Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rise2406.exe

Overview

General Information

Sample name:rise2406.exe
Analysis ID:1462857
MD5:c6c9f27d335d4e47b5ea12653e806be6
SHA1:e53242d463e2c94383ec646e7e04504b96b4d176
SHA256:514efbae5faa43878c743c3db36f81c25ab5d6da93b879b6e88e7a63b1b19769
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected RisePro Stealer
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found API chain indicative of sandbox detection
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for sample
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • rise2406.exe (PID: 3180 cmdline: "C:\Users\user\Desktop\rise2406.exe" MD5: C6C9F27D335D4E47B5EA12653E806BE6)
    • conhost.exe (PID: 1456 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 2520 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 2516 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • WerFault.exe (PID: 2700 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 140 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: RegAsm.exe PID: 2516JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    No Sigma rule has matched
    Timestamp:06/26/24-08:59:32.465846
    SID:2046267
    Source Port:50500
    Destination Port:49701
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:06/26/24-08:59:36.929586
    SID:2046269
    Source Port:49701
    Destination Port:50500
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:06/26/24-08:57:45.307172
    SID:2049060
    Source Port:49701
    Destination Port:50500
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:06/26/24-08:57:45.857539
    SID:2046266
    Source Port:50500
    Destination Port:49701
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: rise2406.exeReversingLabs: Detection: 87%
    Source: rise2406.exeVirustotal: Detection: 78%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: rise2406.exeJoe Sandbox ML: detected
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004C6B00 CryptUnprotectData,CryptUnprotectData,LocalFree,LocalFree,4_2_004C6B00
    Source: rise2406.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.7:49720 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.75.166:443 -> 192.168.2.7:49721 version: TLS 1.2
    Source: rise2406.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: RegAsm.pdb source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DA6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DA6000.00000004.00000020.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_0053C8CD FindFirstFileExW,0_2_0053C8CD
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004C6000 CreateDirectoryA,FindFirstFileA,FindNextFileA,GetLastError,FindClose,4_2_004C6000
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00432022 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,4_2_00432022
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004E6770 FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,GetLastError,std::_Throw_Cpp_error,std::_Throw_Cpp_error,CreateDirectoryA,std::_Throw_Cpp_error,std::_Throw_Cpp_error,4_2_004E6770
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004938D0 FindFirstFileA,FindNextFileA,GetLastError,FindClose,4_2_004938D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00493B60 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,SHGetFolderPathA,FindFirstFileA,FindNextFileA,FindClose,CreateDirectoryA,CreateDirectoryA,CreateDirectoryA,CopyFileA,CreateDirectoryA,CreateDirectoryA,CopyFileA,CopyFileA,CredEnumerateA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,lstrlenA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,lstrlenA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,lstrlenA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,lstrlenA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,CreateDirectoryA,CreateDirectoryA,CreateDirectoryA,lstrlenA,4_2_00493B60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044FC2F FindFirstFileExW,4_2_0044FC2F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004DFF00 CreateDirectoryA,FindFirstFileA,CreateDirectoryA,CopyFileA,FindNextFileA,FindClose,GetLastError,GetLastError,CreateDirectoryA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,4_2_004DFF00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00431F9C FindClose,FindFirstFileExW,GetLastError,4_2_00431F9C

    Networking

    barindex
    Source: TrafficSnort IDS: 2049060 ET TROJAN RisePro TCP Heartbeat Packet 192.168.2.7:49701 -> 5.42.67.8:50500
    Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 5.42.67.8:50500 -> 192.168.2.7:49701
    Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.7:49701 -> 5.42.67.8:50500
    Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 5.42.67.8:50500 -> 192.168.2.7:49701
    Source: global trafficTCP traffic: 192.168.2.7:49701 -> 5.42.67.8:50500
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: ipinfo.ioConnection: Keep-Alive
    Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
    Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
    Source: Joe Sandbox ViewIP Address: 172.67.75.166 172.67.75.166
    Source: Joe Sandbox ViewIP Address: 5.42.67.8 5.42.67.8
    Source: Joe Sandbox ViewASN Name: RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
    Source: unknownDNS query: name: ipinfo.io
    Source: unknownDNS query: name: ipinfo.io
    Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
    Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00409280 recv,GetProcAddress,GetModuleHandleA,GetProcAddress,WSASend,4_2_00409280
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: ipinfo.ioConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
    Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
    Source: global trafficDNS traffic detected: DNS query: ipinfo.io
    Source: global trafficDNS traffic detected: DNS query: db-ip.com
    Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
    Source: rise2406.exe, 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, RegAsm.exe, 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DFF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DFF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=8.46.123.33
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DFF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com:443/demo/home.php?s=8.46.123.33J
    Source: RegAsm.exe, RegAsm.exe, 00000004.00000002.2546153992.0000000000DDF000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.2546153992.0000000000DFF000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.2546153992.0000000000D88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/Mozilla/5.0
    Source: rise2406.exe, 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000D88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/q
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000D5A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.2546153992.0000000000D96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/8.46.123.33
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000D96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/8.46.123.33:
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io:443/widget/demo/8.46.123.33
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000D5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
    Source: RegAsm.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
    Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
    Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.7:49720 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.75.166:443 -> 192.168.2.7:49721 version: TLS 1.2
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_005409FC0_2_005409FC
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_00532C200_2_00532C20
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_0053BC920_2_0053BC92
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_00540DD40_2_00540DD4
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_0052FF040_2_0052FF04
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_005377820_2_00537782
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004E4BD04_2_004E4BD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044002D4_2_0044002D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_005220D04_2_005220D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F60E04_2_004F60E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004D70F04_2_004D70F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004930804_2_00493080
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004EE1704_2_004EE170
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_005081204_2_00508120
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004371A04_2_004371A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_005031A04_2_005031A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_005122604_2_00512260
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040A2C04_2_0040A2C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0050A2B04_2_0050A2B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044036F4_2_0044036F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004A43204_2_004A4320
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004904404_2_00490440
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F04504_2_004F0450
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004DE4304_2_004DE430
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004FA4804_2_004FA480
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_005145504_2_00514550
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0053F5504_2_0053F550
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F85F04_2_004F85F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0042F5804_2_0042F580
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0048F5904_2_0048F590
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004526104_2_00452610
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004A36104_2_004A3610
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_005486C04_2_005486C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_005477604_2_00547760
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F77304_2_004F7730
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004E77E04_2_004E77E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_005397B04_2_005397B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004547BF4_2_004547BF
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F28204_2_004F2820
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0043C9604_2_0043C960
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_005469704_2_00546970
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F79604_2_004F7960
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0043A9284_2_0043A928
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004FA9304_2_004FA930
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004EF9A04_2_004EF9A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044DA864_2_0044DA86
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F8B404_2_004F8B40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00493B604_2_00493B60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0051DBB04_2_0051DBB0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00500BA04_2_00500BA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00458BB04_2_00458BB0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004EFC404_2_004EFC40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004EEC404_2_004EEC40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F7C004_2_004F7C00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00503CC04_2_00503CC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00409C904_2_00409C90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00534D404_2_00534D40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F9D704_2_004F9D70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F7D004_2_004F7D00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004FAD004_2_004FAD00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00546D204_2_00546D20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00545DE04_2_00545DE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0053AE204_2_0053AE20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00458E304_2_00458E30
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00506EA04_2_00506EA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00516EA04_2_00516EA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004DFF004_2_004DFF00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00541F004_2_00541F00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004ECF204_2_004ECF20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F2FD04_2_004F2FD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00501FE04_2_00501FE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004FFFA04_2_004FFFA0
    Source: C:\Users\user\Desktop\rise2406.exeCode function: String function: 0052A0C0 appears 50 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00547510 appears 102 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434380 appears 54 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0041ACE0 appears 52 times
    Source: C:\Users\user\Desktop\rise2406.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 140
    Source: rise2406.exe, 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedotnet.exe6 vs rise2406.exe
    Source: rise2406.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: rise2406.exeStatic PE information: Section: .data ZLIB complexity 0.9968365897495362
