647 641->638 648 4e5cb8-4e5cbf call 4338f3 642->648 649 4e5ca8-4e5cb6 642->649 643->613 646->641 647->646 651 4e5ce9 call 438c70 647->651 648->643 649->648 653 4e5cee-4e5cf3 call 438c70 649->653 651->653 655->655 660 4e5c6e-4e5c7a call 416130 655->660 660->630
                      APIs
                      • GetWindowsDirectoryA.KERNEL32(?,00000104,?,00000000,00000000), ref: 004E588F
                      • GetVolumeInformationA.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 004E5B9B
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: DirectoryInformationVolumeWindows
                      • String ID:
                      • API String ID: 3487004747-0
                      • Opcode ID: 018ccf5c1a20462e23d10cd8f9ff11fec9c29878673a0d9fff758b044cfa9032
                      • Instruction ID: 009fea26e280c08ebde66711631a2368a09a7ac58c7b38572a32fddf838a6e16
                      • Opcode Fuzzy Hash: 018ccf5c1a20462e23d10cd8f9ff11fec9c29878673a0d9fff758b044cfa9032
                      • Instruction Fuzzy Hash: 81F157B0D002499BDB14CFA8C9957EEBBB1FF08304F24425EE545BB381DB756A84CBA5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 663 448dff-448e13 call 44e940 666 448e15-448e17 663->666 667 448e19-448e21 663->667 670 448e67-448e87 call 44e8af 666->670 668 448e23-448e2a 667->668 669 448e2c-448e2f 667->669 668->669 671 448e37-448e4b call 44e940 * 2 668->671 672 448e31-448e35 669->672 673 448e4d-448e5d call 44e940 FindCloseChangeNotification 669->673 680 448e99 670->680 681 448e89-448e97 call 4416c8 670->681 671->666 671->673 672->671 672->673 673->666 685 448e5f-448e65 GetLastError 673->685 683 448e9b-448e9e 680->683 681->683 685->670
                      APIs
                      • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00448CE6,00000000,CF830579,0057A178,0000000C,00448DA2,0043D07D,?), ref: 00448E55
                      • GetLastError.KERNEL32(?,00448CE6,00000000,CF830579,0057A178,0000000C,00448DA2,0043D07D,?), ref: 00448E5F
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ChangeCloseErrorFindLastNotification
                      • String ID:
                      • API String ID: 1687624791-0
                      • Opcode ID: 1fe827fdfe079599b9b1dab25e2b646f0beb01ea40d46a72429d261cc15a62e7
                      • Instruction ID: bfed174018f4c3fae0b74bea86efe9ace0911028d3bee9629bfc5162a0057b67
                      • Opcode Fuzzy Hash: 1fe827fdfe079599b9b1dab25e2b646f0beb01ea40d46a72429d261cc15a62e7
                      • Instruction Fuzzy Hash: 6E1125336042102AF6252236A84677F67499B82738F39061FF918CB2D2DF689C81825D

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 688 44251c-442534 call 44e940 691 442536-44253d 688->691 692 44254a-442560 SetFilePointerEx 688->692 693 442544-442548 691->693 694 442575-44257f 692->694 695 442562-442573 GetLastError call 4416c8 692->695 696 44259b-44259e 693->696 694->693 698 442581-442596 694->698 695->693 698->696
                      APIs
                      • SetFilePointerEx.KERNELBASE(00000000,00000000,00579E30,00432B5E,00000002,00432B5E,00000000,?,?,?,00442626,00000000,?,00432B5E,00000002,00579E30), ref: 00442558
                      • GetLastError.KERNEL32(00432B5E,?,?,?,00442626,00000000,?,00432B5E,00000002,00579E30,00000000,00432B5E,00000000,00579E30,0000000C,0043D61E), ref: 00442565
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ErrorFileLastPointer
                      • String ID:
                      • API String ID: 2976181284-0
                      • Opcode ID: 0df1753fdbe4f7a704092f8361e7cfb0c7cc0fcadc70f8748e4d2d33b1623b65
                      • Instruction ID: bcffdd1dd92d970d4fbe8e398a8ab980657c5c2bf717c74f1f656664416c076e
                      • Opcode Fuzzy Hash: 0df1753fdbe4f7a704092f8361e7cfb0c7cc0fcadc70f8748e4d2d33b1623b65
                      • Instruction Fuzzy Hash: 9B012632610615BFDF158F69DC1699E3B29EB84334F240209F8019B2E1E6B5ED429BA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 749 438e02-438e0f 750 438e11-438e34 call 438be3 749->750 751 438e39-438e4d call 44a1e9 749->751 756 438fa0-438fa2 750->756 757 438e52-438e5b call 4425df 751->757 758 438e4f 751->758 760 438e60-438e6f 757->760 758->757 761 438e71 760->761 762 438e7f-438e88 760->762 763 438e77-438e79 761->763 764 438f49-438f4e 761->764 765 438e8a-438e97 762->765 766 438e9c-438ed0 762->766 763->762 763->764 767 438f9e-438f9f 764->767 768 438f9c 765->768 769 438ed2-438edc 766->769 770 438f2d-438f39 766->770 767->756 768->767 773 438f03-438f0f 769->773 774 438ede-438eea 769->774 771 438f50-438f53 770->771 772 438f3b-438f42 770->772 775 438f56-438f5e 771->775 772->764 773->771 777 438f11-438f2b call 439319 773->777 774->773 776 438eec-438efe call 43916e 774->776 778 438f60-438f66 775->778 779 438f9a 775->779 776->767 777->775 782 438f68-438f7c call 438fa3 778->782 783 438f7e-438f82 778->783 779->768 782->767 787 438f95-438f97 783->787 788 438f84-438f92 call 458660 783->788 787->779 788->787
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9f659cc8a9a49272dc5a8b65b091f37dbf03ca88fa3bd65ce108d20efe530995
                      • Instruction ID: 9663080612542d3e5f9b84a36c3ecf1ef98ea00319430370267f097460dfd66c
                      • Opcode Fuzzy Hash: 9f659cc8a9a49272dc5a8b65b091f37dbf03ca88fa3bd65ce108d20efe530995
                      • Instruction Fuzzy Hash: 2651C670A00204AFDF14DF59C881AAABBA2EF8D328F24915EF8089B352D775DD41CB55
                      APIs
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: __fread_nolock
                      • String ID:
                      • API String ID: 2638373210-0
                      • Opcode ID: 95c2e167186eeb3e7dc9ada3aaf4bef30febac36b32543f012d33ef2061f0272
                      • Instruction ID: 0e53ea78c72a938f7fb02060282791f61ff368934c38134d11baa5cff418869a
                      • Opcode Fuzzy Hash: 95c2e167186eeb3e7dc9ada3aaf4bef30febac36b32543f012d33ef2061f0272
                      • Instruction Fuzzy Hash: BE5159B0D00248DBCB14DF99C981AEEBBB4EF48714F24416DE8047B381D7799E41CBA5
                      APIs
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: __wsopen_s
                      • String ID:
                      • API String ID: 3347428461-0
                      • Opcode ID: 8ff9ba0f0c894046871fc86ec0e9a1d79c4c84a1d92275a4dcbeaa53a6bd2b85
                      • Instruction ID: f3143862af3a299983658f939e96efeb3759b05c7c18c303aa6d1d81ce31e1ed
                      • Opcode Fuzzy Hash: 8ff9ba0f0c894046871fc86ec0e9a1d79c4c84a1d92275a4dcbeaa53a6bd2b85
                      • Instruction Fuzzy Hash: 92112A71A0420AAFDF05DF58E94199F7BF5EF48304F04405AF809EB351D670DA25CB69
                      APIs
                      • SetupDiGetClassDevsA.SETUPAPI(0055D560,00000000,00000000), ref: 004E5D47
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ClassDevsSetup
                      • String ID:
                      • API String ID: 2330331845-0
                      • Opcode ID: 3d8916a0f3a5560b99d21513aef90176b581373bb7b6b0032725707bac5390a9
                      • Instruction ID: 3af1858aaf6aa964ebdd9f4359c5c99147492c850a3065a18f0c0dee6211d041
                      • Opcode Fuzzy Hash: 3d8916a0f3a5560b99d21513aef90176b581373bb7b6b0032725707bac5390a9
                      • Instruction Fuzzy Hash: A0110EB1D04B449BE3208F28DD0A757BBF0EB00B28F10471EE850573C1E3BA6A4887E2
                      APIs
                      • Concurrency::cancel_current_task.LIBCPMT ref: 0040331F
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Concurrency::cancel_current_task
                      • String ID:
                      • API String ID: 118556049-0
                      • Opcode ID: 4c9de15bf43b7906aab7ed6efc04c82af185101d7b74466eda9590404471e6f8
                      • Instruction ID: ac639495c118a2832fc09027b5ebf4fad0cef292c7be368858978faeea3118d5
                      • Opcode Fuzzy Hash: 4c9de15bf43b7906aab7ed6efc04c82af185101d7b74466eda9590404471e6f8
                      • Instruction Fuzzy Hash: 63F024321001009BCB246F61D4565EAB7ECDF28366B50083FFC8DD7292EB3EDA408788
                      APIs
                      • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00434B3F,?,?,76A923A0,?,?,00403522,?,?), ref: 0044B0C6
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AllocateHeap
                      • String ID:
                      • API String ID: 1279760036-0
                      • Opcode ID: c639ae0624eff34eb8e57d07392fb4ffc7a0b3e65f726cef66c68c9318aea675
                      • Instruction ID: 07eaf642519ac51a5bd3283dd2addbb445c80e248ae9cef49388ffb333b33e8c
                      • Opcode Fuzzy Hash: c639ae0624eff34eb8e57d07392fb4ffc7a0b3e65f726cef66c68c9318aea675
                      • Instruction Fuzzy Hash: 99E022322006206BFF313AA69C14B5B764CEF413A3F190227EC25A62D1DB3CCC0092EE
                      APIs
                      • CreateFileW.KERNELBASE(?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 004429A9
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: 9c728ddfee9c54fb3e95c04c245e6250a3a2534adf7d99ecf6cfd652071d74be
                      • Instruction ID: d272b26d39d4c1a932e1863db2ccc44a4dabdf9078851b65b676bd57bd2e36c0
                      • Opcode Fuzzy Hash: 9c728ddfee9c54fb3e95c04c245e6250a3a2534adf7d99ecf6cfd652071d74be
                      • Instruction Fuzzy Hash: 7DD06C3200020DBBDF128F84DC06EDA3BAAFB48754F014000BA1856120C736E861EB90
                      APIs
                        • Part of subcall function 004E71E0: GetCurrentProcess.KERNEL32(?), ref: 004E71EF
                        • Part of subcall function 004E71E0: IsWow64Process.KERNEL32(00000000), ref: 004E71F6
                        • Part of subcall function 0044196B: GetSystemTimeAsFileTime.KERNEL32(?), ref: 00441980
                        • Part of subcall function 0044196B: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0044199F
                      • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,?,00000000,?,?), ref: 004E0D31
                      • RegQueryValueExA.ADVAPI32(00000000,?,00000000,00020019,?,00000400), ref: 004E0DFD
                      • RegCloseKey.ADVAPI32(00000000), ref: 004E0E32
                      • GetCurrentHwProfileA.ADVAPI32(?), ref: 004E0FCA
                      • GetModuleHandleExA.KERNEL32(00000004,Function_000E5FC0,00000000), ref: 004E14CB
                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 004E14E3
                      • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,?,?), ref: 004E1E96
                      • RegQueryValueExA.ADVAPI32(?,?,00000000,00020019,?,?), ref: 004E1F62
                      • RegCloseKey.ADVAPI32(?), ref: 004E21E1
                      • GetComputerNameA.KERNEL32(?,00000104), ref: 004E2215
                      • GetUserNameA.ADVAPI32(?,00000104), ref: 004E23B3
                      • GetDesktopWindow.USER32 ref: 004E2456
                      • GetWindowRect.USER32(00000000,?), ref: 004E2464
                      • GetUserDefaultLocaleName.KERNEL32(?,00000200), ref: 004E25CF
                      • GetKeyboardLayoutList.USER32(00000000,00000000), ref: 004E2A95
                      • LocalAlloc.KERNEL32(00000040), ref: 004E2AA7
                      • GetKeyboardLayoutList.USER32(?,00000000), ref: 004E2AC2
                      • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 004E2AED
                      • LocalFree.KERNEL32(?), ref: 004E2CB0
                      • GetLocalTime.KERNEL32(?), ref: 004E2CC7
                      • GetSystemTime.KERNEL32(?), ref: 004E2EDD
                      • GetTimeZoneInformation.KERNEL32(?), ref: 004E2F00
                      • TzSpecificLocalTimeToSystemTime.KERNEL32(?,?,?), ref: 004E2F25
                      • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,00020019,00000000), ref: 004E333F
                      • RegQueryValueExA.ADVAPI32(00000000,?,00000000,00020019,?,00000400), ref: 004E3491
                      • RegCloseKey.ADVAPI32(00000000), ref: 004E3542
                      • GetSystemInfo.KERNEL32(?), ref: 004E356A
                      • GlobalMemoryStatusEx.KERNEL32(00000040), ref: 004E361D
                      • EnumDisplayDevicesA.USER32(00000000,00000000,?,00000001), ref: 004E3731
                      • EnumDisplayDevicesA.USER32(00000000,00000001,?,00000001), ref: 004E3B14
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 004E3C53
                      • Process32First.KERNEL32(00000000,00000128), ref: 004E3C6B
                      • Process32Next.KERNEL32(00000000,00000128), ref: 004E3C81
                      • Process32Next.KERNEL32(00000000,?), ref: 004E3D53
                      • CloseHandle.KERNEL32(00000000), ref: 004E3D62
                      • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,00020019,?), ref: 004E40D6
                      • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,?,00000000,00000000,00000000,00000000), ref: 004E410D
                      • wsprintfA.USER32 ref: 004E41F0
                      • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,00020019,?), ref: 004E4213
                      • RegQueryValueExA.ADVAPI32(?,?,00000000,000F003F,?,00000400), ref: 004E4312
                      • RegQueryValueExA.ADVAPI32(?,?,00000000,000F003F,?,00000400), ref: 004E4409
                      • RegCloseKey.ADVAPI32(?), ref: 004E44E5
                      • RegCloseKey.ADVAPI32(00000000), ref: 004E4500