    Source: classification engineClassification label: mal100.troj.evad.winEXE@7/6@2/3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00545050 GetLastError,GetVersionExA,FormatMessageW,LocalFree,FormatMessageA,4_2_00545050
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00544A40 GetDiskFreeSpaceW,GetDiskFreeSpaceA,4_2_00544A40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0048F070 CreateDirectoryA,CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,4_2_0048F070
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1456:120:WilError_03
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3180
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user~1\AppData\Local\Temp\trixyuIHtL4lTJ8ciJump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: rise2406.exe, 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, RegAsm.exe, 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
    Source: rise2406.exe, 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
    Source: rise2406.exeReversingLabs: Detection: 87%
    Source: rise2406.exeVirustotal: Detection: 78%
    Source: RegAsm.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
    Source: unknownProcess created: C:\Users\user\Desktop\rise2406.exe "C:\Users\user\Desktop\rise2406.exe"
    Source: C:\Users\user\Desktop\rise2406.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\rise2406.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
    Source: C:\Users\user\Desktop\rise2406.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
    Source: C:\Users\user\Desktop\rise2406.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 140
    Source: C:\Users\user\Desktop\rise2406.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: d3d11.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: resourcepolicyclient.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: d3d10warp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dxcore.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: devobj.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
    Source: rise2406.exeStatic file information: File size 1870848 > 1048576
    Source: rise2406.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x194400
    Source: rise2406.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: rise2406.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: RegAsm.pdb source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DA6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DA6000.00000004.00000020.00020000.00000000.sdmp
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,4_2_004CF280
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_00529AAF push ecx; ret 0_2_00529AC2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00433F59 push ecx; ret 4_2_00433F6C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004EE170 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,4_2_004EE170
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSandbox detection routine: GetCursorPos, DecisionNode, Sleepgraph_4-69899
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_4-69900
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeStalling execution: Execution stalls by calling Sleepgraph_4-70391
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetCursorPos,GetCursorPos,GetCursorPos,Sleep,GetCursorPos,Sleep,GetCursorPos,4_2_0045DB00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 3303Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 6588Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_4-70413
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_4-70426
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI coverage: 5.7 %
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2052Thread sleep count: 3303 > 30Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2052Thread sleep time: -333603s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2052Thread sleep count: 6588 > 30Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2052Thread sleep time: -665388s >= -30000sJump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_005449B0 GetSystemTime followed by cmp: cmp eax, 04h and CTI: jc 005449F1h4_2_005449B0
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_0053C8CD FindFirstFileExW,0_2_0053C8CD
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004C6000 CreateDirectoryA,FindFirstFileA,FindNextFileA,GetLastError,FindClose,4_2_004C6000
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00432022 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,4_2_00432022
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004E6770 FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,GetLastError,std::_Throw_Cpp_error,std::_Throw_Cpp_error,CreateDirectoryA,std::_Throw_Cpp_error,std::_Throw_Cpp_error,4_2_004E6770
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004938D0 FindFirstFileA,FindNextFileA,GetLastError,FindClose,4_2_004938D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00493B60 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,SHGetFolderPathA,FindFirstFileA,FindNextFileA,FindClose,CreateDirectoryA,CreateDirectoryA,CreateDirectoryA,CopyFileA,CreateDirectoryA,CreateDirectoryA,CopyFileA,CopyFileA,CredEnumerateA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,lstrlenA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,lstrlenA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,lstrlenA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,lstrlenA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,CreateDirectoryA,CreateDirectoryA,CreateDirectoryA,lstrlenA,4_2_00493B60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044FC2F FindFirstFileExW,4_2_0044FC2F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004DFF00 CreateDirectoryA,FindFirstFileA,CreateDirectoryA,CopyFileA,FindNextFileA,FindClose,GetLastError,GetLastError,CreateDirectoryA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,4_2_004DFF00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00431F9C FindClose,FindFirstFileExW,GetLastError,4_2_00431F9C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004580D8 VirtualQuery,GetSystemInfo,4_2_004580D8
    Source: Amcache.hve.7.drBinary or memory string: VMware
    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
    Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.2546153992.0000000000DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DB9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
    Source: Amcache.hve.7.drBinary or memory string: vmci.sys
    Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.7.drBinary or memory string: VMware20,1
    Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.7.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
    Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\rise2406.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_0052DED3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0052DED3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,4_2_004CF280
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_00533A8C mov ecx, dword ptr fs:[00000030h]0_2_00533A8C
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_005385C5 mov eax, dword ptr fs:[00000030h]0_2_005385C5
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0045DB00 mov eax, dword ptr fs:[00000030h]4_2_0045DB00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0045DB00 mov eax, dword ptr fs:[00000030h]4_2_0045DB00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004D6280 mov eax, dword ptr fs:[00000030h]4_2_004D6280
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00493B60 mov eax, dword ptr fs:[00000030h]4_2_00493B60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004D2DC0 mov ecx, dword ptr fs:[00000030h]4_2_004D2DC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004C6D80 mov eax, dword ptr fs:[00000030h]4_2_004C6D80
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_0053DAB5 GetProcessHeap,0_2_0053DAB5
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_0052A04B SetUnhandledExceptionFilter,0_2_0052A04B
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_0052A105 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0052A105
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_0052DED3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0052DED3
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_00529EEF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00529EEF
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00434184 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00434184
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00434311 SetUnhandledExceptionFilter,4_2_00434311
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0043451D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0043451D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00438A64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00438A64

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\rise2406.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_007A018D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_007A018D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,4_2_004CF280
    Source: C:\Users\user\Desktop\rise2406.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 55D000Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 585000Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 58A000Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 58C000Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 821008Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_00529C95 cpuid 0_2_00529C95
    Source: C:\Users\user\Desktop\rise2406.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00540033
    Source: C:\Users\user\Desktop\rise2406.exeCode function: GetLocaleInfoW,0_2_0053F8CA
    Source: C:\Users\user\Desktop\rise2406.exeCode function: GetLocaleInfoW,0_2_005370FB
    Source: C:\Users\user\Desktop\rise2406.exeCode function: EnumSystemLocalesW,0_2_0053F971
    Source: C:\Users\user\Desktop\rise2406.exeCode function: EnumSystemLocalesW,0_2_0053F9BC
    Source: C:\Users\user\Desktop\rise2406.exeCode function: EnumSystemLocalesW,0_2_0053FA57
    Source: C:\Users\user\Desktop\rise2406.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0053FAE2
    Source: C:\Users\user\Desktop\rise2406.exeCode function: EnumSystemLocalesW,0_2_00536BD5
    Source: C:\Users\user\Desktop\rise2406.exeCode function: GetLocaleInfoW,0_2_0053FD35
    Source: C:\Users\user\Desktop\rise2406.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0053FE5E
    Source: C:\Users\user\Desktop\rise2406.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_0053F6CF
    Source: C:\Users\user\Desktop\rise2406.exeCode function: GetLocaleInfoW,0_2_0053FF64
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,4_2_004531CA
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,4_2_0044B1B1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_004532F3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,4_2_004533F9
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,4_2_004534CF
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,4_2_0044B734
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,4_2_00452B5A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,4_2_00452D5F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoEx,FormatMessageA,4_2_00431D94
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,4_2_00452E51
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,4_2_00452E06
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,4_2_00452EEC
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,4_2_00452F77
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: CreateDirectoryA,FindFirstFileA,CreateDirectoryA,CopyFileA,FindNextFileA,FindClose,GetLastError,GetLastError,CreateDirectoryA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,4_2_004DFF00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_0052A302 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_0052A302
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004DFF00 CreateDirectoryA,FindFirstFileA,CreateDirectoryA,CopyFileA,FindNextFileA,FindClose,GetLastError,GetLastError,CreateDirectoryA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,4_2_004DFF00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044D130 GetTimeZoneInformation,4_2_0044D130
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00545050 GetLastError,GetVersionExA,FormatMessageW,LocalFree,FormatMessageA,4_2_00545050
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
    Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2516, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2516, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    511
    Process Injection
    12
    Virtualization/Sandbox Evasion
    OS Credential Dumping12
    System Time Discovery
    Remote Services1
    Archive Collected Data
    21
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts12
    Native API
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    511
    Process Injection
    LSASS Memory151
    Security Software Discovery
    Remote Desktop ProtocolData from Removable Media1
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Deobfuscate/Decode Files or Information
    Security Account Manager12
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive2
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
    Obfuscated Files or Information
    NTDS1