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Time$Close$OpenQueryValue$LocalNameSystem$EnumProcess32$CurrentDevicesDisplayFileHandleInfoKeyboardLayoutListLocaleModuleNextProcessUserWindow$AllocComputerCreateDefaultDesktopFirstFreeGlobalInformationMemoryProfileRectSnapshotSpecificStatusToolhelp32Unothrow_t@std@@@Wow64Zone__ehfuncinfo$??2@wsprintf
                      • String ID: 2.0$;Yb.$default24_2
                      • API String ID: 3690012277-1792647087
                      • Opcode ID: 2766509d2dca8154228f778d6e7f3dfafb67fd21fdecd1534a50e8eb966dc40b
                      • Instruction ID: dc7450f610ff8aefedfd2d9d6437dce6e22052c90493d9c27a7ed5ed6746c995
                      • Opcode Fuzzy Hash: 2766509d2dca8154228f778d6e7f3dfafb67fd21fdecd1534a50e8eb966dc40b
                      • Instruction Fuzzy Hash: D093DEB4D0426D8BDB25CF99C981AEEBBB5FF48300F1041AAD909B7351DB345A81CFA5
                      APIs
                      • std::_Throw_Cpp_error.LIBCPMT ref: 004E6BE7
                      • std::_Throw_Cpp_error.LIBCPMT ref: 004E6BF8
                      • CreateDirectoryA.KERNEL32(?,00000000,00000005,?), ref: 004E6C55
                      • std::_Throw_Cpp_error.LIBCPMT ref: 004E6C84
                      • std::_Throw_Cpp_error.LIBCPMT ref: 004E6C95
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Cpp_errorThrow_std::_$CreateDirectory
                      • String ID: \*.*
                      • API String ID: 2715195259-1173974218
                      • Opcode ID: ecc08acd5409bd2d2f2bd3c22b3b6aa0d6264b67c78a209e8d4e4319e9b1ebb3
                      • Instruction ID: b2be1bc9108cd25bcd87be18baf4e69fd7455a47ff8891d9a14199d40660ba90
                      • Opcode Fuzzy Hash: ecc08acd5409bd2d2f2bd3c22b3b6aa0d6264b67c78a209e8d4e4319e9b1ebb3
                      • Instruction Fuzzy Hash: 7AE10470C00388DFDB10DFA9C9487EEBBB0FF25315F20425AE454AB292D7746A49DB65
                      APIs
                      • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000040,?,00000000), ref: 004CF2F1
                      • WriteProcessMemory.KERNEL32(00000000,00000000,004C81DD,?,00000000), ref: 004CF30D
                      • WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 004CF342
                      • VirtualAllocEx.KERNEL32(?,00000000,00001000,00003000,00000040), ref: 004CF36B
                      • WriteProcessMemory.KERNEL32(?,00000000,?,00000218,00000000,?,?,?,00589328), ref: 004CF50F
                      • WriteProcessMemory.KERNEL32(?,00000218,004CF5E0,-00000010,00000000,?,?,?,00589328), ref: 004CF531
                      • CreateRemoteThread.KERNEL32(?,00000000,00000000,00000218,00000000,00000000,00000000), ref: 004CF544
                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,00589328), ref: 004CF54D
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite$AllocVirtual$CreateObjectRemoteSingleThreadWait
                      • String ID: %s|%s$168
                      • API String ID: 2137838514-1703702481
                      • Opcode ID: b88fb1ed2ebfd2a655c4879da0ce9de7ec8f2c0603ef1b71525654192dd42d6d
                      • Instruction ID: 2ab717f03d3c912496b66fb944616d360f792c6fe5d042a247d22025e7d5b78f
                      • Opcode Fuzzy Hash: b88fb1ed2ebfd2a655c4879da0ce9de7ec8f2c0603ef1b71525654192dd42d6d
                      • Instruction Fuzzy Hash: 36B16BB1D002089FDB14CFA4CC95BAEBBB5FF18300F10426DE905BB291D774A984DBA5
                      APIs
                      • GetProcAddress.KERNEL32(00000000,?), ref: 004EE20C
                      • GetProcAddress.KERNEL32(00000000,?), ref: 004EE300
                      • GetProcAddress.KERNEL32(00000000,?), ref: 004EE3F4
                      • GetProcAddress.KERNEL32(00000000,?), ref: 004EE4E8
                      • GetProcAddress.KERNEL32(00000000,?), ref: 004EE5DC
                      • GetProcAddress.KERNEL32(00000000,?), ref: 004EE65C
                      • GetProcAddress.KERNEL32(00000000,?), ref: 004EE750
                      • GetProcAddress.KERNEL32(00000000,?), ref: 004EE844
                      • GetProcAddress.KERNEL32(00000000,?), ref: 004EE938
                      • GetProcAddress.KERNEL32(00000000,?), ref: 004EEA2C
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressProc
                      • String ID:
                      • API String ID: 190572456-0
                      • Opcode ID: fba17449efcc4fd35a5932faffef4f0bd4510b269c308ba7fc037d24948359eb
                      • Instruction ID: d080ee8d53740b572b5d589773f2606012d6cd0ef2a87b1da31b43526306bc13
                      • Opcode Fuzzy Hash: fba17449efcc4fd35a5932faffef4f0bd4510b269c308ba7fc037d24948359eb
                      • Instruction Fuzzy Hash: 336233B8D0525CEB8B04CFA8D5819DDFBB1BF58310F24919AE855BB351E7306A82EF44
                      APIs
                      • GetFileAttributesExW.KERNEL32(?,00000000,?,?,00000000,00000000), ref: 004320BA
                      • GetLastError.KERNEL32(?,00000000,00000000), ref: 004320C4
                      • FindFirstFileW.KERNEL32(?,?,?,00000000,00000000), ref: 004320DB
                      • GetLastError.KERNEL32(?,00000000,00000000), ref: 004320E6
                      • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 004320F2
                      • ___std_fs_open_handle@16.LIBCPMT ref: 004321AB
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ErrorFileFindLast$AttributesCloseFirst___std_fs_open_handle@16
                      • String ID:
                      • API String ID: 2340820627-0
                      • Opcode ID: 399e9fa649e6a34084e5cc74f8c51f104b45a1f2b4104aba3408bb700d2d57cc
                      • Instruction ID: 7e0e21ba57e1066c6160095fdf5a0f96b949db91fc8e8bea8e80148e62c7c079
                      • Opcode Fuzzy Hash: 399e9fa649e6a34084e5cc74f8c51f104b45a1f2b4104aba3408bb700d2d57cc
                      • Instruction Fuzzy Hash: D971D275A007199FCB24CF28CE84BABB3B8BF09310F145296E954E3390D7B49E85CB95
                      APIs
                      • LoadLibraryA.KERNEL32(?), ref: 00409D32
                      • GetProcAddress.KERNEL32(?), ref: 00409E3D
                      • GetProcAddress.KERNEL32(?), ref: 00409F36
                      • GetProcAddress.KERNEL32(?), ref: 00409FBB
                      • GetProcAddress.KERNEL32(?), ref: 0040A055
                      • GetProcAddress.KERNEL32(?), ref: 0040A0EF
                      • GetProcAddress.KERNEL32(?), ref: 0040A189
                      • GetProcAddress.KERNEL32(?), ref: 0040A223
                      • FreeLibrary.KERNEL32 ref: 0040A27B
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressProc$Library$FreeLoad
                      • String ID:
                      • API String ID: 2449869053-0
                      • Opcode ID: 52f01a4dfbcb3f59218750f5f3945a65c16e243dd72f162a9732142b51316fa4
                      • Instruction ID: 056e7afbc769c29073d59368404efc94fb89f274a412975777f329f96bf9ec8f
                      • Opcode Fuzzy Hash: 52f01a4dfbcb3f59218750f5f3945a65c16e243dd72f162a9732142b51316fa4
                      • Instruction Fuzzy Hash: 372286B8D05218EBCB15CF98D981AEDBBB1FF58310F2081AAD849B7350D7345A85EF45
                      APIs
                        • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                        • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                      • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 004535D7
                      • IsValidCodePage.KERNEL32(00000000), ref: 00453615
                      • IsValidLocale.KERNEL32(?,00000001), ref: 00453628
                      • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00453670
                      • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 0045368B
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                      • String ID: *V
                      • API String ID: 415426439-2897881622
                      • Opcode ID: bb3ee8500ca9cacc625c50b97d6e48ff5c53ad3e39c4a6c01d9da358df15b7ae
                      • Instruction ID: 4a54d826d8e8e5dc964d84ffa3ac1e49b68ae0fe58eca9cd8e7cd24ca5604c7d
                      • Opcode Fuzzy Hash: bb3ee8500ca9cacc625c50b97d6e48ff5c53ad3e39c4a6c01d9da358df15b7ae
                      • Instruction Fuzzy Hash: 4E517471A00209AFDB20DFA5CC41ABF77B8AF05743F14446AED01E7252EB74DA48DB65
                      APIs
                      • GetLastError.KERNEL32 ref: 005447EB
                      • GetVersionExA.KERNEL32(?), ref: 00544810
                      • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00544843
                      • LocalFree.KERNEL32(?), ref: 0054485A
                      • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00544893
                        • Part of subcall function 00545B50: AreFileApisANSI.KERNEL32(00000000,00000000,?,?,?,005448A5), ref: 00545B5C
                        • Part of subcall function 00545B50: MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,?,?,?,005448A5), ref: 00545B71
                        • Part of subcall function 00545B50: MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 00545B97
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ByteCharFormatMessageMultiWide$ApisErrorFileFreeLastLocalVersion
                      • String ID: OsError 0x%x (%u)
                      • API String ID: 807219750-2664311388
                      • Opcode ID: dd207c85fc94544383a517e30f756156e384ee2b8bcde9e9a95a45159a38d464
                      • Instruction ID: 0c2bef24f6b7c7166f87ec92302cb7117f3d967c30a7bda74ece9fcd541a0daa
                      • Opcode Fuzzy Hash: dd207c85fc94544383a517e30f756156e384ee2b8bcde9e9a95a45159a38d464
                      • Instruction Fuzzy Hash: 0D21C832A40208BBEB209F71DC4AFEE7F78FF94755F1000A9F909A2191E7709A05DB61
                      APIs
                        • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                        • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                      • GetACP.KERNEL32(?,?,?,?,?,?,00447300,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00452C19
                      • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00447300,?,?,?,00000055,?,-00000050,?,?), ref: 00452C50
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00452DB3
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ErrorLast$CodeInfoLocalePageValid
                      • String ID: *V$utf8
                      • API String ID: 607553120-210452255
                      • Opcode ID: 95727e6ef7b94787d777f99e21165c393144e5509e4be2ad3f52f8295ffa9360
                      • Instruction ID: 742b11dcb7ff0b0bfa38c284345f0d68b4d7ce619a9ba0daefdf44cafbbca61f
                      • Opcode Fuzzy Hash: 95727e6ef7b94787d777f99e21165c393144e5509e4be2ad3f52f8295ffa9360
                      • Instruction Fuzzy Hash: F071FA32600602A6D725AF75CD45B6B73A8EF16705F10042FFD05D7283EBF8E94C9699
                      APIs
                      • GetLocaleInfoW.KERNEL32(?,2000000B,00453605,00000002,00000000,?,?,?,00453605,?,00000000), ref: 0045338C
                      • GetLocaleInfoW.KERNEL32(?,20001004,00453605,00000002,00000000,?,?,?,00453605,?,00000000), ref: 004533B5
                      • GetACP.KERNEL32(?,?,00453605,?,00000000), ref: 004533CA
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: InfoLocale
                      • String ID: ACP$OCP
                      • API String ID: 2299586839-711371036
                      • Opcode ID: b900ca414d4c4be95a8c6f041d08249478f894891a183a2f82a4edaf5765dc51
                      • Instruction ID: 0023b8279c9b3e3643c8ce07df61025d6c2b7e12d2ffc4f7461f6cfcb2a1a3ae
                      • Opcode Fuzzy Hash: b900ca414d4c4be95a8c6f041d08249478f894891a183a2f82a4edaf5765dc51
                      • Instruction Fuzzy Hash: 8021C432600100A7DB308F54C900A9BB3A6AF50FD3B568466EC06D7312EF36EF49D358
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                      • Instruction ID: 01dad5c531b3804b6668612822d9feb5b6f7af541a2af8c3bc89036eeee974e8
                      • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                      • Instruction Fuzzy Hash: DA023A71E002199BDF14CFA9D9C06AEFBB1FF48314F24926AE919B7380D735A9418B94
                      APIs
                      • FindFirstFileA.KERNEL32(00000000,?,00000000), ref: 004C613F
                      • FindNextFileA.KERNEL32(00000000,00000010), ref: 004C643F
                      • GetLastError.KERNEL32 ref: 004C644D
                      • FindClose.KERNEL32(00000000), ref: 004C645D
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Find$File$CloseErrorFirstLastNext
                      • String ID:
                      • API String ID: 819619735-0
                      • Opcode ID: ad8232aa6ab48f27d6540ad5b2baad4e23a9261af117df8526272475b3c5b835
                      • Instruction ID: afe6fe270f27518361ed143ef8865d869d8c660e8b4c9bb3a5978c93709ae348
                      • Opcode Fuzzy Hash: ad8232aa6ab48f27d6540ad5b2baad4e23a9261af117df8526272475b3c5b835
                      • Instruction Fuzzy Hash: ACD17CB4C043488FDB24CF98C994BEEBBB1BF45314F14829ED4496B392D7785A84CB59
                      APIs
                      • FindFirstFileA.KERNEL32(00000000,00565EFC,00565EFC,00000002,?,00000001), ref: 0049396F
                      • FindNextFileA.KERNEL32(00000000,00000010), ref: 00493ACF
                      • GetLastError.KERNEL32 ref: 00493ADD
                      • FindClose.KERNEL32(00000000), ref: 00493AED
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Find$File$CloseErrorFirstLastNext
                      • String ID:
                      • API String ID: 819619735-0