    Process Discovery
    Distributed Component Object ModelInput Capture2
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Software Packing
    LSA Secrets1
    Application Window Discovery
    SSHKeylogging13
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain Credentials1
    Account Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
    System Owner/User Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
    System Network Configuration Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
    File and Directory Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing36
    System Information Discovery
    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1462857 Sample: rise2406.exe Startdate: 26/06/2024 Architecture: WINDOWS Score: 100 23 ipinfo.io 2->23 25 db-ip.com 2->25 33 Snort IDS alert for network traffic 2->33 35 Multi AV Scanner detection for submitted file 2->35 37 Yara detected RisePro Stealer 2->37 39 2 other signatures 2->39 7 rise2406.exe 1 2->7         started        signatures3 process4 signatures5 41 Contains functionality to inject code into remote processes 7->41 43 Writes to foreign memory regions 7->43 45 Allocates memory in foreign processes 7->45 47 Injects a PE file into a foreign processes 7->47 10 RegAsm.exe 7->10         started        13 RegAsm.exe 2 7->13         started        16 WerFault.exe 21 16 7->16         started        19 conhost.exe 7->19         started        process6 dnsIp7 49 Found stalling execution ending in API Sleep call 10->49 51 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 10->51 53 Found API chain indicative of sandbox detection 10->53 55 Contains functionality to inject threads in other processes 10->55 27 5.42.67.8, 49701, 50500 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 13->27 29 ipinfo.io 34.117.186.192, 443, 49720 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 13->29 31 db-ip.com 172.67.75.166, 443, 49721 CLOUDFLARENETUS United States 13->31 21 C:\ProgramData\Microsoft\...\Report.wer, Unicode 16->21 dropped file8 signatures9

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    rise2406.exe88%ReversingLabsWin32.Trojan.LummaStealer
    rise2406.exe79%VirustotalBrowse
    rise2406.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://ipinfo.io/0%URL Reputationsafe
    http://upx.sf.net0%URL Reputationsafe
    http://www.winimage.com/zLibDll0%Avira URL Cloudsafe
    https://ipinfo.io:443/widget/demo/8.46.123.330%Avira URL Cloudsafe
    https://db-ip.com/0%Avira URL Cloudsafe
    https://ipinfo.io/widget/demo/8.46.123.330%Avira URL Cloudsafe
    https://db-ip.com:443/demo/home.php?s=8.46.123.33J0%Avira URL Cloudsafe
    https://ipinfo.io/q0%Avira URL Cloudsafe
    https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
    https://www.maxmind.com/en/locate-my-ip-address0%Avira URL Cloudsafe
    https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
    https://ipinfo.io/Mozilla/5.00%Avira URL Cloudsafe
    https://db-ip.com/demo/home.php?s=8.46.123.330%Avira URL Cloudsafe
    https://ipinfo.io/widget/demo/8.46.123.33:0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    ipinfo.io
    34.117.186.192
    truefalse
      unknown
      db-ip.com
      172.67.75.166
      truefalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://ipinfo.io/false
        • URL Reputation: safe
        unknown
        https://ipinfo.io/widget/demo/8.46.123.33false
        • Avira URL Cloud: safe
        unknown
        https://db-ip.com/demo/home.php?s=8.46.123.33false
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://db-ip.com:443/demo/home.php?s=8.46.123.33JRegAsm.exe, 00000004.00000002.2546153992.0000000000DFF000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://ipinfo.io:443/widget/demo/8.46.123.33RegAsm.exe, 00000004.00000002.2546153992.0000000000DDF000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://ipinfo.io/qRegAsm.exe, 00000004.00000002.2546153992.0000000000D88000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://www.maxmind.com/en/locate-my-ip-addressRegAsm.exefalse
        • Avira URL Cloud: safe
        unknown
        https://db-ip.com/RegAsm.exe, 00000004.00000002.2546153992.0000000000DFF000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllrise2406.exe, 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.winimage.com/zLibDllrise2406.exe, 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, RegAsm.exe, 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://upx.sf.netAmcache.hve.7.drfalse
        • URL Reputation: safe
        unknown
        https://t.me/RiseProSUPPORTRegAsm.exe, 00000004.00000002.2546153992.0000000000D5A000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://ipinfo.io/Mozilla/5.0RegAsm.exe, 00000004.00000002.2546153992.0000000000DDF000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://ipinfo.io/widget/demo/8.46.123.33:RegAsm.exe, 00000004.00000002.2546153992.0000000000D96000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        34.117.186.192
        ipinfo.ioUnited States
        139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
        172.67.75.166
        db-ip.comUnited States
        13335CLOUDFLARENETUSfalse
        5.42.67.8
        unknownRussian Federation
        39493RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUtrue
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1462857
        Start date and time:2024-06-26 08:56:44 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 52s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:15
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:rise2406.exe
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@7/6@2/3
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 79%
        • Number of executed functions: 29
        • Number of non-executed functions: 159
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 104.208.16.94
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        02:57:58API Interceptor1x Sleep call for process: WerFault.exe modified
        04:11:36API Interceptor261810x Sleep call for process: RegAsm.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        34.117.186.192Raptor.HardwareService.Setup_2.3.6.0.msiGet hashmaliciousUnknownBrowse
        • ipinfo.io/ip
        HP-patchedUS-deobfuscated.exeGet hashmaliciousUnknownBrowse
        • ipinfo.io/
        HP-patchedUS-deobfuscated.exeGet hashmaliciousUnknownBrowse
        • ipinfo.io/
        HP-patchedUS-deobfuscated.exeGet hashmaliciousUnknownBrowse
        • ipinfo.io/
        SecuriteInfo.com.Win32.Evo-gen.24318.16217.exeGet hashmaliciousUnknownBrowse
        • ipinfo.io/json
        SecuriteInfo.com.Win32.Evo-gen.28489.31883.exeGet hashmaliciousUnknownBrowse
        • ipinfo.io/json
        Raptor.HardwareService.Setup 1.msiGet hashmaliciousUnknownBrowse
        • ipinfo.io/ip
        Conferma_Pdf_Editor.exeGet hashmaliciousPlanet StealerBrowse
        • ipinfo.io/
        Conferma_Pdf_Editor.exeGet hashmaliciousPlanet StealerBrowse
        • ipinfo.io/
        w.shGet hashmaliciousXmrigBrowse
        • /ip
        172.67.75.166http://luxury-sherbet-tk1111-10e1b5.netlify.app/form.htmlGet hashmaliciousUnknownBrowse
          https://cn10.pages.dev/appeal_case_ID/Get hashmaliciousUnknownBrowse
            file.exeGet hashmaliciousRisePro StealerBrowse
              YnsEArPlqx.exeGet hashmaliciousRisePro StealerBrowse
                T17sbXrL3i.exeGet hashmaliciousRisePro StealerBrowse
                  file.exeGet hashmaliciousRisePro StealerBrowse
                    https://curious-kringle-id4964-024b3b3.netlify.app/form.htmlGet hashmaliciousUnknownBrowse
                      4Ip0IVHqJ3.exeGet hashmaliciousRisePro StealerBrowse
                        https://gacw-no-reply-restriction-appeal-case.netlify.app/feedback_id_38258467296/Get hashmaliciousUnknownBrowse
                          http://rules-prohibiting-violative-advertisi.netlify.app/appeal_case_ID_78234127826/Get hashmaliciousUnknownBrowse
                            5.42.67.81kBeqS7E3z.exeGet hashmaliciousLummaC, RisePro Stealer, VidarBrowse
                              BY1Fwf74x3.exeGet hashmaliciousRisePro Stealer, VidarBrowse
                                SecuriteInfo.com.Win64.Evo-gen.4435.12354.exeGet hashmaliciousCryptOne, GCleaner, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                                  CHA0VZiz8y.exeGet hashmaliciousCryptOne, Djvu, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, VidarBrowse
                                    SecuriteInfo.com.Win64.Evo-gen.30302.14698.exeGet hashmaliciousCryptOne, Djvu, GCleaner, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
                                      WaGiUWSpyO.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                                        BI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                                          1n4J6tLgsc.exeGet hashmaliciousRisePro StealerBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            ipinfo.ioRaptor.HardwareService.Setup_2.3.6.0.msiGet hashmaliciousUnknownBrowse
                                            • 34.117.186.192
                                            file.exeGet hashmaliciousRisePro StealerBrowse
                                            • 34.117.186.192
                                            http://telegravm.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            http://telegrarl.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            http://telegraem.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            http://telegrema.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            http://telegrram.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            http://telegrmaw.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            http://telegrnal.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            http://telegrma.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            db-ip.comfile.exeGet hashmaliciousRisePro StealerBrowse
                                            • 104.26.5.15
                                            http://luxury-sherbet-tk1111-10e1b5.netlify.app/form.htmlGet hashmaliciousUnknownBrowse
                                            • 172.67.75.166
                                            https://le-2vr.pages.dev/appeal_case_ID/Get hashmaliciousUnknownBrowse
                                            • 104.26.5.15
                                            https://e23-c5p.pages.dev/appeal_case_ID/Get hashmaliciousUnknownBrowse
                                            • 104.26.5.15
                                            https://ml5-94x.pages.dev/appeal_case_ID/Get hashmaliciousUnknownBrowse
                                            • 104.26.5.15
                                            https://cn10.pages.dev/appeal_case_ID/Get hashmaliciousUnknownBrowse
                                            • 172.67.75.166
                                            https://verify-infraction-messages.netlify.app/appeal_case_id_561597519/Get hashmaliciousUnknownBrowse
                                            • 104.26.5.15
                                            90ZF1EDs9h.exeGet hashmaliciousRisePro StealerBrowse
                                            • 104.26.5.15
                                            BqqQh4Jr7L.exeGet hashmaliciousRisePro StealerBrowse
                                            • 104.26.4.15
                                            file.exeGet hashmaliciousRisePro StealerBrowse
                                            • 104.26.4.15
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUfile.exeGet hashmaliciousRedLineBrowse
                                            • 5.42.65.92
                                            file.exeGet hashmaliciousRedLineBrowse
                                            • 5.42.65.92
                                            file.exeGet hashmaliciousUnknownBrowse
                                            • 5.42.66.10
                                            file.exeGet hashmaliciousRedLineBrowse
                                            • 5.42.65.92
                                            adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93_dump.exeGet hashmaliciousRedLineBrowse
                                            • 5.42.65.92
                                            file.exeGet hashmaliciousRedLineBrowse
                                            • 5.42.65.92
                                            DqnftBv2b9.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                            • 5.42.104.211
                                            1kBeqS7E3z.exeGet hashmaliciousLummaC, RisePro Stealer, VidarBrowse
                                            • 5.42.65.116
                                            file.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                                            • 5.42.65.92
                                            GOOGLE-AS-APGoogleAsiaPacificPteLtdSGhttps://riprogramma.consegna.3-79-47-0.cprapid.com/brt/update.php?%276Get hashmaliciousUnknownBrowse
                                            • 34.117.77.79
                                            http://3-79-47-0.cprapid.com/brt/update.php?%2704bd392f228f637be355Get hashmaliciousUnknownBrowse
                                            • 34.117.77.79