                      • Opcode ID: 3687e23493e2d079902dbc910b8d869425b52e72f4e67ce4ca7be239348c82ba
                      • Instruction ID: 59bca9142b2f43e85d8f64eb9617364e40f7e337b3faf31c9dfe380ec3e76daa
                      • Opcode Fuzzy Hash: 3687e23493e2d079902dbc910b8d869425b52e72f4e67ce4ca7be239348c82ba
                      • Instruction Fuzzy Hash: 817124719002448BCF10CF64C8957FEBFB5AB56305F1442AAE441AB382D77A9F89CB64
                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00434190
                      • IsDebuggerPresent.KERNEL32 ref: 0043425C
                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00434275
                      • UnhandledExceptionFilter.KERNEL32(?), ref: 0043427F
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                      • String ID:
                      • API String ID: 254469556-0
                      • Opcode ID: 5e995d56bca3090024ce11201d33d294d56103379e56bdf134d89c0665374a9e
                      • Instruction ID: cc34265599f2dec34f964c3269ec222ae3e40e25564db7ad72de3f36d20b351d
                      • Opcode Fuzzy Hash: 5e995d56bca3090024ce11201d33d294d56103379e56bdf134d89c0665374a9e
                      • Instruction Fuzzy Hash: BB31F6B5D053189BDB20EFA5D9497CDBBB8AF08304F1041AAE40CAB250EB759A84CF59
                      APIs
                      • GetSystemTime.KERNEL32(?), ref: 005449CA
                      • GetCurrentProcessId.KERNEL32 ref: 005449E5
                      • GetTickCount.KERNEL32 ref: 005449FA
                      • QueryPerformanceCounter.KERNEL32(?), ref: 00544A11
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: CountCounterCurrentPerformanceProcessQuerySystemTickTime
                      • String ID:
                      • API String ID: 4122616988-0
                      • Opcode ID: 2761748a9af697217c0ec141a17cdb9775b7d53fbeab25e478c1a4390fc4254b
                      • Instruction ID: a8b0bf13f8b3a5775aebc3e00f45f95b893848271c39c3c1d8b2d1e40acf56c4
                      • Opcode Fuzzy Hash: 2761748a9af697217c0ec141a17cdb9775b7d53fbeab25e478c1a4390fc4254b
                      • Instruction Fuzzy Hash: 8A110432A007298BDB118FA9DC885EAFBF9FF49225B404536EC49D7215D631A481CBE0
                      APIs
                      • std::_Throw_Cpp_error.LIBCPMT ref: 004C7051
                      • std::_Throw_Cpp_error.LIBCPMT ref: 004C7062
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Cpp_errorThrow_std::_
                      • String ID: TgL
                      • API String ID: 2134207285-3240275877
                      • Opcode ID: 7956ce00cadceb4b4c3302bc76aee270ec69d8d14a187e1f6517270ea90dd876
                      • Instruction ID: e760907e7d40913908c938862d83eeacfb176e41806bca2803ae4695dda398ba
                      • Opcode Fuzzy Hash: 7956ce00cadceb4b4c3302bc76aee270ec69d8d14a187e1f6517270ea90dd876
                      • Instruction Fuzzy Hash: 0891EEB4E04248CFDB04DFA9C881BADBBB1BF58314F18816ED8416B392D779A905CF95
                      APIs
                      • VirtualQuery.KERNEL32(?,?,0000001C), ref: 004580E9
                      • GetSystemInfo.KERNEL32(?), ref: 00458104
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: InfoQuerySystemVirtual
                      • String ID: D
                      • API String ID: 401686933-2746444292
                      • Opcode ID: 53f2c066bf0a3f036097ffc709ce78bf8807582e756120d0ec3c2933d4a49f04
                      • Instruction ID: 15e633f26279e9839b0c5b245ad8314628d4ede9c042647a00b0634ca8b556b4
                      • Opcode Fuzzy Hash: 53f2c066bf0a3f036097ffc709ce78bf8807582e756120d0ec3c2933d4a49f04
                      • Instruction Fuzzy Hash: 7201F7336005096BDB24DE29DC05BDE7BBAAFD4325F0CC125ED59E7291EE38D90A8790
                      APIs
                      • GetLocaleInfoEx.KERNEL32(!x-sys-default-locale,20000001,00000000,00000002,?,?,00403E16), ref: 00431DA8
                      • FormatMessageA.KERNEL32(00001300,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00403E16), ref: 00431DCF
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: FormatInfoLocaleMessage
                      • String ID: !x-sys-default-locale
                      • API String ID: 4235545615-2729719199
                      • Opcode ID: fcdca3659bb1d2a61432e1cd2d8e2713532a4f3d4bfe03f6844bae0cf60f700d
                      • Instruction ID: 5533b84c20dc3ebd942ff18ae9bc369b32e0f46532b4feac63eb50df4c9c1bd4
                      • Opcode Fuzzy Hash: fcdca3659bb1d2a61432e1cd2d8e2713532a4f3d4bfe03f6844bae0cf60f700d
                      • Instruction Fuzzy Hash: 05F03076210104BFEB189B94DC1ADEB7ABCEB0A395F00411ABA02D6150E2B0AE0097B5
                      APIs
                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 004C6B57
                      • LocalFree.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,00000000,005599AF,000000FF,?,?,00000005), ref: 004C6B86
                      • LocalFree.KERNEL32(?,?), ref: 004C6C82
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: FreeLocal$CryptDataUnprotect
                      • String ID:
                      • API String ID: 2835072361-0
                      • Opcode ID: d7d82cbe380403d495b2fd6a7e2a6d2e7fbb054e7ac70c00a231221df97a0296
                      • Instruction ID: 90b6470924ea9a925c498959a8113d32d71e754cc84c5268c76d6fdb8e080973
                      • Opcode Fuzzy Hash: d7d82cbe380403d495b2fd6a7e2a6d2e7fbb054e7ac70c00a231221df97a0296
                      • Instruction Fuzzy Hash: A271A171C002489BDB00DFA8C945BEEFBB4EF14314F14826EE855B3391EB786A45DBA5
                      APIs
                        • Part of subcall function 00544B20: GetVersionExA.KERNEL32(?), ref: 00544B51
                        • Part of subcall function 00544B20: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000), ref: 00544B76
                        • Part of subcall function 00544B20: GetFullPathNameW.KERNEL32(00000000,00000003,00000000,00000000), ref: 00544B96
                        • Part of subcall function 00545330: GetVersionExA.KERNEL32(?), ref: 00545356
                        • Part of subcall function 00545D90: GetVersionExA.KERNEL32(?), ref: 00545DB4
                      • GetDiskFreeSpaceW.KERNEL32(00000000,?,00000200,?,?), ref: 00544AC9
                      • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?), ref: 00544AF6
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Version$DiskFreeFullNamePathSpace
                      • String ID:
                      • API String ID: 4112908208-0
                      • Opcode ID: becd6c03501c24d27a43ccdd940953d2523818c8f4bbaac0c2ad00c18d494839
                      • Instruction ID: f10753ebb869b3640b9ac64d1dc3f7217fc16a68dafdf90303c08a5a8463592c
                      • Opcode Fuzzy Hash: becd6c03501c24d27a43ccdd940953d2523818c8f4bbaac0c2ad00c18d494839
                      • Instruction Fuzzy Hash: 0C21257A980108ABDB21DB699844BFB7BBDFF00308F1400A6E941D7101FB31CE46CBA5
                      APIs
                      • GetModuleHandleA.KERNEL32(?,7591E010,?), ref: 004E92A0
                      • GetProcAddress.KERNEL32(00000000,?), ref: 004E92B0
                      • GetModuleHandleA.KERNEL32(?), ref: 004E93C8
                      • GetProcAddress.KERNEL32(00000000,?), ref: 004E93D2
                      • OpenProcess.KERNEL32(00000040,00000000,?), ref: 004E93DE
                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000000), ref: 004E944D
                      • CloseHandle.KERNEL32(00000000), ref: 004E9480
                      • CloseHandle.KERNEL32(00000000), ref: 004E94A6
                      • CloseHandle.KERNEL32(00000000), ref: 004E94C6
                      • CreateEventA.KERNEL32(00000000,00000001,00000000,?), ref: 004E9668
                      • ResetEvent.KERNEL32(00000000), ref: 004E9671
                      • CreateThread.KERNEL32(00000000,00000000,004E97A0,?,00000000,00000000), ref: 004E9695
                      • WaitForSingleObject.KERNEL32(00000000,00000064), ref: 004E96A1
                      • RtlUnicodeStringToAnsiString.NTDLL(?,?,00000001), ref: 004E96E7
                      • CloseHandle.KERNEL32(00000000), ref: 004E9728
                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000001), ref: 004E9734
                      • CloseHandle.KERNEL32(00000000), ref: 004E9753
                      • TerminateThread.KERNEL32(14D846FE,00000000), ref: 004E9781
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Handle$Close$Process$AddressCreateCurrentEventModuleProcStringThread$AnsiObjectOpenResetSingleTerminateUnicodeWait
                      • String ID: File
                      • API String ID: 3681783469-749574446
                      • Opcode ID: 5519d313cc11df224254bb5c2ddb9f42228914f8febfa83a914f2ab3983c68cb
                      • Instruction ID: b9b0c17e31d3cfe0bbc2e9151a178c1e78e3251af3666c5291f23336d4f8ce8a
                      • Opcode Fuzzy Hash: 5519d313cc11df224254bb5c2ddb9f42228914f8febfa83a914f2ab3983c68cb
                      • Instruction Fuzzy Hash: 6322D2B4D042599FDB24CF99D981BEEBBB4BF08310F104199E909B7390E7746A81CFA5
                      APIs
                      • CopyFileA.KERNEL32(?,?,00000000), ref: 004D6A20
                        • Part of subcall function 004D6BA0: GetLastError.KERNEL32(?,00000000), ref: 004D6BD3
                        • Part of subcall function 004D6BA0: RmStartSession.RSTRTMGR(?,00000000,?), ref: 004D6C50
                        • Part of subcall function 004D6BA0: RmRegisterResources.RSTRTMGR(?,00000001,?,00000000,00000000,00000000,00000000,?), ref: 004D6C91
                        • Part of subcall function 004D6BA0: RmGetList.RSTRTMGR(?,00000000,?,?,?), ref: 004D6CB9
                      • std::_Throw_Cpp_error.LIBCPMT ref: 004D6B84
                      • std::_Throw_Cpp_error.LIBCPMT ref: 004D6B95
                      • RmShutdown.RSTRTMGR(?,00000001,00000000), ref: 004D6CDA
                      • RmEndSession.RSTRTMGR(?), ref: 004D6CF7
                      • SetLastError.KERNEL32(00000000), ref: 004D6CFE
                      • CopyFileA.KERNEL32(?,?,00000000), ref: 004D6D25
                      • GetLastError.KERNEL32(?,?,00000000), ref: 004D6D33
                      • CopyFileA.KERNEL32(?,?,00000000), ref: 004D6D47
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: CopyErrorFileLast$Cpp_errorSessionThrow_std::_$ListRegisterResourcesShutdownStart
                      • String ID:
                      • API String ID: 3293558552-0
                      • Opcode ID: 4ad8c97d16258963b69530f00f5a19583fa6f8cd08bbe9ec6ea1fbea8f4f1102
                      • Instruction ID: 506ad45c425b60783e5a35b13f18b7e09e4e0bf61d875f697530398146ac6994
                      • Opcode Fuzzy Hash: 4ad8c97d16258963b69530f00f5a19583fa6f8cd08bbe9ec6ea1fbea8f4f1102
                      • Instruction Fuzzy Hash: 0102BCB1C00249DBCB10DFA4C955BEEBBB5FF14314F14426AE805B7381EB786A49CBA5
                      APIs
                      • CharNextA.USER32 ref: 004EEA65
                      • CharNextA.USER32 ref: 004EEA85
                      • CharNextA.USER32 ref: 004EEAA5
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004EEAD6
                      • lstrlenA.KERNEL32(?,00000000,00000000,00000003,00000000), ref: 004EEB52
                      • GetProcessHeap.KERNEL32(00000008,?,00000000,00000000,00000003,00000000), ref: 004EEB6E
                      • HeapAlloc.KERNEL32(00000000), ref: 004EEB71
                      • lstrcpynA.KERNEL32(00000000,?,?), ref: 004EEB7E
                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004EEBA9
                      • HeapFree.KERNEL32(00000000), ref: 004EEBAC
                      Strings
                      • Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36, xrefs: 004EEB8E
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Heap$CharNext$Process$AllocFreeUnothrow_t@std@@@__ehfuncinfo$??2@lstrcpynlstrlen
                      • String ID: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36
                      • API String ID: 2305228968-2732702261
                      • Opcode ID: 423986ca5e1177f672ef3d58246459128f5a16203a5f76b509fb2a383bcfa813
                      • Instruction ID: 66e08b66e62082d9c79a605ab5b022e87f42821b87c70d6f65fc34b32a61c15c
                      • Opcode Fuzzy Hash: 423986ca5e1177f672ef3d58246459128f5a16203a5f76b509fb2a383bcfa813
                      • Instruction Fuzzy Hash: F1414976D003449FCF10CFAB9C80AAABBB5FF69302B08016BEA05B7351E7755D059B64
                      APIs
                      • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,0045734F), ref: 004579FC
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: DecodePointer
                      • String ID: `-@$acos$asin$exp$log$log10$pow$sqrt
                      • API String ID: 3527080286-3628989360
                      • Opcode ID: 4c17630f5161de399ffce6b570c60365a2c89c55b52a7f760b39540bf94f5387
                      • Instruction ID: bbf143f63b3841ec77cfacb8c6df481a799db6acf17f433172942b25d65e7ef2
                      • Opcode Fuzzy Hash: 4c17630f5161de399ffce6b570c60365a2c89c55b52a7f760b39540bf94f5387
                      • Instruction Fuzzy Hash: 1651B370808A0ACBCF109F58F84C1BEBFB1FB05309F154166D851A7266C7799A2DCB4D
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 0041A09D
                      • std::_Lockit::_Lockit.LIBCPMT ref: 0041A0BF
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0041A0E7