                                            https://opposite-grandiose-flock.glitch.me/public/digitalapps.navyfederal.org.htmlGet hashmaliciousHTMLPhisherBrowse
                                            • 34.117.77.79
                                            Authorization code - SO10552124.PDFGet hashmaliciousUnknownBrowse
                                            • 34.117.77.79
                                            Raptor.HardwareService.Setup_2.3.6.0.msiGet hashmaliciousUnknownBrowse
                                            • 34.117.186.192
                                            https://eex2ujl43dm.larksuite.com/wiki/Ui6DwyQ8kilW7qkvx66uyYsusXb?from=from_copylinkGet hashmaliciousHTMLPhisherBrowse
                                            • 34.117.97.41
                                            file.exeGet hashmaliciousRisePro StealerBrowse
                                            • 34.117.186.192
                                            http://telegravm.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            http://telegrarl.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            http://telegraem.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            CLOUDFLARENETUS_Account Receipt.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            ORDEN DE COMPRA OI1597.exeGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            288292021 ABB.exeGet hashmaliciousFormBookBrowse
                                            • 188.114.96.3
                                            GG017077 TAE.exeGet hashmaliciousAgentTeslaBrowse
                                            • 104.26.12.205
                                            0Z0CbhhLet.exeGet hashmaliciousQuasarBrowse
                                            • 172.67.74.152
                                            txJO1YslwA.rtfGet hashmaliciousUnknownBrowse
                                            • 188.114.96.3
                                            GOoY5QBqvC.elfGet hashmaliciousMirai, MoobotBrowse
                                            • 104.16.167.29
                                            clamav-26507ecba954172bdcc6c436a16c6d66.tmpGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            https://nekofile.eu.org/d7e69ef7da63a0b454230diajGet hashmaliciousUnknownBrowse
                                            • 172.64.41.3
                                            https://nekofile.eu.org/f8e2cb54931bf39d6c12eo5ncGet hashmaliciousUnknownBrowse
                                            • 1.1.1.1
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            a0e9f5d64349fb13191bc781f81f42e1qoe1X4ig0N.exeGet hashmaliciousLummaC, AsyncRAT, DarkTortilla, LummaC Stealer, Njrat, SmokeLoader, StormKittyBrowse
                                            • 34.117.186.192
                                            • 172.67.75.166
                                            proof.cmdGet hashmaliciousDBatLoader, RemcosBrowse
                                            • 34.117.186.192
                                            • 172.67.75.166
                                            pmrD6U8p5z.xlsGet hashmaliciousUnknownBrowse
                                            • 34.117.186.192
                                            • 172.67.75.166
                                            file.exeGet hashmaliciousLummaCBrowse
                                            • 34.117.186.192
                                            • 172.67.75.166
                                            Techno_PO LV12406-003211.xla.xlsxGet hashmaliciousUnknownBrowse
                                            • 34.117.186.192
                                            • 172.67.75.166
                                            Techno_PO LV12406-00311.xla.xlsxGet hashmaliciousUnknownBrowse
                                            • 34.117.186.192
                                            • 172.67.75.166
                                            PO LV12406-00390.xla.xlsxGet hashmaliciousUnknownBrowse
                                            • 34.117.186.192
                                            • 172.67.75.166
                                            BlockIps.DocxGet hashmaliciousUnknownBrowse
                                            • 34.117.186.192
                                            • 172.67.75.166
                                            Purchase Order.batGet hashmaliciousDBatLoaderBrowse
                                            • 34.117.186.192
                                            • 172.67.75.166
                                            7rBFEWNRqy.exeGet hashmaliciousLummaC, SmokeLoaderBrowse
                                            • 34.117.186.192
                                            • 172.67.75.166
                                            No context
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):0.7007062601030464
                                            Encrypted:false
                                            SSDEEP:96:jP4FOH/usAhqjoOyDqGQXIDcQZc68cE+cw3Jqe+HbHg/PB6HeaOy1FhZAX/d5FMv:j4gH/u8t0H4UcjG1zuiFyZ24IO8KL
                                            MD5:4F7B153356A21D0E0F145E4132E37263
                                            SHA1:9BA233E6AB5F2F017293B2A2EEF35782D3BACD24
                                            SHA-256:29378ECA28488E4BA5D22B072C57A113873FBEB2A82A10C303F1BA0892DFFB2F
                                            SHA-512:AA3C3D716D22D39545A8727309F3A6F67E4140A0455D8F76AA37F0AE9D4EBA55DED431A96789FC2D15C9DD67A7720DAB6CCBDB3DC21414634BFF5637D403BFBC
                                            Malicious:true
                                            Reputation:low
                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.3.8.5.8.6.6.4.0.8.2.5.7.0.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.3.8.5.8.6.6.4.6.7.6.3.2.4.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.d.4.2.8.d.2.d.-.1.b.5.3.-.4.5.6.e.-.a.f.c.5.-.4.4.6.0.5.0.e.7.6.9.4.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.1.d.0.d.a.3.f.-.5.1.d.a.-.4.b.b.5.-.a.a.7.9.-.b.8.3.c.f.6.2.5.5.f.0.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.i.s.e.2.4.0.6...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.c.6.c.-.0.0.0.1.-.0.0.1.4.-.5.e.9.0.-.3.4.2.4.9.6.c.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.9.f.7.8.3.5.9.1.1.b.e.9.f.c.a.f.b.8.f.c.5.b.7.b.0.d.c.0.f.f.3.0.0.0.0.f.f.f.f.!.0.0.0.0.e.5.3.2.4.2.d.4.6.3.e.2.c.9.4.3.8.3.e.c.6.4.6.e.7.e.0.4.5.0.4.b.9.6.b.4.d.1.7.6.!.r.i.s.e.2.4.0.6...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:Mini DuMP crash report, 14 streams, Wed Jun 26 06:57:44 2024, 0x1205a4 type
                                            Category:dropped
                                            Size (bytes):47100
                                            Entropy (8bit):1.8252727652124974
                                            Encrypted:false
                                            SSDEEP:192:mykqBVV9OMvskaBktKYUd4kD2yE1WdlVQ5LM:F5wMvskaBktKYI2yE12lVQ5
                                            MD5:BBD9295B206DABE992F3C66CBFBB9C79
                                            SHA1:69893A4AB3B9A1122F4863F0F9EB55BF376BA346
                                            SHA-256:3D6DAA050E5FA8AD4025CADC6EF3081DD6B8CBB4A64FD139081CB2C6CEFC9ABF
                                            SHA-512:4731ECECFAAF5C055037E53BA2D14051DF9CE5EFEDC764EB855461C2E5D62BFCBC80C5298EA094284E7927FF86A186403867E1382525AE90ACED335E42CAF48B
                                            Malicious:false
                                            Reputation:low
                                            Preview:MDMP..a..... ........{f........................X...............N#..........T.......8...........T...........@...............T...........@...............................................................................eJ..............GenuineIntel............T.......l....{f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):8344
                                            Entropy (8bit):3.7039735507651863
                                            Encrypted:false
                                            SSDEEP:192:R6l7wVeJ+W606YN1SUHQgmfvJ2Xyprr89boMsfJ4m:R6lXJP606YvSUHQgmfvJ2LoffD
                                            MD5:F4E60215C8F423BDB047EB40142F28A6
                                            SHA1:DC99EBC00D009FE23795FE8A91FCFA1830E85C4F
                                            SHA-256:52F2ADE8FA5579441E043B494D8697CA21C6B212C7692D3A23534ED23EA68E6D
                                            SHA-512:68B6371DDDA400177012A768E063E4C313375F192ABF870356A1EFCDBB4E4037F29AF6FFA6263D716C23BCB9F4C894F7693061F3EC354602E0043FE046DD6AC6
                                            Malicious:false
                                            Reputation:low
                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.1.8.0.<./.P.i.
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):4625
                                            Entropy (8bit):4.493182411741148
                                            Encrypted:false
                                            SSDEEP:48:cvIwWl8zsCJg77aI9JiTWpW8VYMYm8M4JHVFl+q8TMhkKWBSad:uIjfQI7Si7VwJV3kKWkad
                                            MD5:BD57B6DFB4823B8CAE63139D142F06EB
                                            SHA1:C02B4B67C4B49A0F8268B7F4D6A08552737B7524
                                            SHA-256:F5D61207F9616815B42EC173AE223B372C55824E2F5988DB69BF147481B9F982
                                            SHA-512:08C1A8B85C62EF3B5BFDBB7DD43ACF79A4B97523CCD1C708DF4F77F4FDB9FDE7C84D32229232529359B246C01E3D7759ED85ACBC32036D906C2C32A758DE259B
                                            Malicious:false
                                            Reputation:low
                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="384360" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:MS Windows registry file, NT/2000 or above
                                            Category:dropped
                                            Size (bytes):1835008
                                            Entropy (8bit):4.4166480132445125
                                            Encrypted:false
                                            SSDEEP:6144:fcifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuN95+5:Ei58oSWIZBk2MM6AFBDo5
                                            MD5:0E19D08FE18D8BD9DE175F332BD75147
                                            SHA1:A743943723D85AA0D0F2181FA2026053489E95E1
                                            SHA-256:9541293C1501798039581F86A203B769D3739667EABF080E5E54C62CA8CB13BC
                                            SHA-512:611318A3E6CD7C0C02F95154D3095C20AA2F2C72B4DE8B8D5A6978C9F048B2429F3D09E8EB0F5E29C00E6A7034A21B01BD0058087D9BC298A027612867935173
                                            Malicious:false
                                            Reputation:low
                                            Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.3.$............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\rise2406.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):14
                                            Entropy (8bit):3.3248629576173565
                                            Encrypted:false
                                            SSDEEP:3:oJCVNV:o8/V
                                            MD5:2C34338A8C340C46983875A53A889FC3
                                            SHA1:5EF486E22F88756BE456209030D46D3D94C21952
                                            SHA-256:511FF7ADE84BB22C9B35B62A64FC4100A1958E8D20CB795031199748A926E507
                                            SHA-512:61A221F599A577BC988C6CFF3319F214A62F066B5086C7D8841E8B88BC9FB6CC4F93E8E48E25382BB8148C8F26D045AD15A927ACF0742E69E24923A4659FF633
                                            Malicious:false
                                            Reputation:low
                                            Preview:Illkjmuueghu 0
                                            File type:PE32 executable (console) Intel 80386, for MS Windows
                                            Entropy (8bit):7.948024837182058
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:rise2406.exe
                                            File size:1'870'848 bytes
                                            MD5:c6c9f27d335d4e47b5ea12653e806be6
                                            SHA1:e53242d463e2c94383ec646e7e04504b96b4d176
                                            SHA256:514efbae5faa43878c743c3db36f81c25ab5d6da93b879b6e88e7a63b1b19769
                                            SHA512:7e00bdac39c89821b776dda372693d29e0e7188f8ef747037b971461af79545908f8fc8c9bbf7a30f1b0cc4ceea45632e91c1093e784002994808c19bd2a7347
                                            SSDEEP:49152:KWPLwXMkW4itwCBDtixjSzceiLYtV25Mm8eEMMd:tPLPkW4IwcOj6iLYtV+Mw8
                                            TLSH:6C852300F4908073C562167706E4DFB69A7EB9714B725CDB6BA44FBF4F306C09632A6A
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........@.}.@.}.@.}...~.Q.}...x...}...y.V.}..sy.R.}...|.G.}.@.|...}..sx...}..s~.X.}..px.A.}..p..A.}.Rich@.}.................PE..L..