                      • __Getctype.LIBCPMT ref: 0041A1C5
                      • std::_Facet_Register.LIBCPMT ref: 0041A1F9
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0041A223
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                      • String ID: PD@$PG@$E@
                      • API String ID: 1102183713-4120405683
                      • Opcode ID: cf66166f52ff7971b600a3250f2a29593a1149a421a208e93fab5363b0ce8f21
                      • Instruction ID: b372b58ab1bb25eec4b44a09b7f8f3aef2cc67a410616163416d5e42c3dffe19
                      • Opcode Fuzzy Hash: cf66166f52ff7971b600a3250f2a29593a1149a421a208e93fab5363b0ce8f21
                      • Instruction Fuzzy Hash: 6E51BAB0D01245DFCB11CF98C9457AEBBF0FB14714F14825ED855AB391DB78AA88CB92
                      APIs
                      • LocalAlloc.KERNEL32(00000040,0000001C), ref: 004E5E2B
                      • SetupDiEnumDeviceInfo.SETUPAPI(00000000,00000000,00000000), ref: 004E5E3E
                      • LocalAlloc.KERNEL32(00000040,0000001C), ref: 004E5E73
                      • SetupDiEnumDeviceInterfaces.SETUPAPI(?,00000000,0055D560,00000000,00000000), ref: 004E5E91
                      • GetModuleHandleExA.KERNEL32(00000004,004E5FC0,?), ref: 004E5FD6
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AllocDeviceEnumLocalSetup$HandleInfoInterfacesModule
                      • String ID:
                      • API String ID: 2253831631-0
                      • Opcode ID: fadfa1ac60673d3e458d1915a7e98f7ba4584b72fe7d50eb1e1fd26e6b005db2
                      • Instruction ID: 9ece1d8e53d7ac8d60b2bb6ddbf2ef81f89b1d867ae8a09947e2396971ddc2c4
                      • Opcode Fuzzy Hash: fadfa1ac60673d3e458d1915a7e98f7ba4584b72fe7d50eb1e1fd26e6b005db2
                      • Instruction Fuzzy Hash: AB61BCB1900349AFEB10CFA5CD09BAEBFB5FF14305F24025AE90067291D3B96A44DBA5
                      APIs
                      • GetLastError.KERNEL32(?,00000000), ref: 004D6BD3
                      • RmStartSession.RSTRTMGR(?,00000000,?), ref: 004D6C50
                      • RmRegisterResources.RSTRTMGR(?,00000001,?,00000000,00000000,00000000,00000000,?), ref: 004D6C91
                      • RmGetList.RSTRTMGR(?,00000000,?,?,?), ref: 004D6CB9
                      • RmShutdown.RSTRTMGR(?,00000001,00000000), ref: 004D6CDA
                      • RmEndSession.RSTRTMGR(?), ref: 004D6CF7
                      • SetLastError.KERNEL32(00000000), ref: 004D6CFE
                      • CopyFileA.KERNEL32(?,?,00000000), ref: 004D6D25
                      • GetLastError.KERNEL32(?,?,00000000), ref: 004D6D33
                      • CopyFileA.KERNEL32(?,?,00000000), ref: 004D6D47
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ErrorLast$CopyFileSession$ListRegisterResourcesShutdownStart
                      • String ID:
                      • API String ID: 304452573-0
                      • Opcode ID: f2e0f649d8c451cb188e662d2111ed80fd4b92e16dc5a70a42fc26eb44908162
                      • Instruction ID: cca443e56f4e81c83c2dc89493b37bcb85ee1d7da0cfa031959f485395bd6110
                      • Opcode Fuzzy Hash: f2e0f649d8c451cb188e662d2111ed80fd4b92e16dc5a70a42fc26eb44908162
                      • Instruction Fuzzy Hash: 6051C172D01219ABCB21CF94DC55BEEBBB8EB04320F10026AE804B3390D7396E05CBA4
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwind
                      • String ID: PU$csm$csm$csm
                      • API String ID: 944608866-2352073648
                      • Opcode ID: bfdbdb9048f87fb98bf27686f7ec8788dee97e91e92dadc6c49aef564bf08e9e
                      • Instruction ID: 3ab07074fa5cec17866f911e521d745307128fc3ecc03719d0b843171535b798
                      • Opcode Fuzzy Hash: bfdbdb9048f87fb98bf27686f7ec8788dee97e91e92dadc6c49aef564bf08e9e
                      • Instruction Fuzzy Hash: 2DB18EB1808209DFDF25EFA5C8819AEBB75FF18314F14615BE8406B302D739EA51CB99
                      APIs
                      • RegGetValueA.ADVAPI32(80000002,?,?,0001FFFF,00000001,?,00000104,?,?,?), ref: 004E4A70
                      • GetComputerNameExA.KERNEL32(00000002,?,00000104,?,?,?,?,?,?), ref: 004E4ADC
                      • LsaOpenPolicy.ADVAPI32(00000000,00587684,00000001,?), ref: 004E4B35
                      • LsaQueryInformationPolicy.ADVAPI32(?,0000000C,?), ref: 004E4B48
                      • LsaFreeMemory.ADVAPI32(?), ref: 004E4B76
                      • LsaClose.ADVAPI32(?), ref: 004E4B7F
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Policy$CloseComputerFreeInformationMemoryNameOpenQueryValue
                      • String ID: %wZ$;Yb.
                      • API String ID: 762890658-2876608990
                      • Opcode ID: 1f6fa3f1279af543b2d0416b495f84695c810df1c81b970ccc0f6ebddc05bc25
                      • Instruction ID: db120a3af714b361d6db134a28a940fef9e0d4b71911d12d67c4190411436b99
                      • Opcode Fuzzy Hash: 1f6fa3f1279af543b2d0416b495f84695c810df1c81b970ccc0f6ebddc05bc25
                      • Instruction Fuzzy Hash: 1EE101B4D0425A8FDB14CF98C985BEEBBB4BF08304F2041AAE949B7341D7745A85CFA5
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 0041D28A
                      • std::_Lockit::_Lockit.LIBCPMT ref: 0041D2AC
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0041D2D4
                      • __Getcoll.LIBCPMT ref: 0041D39F
                      • std::_Facet_Register.LIBCPMT ref: 0041D3E4
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0041D40E
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetcollRegister
                      • String ID: @A$PD@
                      • API String ID: 1184649410-3602166583
                      • Opcode ID: 3f72e526092bf99e7447afaa4f0b7c5784614eb7b5b41a98088833437af13145
                      • Instruction ID: c0da35fc40401e56e1a2e1b6a9e91288cb6dff343535c30909133d457a6d594b
                      • Opcode Fuzzy Hash: 3f72e526092bf99e7447afaa4f0b7c5784614eb7b5b41a98088833437af13145
                      • Instruction Fuzzy Hash: DD51BAB1C01209DFDB01DF99C9447AEBBF0FF55318F24805AE8156B381C779AA49CB92
                      APIs
                      • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 004335DE
                      • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 004335EC
                      • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 004335FD
                      • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 0043360E
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressProc$HandleModule
                      • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                      • API String ID: 667068680-1247241052
                      • Opcode ID: fa32ac99bed3163b7218575a0872144807cc5232e4a06349f6b146d66b29aa24
                      • Instruction ID: 4ac6349005adf47651da35ec4b9228104ef97a4851d7f02e7f823555ada55313
                      • Opcode Fuzzy Hash: fa32ac99bed3163b7218575a0872144807cc5232e4a06349f6b146d66b29aa24
                      • Instruction Fuzzy Hash: ACE0B672951310ABC7249BB0BC2D9663EB8FA296637404056FC02E21A0EBB05949ABB4
                      APIs
                        • Part of subcall function 00545330: GetVersionExA.KERNEL32(?), ref: 00545356
                      • GetVersionExA.KERNEL32(?), ref: 00544D33
                      • DeleteFileW.KERNEL32(00000000), ref: 00544D52
                      • GetFileAttributesW.KERNEL32(00000000), ref: 00544D59
                      • GetLastError.KERNEL32 ref: 00544D66
                      • Sleep.KERNEL32(00000064), ref: 00544D7C
                      • DeleteFileA.KERNEL32(00000000), ref: 00544D85
                      • GetFileAttributesA.KERNEL32(00000000), ref: 00544D8C
                      • GetLastError.KERNEL32 ref: 00544D99
                      • Sleep.KERNEL32(00000064), ref: 00544DAF
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: File$AttributesDeleteErrorLastSleepVersion
                      • String ID:
                      • API String ID: 1421123951-0
                      • Opcode ID: 644f3411c4d85681ded29085f2f8665f8d90dbdf3f2b9961fa3a9f7b4629f182
                      • Instruction ID: e8ec0c6fce3b273d326ef0f9b2b3730986ab63f4275b785bb0a08d323dc610f1
                      • Opcode Fuzzy Hash: 644f3411c4d85681ded29085f2f8665f8d90dbdf3f2b9961fa3a9f7b4629f182
                      • Instruction Fuzzy Hash: 6221DB32D403149FCB20AB74AC8D6FD7BB4FB69339F100655E91AD31A0EA304985AB52
                      APIs
                      • _ValidateLocalCookies.LIBCMT ref: 00437307
                      • ___except_validate_context_record.LIBVCRUNTIME ref: 0043730F
                      • _ValidateLocalCookies.LIBCMT ref: 00437398
                      • __IsNonwritableInCurrentImage.LIBCMT ref: 004373C3
                      • _ValidateLocalCookies.LIBCMT ref: 00437418
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                      • String ID: `-@$csm
                      • API String ID: 1170836740-3738301566
                      • Opcode ID: a837c65dc98bc53f7a591b5dada66322cfdf011b0ab20b220170fbbfaeea83fd
                      • Instruction ID: bde692452db8eba3752ab90a3e7788ac0719a0bf92b2230e47b89eff8dfd02fd
                      • Opcode Fuzzy Hash: a837c65dc98bc53f7a591b5dada66322cfdf011b0ab20b220170fbbfaeea83fd
                      • Instruction Fuzzy Hash: B041F8709042099FCF20DF59C885A9FBBA4BF08328F14905BFC54AB392D739E905DB95
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 0041C45A
                      • std::_Lockit::_Lockit.LIBCPMT ref: 0041C47C
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0041C4A4
                      • std::_Facet_Register.LIBCPMT ref: 0041C59A
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0041C5C4
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                      • String ID: E@$PD@
                      • API String ID: 459529453-4103272508
                      • Opcode ID: 4956459445cc7cc7d841703dbe2ed42e033006db9883af498c412f7626095107
                      • Instruction ID: e4bc83ced0ac359faa997fd18d4eeb760fe14de2594101695cc0fd15b6690fbc
                      • Opcode Fuzzy Hash: 4956459445cc7cc7d841703dbe2ed42e033006db9883af498c412f7626095107
                      • Instruction Fuzzy Hash: C351EFB0900255EFDB11CF58C991BAEBBF0FB10314F24415EE846AB381D7B9AA45CB95
                      APIs
                      • InternetSetOptionA.WININET(00000000,00000006,?,00000004), ref: 004EDF20
                      • GetLastError.KERNEL32 ref: 004EE015
                      • InternetQueryOptionA.WININET(00000000,0000001F,80000000,?), ref: 004EE040
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: InternetOption$ErrorLastQuery
                      • String ID:
                      • API String ID: 3980908186-0
                      • Opcode ID: a1ac1e88c949714abb61e8a63101dbc767da60d4252146e236756bc9d4aa2743
                      • Instruction ID: 9490229386b8f910ac67b310a4b2a15fa60c532261df57d9535cab47ed46c7f4
                      • Opcode Fuzzy Hash: a1ac1e88c949714abb61e8a63101dbc767da60d4252146e236756bc9d4aa2743
                      • Instruction Fuzzy Hash: B951BE75D40319ABEB20CF95DC8ABEEBBB4EB08B11F14415AEE11BB380D7745A05CB94
                      APIs
                      • LockFile.KERNEL32(00000000,40000000,00000000,00000001,00000000), ref: 005455C3
                      • Sleep.KERNEL32(00000001), ref: 005455D1
                      • GetLastError.KERNEL32 ref: 005455E8
                      • UnlockFile.KERNEL32(00000000,40000000,00000000,?,00000000), ref: 00545633
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: File$ErrorLastLockSleepUnlock
                      • String ID:
                      • API String ID: 3015003838-0
                      • Opcode ID: fe5b5dd74c13ed604590905c3a68f9743d06f085f038e564466f01a9403e7b73
                      • Instruction ID: 85acfabea7dd4ab1116a46d77ec5fdacabbf57290cd153e1b380d28a3a3316b2
                      • Opcode Fuzzy Hash: fe5b5dd74c13ed604590905c3a68f9743d06f085f038e564466f01a9403e7b73
                      • Instruction Fuzzy Hash: 9741D431B01B14ABDB308F24DD957EEBB66FB54729F618125ED08AB392E7719C408BD0
                      APIs
                      • CharNextA.USER32 ref: 004EDB55
                      • CharNextA.USER32 ref: 004EDB6C
                      • CharNextA.USER32 ref: 004EDB85
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004EDBB6
                      • lstrlenA.KERNEL32(?,00000000,00000000,00000003,00000000), ref: 004EDC32
                      • GetProcessHeap.KERNEL32(00000008,?,00000000,00000000,00000003,00000000), ref: 004EDC48
                      • HeapAlloc.KERNEL32(00000000), ref: 004EDC4F
                      • lstrcpynA.KERNEL32(00000000,?,?), ref: 004EDC5C
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: CharNext$Heap$AllocProcessUnothrow_t@std@@@__ehfuncinfo$??2@lstrcpynlstrlen
                      • String ID:
                      • API String ID: 1659885099-0
                      • Opcode ID: 5902d60186420a28bcfe0593f279e262339d39e86a68ea558966eb630272322d
                      • Instruction ID: 9156e0b6da00d8c97823f7767c754a9362769a51dfd7e715744df6f0419fd9af
                      • Opcode Fuzzy Hash: 5902d60186420a28bcfe0593f279e262339d39e86a68ea558966eb630272322d
                      • Instruction Fuzzy Hash: 9C416A35D007849FCB208F6E9C806AABBF9EF69312B150197E845F7311E7B49C45DB58
                      APIs
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: _strrchr
                      • String ID:
                      • API String ID: 3213747228-0
                      • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                      • Instruction ID: d7b9d7273cbfac5d15a556f8c8651b9033d93685d5a38535419dded3191b9e75
                      • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                      • Instruction Fuzzy Hash: D5B14672D006559FEB158F24CC81BEBBBA5EF59310F2441ABE904AB382D778D901C7E9
                      APIs
                      • GetLastError.KERNEL32 ref: 00545061
                      • GetVersionExA.KERNEL32(?), ref: 00545085
                      • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 005450B7
                      • LocalFree.KERNEL32(?), ref: 005450CE
                      • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00545106
                        • Part of subcall function 00545B50: AreFileApisANSI.KERNEL32(00000000,00000000,?,?,?,005448A5), ref: 00545B5C
                        • Part of subcall function 00545B50: MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,?,?,?,005448A5), ref: 00545B71
                        • Part of subcall function 00545B50: MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 00545B97
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ByteCharFormatMessageMultiWide$ApisErrorFileFreeLastLocalVersion
                      • String ID: OsError 0x%x (%u)
                      • API String ID: 807219750-2664311388
                      • Opcode ID: 0d4010ca04ec75710d5123f11d165840ae7251f1f65bebee6710aad968807722
                      • Instruction ID: 40d3e820988b70ea56f320253a2c5dfb69695040fa1f8efb038979f2cda04def
                      • Opcode Fuzzy Hash: 0d4010ca04ec75710d5123f11d165840ae7251f1f65bebee6710aad968807722
                      • Instruction Fuzzy Hash: 9621A476A00308BBDB20AB719C4AFDE7FB8FB55795F1000A5F909E3291E7709E05D661
                      APIs
                      • FreeLibrary.KERNEL32(00000000,?,0044B48D,?,?,00000000,00000001,?,?,0044B6B7,00000022,FlsSetValue,00561B88,00561B90,00000001), ref: 0044B43F
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID: api-ms-$ext-ms-
                      • API String ID: 3664257935-537541572
                      • Opcode ID: 033630484f002e070c94113c7b6ef7f262f68e90d70309fdd043a749aa00ed93
                      • Instruction ID: e3d7dbf8d3e43151f67a2d3675c4fcd7809fc0c9af6198dcb17880ded4e1cd5b
                      • Opcode Fuzzy Hash: 033630484f002e070c94113c7b6ef7f262f68e90d70309fdd043a749aa00ed93
                      • Instruction Fuzzy Hash: A2212B36A01220A7E7319F619C45A6B7768EB51761F140112FC06A7392D734ED05D6D9
                      APIs
                      • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,0045809E,00458247), ref: 0045803A
                      • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00458050
                      • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00458065
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressProc$HandleModule
                      • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                      • API String ID: 667068680-1718035505
                      • Opcode ID: b8fd12eac23ddbaee97a23d952f9025b2fd48530103b998c3f924386a52c0e98
                      • Instruction ID: 9d8da08feb674b7e1defcd418174b7d342a7e101b9a5f06a55684ee540db6b02
                      • Opcode Fuzzy Hash: b8fd12eac23ddbaee97a23d952f9025b2fd48530103b998c3f924386a52c0e98
                      • Instruction Fuzzy Hash: C6F0A4316807129B5B715E755C9827736DCAA11B53716003EDF01F32E2FE18CC4EA795
                      APIs
                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,93D55659,?,?,00000000,00551365,000000FF,?,0044360F,?,?,004435E3,00000016), ref: 00443668
                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044367A
                      • FreeLibrary.KERNEL32(00000000,?,00000000,00551365,000000FF,?,0044360F,?,?,004435E3,00000016), ref: 0044369C
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressFreeHandleLibraryModuleProc
                      • String ID: CorExitProcess$`-@$mscoree.dll
                      • API String ID: 4061214504-3731901874
                      • Opcode ID: 66c557226bdf84cfe892202a4e2d9d598a1facfa92736b92f61228ad13b2a6bb
                      • Instruction ID: 11f561727bfec435161e86ab51d2faaed74d5e09c0b89d0474703e999051cdf2
                      • Opcode Fuzzy Hash: 66c557226bdf84cfe892202a4e2d9d598a1facfa92736b92f61228ad13b2a6bb
                      • Instruction Fuzzy Hash: 5601A232A44715AFDB219F44DC19BAFBBB8FB14B52F014526E812E27E0DB749A04CA94
                      APIs
                      • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,0045618C,00000000,00000000,?,00000001,?,?,?,?,00000001,?), ref: 00455F62
                      • __freea.LIBCMT ref: 004560F7
                      • __freea.LIBCMT ref: 004560FD
                      • __freea.LIBCMT ref: 00456133
                      • __freea.LIBCMT ref: 00456139
                      • __freea.LIBCMT ref: 00456149
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: __freea$Info
                      • String ID:
                      • API String ID: 541289543-0
                      • Opcode ID: 3cb777db59429bfc891b253d5559c1e8fbc0b96e17397612565c1f741eb4a6a0
                      • Instruction ID: 72db6a5fbbb72ca24a21522075f010f93cbc1b36e5ad4b1d6eb8cbe60aa301df
                      • Opcode Fuzzy Hash: 3cb777db59429bfc891b253d5559c1e8fbc0b96e17397612565c1f741eb4a6a0
                      • Instruction Fuzzy Hash: D1711572900A05ABDF209F648C51BBFB7B69F49316F66015BED04A7383E63CDC098799
                      APIs
                      • GetCPInfo.KERNEL32(?,?,?,?,?), ref: 004333F4
                      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00433480
                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 004334EB
                      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00433507
                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043356A
                      • CompareStringEx.KERNEL32(?,?,00000000,?,00000000,?,00000000,00000000,00000000), ref: 00433587
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$CompareInfoString
                      • String ID:
                      • API String ID: 2984826149-0
                      • Opcode ID: 4a3eeb56bd7ee9fe1909d18e68262bb2fe5fda54b12eb40b7425b1e554b148b6
                      • Instruction ID: 4b04ae3b393bc6533ba77a97e4ab0e5e3051f7f3fd8f9b1f1052972f8d3aefbf
                      • Opcode Fuzzy Hash: 4a3eeb56bd7ee9fe1909d18e68262bb2fe5fda54b12eb40b7425b1e554b148b6
                      • Instruction Fuzzy Hash: 8871C272D00215ABEF219F64CC45BEF7BB5AF1D726F14205BE850A7291D73C9E048BA8
                      APIs
                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 004330F2
                      • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 0043315D
                      • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0043317A
                      • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004331B9
                      • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00433218
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 0043323B
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ByteCharMultiStringWide
                      • String ID:
                      • API String ID: 2829165498-0
                      • Opcode ID: 5f4a82ba7d014fa06e8216ae2bfd85b34b40225c1761d69da73e76adef6768e6
                      • Instruction ID: 2e7ff44e5bd3fd254f9cef1b25620d319a510a0ee994d159d64b8617f2502457
                      • Opcode Fuzzy Hash: 5f4a82ba7d014fa06e8216ae2bfd85b34b40225c1761d69da73e76adef6768e6
                      • Instruction Fuzzy Hash: 5E51E172500206ABEF205F65CC45FAB7BB9EF48B46F24456AF910D6250D738CE00DB68
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: __freea
                      • String ID: 9WD$a/p$am/pm
                      • API String ID: 240046367-3195321850
                      • Opcode ID: d269768e122446cddcc54ca1bb0353446874435394a7fafcda5843a2fd319884
                      • Instruction ID: eb6553218dede8ec3b22f7d8591de804fd90c34fa4c0505c2e4821a80c18f7d5
                      • Opcode Fuzzy Hash: d269768e122446cddcc54ca1bb0353446874435394a7fafcda5843a2fd319884
                      • Instruction Fuzzy Hash: 6BC1EC31900A06EBEF249F68C895ABFB7B1FF05700F55404BE805AB356D3789D42CB9A
                      APIs
                      • RmStartSession.RSTRTMGR(?,00000000,?), ref: 004D6DDE
                      • RmRegisterResources.RSTRTMGR(?,00000001,?,00000000,00000000,00000000,00000000,?), ref: 004D6E20
                      • RmGetList.RSTRTMGR(?,?,?,?,?), ref: 004D6E48
                      • RmShutdown.RSTRTMGR(?,00000001,00000000), ref: 004D6E69
                      • RmEndSession.RSTRTMGR(?), ref: 004D6E9C
                      • SetLastError.KERNEL32(00000000), ref: 004D6EA3
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Session$ErrorLastListRegisterResourcesShutdownStart
                      • String ID:
                      • API String ID: 3915309458-0
                      • Opcode ID: 35964b7dd5ed9eaca30dcc906b780c94db694ea61ce3b36c4f9fa18b6ac6bce6
                      • Instruction ID: 29e6430877ba3f7b480c4ad8311182fb53b3682ab34aef7614a715581ba20f86
                      • Opcode Fuzzy Hash: 35964b7dd5ed9eaca30dcc906b780c94db694ea61ce3b36c4f9fa18b6ac6bce6
                      • Instruction Fuzzy Hash: 42316076C01219AFDB21DF94CC55BEFBBB8EF18310F01422AF911A3290DB795A448BE1
                      APIs
                      • GetLastError.KERNEL32(?,?,0043744F,0043599C,00434361), ref: 00437466
                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00437474
                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043748D
                      • SetLastError.KERNEL32(00000000,0043744F,0043599C,00434361), ref: 004374DF
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ErrorLastValue___vcrt_
                      • String ID:
                      • API String ID: 3852720340-0
                      • Opcode ID: 1f7d8f03dc5d5ed9cbe3f3a50d497af2707fd42e27fe0bf67e220eaf0f6c3ecd
                      • Instruction ID: 2a60fb784f2f832ea5b73717e43a0c16eb42b58da7a2c3196cfaa8111b53b8ed
                      • Opcode Fuzzy Hash: 1f7d8f03dc5d5ed9cbe3f3a50d497af2707fd42e27fe0bf67e220eaf0f6c3ecd
                      • Instruction Fuzzy Hash: F401F57210C7116EE63027756C8A6172B84DB693BAF30633FF894512F1FE195C04628C
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AdjustPointer
                      • String ID: `-@
                      • API String ID: 1740715915-3781167437
                      • Opcode ID: 9c49ec1216cd10a1b8dcded1df3eff29d3c2c71fb51b80305b9040516556d7e1
                      • Instruction ID: 05bfd451ac5aa057a102673f7c5ee37241370c5a2d72e881bccf1d550ae62a18
                      • Opcode Fuzzy Hash: 9c49ec1216cd10a1b8dcded1df3eff29d3c2c71fb51b80305b9040516556d7e1
                      • Instruction Fuzzy Hash: CE5125F1608A02AFDB388F19C852BBB77A5EF08324F14542FE881472A1D739EC50CB58
                      APIs
                      • GetVersionExA.KERNEL32(?,?), ref: 00545190
                      • GetTempPathW.KERNEL32(000000E6,?,?), ref: 005451B9
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: PathTempVersion
                      • String ID: %s\etilqs_$>
                      • API String ID: 261301950-2315843240
                      • Opcode ID: ce0a7f2363ab7b7d7abc17a902d21cc4fb793d200454f9d166eb27a7e0bd6095
                      • Instruction ID: d7a7f50afb807603cb5ab0f28f8cfab7bdc2795ddb654ce58a8a7a184e52c6c9
                      • Opcode Fuzzy Hash: ce0a7f2363ab7b7d7abc17a902d21cc4fb793d200454f9d166eb27a7e0bd6095
                      • Instruction Fuzzy Hash: 8D516B31D086989FE722CB798C457FABFA4BF16308F4809D6D58492083E6B48F85D761
                      APIs
                      • __EH_prolog3.LIBCMT ref: 00432730
                      • std::_Lockit::_Lockit.LIBCPMT ref: 0043273B
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 004327A9
                        • Part of subcall function 0043288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 004328A4
                      • std::locale::_Setgloballocale.LIBCPMT ref: 00432756
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                      • String ID: `-@
                      • API String ID: 677527491-3781167437
                      • Opcode ID: 8a5613631ec3d916f95b396eb7cc43f12c5d676d84142dd5ef1a29976cc47206
                      • Instruction ID: 335728d06f8999c9367bb6f0cb93ad347570f0e44e9dcbef2930aaa8ccdcd417
                      • Opcode Fuzzy Hash: 8a5613631ec3d916f95b396eb7cc43f12c5d676d84142dd5ef1a29976cc47206
                      • Instruction Fuzzy Hash: 9D01FC35A006109BC70AFB20CC5157D7BB0FF98790F44250EE81163391CFB8AE06DB89
                      APIs
                      • GetVersionExA.KERNEL32(?), ref: 00544EA3
                      • CreateFileW.KERNEL32(00000000,C0000000,00000003,00000000,7FFFFFFD,00000000,00000000), ref: 00544ED3
                      • CreateFileA.KERNEL32(00000000,C0000000,00000003,00000000,7FFFFFFD,00000000,00000000), ref: 00544EDB
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: CreateFile$Version
                      • String ID:
                      • API String ID: 1715692615-0
                      • Opcode ID: e626251a24768bde3cf7646f34f6a4eca0d0342c2a8e3f24f44f168cd5caa3e2
                      • Instruction ID: 79d633e4ecdcec58b4cab98b7c2eef95a221f739213a781545a85cef4e7b8ca8
                      • Opcode Fuzzy Hash: e626251a24768bde3cf7646f34f6a4eca0d0342c2a8e3f24f44f168cd5caa3e2
                      • Instruction Fuzzy Hash: 9961BC75604302AFD720CF24D845BAABBE8FF84318F04492DF999C6291E735C959CB92
                      APIs
                      • GetModuleHandleA.KERNEL32(?,7591E010,?), ref: 004E9BEE
                      • GetProcAddress.KERNEL32(00000000,?), ref: 004E9BF9
                      • GetProcessHeap.KERNEL32 ref: 004E9C04
                      • HeapAlloc.KERNEL32(00000000,00000000,00010000), ref: 004E9C1E
                      • HeapAlloc.KERNEL32(?,00000000,00010000), ref: 004E9C57
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Heap$Alloc$AddressHandleModuleProcProcess
                      • String ID:
                      • API String ID: 349456774-0
                      • Opcode ID: 13763fb7ed65d7034848c90db75977a8d0748b960893ffa14e62b2712247cb23
                      • Instruction ID: d3ba1316c3404c5ffc03a5be9701c45b2826e37c75856fc641be7cc60fa5c5e8
                      • Opcode Fuzzy Hash: 13763fb7ed65d7034848c90db75977a8d0748b960893ffa14e62b2712247cb23
                      • Instruction Fuzzy Hash: CF81F0B5D04229ABDB14CF9AD884AAEFBB4FF48311F10856AE924B7350E7746A01CF54
                      APIs
                      • GetCurrentThreadId.KERNEL32 ref: 00432BDC
                      • AcquireSRWLockExclusive.KERNEL32(00000008), ref: 00432BFB
                      • AcquireSRWLockExclusive.KERNEL32(00000008,00000000), ref: 00432C29
                      • TryAcquireSRWLockExclusive.KERNEL32(00000008,00000000), ref: 00432C84
                      • TryAcquireSRWLockExclusive.KERNEL32(00000008,00000000), ref: 00432C9B
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AcquireExclusiveLock$CurrentThread
                      • String ID:
                      • API String ID: 66001078-0
                      • Opcode ID: 8f089e7040faa662b45679f060ee1b8a0f0adfff173fd46cb89089840a213128
                      • Instruction ID: ee0d2db44a198d3d02c1eb3b1b0ff5a364ec90963e300245c4d31640e9e12550
                      • Opcode Fuzzy Hash: 8f089e7040faa662b45679f060ee1b8a0f0adfff173fd46cb89089840a213128
                      • Instruction Fuzzy Hash: B2415931900A0ADFCB20DF65CA8096EB3B4FF0C311F20692BD446D7650D7B8E986DB69
                      APIs
                        • Part of subcall function 00545330: GetVersionExA.KERNEL32(?), ref: 00545356
                      • GetVersionExA.KERNEL32(?), ref: 00544B51
                      • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000), ref: 00544B76
                      • GetFullPathNameW.KERNEL32(00000000,00000003,00000000,00000000), ref: 00544B96
                      • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00544BAF
                      • GetFullPathNameA.KERNEL32(00000000,00000003,00000000,00000000), ref: 00544BE1
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: FullNamePath$Version
                      • String ID:
                      • API String ID: 495861893-0
                      • Opcode ID: def506589b02ed86a2d83c6155d8a90f1111383d037ff91711d2ded9672cc6f4
                      • Instruction ID: d9a042031f5a76925af0b002eaae0799fce7b88889afc6fe8005c9c8c5fb2dd0
                      • Opcode Fuzzy Hash: def506589b02ed86a2d83c6155d8a90f1111383d037ff91711d2ded9672cc6f4
                      • Instruction Fuzzy Hash: 55213FB25406146BEB206F719C86FEF3B68EF51309F000078F90956252EA38DD49C7A6
                      APIs
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0048F4E3
                      • Process32First.KERNEL32(00000000,?), ref: 0048F506
                      • Process32Next.KERNEL32(00000000,00000128), ref: 0048F551
                      • CloseHandle.KERNEL32(00000000), ref: 0048F55C
                      • CloseHandle.KERNEL32(00000000), ref: 0048F572
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: CloseHandleProcess32$CreateFirstNextSnapshotToolhelp32
                      • String ID:
                      • API String ID: 1789362936-0
                      • Opcode ID: 6029d90057008e46b8e5c5277aed6df356708134237ca5f417d9c8706b6c6cea
                      • Instruction ID: bc177564cbddbd99672fb84a339279b73cca850227e520494dfef4c47b8580b0
                      • Opcode Fuzzy Hash: 6029d90057008e46b8e5c5277aed6df356708134237ca5f417d9c8706b6c6cea
                      • Instruction Fuzzy Hash: 6411E6326001146BD7306F34AC986BFB7B9EB19325F1405BAE848C3352E7268C4E8765
                      APIs
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00406587
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ___std_exception_destroy
                      • String ID: )@$", "$: "
                      • API String ID: 4194217158-2520320562
                      • Opcode ID: 8a991d6cc43cc05af2141aeae52dd0db046d74c20a293c61a820b5870d9df492
                      • Instruction ID: 193815703dc37f45cda184aa0d75e7307a57ae547af4f9c577389d6cf834964f
                      • Opcode Fuzzy Hash: 8a991d6cc43cc05af2141aeae52dd0db046d74c20a293c61a820b5870d9df492
                      • Instruction Fuzzy Hash: 85D1E370D00205DFCB14DFA8C945AAEBBF5FF44304F10462EE456A7381DB78AA55CB99
                      APIs
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 0040750C
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00407522
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ___std_exception_destroy
                      • String ID: )@$[json.exception.
                      • API String ID: 4194217158-3378332251
                      • Opcode ID: 74f1ced649a80f54c74698f2e3f1ef80366f2fbaef409b1663f26043a5eac72a
                      • Instruction ID: d1fd1ad00dbeab1566b73d8112c34bc80c76f551163e59ed82d928a5322bc1a2
                      • Opcode Fuzzy Hash: 74f1ced649a80f54c74698f2e3f1ef80366f2fbaef409b1663f26043a5eac72a
                      • Instruction Fuzzy Hash: 8C51CFB1C046489BD710DFA8C905B9EBBB4FF15318F14426EE850A73C2E7B86A44C7A5
                      APIs
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00407CAC
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00407CC2
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ___std_exception_destroy
                      • String ID: )@$p|@
                      • API String ID: 4194217158-2759249158
                      • Opcode ID: fbc67c62691b4d29c16fb41b2f6209782dee4ae52023c44201ea77ed1986cddc
                      • Instruction ID: 2d5fa3d367423be86db8b91485125f203ee18fb15550ca5d49c40f7a3d1822d9
                      • Opcode Fuzzy Hash: fbc67c62691b4d29c16fb41b2f6209782dee4ae52023c44201ea77ed1986cddc
                      • Instruction Fuzzy Hash: 0051D3B1C052489BDB00DF98D9457DEFBF4EF19318F10426EE814A7381E7B96A44C7A5
                      APIs
                      • EncodePointer.KERNEL32(00000000,?), ref: 00437B90
                      • CatchIt.LIBVCRUNTIME ref: 00437C76
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: CatchEncodePointer
                      • String ID: MOC$RCC
                      • API String ID: 1435073870-2084237596
                      • Opcode ID: 2197aaef782f375f8d87615206ae6fe603a672c81450030c01d2018f2b0bfa53
                      • Instruction ID: 1ed06b6d49ca92b7e67ab75acb14d1b1cdaab090b09ce00a5d54d3623121de76
                      • Opcode Fuzzy Hash: 2197aaef782f375f8d87615206ae6fe603a672c81450030c01d2018f2b0bfa53
                      • Instruction Fuzzy Hash: C1416AB1900209AFDF25DF94CD81AEEBBB5FF4C304F14A05AF944A7251D339A950DB54
                      APIs
                      • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0040499F
                        • Part of subcall function 004351FB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,76A923A0,?,00431D09,?,005799D8,76A923A0,?,76A923A0,-00589880), ref: 0043525B
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                      • API String ID: 1903096808-1866435925
                      • Opcode ID: 5e8fcf04681b5496c91e096f1d273a5343178b8940b0c322b64de4dd1df32f3c
                      • Instruction ID: 99c94d1e80f512c720ba00148ae48faeb0acee82eabb402b7e5943aa58dcc262
                      • Opcode Fuzzy Hash: 5e8fcf04681b5496c91e096f1d273a5343178b8940b0c322b64de4dd1df32f3c
                      • Instruction Fuzzy Hash: AC119CF2844644ABCB10DF688C03BAB37C8E744715F04463EFE58972C1EB399800C79A
                      APIs
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00438538,00000000,?,00588904,?,?,?,004386DB,00000004,InitializeCriticalSectionEx,0055F640,InitializeCriticalSectionEx), ref: 00438594
                      • GetLastError.KERNEL32(?,00438538,00000000,?,00588904,?,?,?,004386DB,00000004,InitializeCriticalSectionEx,0055F640,InitializeCriticalSectionEx,00000000,?,00438322), ref: 0043859E
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 004385C6
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: LibraryLoad$ErrorLast
                      • String ID: api-ms-
                      • API String ID: 3177248105-2084034818
                      • Opcode ID: c947551068fc5aa78d1c4ecff25818d243fe134ebcecfa929017a310edce328a
                      • Instruction ID: c90ef5146fc35b23aa789d7ef59479731dd43e4d0f257fa83e9710a47c69997d
                      • Opcode Fuzzy Hash: c947551068fc5aa78d1c4ecff25818d243fe134ebcecfa929017a310edce328a
                      • Instruction Fuzzy Hash: 51E0D871280308B7EF301F60DC06B1A7F65AB10B41F100035F90CA85F0EB65E954A959
                      APIs
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00425787
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 0042579E
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ___std_exception_destroy
                      • String ID: )@$l
                      • API String ID: 4194217158-531593656
                      • Opcode ID: a4528b05e6746526d62e84ebb445939fb61f2aaef993a3223180bb5120b50cba
                      • Instruction ID: 43fda41a344adde0c0e2112745b19999f63c5ee1cff445b37cb15900c05139ed
                      • Opcode Fuzzy Hash: a4528b05e6746526d62e84ebb445939fb61f2aaef993a3223180bb5120b50cba
                      • Instruction Fuzzy Hash: BAF0F9A0C052C8DEDB01CBA8C9557CDBFB56F15308F14409AD444A7282E7B96B0CD763
                      APIs
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00425680
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00425697
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ___std_exception_destroy
                      • String ID: )@$x
                      • API String ID: 4194217158-91598277
                      • Opcode ID: 6c5c37cb81e8ac0a1486ed869cf1e333a176143b923977886202bd8eddd9186c
                      • Instruction ID: 10c3b930f4cf49af9ee2bef6b48737f2413326e6bf4895110f1bc2a9c90c91f1
                      • Opcode Fuzzy Hash: 6c5c37cb81e8ac0a1486ed869cf1e333a176143b923977886202bd8eddd9186c
                      • Instruction Fuzzy Hash: 28F0DAA1C09288E9DF41DBE4C5087CDBFB56F15309F24409AD848A7242E7B8670CD767
                      APIs
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0048F19C
                      • Process32First.KERNEL32(00000000,?), ref: 0048F1C2
                      • Process32Next.KERNEL32(00000000,00000128), ref: 0048F211
                      • CloseHandle.KERNEL32(00000000), ref: 0048F227
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                      • String ID:
                      • API String ID: 420147892-0
                      • Opcode ID: 0d951179c317006dddf831d143819256e2710197f3f27043bc004d2e793115e6
                      • Instruction ID: fbe0c60eb3c239f6b217fe84070aebb3c7b1e9daf40031a0165cf74cf1030098
                      • Opcode Fuzzy Hash: 0d951179c317006dddf831d143819256e2710197f3f27043bc004d2e793115e6
                      • Instruction Fuzzy Hash: ADD1BF71D002098BDB14DFA8C9857EEFBF5EF44304F24456AD805A7381E779AE88CBA5
                      APIs
                      • GetConsoleOutputCP.KERNEL32(93D55659,00000000,00000000,?), ref: 00448F02
                        • Part of subcall function 0044EC55: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0044A862,?,00000000,-00000008), ref: 0044ECB6
                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00449154
                      • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0044919A
                      • GetLastError.KERNEL32 ref: 0044923D
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                      • String ID:
                      • API String ID: 2112829910-0
                      • Opcode ID: d46c0870a8277536d77cd1fa32924c999241811f2f15ebdbc3735bbe4b8907ba
                      • Instruction ID: b6f9ea87837ca93654473fd2bae4ec290e60b55bc3ade45d2d9d29a5185f0d60
                      • Opcode Fuzzy Hash: d46c0870a8277536d77cd1fa32924c999241811f2f15ebdbc3735bbe4b8907ba
                      • Instruction Fuzzy Hash: 70D1BC75D00249AFDF14CFA8C880AAEBBB5FF09304F28456AE856EB351D734AD45CB54
                      APIs
                      • GetModuleHandleA.KERNEL32(?), ref: 004E98CE
                      • GetProcAddress.KERNEL32(00000000,?), ref: 004E98DA
                      • CreateEventA.KERNEL32(00000000,00000001,00000000,?), ref: 004E9A55
                      • SetEvent.KERNEL32(00000000), ref: 004E9A5C
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Event$AddressCreateHandleModuleProc
                      • String ID:
                      • API String ID: 2341598627-0
                      • Opcode ID: d8f616207016ccd70649815b0a46d34ccb6368db7b539dbf58b9823ea8322156
                      • Instruction ID: 94e94f94aa147367d366308f7bbda68d1ba073eefd2343970e9372381d670d86
                      • Opcode Fuzzy Hash: d8f616207016ccd70649815b0a46d34ccb6368db7b539dbf58b9823ea8322156
                      • Instruction Fuzzy Hash: 88819AB490C3829FC304CF59C48195AFBE5AFA8390F10891EF89587361E775D989CF96
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c28dd970ee9f985723d01587f791f28dc943c9d51e1efde8fb113aa15fde7f1a
                      • Instruction ID: 3ce7a0f6481a0f72d6256d3f2a6e49e06ee9a16ea2b7f0bfddf77237ab23de3e
                      • Opcode Fuzzy Hash: c28dd970ee9f985723d01587f791f28dc943c9d51e1efde8fb113aa15fde7f1a
                      • Instruction Fuzzy Hash: 8F412872A40744AFF7149F39C841B5ABBA9EB48B11F10812FF051EB381D779EA408788
                      APIs
                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 004E562F
                      • MultiByteToWideChar.KERNEL32(0000000F,00000000,?,000000FF,00000000,0000000F), ref: 004E5664
                      • WideCharToMultiByte.KERNEL32(000004E3,00000000,00000000,000000FF,00000000,00000000,00000000,00000000), ref: 004E568B
                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000), ref: 004E56B9
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide
                      • String ID:
                      • API String ID: 626452242-0
                      • Opcode ID: 667af2e2a61abff60a43f7d208c8c753e65e9722df59284470c0eff5b9583b61
                      • Instruction ID: 1f69569aec08140b5ab3c0a9b620ac8cfa37dccc0484cb5d57b15f637e29afd9
                      • Opcode Fuzzy Hash: 667af2e2a61abff60a43f7d208c8c753e65e9722df59284470c0eff5b9583b61
                      • Instruction Fuzzy Hash: ED41E271900345ABEF218F75CC09FAE7BB4AF45715F10025AF414BB2D1D7B99A04CBA9
                      APIs
                        • Part of subcall function 0044EC55: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0044A862,?,00000000,-00000008), ref: 0044ECB6
                      • GetLastError.KERNEL32 ref: 0044FA50
                      • __dosmaperr.LIBCMT ref: 0044FA57
                      • GetLastError.KERNEL32(?,?,?,?), ref: 0044FA91
                      • __dosmaperr.LIBCMT ref: 0044FA98
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                      • String ID:
                      • API String ID: 1913693674-0
                      • Opcode ID: f69f264f3a3445fa5257163de56fc3005cb7e945df64431326a0965baf165f71
                      • Instruction ID: 175cdc1e371479ca6662e8932d27d2c7f0366fb1f46f3a828fcae8f7a9953d28
                      • Opcode Fuzzy Hash: f69f264f3a3445fa5257163de56fc3005cb7e945df64431326a0965baf165f71
                      • Instruction Fuzzy Hash: 4A21D731A00605AFFB20EF66D88086BB7A9EF54368715843FF81DA7250D738EC598B59
                      APIs
                      • GetVersionExA.KERNEL32(?), ref: 00545356
                        • Part of subcall function 00545D20: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,?,?,?,?,00545385), ref: 00545D36
                      • AreFileApisANSI.KERNEL32 ref: 00545392
                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,00000000,00000000,00000000), ref: 005453AB
                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000), ref: 005453D1
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$ApisFileVersion
                      • String ID:
                      • API String ID: 928063719-0
                      • Opcode ID: cddb1f359b989beb9fa67faf323006f07cde4dd9abd9fb615a423bdc0bd7c05d
                      • Instruction ID: ee91a8a6a0c0fee7022a5c8999e7185e4bdf2e494df521b14be47994331aebc0
                      • Opcode Fuzzy Hash: cddb1f359b989beb9fa67faf323006f07cde4dd9abd9fb615a423bdc0bd7c05d
                      • Instruction Fuzzy Hash: 22113F72E407142BE7305F786C8AFAF37ACEB55769F100265F909E62C1FAB44D489391
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b057469d9bc5f69e0f8b611fad5c821e03d6bc773c10b2b7f28a1d317aa21b2f
                      • Instruction ID: b5fe3350cd15eea0aaf87c65c2f18f4f52b92c45156554196b4f926f22b003f4
                      • Opcode Fuzzy Hash: b057469d9bc5f69e0f8b611fad5c821e03d6bc773c10b2b7f28a1d317aa21b2f
                      • Instruction Fuzzy Hash: 6621F6F1200205AFFB20AF76CC8186BB7A9FF4076A710C51BF95987250DB39EE518769
                      APIs
                      • SetFilePointer.KERNEL32(00000000,00000000,?,00000000), ref: 00545949
                      • GetLastError.KERNEL32 ref: 00545956
                      • WriteFile.KERNEL32(00000000,?,?,00000000,00000000), ref: 0054598E
                      • GetLastError.KERNEL32 ref: 005459BF
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ErrorFileLast$PointerWrite
                      • String ID:
                      • API String ID: 2977825765-0
                      • Opcode ID: 1950966d951f8c867560627456bbde13738b7accb01c1cd70c58ef6c62dd0c24
                      • Instruction ID: 582698eb55b2eaae6c7c0c5214501257d254c964c7943da035f428691071258d
                      • Opcode Fuzzy Hash: 1950966d951f8c867560627456bbde13738b7accb01c1cd70c58ef6c62dd0c24
                      • Instruction Fuzzy Hash: 0E219F33600609EBDB208FA8D884BDABBB8FB44375F144166ED18D7281E631DD04DBA0
                      APIs
                      • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 005459FF
                      • GetLastError.KERNEL32 ref: 00545A0A
                      • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00545A32
                      • GetLastError.KERNEL32 ref: 00545A3C
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ErrorFileLast$PointerRead
                      • String ID:
                      • API String ID: 2170121939-0
                      • Opcode ID: 540eb84cac6ede58d3537ff1f38c1a90d22693d8cdf9cf0c6dadd44eecfb50f4
                      • Instruction ID: 6ceb55c3a65a62e15609471827d2f6869488a49b85fb46b58a4ba310ad65ed5c
                      • Opcode Fuzzy Hash: 540eb84cac6ede58d3537ff1f38c1a90d22693d8cdf9cf0c6dadd44eecfb50f4
                      • Instruction Fuzzy Hash: 6D119172600209ABCB108FA9EC45BDABBA8FF14375F004266FD1CC72A0E771D8609BD1
                      APIs
                      • GetVersionExA.KERNEL32(?,00000000,?), ref: 00545797
                      • LockFileEx.KERNEL32(?,00000001,00000000,000001FE,00000000,?,00000000,?), ref: 005457DB
                      • LockFile.KERNEL32(?,?,00000000,00000001,00000000,00000000,?), ref: 00545818
                      • GetLastError.KERNEL32 ref: 00545824
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: FileLock$ErrorLastVersion
                      • String ID:
                      • API String ID: 1561719237-0
                      • Opcode ID: 47948f3ac46128f688e1d1758b7c43b77088cf2001bc0b658931b0abdcadf5d0
                      • Instruction ID: 771d51dfa285cbb2dd74062f629081d2be7cfc554bc2a81a6f00ae30f739e82a
                      • Opcode Fuzzy Hash: 47948f3ac46128f688e1d1758b7c43b77088cf2001bc0b658931b0abdcadf5d0
                      • Instruction Fuzzy Hash: DB110171A00715EFF7208B64DC0ABAABBB5FF14314F004165F909E72D0EBB49D448B90
                      APIs
                      • WideCharToMultiByte.KERNEL32(?,00000400,?,?,?,?,00000000,00000000), ref: 00431F29
                      • GetLastError.KERNEL32 ref: 00431F35
                      • WideCharToMultiByte.KERNEL32(?,00000000,?,?,?,?,00000000,00000000), ref: 00431F5B
                      • GetLastError.KERNEL32 ref: 00431F67
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ByteCharErrorLastMultiWide
                      • String ID:
                      • API String ID: 203985260-0
                      • Opcode ID: 35e7bea43bf35a340b569ac256c958a5570a5f93565d5de543f4fdf7da8372b1
                      • Instruction ID: 5e8341cea1a57eda6e9d4b8ca3b7a39c6f892c49641055c0ca5066718be154a8
                      • Opcode Fuzzy Hash: 35e7bea43bf35a340b569ac256c958a5570a5f93565d5de543f4fdf7da8372b1
                      • Instruction Fuzzy Hash: C901FF36600255BBCF221FA1DC08D9B3E36EBD97A1F104015FE1556230C7318866E7B5
                      APIs
                      • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 005458DF
                      • GetLastError.KERNEL32 ref: 005458EA
                      • SetEndOfFile.KERNEL32(?), ref: 005458F7
                      • GetLastError.KERNEL32 ref: 00545901
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ErrorFileLast$Pointer
                      • String ID:
                      • API String ID: 1697706070-0
                      • Opcode ID: 99ed1c69f56f5325abe80c91d58b6415e30b45006e4dec00d143e7c5daf9e1c0
                      • Instruction ID: 8fd75b374af1164205c64c99f3da373fde227693c6e20ab0659c9ae24c58912b
                      • Opcode Fuzzy Hash: 99ed1c69f56f5325abe80c91d58b6415e30b45006e4dec00d143e7c5daf9e1c0
                      • Instruction Fuzzy Hash: BFF03032514708EFDB209FA4EC05AAA7BB8FB15735F104656F82DC62A0E731D924AB91
                      APIs
                      • WriteConsoleW.KERNEL32(00000000,00000000,0043D547,00000000,00000000,?,00453DCE,00000000,00000001,?,?,?,00449291,?,00000000,00000000), ref: 00456D49
                      • GetLastError.KERNEL32(?,00453DCE,00000000,00000001,?,?,?,00449291,?,00000000,00000000,?,?,?,0044986B,00000000), ref: 00456D55
                        • Part of subcall function 00456D1B: CloseHandle.KERNEL32(FFFFFFFE,00456D65,?,00453DCE,00000000,00000001,?,?,?,00449291,?,00000000,00000000,?,?), ref: 00456D2B
                      • ___initconout.LIBCMT ref: 00456D65
                        • Part of subcall function 00456CDD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00456D0C,00453DBB,?,?,00449291,?,00000000,00000000,?), ref: 00456CF0
                      • WriteConsoleW.KERNEL32(00000000,00000000,0043D547,00000000,?,00453DCE,00000000,00000001,?,?,?,00449291,?,00000000,00000000,?), ref: 00456D7A
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                      • String ID:
                      • API String ID: 2744216297-0
                      • Opcode ID: 6d252f6c85546040703605b5d122fbb434f3c9b6b34be8e7cd3f73b3df330617
                      • Instruction ID: b582005f90f2c4d159ccd48a3422ceca8e6e351b7b3b67145bbef734a6de3f3c
                      • Opcode Fuzzy Hash: 6d252f6c85546040703605b5d122fbb434f3c9b6b34be8e7cd3f73b3df330617
                      • Instruction Fuzzy Hash: F4F01C37500518BBCF221FD1DC18A8A3F76EB583A2B814415FE0D96231D6328928EB94
                      APIs
                      • GetCurrentThreadId.KERNEL32 ref: 00481BC4
                      • GetCurrentProcessId.KERNEL32 ref: 00481BCC
                      • SetEvent.KERNEL32 ref: 00481BE9
                      • WaitForSingleObject.KERNEL32(000000FF), ref: 00481BF7
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Current$EventObjectProcessSingleThreadWait
                      • String ID:
                      • API String ID: 977356572-0
                      • Opcode ID: 145f1463f0330e510467377b19718f6381c7c9cc9e72a15fcc7b338b6b78320b
                      • Instruction ID: 43167ce624a0f5263368e741b5dc2b465bdabedb5219c12b94d6a200efc4dfb2
                      • Opcode Fuzzy Hash: 145f1463f0330e510467377b19718f6381c7c9cc9e72a15fcc7b338b6b78320b
                      • Instruction Fuzzy Hash: 3FE01A72004315DFD7109F64EC1C855BBB5FB293227148221F9099B3B0E6318989EBA5
                      APIs
                        • Part of subcall function 004E74C0: __fread_nolock.LIBCMT ref: 004E7609
                      • DeleteFileA.KERNEL32(?), ref: 004C70EB
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: DeleteFile__fread_nolock
                      • String ID: 168$default24_2
                      • API String ID: 3901365830-313377091
                      • Opcode ID: 1161ed511266ea5b36fdda2c25c8167c5bb02b9ddc66b7669f310dbba728992d
                      • Instruction ID: 994a29ed8d939f73133b05733742be9ed0c6bb819da8c78882f75ca7b06cd161
                      • Opcode Fuzzy Hash: 1161ed511266ea5b36fdda2c25c8167c5bb02b9ddc66b7669f310dbba728992d
                      • Instruction Fuzzy Hash: 7CE18AB4D00249CBCB04CFA8C945BAEBBB1BF48304F24419DE9056B392DB78AE45CF95
                      APIs
                      • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,?,?,?,?,?,00000004,00000000), ref: 004091C8
                      • GetProcAddress.KERNEL32(00000000,?), ref: 004091D3
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressHandleModuleProc
                      • String ID: Ws2_32.dll
                      • API String ID: 1646373207-3093949381
                      • Opcode ID: ea9167e3bcfed1d29222b40259f4286497e10de2dd63420951b2f22a9489b711
                      • Instruction ID: cb5ead6240095672237fdab8273f91d80b82b8d73d4ae51f565ea22395c8577a
                      • Opcode Fuzzy Hash: ea9167e3bcfed1d29222b40259f4286497e10de2dd63420951b2f22a9489b711
                      • Instruction Fuzzy Hash: E7C16A70E01214DFCB24CFA8C84579EBBB0BF08714F24859EE955AB392D779AD01CB95
                      APIs
                      • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 00406CF0
                      • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 00406D3E
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ___std_fs_directory_iterator_advance@8
                      • String ID: .