                                            Icon Hash:00928e8e8686b000
                                            Entrypoint:0x409aa5
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows cui
                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x66789839 [Sun Jun 23 21:48:41 2024 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:6
                                            OS Version Minor:0
                                            File Version Major:6
                                            File Version Minor:0
                                            Subsystem Version Major:6
                                            Subsystem Version Minor:0
                                            Import Hash:e4019b337e6aa53400bb9378be49b858
                                            Instruction
                                            call 00007F238CDFCE3Ah
                                            jmp 00007F238CDFC409h
                                            mov ecx, dword ptr [ebp-0Ch]
                                            mov dword ptr fs:[00000000h], ecx
                                            pop ecx
                                            pop edi
                                            pop edi
                                            pop esi
                                            pop ebx
                                            mov esp, ebp
                                            pop ebp
                                            push ecx
                                            ret
                                            mov ecx, dword ptr [ebp-10h]
                                            xor ecx, ebp
                                            call 00007F238CDFC2F5h
                                            jmp 00007F238CDFC572h
                                            push eax
                                            push dword ptr fs:[00000000h]
                                            lea eax, dword ptr [esp+0Ch]
                                            sub esp, dword ptr [esp+0Ch]
                                            push ebx
                                            push esi
                                            push edi
                                            mov dword ptr [eax], ebp
                                            mov ebp, eax
                                            mov eax, dword ptr [005C69C0h]
                                            xor eax, ebp
                                            push eax
                                            push dword ptr [ebp-04h]
                                            mov dword ptr [ebp-04h], FFFFFFFFh
                                            lea eax, dword ptr [ebp-0Ch]
                                            mov dword ptr fs:[00000000h], eax
                                            ret
                                            push eax
                                            push dword ptr fs:[00000000h]
                                            lea eax, dword ptr [esp+0Ch]
                                            sub esp, dword ptr [esp+0Ch]
                                            push ebx
                                            push esi
                                            push edi
                                            mov dword ptr [eax], ebp
                                            mov ebp, eax
                                            mov eax, dword ptr [005C69C0h]
                                            xor eax, ebp
                                            push eax
                                            mov dword ptr [ebp-10h], eax
                                            push dword ptr [ebp-04h]
                                            mov dword ptr [ebp-04h], FFFFFFFFh
                                            lea eax, dword ptr [ebp-0Ch]
                                            mov dword ptr fs:[00000000h], eax
                                            ret
                                            push eax
                                            push dword ptr fs:[00000000h]
                                            lea eax, dword ptr [esp+0Ch]
                                            sub esp, dword ptr [esp+0Ch]
                                            push ebx
                                            push esi
                                            push edi
                                            mov dword ptr [eax], ebp
                                            mov ebp, eax
                                            mov eax, dword ptr [005C69C0h]
                                            xor eax, ebp
                                            push eax
                                            mov dword ptr [ebp-10h], esp
                                            push dword ptr [ebp-04h]
                                            mov dword ptr [ebp-04h], FFFFFFFFh
                                            lea eax, dword ptr [ebp-0Ch]
                                            mov dword ptr fs:[00000000h], eax
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x335940x50.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1ca0000x21f0.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x30a680x1c.rdata
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x30ac00x18.rdata
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x309a80x40.rdata
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x280000x180.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x251c20x25200ad92eac1a3518c94a50c469e832eda52False0.5649134574915825data6.636592053866142IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .BSs0x270000xe1d0x100074293e678f0de25bb463c0dccc7904d8False0.583740234375data6.002868469254389IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x280000xbe860xc000b0aa40c4aa7dfc2011d6ffe63826f1cdFalse0.41448974609375data4.98810951337647IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0x340000x19534c0x1944004d397285c775cfc4554c7ce0ca0071fcFalse0.9968365897495362data7.999224560090972IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .reloc0x1ca0000x21f00x2200f4f8da3f2dfcb44938435d58d7a1d96fFalse0.7734375data6.553528678280142IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            DLLImport
                                            GDI32.dllPolyline, RectVisible
                                            USER32.dllOffsetRect
                                            KERNEL32.dllCreateFileW, HeapSize, SetStdHandle, WaitForSingleObject, CreateThread, VirtualAlloc, FreeConsole, RaiseException, InitOnceBeginInitialize, InitOnceComplete, CloseHandle, GetCurrentThreadId, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, WakeAllConditionVariable, SleepConditionVariableSRW, GetLastError, FreeLibraryWhenCallbackReturns, CreateThreadpoolWork, SubmitThreadpoolWork, CloseThreadpoolWork, GetModuleHandleExW, IsProcessorFeaturePresent, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, QueryPerformanceCounter, EncodePointer, DecodePointer, MultiByteToWideChar, WideCharToMultiByte, LCMapStringEx, GetSystemTimeAsFileTime, GetModuleHandleW, GetProcAddress, GetStringTypeW, GetCPInfo, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetCurrentProcess, TerminateProcess, GetCurrentProcessId, InitializeSListHead, GetProcessHeap, RtlUnwind, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, ExitProcess, GetModuleFileNameW, GetStdHandle, WriteFile, GetCommandLineA, GetCommandLineW, HeapFree, HeapAlloc, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, GetFileSizeEx, SetFilePointerEx, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, WriteConsoleW
                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                            06/26/24-08:59:32.465846TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)50500497015.42.67.8192.168.2.7
                                            06/26/24-08:59:36.929586TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4970150500192.168.2.75.42.67.8
                                            06/26/24-08:57:45.307172TCP2049060ET TROJAN RisePro TCP Heartbeat Packet4970150500192.168.2.75.42.67.8
                                            06/26/24-08:57:45.857539TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)50500497015.42.67.8192.168.2.7
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jun 26, 2024 08:57:45.297755003 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:57:45.304011106 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:57:45.304169893 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:57:45.307172060 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:57:45.311940908 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:57:45.857538939 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:57:45.897598028 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:57:48.976103067 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:57:48.981566906 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:58:20.319787979 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:58:20.324636936 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:58:39.116864920 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:58:39.121699095 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:58:48.507325888 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:58:48.512460947 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:58:51.632371902 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:58:51.637187958 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:58:54.773797989 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:58:54.778863907 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:58:57.898468971 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:58:57.903498888 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:01.023139000 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:01.028254986 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:04.163611889 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:04.168463945 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:07.288690090 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:07.353250980 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:10.429568052 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:10.549530983 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:13.569916964 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:13.576683044 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:16.710654974 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:16.715524912 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:19.851167917 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:19.856040955 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:22.992151022 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:22.997278929 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:26.116830111 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:26.183959007 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:29.242022038 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:29.247180939 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:32.382481098 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:32.433741093 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:32.435168982 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:32.465846062 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:32.465996027 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:32.549282074 CEST49720443192.168.2.734.117.186.192
                                            Jun 26, 2024 08:59:32.549349070 CEST4434972034.117.186.192192.168.2.7
                                            Jun 26, 2024 08:59:32.549700022 CEST49720443192.168.2.734.117.186.192
                                            Jun 26, 2024 08:59:32.553071976 CEST49720443192.168.2.734.117.186.192
                                            Jun 26, 2024 08:59:32.553092957 CEST4434972034.117.186.192192.168.2.7
                                            Jun 26, 2024 08:59:33.008507013 CEST4434972034.117.186.192192.168.2.7
                                            Jun 26, 2024 08:59:33.008841038 CEST49720443192.168.2.734.117.186.192
                                            Jun 26, 2024 08:59:33.016993999 CEST49720443192.168.2.734.117.186.192
                                            Jun 26, 2024 08:59:33.017016888 CEST4434972034.117.186.192192.168.2.7
                                            Jun 26, 2024 08:59:33.017276049 CEST4434972034.117.186.192192.168.2.7
                                            Jun 26, 2024 08:59:33.069917917 CEST49720443192.168.2.734.117.186.192
                                            Jun 26, 2024 08:59:33.075551987 CEST49720443192.168.2.734.117.186.192
                                            Jun 26, 2024 08:59:33.120506048 CEST4434972034.117.186.192192.168.2.7
                                            Jun 26, 2024 08:59:33.204579115 CEST4434972034.117.186.192192.168.2.7
                                            Jun 26, 2024 08:59:33.204700947 CEST4434972034.117.186.192192.168.2.7
                                            Jun 26, 2024 08:59:33.204777002 CEST49720443192.168.2.734.117.186.192
                                            Jun 26, 2024 08:59:33.207257986 CEST49720443192.168.2.734.117.186.192
                                            Jun 26, 2024 08:59:33.207257986 CEST49720443192.168.2.734.117.186.192
                                            Jun 26, 2024 08:59:33.207282066 CEST4434972034.117.186.192192.168.2.7
                                            Jun 26, 2024 08:59:33.207292080 CEST4434972034.117.186.192192.168.2.7
                                            Jun 26, 2024 08:59:33.227814913 CEST49721443192.168.2.7172.67.75.166
                                            Jun 26, 2024 08:59:33.227871895 CEST44349721172.67.75.166192.168.2.7
                                            Jun 26, 2024 08:59:33.227955103 CEST49721443192.168.2.7172.67.75.166
                                            Jun 26, 2024 08:59:33.228293896 CEST49721443192.168.2.7172.67.75.166
                                            Jun 26, 2024 08:59:33.228312016 CEST44349721172.67.75.166192.168.2.7
                                            Jun 26, 2024 08:59:33.689722061 CEST44349721172.67.75.166192.168.2.7
                                            Jun 26, 2024 08:59:33.689811945 CEST49721443192.168.2.7172.67.75.166
                                            Jun 26, 2024 08:59:33.693711042 CEST49721443192.168.2.7172.67.75.166
                                            Jun 26, 2024 08:59:33.693731070 CEST44349721172.67.75.166192.168.2.7
                                            Jun 26, 2024 08:59:33.694144964 CEST44349721172.67.75.166192.168.2.7
                                            Jun 26, 2024 08:59:33.698007107 CEST49721443192.168.2.7172.67.75.166
                                            Jun 26, 2024 08:59:33.744504929 CEST44349721172.67.75.166192.168.2.7
                                            Jun 26, 2024 08:59:33.797836065 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:33.851438999 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:33.897752047 CEST44349721172.67.75.166192.168.2.7
                                            Jun 26, 2024 08:59:33.897984028 CEST44349721172.67.75.166192.168.2.7
                                            Jun 26, 2024 08:59:33.898348093 CEST49721443192.168.2.7172.67.75.166
                                            Jun 26, 2024 08:59:33.900158882 CEST49721443192.168.2.7172.67.75.166
                                            Jun 26, 2024 08:59:33.900192022 CEST44349721172.67.75.166192.168.2.7
                                            Jun 26, 2024 08:59:33.900362015 CEST49721443192.168.2.7172.67.75.166
                                            Jun 26, 2024 08:59:33.900371075 CEST44349721172.67.75.166192.168.2.7
                                            Jun 26, 2024 08:59:33.901794910 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:33.949876070 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:36.929585934 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:36.934513092 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:38.961268902 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:39.007390022 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:46.685332060 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:46.741777897 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:48.365884066 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:48.413897991 CEST4970150500192.168.2.75.42.67.8
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jun 26, 2024 08:59:32.535058022 CEST6312153192.168.2.71.1.1.1
                                            Jun 26, 2024 08:59:32.542617083 CEST53631211.1.1.1192.168.2.7
                                            Jun 26, 2024 08:59:33.210113049 CEST6358153192.168.2.71.1.1.1
                                            Jun 26, 2024 08:59:33.226600885 CEST53635811.1.1.1192.168.2.7
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Jun 26, 2024 08:59:32.535058022 CEST192.168.2.71.1.1.10x1ba0Standard query (0)ipinfo.ioA (IP address)IN (0x0001)false
                                            Jun 26, 2024 08:59:33.210113049 CEST192.168.2.71.1.1.10xb2b6Standard query (0)db-ip.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Jun 26, 2024 08:59:32.542617083 CEST1.1.1.1192.168.2.70x1ba0No error (0)ipinfo.io34.117.186.192A (IP address)IN (0x0001)false
                                            Jun 26, 2024 08:59:33.226600885 CEST1.1.1.1192.168.2.70xb2b6No error (0)db-ip.com172.67.75.166A (IP address)IN (0x0001)false
                                            Jun 26, 2024 08:59:33.226600885 CEST1.1.1.1192.168.2.70xb2b6No error (0)db-ip.com104.26.4.15A (IP address)IN (0x0001)false
                                            Jun 26, 2024 08:59:33.226600885 CEST1.1.1.1192.168.2.70xb2b6No error (0)db-ip.com104.26.5.15A (IP address)IN (0x0001)false
                                            • ipinfo.io
                                            • https:
                                            • db-ip.com
                                            Session IDSource IPSource PortDestination IPDestination Port
                                            0192.168.2.74970034.117.186.192443
                                            TimestampBytes transferredDirectionData
                                            2024-06-26 06:57:37 UTC59OUTGET / HTTP/1.1
                                            Host: ipinfo.io
                                            Connection: Keep-Alive
                                            2024-06-26 06:57:37 UTC513INHTTP/1.1 200 OK
                                            server: nginx/1.24.0
                                            date: Wed, 26 Jun 2024 06:57:37 GMT
                                            content-type: application/json; charset=utf-8
                                            Content-Length: 319
                                            access-control-allow-origin: *
                                            x-frame-options: SAMEORIGIN
                                            x-xss-protection: 1; mode=block
                                            x-content-type-options: nosniff
                                            referrer-policy: strict-origin-when-cross-origin
                                            x-envoy-upstream-service-time: 2
                                            via: 1.1 google
                                            strict-transport-security: max-age=2592000; includeSubDomains
                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                            Connection: close
                                            2024-06-26 06:57:37 UTC319INData Raw: 7b 0a 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 0a 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 22 6f 72 67 22 3a 20 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20 33 20 50 61 72 65 6e 74 2c 20 4c 4c 43 22 2c 0a 20 20 22 70 6f 73 74 61 6c 22 3a 20 22 31 30 30 30 31 22 2c 0a 20 20 22 74 69 6d 65 7a 6f 6e 65 22 3a 20 22
                                            Data Ascii: { "ip": "8.46.123.33", "hostname": "static-cpe-8-46-123-33.centurylink.com", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS3356 Level 3 Parent, LLC", "postal": "10001", "timezone": "


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.74972034.117.186.1924432516C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            TimestampBytes transferredDirectionData
                                            2024-06-26 06:59:33 UTC236OUTGET /widget/demo/8.46.123.33 HTTP/1.1
                                            Connection: Keep-Alive