                      • API String ID: 2610647541-248832578
                      • Opcode ID: 8de97e0557b89d418490575b2115c1d7852bdd46763aabdbcc61db0957447ddc
                      • Instruction ID: 06e113195c9c995bb1126ed1958f592d786724859c69b2563011d6ef3baaff07
                      • Opcode Fuzzy Hash: 8de97e0557b89d418490575b2115c1d7852bdd46763aabdbcc61db0957447ddc
                      • Instruction Fuzzy Hash: 6A91D071A00625ABCB34DF18C4846AAB7B4FF05324F01026AE856A77D0D739FDA5CBD9
                      APIs
                      • ___std_exception_copy.LIBVCRUNTIME ref: 00403819
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 004038F0
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ___std_exception_copy___std_exception_destroy
                      • String ID: )@
                      • API String ID: 2970364248-4120265097
                      • Opcode ID: ed1ac0f14267c2b8626e9d784d9228836504f476972db074cc70cf608e0aac1a
                      • Instruction ID: 269ef50febfdc4b1c22cf7239a576f40f0b19685bcb009e1facc48eb6157c32a
                      • Opcode Fuzzy Hash: ed1ac0f14267c2b8626e9d784d9228836504f476972db074cc70cf608e0aac1a
                      • Instruction Fuzzy Hash: DD6169B1C00248DBDB10DF98C945B9EFFB5FF19324F14825EE814AB282D7B95A44CBA5
                      APIs
                      • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0040499F
                        • Part of subcall function 004351FB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,76A923A0,?,00431D09,?,005799D8,76A923A0,?,76A923A0,-00589880), ref: 0043525B
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                      • String ID: ios_base::badbit set$ios_base::failbit set
                      • API String ID: 1903096808-1240500531
                      • Opcode ID: 037fbcf792b1db2df9f4c70af3e1ac54ab8959b344865e02de195616cc3e88a6
                      • Instruction ID: 59789774a96eacd1a5b8f49c51d8e497543063f0a2ed12b155596828dbf76f3a
                      • Opcode Fuzzy Hash: 037fbcf792b1db2df9f4c70af3e1ac54ab8959b344865e02de195616cc3e88a6
                      • Instruction Fuzzy Hash: E84124B2C00244ABCB04DF68C845BAEBBB8FB49710F14826EF554A73C1D7795A00CBA5
                      APIs
                      • SetEndOfFile.KERNEL32(00000000,?,00000000,?,?,?,?,?,!,D,0044EA1C,?,?,!,D,?,00000000,?), ref: 0044EB7A
                      • GetLastError.KERNEL32(?,?,?,?,!,D,0044EA1C,?,?,!,D,?,00000000,?), ref: 0044EB84
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ErrorFileLast
                      • String ID: !,D
                      • API String ID: 734332943-2387483618
                      • Opcode ID: 6a1e7ac7384b4bb6329048eea8c26e09b822db16cd26105a02b1221d47aee58a
                      • Instruction ID: 1e1ef3cad634bc89b09ed5b2214d0c7337f84d15d2fc9132cafc43e0310a1cdb
                      • Opcode Fuzzy Hash: 6a1e7ac7384b4bb6329048eea8c26e09b822db16cd26105a02b1221d47aee58a
                      • Instruction Fuzzy Hash: FB511971900685AAFB14CF67CC85B9E7B70FF04328F14021BF516A2281D779E891DBA9
                      APIs
                      • std::_Throw_Cpp_error.LIBCPMT ref: 004D676A
                      • std::_Throw_Cpp_error.LIBCPMT ref: 004D677B
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Cpp_errorThrow_std::_
                      • String ID: UaJ
                      • API String ID: 2134207285-2144978721
                      • Opcode ID: 71bc9411bda081ba2c6ca070473d6e11764a2e135bc835127b003db35da83e39
                      • Instruction ID: 177bb7d1701b8dda1f5a90c4ee3be826f8175b366ab48e47effb054e9b4aa952
                      • Opcode Fuzzy Hash: 71bc9411bda081ba2c6ca070473d6e11764a2e135bc835127b003db35da83e39
                      • Instruction Fuzzy Hash: 6441F2B1E002058BC720DF68995136EBBA1BB94314F19072FE815673D1EB79EA04C795
                      APIs
                      • GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 004E6290
                      • GdipGetImageEncoders.GDIPLUS(00000000,00000000,00000000), ref: 004E62BD
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: EncodersGdipImage$Size
                      • String ID: image/png
                      • API String ID: 864223233-2966254431
                      • Opcode ID: e7fc661bbe40e167e968ce4b4834ac07952c6a2874a5ff204e6fe5eb7edf3d15
                      • Instruction ID: e08145eb1897d221235e8b13ede795c589c6d842b6ab703e07584c42203d8d4f
                      • Opcode Fuzzy Hash: e7fc661bbe40e167e968ce4b4834ac07952c6a2874a5ff204e6fe5eb7edf3d15
                      • Instruction Fuzzy Hash: 99216D72E00104ABDB10AFA6DC816AFB7B8FF34395F1201F6ED05A7351E7369A44C295
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 00404061
                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 004040C4
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                      • String ID: bad locale name
                      • API String ID: 3988782225-1405518554
                      • Opcode ID: 0039d2d2ea2786ef81fe116e8b864d57793cf36a19fa060d6cb0c255b1586cee
                      • Instruction ID: 65c2995a4cce64452fc0e082f9126f7f9302ed92d60cad1113ce5137d9e79936
                      • Opcode Fuzzy Hash: 0039d2d2ea2786ef81fe116e8b864d57793cf36a19fa060d6cb0c255b1586cee
                      • Instruction Fuzzy Hash: DB112670805B84EED321CF69C50474BBFF0AF25714F10868DD09597781D3B9A604CB95
                      APIs
                      • ___std_exception_copy.LIBVCRUNTIME ref: 004165C9
                      • ___std_exception_copy.LIBVCRUNTIME ref: 004165FC
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ___std_exception_copy
                      • String ID: )@
                      • API String ID: 2659868963-4120265097
                      • Opcode ID: ec459901e9a8c12f2536e06f4ce64afd8286d8aca2aa337d2d7da09c98386d96
                      • Instruction ID: 79ebb971947c26e29da123751e765caa72f3f100f47198c89106861aa63fe252
                      • Opcode Fuzzy Hash: ec459901e9a8c12f2536e06f4ce64afd8286d8aca2aa337d2d7da09c98386d96
                      • Instruction Fuzzy Hash: F0112EB6910649EBCB11CF99C980B86FBF8FF09724F10876AE82497641E774A5448BA0
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 004327C2
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0043281E
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Lockitstd::_$Lockit::_Lockit::~_
                      • String ID: `-@
                      • API String ID: 593203224-3781167437
                      • Opcode ID: 0fa848a44c73a6aeeb21660fd2b14f5aaf999c273a66810f0e0171f36124b769
                      • Instruction ID: 083d3c1e84ca2e980ab4dd45ca0d837cc41164b3fcfcb6a28aec5d987169874b
                      • Opcode Fuzzy Hash: 0fa848a44c73a6aeeb21660fd2b14f5aaf999c273a66810f0e0171f36124b769
                      • Instruction Fuzzy Hash: 2A019231600214AFCB15EB19C995E5E77B8EF88754F05409AE8019B3A1DFB0EE44CB60
                      APIs
                      • GdipCloneImage.GDIPLUS(?,00000000,?,?,?,000000FF), ref: 00404C4C
                      • GdipAlloc.GDIPLUS(00000010,?,?,?,000000FF), ref: 00404C5B
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Gdip$AllocCloneImage
                      • String ID: `K@
                      • API String ID: 3021075589-3536307564
                      • Opcode ID: 6e910720078c30621a47b6eca49d96a116425349966641e16d2adddba9b4a4fa
                      • Instruction ID: 8747f557437175caeb58756454adc5b6b8cc0decca9fbbd4afccec21ee9e9ac9
                      • Opcode Fuzzy Hash: 6e910720078c30621a47b6eca49d96a116425349966641e16d2adddba9b4a4fa
                      • Instruction Fuzzy Hash: C0112DB1905749DFDB10CF98D904BAABBF8FB48720F10866AE829D37D0D7749900CB91
                      APIs
                      • GdipDisposeImage.GDIPLUS(FFFFFFFF,?,?,?,0054C48D,000000FF), ref: 00404CDF
                      • GdipFree.GDIPLUS(?,?,?,?,0054C48D,000000FF), ref: 00404CF1
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Gdip$DisposeFreeImage
                      • String ID: `K@
                      • API String ID: 1950503971-3536307564
                      • Opcode ID: 3316c4455565ac62ed6a26cea9d7150bfba2d0e3f41cbf1825aecc5a329bdf6e
                      • Instruction ID: 7ba4187510c4fdb2f2599f15a6424d96657f10c150e71c31b65947a42bc49c9a
                      • Opcode Fuzzy Hash: 3316c4455565ac62ed6a26cea9d7150bfba2d0e3f41cbf1825aecc5a329bdf6e
                      • Instruction Fuzzy Hash: 7201F472A00614ABC720CF48ED01B99BBA8FB19B21F00472FFC11A37C0C7B919108BD5
                      APIs
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00407ACC
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00407AE2
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ___std_exception_destroy
                      • String ID: )@
                      • API String ID: 4194217158-4120265097
                      • Opcode ID: 93267da127a396356cd2fdbad952cd532b26063f3bf799b654b12ef89a692989
                      • Instruction ID: 39a61349d826cdb48b27ae0f58ab52f56d337699a51a428b07672872488508ae
                      • Opcode Fuzzy Hash: 93267da127a396356cd2fdbad952cd532b26063f3bf799b654b12ef89a692989
                      • Instruction Fuzzy Hash: FE01A2B2C04744ABC711DF98CD0178DFFF8EB09715F10466BE814A3380E3B8660487A5
                      APIs
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00407CAC
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00407CC2
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ___std_exception_destroy
                      • String ID: )@
                      • API String ID: 4194217158-4120265097
                      • Opcode ID: cad3be967c840cba8baab123a4240524b2ea9f27ee00b0363261d2d3a2957baf
                      • Instruction ID: b31235e20b660ddbb30c99c001b11998604f696d918c6d2dbba64f62e05318ed
                      • Opcode Fuzzy Hash: cad3be967c840cba8baab123a4240524b2ea9f27ee00b0363261d2d3a2957baf
                      • Instruction Fuzzy Hash: 3F0162B2C44748ABC711DF98DD01B89FFF8EB09715F10466BE814A3781E3B9AA0487A5
                      APIs
                      • GdipDisposeImage.GDIPLUS(?,?,?,Function_0014BFE0,000000FF), ref: 00404B84
                      • GdipFree.GDIPLUS(?,?,?,Function_0014BFE0,000000FF), ref: 00404B96
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Gdip$DisposeFreeImage
                      • String ID: `K@
                      • API String ID: 1950503971-3536307564
                      • Opcode ID: 62ee0daa599b9b00a0c4ce88fb3d390fe4e594f946ea023ffe489846956dd575
                      • Instruction ID: bd97fcbd8bdc5b644a2ca526311264c36a05ae446e09af96bb23667ce14d71f1
                      • Opcode Fuzzy Hash: 62ee0daa599b9b00a0c4ce88fb3d390fe4e594f946ea023ffe489846956dd575
                      • Instruction Fuzzy Hash: ADF0F672A44654ABD3218F08DC02F95B7E8FB19B10F00466BFC01A3780D7BA68108AD9
                      APIs
                      • CompareStringW.KERNEL32(00000000,00000000,00000000,00000000,?,-00000008,?,-00000008,?,?,00456130,?,?,-00000008,?,-00000008), ref: 0044B57F
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: CompareString
                      • String ID: 0aE$`-@
                      • API String ID: 1825529933-1472567772
                      • Opcode ID: d0df0ea43047c73f5029be752bfe14cefc264b458c3f39c7a470d4df90d53397
                      • Instruction ID: e44343d96fe236ab9219cb5f9cc943518e3960d7194e1eed57cc779ab2011060
                      • Opcode Fuzzy Hash: d0df0ea43047c73f5029be752bfe14cefc264b458c3f39c7a470d4df90d53397
                      • Instruction Fuzzy Hash: CDF0B83200021ABBCF126F90EC08ADE3F26EB483A4F058011FA1825130C736C972AB95
                      APIs
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 0040758C
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 004075A2
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ___std_exception_destroy
                      • String ID: )@
                      • API String ID: 4194217158-4120265097
                      • Opcode ID: c858c6ed78de8a3b5ee1cba1accddd2d2891f2392b50b006f97d08456e2954ad
                      • Instruction ID: 78ccdeb9fbba2d16b6cd524d5c99d9dbf264c3e6aa85c375e1d072593ce1236d
                      • Opcode Fuzzy Hash: c858c6ed78de8a3b5ee1cba1accddd2d2891f2392b50b006f97d08456e2954ad
                      • Instruction Fuzzy Hash: 12F01DB2805748EFC721DF98D901789FFF8FB09728F50466AE865A3780E77466048BA5
                      APIs
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00407A5C
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00407A72
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ___std_exception_destroy
                      • String ID: )@
                      • API String ID: 4194217158-4120265097
                      • Opcode ID: 9ee8fa866bcea9d2c14fc14309fcadf8facde4318e0e6bb098ed358a1a235593
                      • Instruction ID: 96290d15a7b89a27e7413382239de33ac52fdad5c525fa7f0e86a9c1871ea130
                      • Opcode Fuzzy Hash: 9ee8fa866bcea9d2c14fc14309fcadf8facde4318e0e6bb098ed358a1a235593
                      • Instruction Fuzzy Hash: 68F012B1805744DFC711DF98C90178DFFF8FB05728F50466AE855A3780E7B5660487A5
                      APIs
                      • GetSystemTimePreciseAsFileTime.KERNEL32(?,00433077,?,?,?,?,004C7E2F), ref: 00433655
                      • GetSystemTimeAsFileTime.KERNEL32(?,93D55659,00000000,?,00551382,000000FF,?,00433077,?,?,?,?,004C7E2F), ref: 00433659
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Time$FileSystem$Precise
                      • String ID: `-@
                      • API String ID: 743729956-3781167437
                      • Opcode ID: a70e229828252f114f3dcb939b169fb3f53d7191ad82fa45b454faadf805d98c
                      • Instruction ID: 3e04e591088ee8cc2650925c1d28f2227fba881fd4e87dc1a7d03300bd93dc66
                      • Opcode Fuzzy Hash: a70e229828252f114f3dcb939b169fb3f53d7191ad82fa45b454faadf805d98c
                      • Instruction Fuzzy Hash: 73F0A032904A54EFCB118F44DC11B59BBA8F708B21F004626EC12A3790DB34A9049F94
                      APIs
                      • InitializeCriticalSectionAndSpinCount.KERNEL32(00000016,00000001,004389D2,00000001,00000016,00438BE1,?,?,?,?,?,00000000), ref: 0044B834
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: CountCriticalInitializeSectionSpin
                      • String ID: InitializeCriticalSectionEx$`-@
                      • API String ID: 2593887523-3269949891
                      • Opcode ID: 1f2253b5c78e33ee57fe7f30907939316c5faef6f9275bf3e632fad4f43c2f0e
                      • Instruction ID: 5bcc12c1b0658f8dc7434a33690804c70bb56e7eadbb0958c8ec10a8e9d05d13
                      • Opcode Fuzzy Hash: 1f2253b5c78e33ee57fe7f30907939316c5faef6f9275bf3e632fad4f43c2f0e
                      • Instruction Fuzzy Hash: BDE09236581318BBCB212F92DC06DAE7F25EB24BA2F048022FD1956161C7768821BBD9
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.4473420194.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Alloc
                      • String ID: FlsAlloc$`-@
                      • API String ID: 2773662609-4156633630
                      • Opcode ID: cb3d3b1705c4ad86f1f38207f7089225cebdf7df6536ef5bae3d846ce8807c5c
                      • Instruction ID: f97a85a86a778de88566526de1fe8fa57bb386988dde2a496b9568b12ff0cd72
                      • Opcode Fuzzy Hash: cb3d3b1705c4ad86f1f38207f7089225cebdf7df6536ef5bae3d846ce8807c5c
                      • Instruction Fuzzy Hash: DAE0CD3258031477961036916C16DAA7D14D750BA3F050033F904522619A95891066DF