                                            Referer: https://ipinfo.io/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                            Host: ipinfo.io
                                            2024-06-26 06:59:33 UTC514INHTTP/1.1 200 OK
                                            server: nginx/1.24.0
                                            date: Wed, 26 Jun 2024 06:59:33 GMT
                                            content-type: application/json; charset=utf-8
                                            Content-Length: 1025
                                            access-control-allow-origin: *
                                            x-frame-options: SAMEORIGIN
                                            x-xss-protection: 1; mode=block
                                            x-content-type-options: nosniff
                                            referrer-policy: strict-origin-when-cross-origin
                                            x-envoy-upstream-service-time: 3
                                            via: 1.1 google
                                            strict-transport-security: max-age=2592000; includeSubDomains
                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                            Connection: close
                                            2024-06-26 06:59:33 UTC876INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20
                                            Data Ascii: { "input": "8.46.123.33", "data": { "ip": "8.46.123.33", "hostname": "static-cpe-8-46-123-33.centurylink.com", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS3356 Level
                                            2024-06-26 06:59:33 UTC149INData Raw: 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 61 75 70 2e 6c 75 6d 65 6e 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 43 65 6e 74 75 72 79 6c 69 6e 6b 20 41 62 75 73 65 20 44 65 73 6b 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 30 2f 32 34 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 2b 31 2d 38 37 37 2d 38 38 36 2d 36 35 31 35 22 0a 20 20 20 20 7d 0a 20 20 7d 0a 7d
                                            Data Ascii: email": "abuse@aup.lumen.com", "name": "Centurylink Abuse Desk", "network": "8.46.123.0/24", "phone": "+1-877-886-6515" } }}


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            2192.168.2.749721172.67.75.1664432516C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            TimestampBytes transferredDirectionData
                                            2024-06-26 06:59:33 UTC260OUTGET /demo/home.php?s=8.46.123.33 HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                            Host: db-ip.com
                                            2024-06-26 06:59:33 UTC665INHTTP/1.1 200 OK
                                            Date: Wed, 26 Jun 2024 06:59:33 GMT
                                            Content-Type: application/json
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            x-iplb-request-id: AC466F7F:9CA2_93878F2E:0050_667BBC55_15DB0975:4F34
                                            x-iplb-instance: 59215
                                            CF-Cache-Status: DYNAMIC
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dxI4ToxjZw9q7QF94cxCc0W%2Flhon%2FcwjswI43%2F%2FN%2FRRSnUORQOEnriRS2ngRG1aa1GoK90MxS4hSo%2FfQCvUW7StzpCfuug%2F9ELHmTdOyAJ0zUo9FX0MAt%2FE2CA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 899b50b8199e1839-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-06-26 06:59:33 UTC673INData Raw: 32 39 61 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 69 70 41 64 64 72 65 73 73 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 22 63 6f 6e 74 69 6e 65 6e 74 43 6f 64 65 22 3a 22 4e 41 22 2c 22 63 6f 6e 74 69 6e 65 6e 74 4e 61 6d 65 22 3a 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 22 63 6f 75 6e 74 72 79 4e 61 6d 65 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 69 73 45 75 4d 65 6d 62 65 72 22 3a 66 61 6c 73 65 2c 22 63 75 72 72 65 6e 63 79 43 6f 64 65 22 3a 22 55 53 44 22 2c 22 63 75 72 72 65 6e 63 79 4e 61 6d 65 22 3a 22 44 6f 6c 6c 61 72 22 2c 22 70 68 6f 6e 65 50 72 65 66 69 78 22 3a 22 31 22 2c 22 6c 61 6e 67 75 61 67 65 73 22 3a 5b
                                            Data Ascii: 29a{"status":"ok","demoInfo":{"ipAddress":"8.46.123.33","continentCode":"NA","continentName":"North America","countryCode":"US","countryName":"United States","isEuMember":false,"currencyCode":"USD","currencyName":"Dollar","phonePrefix":"1","languages":[
                                            2024-06-26 06:59:33 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:02:57:42
                                            Start date:26/06/2024
                                            Path:C:\Users\user\Desktop\rise2406.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\rise2406.exe"
                                            Imagebase:0x520000
                                            File size:1'870'848 bytes
                                            MD5 hash:C6C9F27D335D4E47B5EA12653E806BE6
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:2
                                            Start time:02:57:42
                                            Start date:26/06/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff75da10000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:3
                                            Start time:02:57:43
                                            Start date:26/06/2024
                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                            Imagebase:0x260000
                                            File size:65'440 bytes
                                            MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:4
                                            Start time:02:57:43
                                            Start date:26/06/2024
                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                            Imagebase:0x620000
                                            File size:65'440 bytes
                                            MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:false

                                            Target ID:7
                                            Start time:02:57:43
                                            Start date:26/06/2024
                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 140
                                            Imagebase:0x40000
                                            File size:483'680 bytes
                                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:4.3%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:3.4%
                                              Total number of Nodes:2000
                                              Total number of Limit Nodes:47
                                              execution_graph 21328 528843 21329 52884f 21328->21329 21330 528886 21329->21330 21334 532944 21329->21334 21335 532957 _Fputc 21334->21335 21344 53287b 21335->21344 21337 53296c 21338 52de0b _Fputc 41 API calls 21337->21338 21339 528873 21338->21339 21339->21330 21340 528229 21339->21340 21341 528248 21340->21341 21342 52826a 21341->21342 21378 52ed01 21341->21378 21342->21330 21345 53288d 21344->21345 21347 5328b0 21344->21347 21346 52e052 __strnicoll 41 API calls 21345->21346 21348 5328a8 21346->21348 21347->21345 21349 5328d7 21347->21349 21348->21337 21352 532780 21349->21352 21353 53278c __FrameHandler3::FrameUnwindToState 21352->21353 21360 52ed47 EnterCriticalSection 21353->21360 21355 53279a 21361 5327db 21355->21361 21357 5327a7 21370 5327cf 21357->21370 21360->21355 21362 531b3e ___scrt_uninitialize_crt 66 API calls 21361->21362 21363 5327f6 21362->21363 21373 5373fd 21363->21373 21366 536b6b __Getctype 14 API calls 21367 53283f 21366->21367 21368 53663b ___free_lconv_mon 14 API calls 21367->21368 21369 53281b 21368->21369 21369->21357 21377 52ed5b LeaveCriticalSection 21370->21377 21372 5327b8 21372->21337 21374 537414 21373->21374 21375 532800 21373->21375 21374->21375 21376 53663b ___free_lconv_mon 14 API calls 21374->21376 21375->21366 21375->21369 21376->21375 21377->21372 21379 52ed0d 21378->21379 21382 52ed22 21378->21382 21380 532b87 __dosmaperr 14 API calls 21379->21380 21381 52ed12 21380->21381 21383 52e0cf __strnicoll 41 API calls 21381->21383 21382->21342 21384 52ed1d 21383->21384 21384->21342 21851 5288da 21852 5288e6 __EH_prolog3_GS 21851->21852 21855 528933 21852->21855 21856 52894c 21852->21856 21859 5288fd 21852->21859 21853 529ac3 std::_Throw_Cpp_error 5 API calls 21854 528a67 21853->21854 21867 527c4e 21855->21867 21870 531ca6 21856->21870 21859->21853 21861 522e80 std::_Throw_Cpp_error 41 API calls 21861->21859 21862 528a0b 21862->21861 21864 52896b 21864->21862 21865 528a24 21864->21865 21866 531ca6 43 API calls 21864->21866 21890 525f60 21864->21890 21865->21862 21901 532a77 21865->21901 21866->21864 21868 531ca6 43 API calls 21867->21868 21869 527c59 21868->21869 21869->21859 21871 531cb2 __FrameHandler3::FrameUnwindToState 21870->21871 21872 531cd4 21871->21872 21873 531cbc 21871->21873 21914 52ed47 EnterCriticalSection 21872->21914 21875 532b87 __dosmaperr 14 API calls 21873->21875 21876 531cc1 21875->21876 21878 52e0cf __strnicoll 41 API calls 21876->21878 21877 531cde 21879 531d7a 21877->21879 21880 538464 __fread_nolock 41 API calls 21877->21880 21889 531ccc _Fputc 21878->21889 21915 531c6a 21879->21915 21885 531cfb 21880->21885 21882 531d80 21922 531daa 21882->21922 21884 531d52 21886 532b87 __dosmaperr 14 API calls 21884->21886 21885->21879 21885->21884 21887 531d57 21886->21887 21888 52e0cf __strnicoll 41 API calls 21887->21888 21888->21889 21889->21864 21891 525f72 21890->21891 21892 525f94 21890->21892 21891->21864 21893 525fa6 21892->21893 21894 52606f 21892->21894 21897 521900 std::_Throw_Cpp_error 113 API calls 21893->21897 21895 5255c0 std::_Throw_Cpp_error 113 API calls 21894->21895 21896 525fde _Yarn 21895->21896 21898 52e0df std::_Throw_Cpp_error 41 API calls 21896->21898 21900 52602f _Yarn messages 21896->21900 21897->21896 21899 526079 21898->21899 21900->21864 21902 532a83 __FrameHandler3::FrameUnwindToState 21901->21902 21903 532a8a 21902->21903 21904 532a9f 21902->21904 21905 532b87 __dosmaperr 14 API calls 21903->21905 21926 52ed47 EnterCriticalSection 21904->21926 21907 532a8f 21905->21907 21909 52e0cf __strnicoll 41 API calls 21907->21909 21908 532aa9 21927 53297e 21908->21927 21912 532a9a 21909->21912 21912->21865 21914->21877 21916 531c76 21915->21916 21917 531c8b __fread_nolock 21915->21917 21918 532b87 __dosmaperr 14 API calls 21916->21918 21917->21882 21919 531c7b 21918->21919 21920 52e0cf __strnicoll 41 API calls 21919->21920 21921 531c86 21920->21921 21921->21882 21925 52ed5b LeaveCriticalSection 21922->21925 21924 531db0 21924->21889 21925->21924 21926->21908 21928 532996 21927->21928 21935 532a06 21927->21935 21929 538464 __fread_nolock 41 API calls 21928->21929 21932 53299c 21929->21932 21930 5329fe 21938 532ae2 21930->21938 21931 53b898 14 API calls 21931->21930 21933 5329ee 21932->21933 21932->21935 21934 532b87 __dosmaperr 14 API calls 21933->21934 21936 5329f3 21934->21936 21935->21930 21935->21931 21937 52e0cf __strnicoll 41 API calls 21936->21937 21937->21930 21941 52ed5b LeaveCriticalSection 21938->21941 21940 532ae8 21940->21912 21941->21940 24038 53dac7 24039 53dae0 24038->24039 24040 53dafe 24038->24040 24039->24040 24041 5374f3 2 API calls 24039->24041 24041->24039 22146 53a4f4 22147 53a501 22146->22147 22151 53a519 22146->22151 22148 532b87 __dosmaperr 14 API calls 22147->22148 22149 53a506 22148->22149 22150 52e0cf __strnicoll 41 API calls 22149->22150 22153 53a511 22150->22153 22152 53a578 22151->22152 22151->22153 22154 53b898 14 API calls 22151->22154 22155 538464 __fread_nolock 41 API calls 22152->22155 22154->22152 22156 53a591 22155->22156 22166 53b180 22156->22166 22159 538464 __fread_nolock 41 API calls 22160 53a5ca 22159->22160 22160->22153 22161 538464 __fread_nolock 41 API calls 22160->22161 22162 53a5d8 22161->22162 22162->22153 22163 538464 __fread_nolock 41 API calls 22162->22163 22164 53a5e6 22163->22164 22165 538464 __fread_nolock 41 API calls 22164->22165 22165->22153 22167 53b18c __FrameHandler3::FrameUnwindToState 22166->22167 22168 53b194 22167->22168 22171 53b1ac 22167->22171 22170 532b74 __dosmaperr 14 API calls 22168->22170 22169 53b269 22172 532b74 __dosmaperr 14 API calls 22169->22172 22173 53b199 22170->22173 22171->22169 22174 53b1e2 22171->22174 22175 53b26e 22172->22175 22176 532b87 __dosmaperr 14 API calls 22173->22176 22177 53b200 22174->22177 22178 53b1eb 22174->22178 22179 532b87 __dosmaperr 14 API calls 22175->22179 22195 53a599 22176->22195 22196 53de13 EnterCriticalSection 22177->22196 22180 532b74 __dosmaperr 14 API calls 22178->22180 22182 53b1f8 22179->22182 22183 53b1f0 22180->22183 22188 52e0cf __strnicoll 41 API calls 22182->22188 22185 532b87 __dosmaperr 14 API calls 22183->22185 22184 53b206 22186 53b222 22184->22186 22187 53b237 22184->22187 22185->22182 22190 532b87 __dosmaperr 14 API calls 22186->22190 22197 53b294 22187->22197 22188->22195 22192 53b227 22190->22192 22191 53b232 22260 53b261 22191->22260 22193 532b74 __dosmaperr 14 API calls 22192->22193 22193->22191 22195->22153 22195->22159 22196->22184 22198 53b2a6 22197->22198 22199 53b2be 22197->22199 22200 532b74 __dosmaperr 14 API calls 22198->22200 22201 53b614 22199->22201 22209 53b304 22199->22209 22202 53b2ab 22200->22202 22203 532b74 __dosmaperr 14 API calls 22201->22203 22204 532b87 __dosmaperr 14 API calls 22202->22204 22205 53b619 22203->22205 22206 53b2b3 22204->22206 22207 532b87 __dosmaperr 14 API calls 22205->22207 22206->22191 22210 53b31c 22207->22210 22208 53b30f 22211 532b74 __dosmaperr 14 API calls 22208->22211 22209->22206 22209->22208 22213 53b33f 22209->22213 22214 52e0cf __strnicoll 41 API calls 22210->22214 22212 53b314 22211->22212 22215 532b87 __dosmaperr 14 API calls 22212->22215 22216 53b358 22213->22216 22217 53b3a3 22213->22217 22218 53b372 22213->22218 22214->22206 22215->22210 22216->22218 22223 53b35d 22216->22223 22220 53762f std::_Locinfo::_Locinfo_ctor 15 API calls 22217->22220 22219 532b74 __dosmaperr 14 API calls 22218->22219 22221 53b377 22219->22221 22222 53b3b4 22220->22222 22224 532b87 __dosmaperr 14 API calls 22221->22224 22226 53663b ___free_lconv_mon 14 API calls 22222->22226 22225 54215c __fread_nolock 41 API calls 22223->22225 22227 53b37e 22224->22227 22228 53b4f0 22225->22228 22229 53b3bd 22226->22229 22230 52e0cf __strnicoll 41 API calls 22227->22230 22231 53b564 22228->22231 22232 53b509 GetConsoleMode 22228->22232 22233 53663b ___free_lconv_mon 14 API calls 22229->22233 22259 53b389 __fread_nolock 22230->22259 22234 53b568 ReadFile 22231->22234 22232->22231 22235 53b51a 22232->22235 22236 53b3c4 22233->22236 22237 53b580 22234->22237 22238 53b5dc GetLastError 22234->22238 22235->22234 22239 53b520 ReadConsoleW 22235->22239 22240 53b3e9 22236->22240 22241 53b3ce 22236->22241 22237->22238 22244 53b559 22237->22244 22242 53b540 22238->22242 22243 53b5e9 22238->22243 22239->22244 22245 53b53a GetLastError 22239->22245 22263 53b83a 22240->22263 22247 532b87 __dosmaperr 14 API calls 22241->22247 22242->22259 22269 532b2d 22242->22269 22249 532b87 __dosmaperr 14 API calls 22243->22249 22254 53b5a5 22244->22254 22255 53b5bc 22244->22255 22244->22259 22245->22242 22246 53663b ___free_lconv_mon 14 API calls 22246->22206 22252 53b3d3 22247->22252 22250 53b5ee 22249->22250 22253 532b74 __dosmaperr 14 API calls 22250->22253 22256 532b74 __dosmaperr 14 API calls 22252->22256 22253->22259 22274 53afae 22254->22274 22255->22259 22287 53ae06 22255->22287 22256->22259 22259->22246 22299 53de36 LeaveCriticalSection 22260->22299 22262 53b267 22262->22195 22264 53b84e _Fputc 22263->22264 22265 53b759 __fread_nolock 43 API calls 22264->22265 22266 53b863 22265->22266 22267 52de0b _Fputc 41 API calls 22266->22267 22268 53b872 22267->22268 22268->22223 22270 532b74 __dosmaperr 14 API calls 22269->22270 22271 532b38 __dosmaperr 22270->22271 22272 532b87 __dosmaperr 14 API calls 22271->22272 22273 532b4b 22272->22273 22273->22259 22293 53acba 22274->22293 22276 53c34e __strnicoll MultiByteToWideChar 22278 53b0c2 22276->22278 22281 53b0cb GetLastError 22278->22281 22284 53aff6 22278->22284 22279 53b050 22285 53b00a 22279->22285 22286 53b83a __fread_nolock 43 API calls 22279->22286 22280 53b040 22282 532b87 __dosmaperr 14 API calls 22280->22282 22283 532b2d __dosmaperr 14 API calls 22281->22283 22282->22284 22283->22284 22284->22259 22285->22276 22286->22285 22288 53ae3d 22287->22288 22289 53aecd 22288->22289 22290 53aed2 ReadFile 22288->22290 22289->22259 22290->22289 22291 53aeef 22290->22291 22291->22289 22292 53b83a __fread_nolock 43 API calls 22291->22292 22292->22289 22294 53acee 22293->22294 22295 53ad5d ReadFile 22294->22295 22296 53ad58 22294->22296 22295->22296 22297 53ad76 22295->22297 22296->22279 22296->22280 22296->22284 22296->22285 22297->22296 22298 53b83a __fread_nolock 43 API calls 22297->22298 22298->22296 22299->22262 24156 528aef 24158 528b01 _Yarn 24156->24158 24157 528b07 24158->24157 24159 528bb1 24158->24159 24162 531ff3 24158->24162 24159->24157 24161 531ff3 __fread_nolock 55 API calls 24159->24161 24161->24157 24165 532010 24162->24165 24167 53201c __FrameHandler3::FrameUnwindToState 24165->24167 24166 53200b 24166->24158 24167->24166 24168 532066 24167->24168 24169 53202f __fread_nolock 24167->24169 24178 52ed47 EnterCriticalSection 24168->24178 24172 532b87 __dosmaperr 14 API calls 24169->24172 24171 532070 24179 531e0d 24171->24179 24174 532049 24172->24174 24176 52e0cf __strnicoll 41 API calls 24174->24176 24176->24166 24178->24171 24182 531e1e __fread_nolock 24179->24182 24191 531e3a 24179->24191 24180 531e2a 24181 532b87 __dosmaperr 14 API calls 24180->24181 24190 531e2f 24181->24190 24182->24180 24185 531e7c __fread_nolock 24182->24185 24182->24191 24183 52e0cf __strnicoll 41 API calls 24183->24191 24184 531fa3 __fread_nolock 24188 532b87 __dosmaperr 14 API calls 24184->24188 24185->24184 24186 538464 __fread_nolock 41 API calls 24185->24186 24187 5320ad __fread_nolock 41 API calls 24185->24187 24189 53b294 __fread_nolock 53 API calls 24185->24189 24185->24191 24186->24185 24187->24185 24188->24190 24189->24185 24190->24183 24192 5320a5 24191->24192 24195 52ed5b LeaveCriticalSection 24192->24195 24194 5320ab 24194->24166 24195->24194 22348 52889b 22349 5288d3 22348->22349 22350 5288a4 22348->22350 22350->22349 22353 531c15 22350->22353 22352 5288c6 22354 531c30 ___scrt_uninitialize_crt 22353->22354 22355 531c27 22353->22355 22358 531c41 22354->22358 22361 531a39 22354->22361 22356 531a99 ___scrt_uninitialize_crt 70 API calls 22355->22356 22357 531c2d 22356->22357 22357->22352 22358->22352 22362 531a45 __FrameHandler3::FrameUnwindToState 22361->22362 22369 52ed47 EnterCriticalSection 22362->22369 22364 531a53 22365 531ba7 ___scrt_uninitialize_crt 70 API calls 22364->22365 22366 531a64 22365->22366 22370 531a8d 22366->22370 22369->22364 22373 52ed5b LeaveCriticalSection 22370->22373 22372 531a76 22372->22352 22373->22372 24230 5286b4 24231 5286c8 24230->24231 24237 528723 24231->24237 24238 5280be 24231->24238 24234 528710 24234->24237 24250 531db2 24234->24250 24241 5280d8 24238->24241 24243 528127 24238->24243 24239 52982d CatchGuardHandler 5 API calls 24240 52813e 24239->24240 24240->24234 24240->24237 24244 532444 24240->24244 24242 532746 69 API calls 24241->24242 24241->24243 24242->24243 24243->24239 24245 532457 _Fputc 24244->24245 24264 5321e3 24245->24264 24248 52de0b _Fputc 41 API calls 24249 532479 24248->24249 24249->24234 24251 531dd2 24250->24251 24252 531dbd 24250->24252 24253 531dda 24251->24253 24254 531def 24251->24254 24255 532b87 __dosmaperr 14 API calls 24252->24255 24256 532b87 __dosmaperr 14 API calls 24253->24256 24293 53ac79 24254->24293 24258 531dc2 24255->24258 24260 531ddf 24256->24260 24259 52e0cf __strnicoll 41 API calls 24258->24259 24262 531dcd 24259->24262 24263 52e0cf __strnicoll 41 API calls 24260->24263 24261 531dea 24261->24237 24262->24237 24263->24261 24267 5321ef __FrameHandler3::FrameUnwindToState 24264->24267 24265 5321f5 24268 52e052 __strnicoll 41 API calls 24265->24268 24266 532229 24275 52ed47 EnterCriticalSection 24266->24275 24267->24265 24267->24266 24274 532210 24268->24274 24270 532235 24276 532358 24270->24276 24272 53224c 24285 532275 24272->24285 24274->24248 24275->24270 24277 53236b 24276->24277 24278 53237e 24276->24278 24277->24272 24288 53227f 24278->24288 24280 5323a1 24281 531b3e ___scrt_uninitialize_crt 66 API calls 24280->24281 24284 53242f 24280->24284 24283 5323cf 24281->24283 24282 53b87a ___scrt_uninitialize_crt 43 API calls 24282->24284 24283->24282 24284->24272 24292 52ed5b LeaveCriticalSection 24285->24292 24287 53227d 24287->24274 24289 532290 24288->24289 24290 5322e8 24288->24290 24289->24290 24291 53b83a __fread_nolock 43 API calls 24289->24291 24290->24280 24291->24290 24292->24287 24294 53ac8d _Fputc 24293->24294 24299 53a68e 24294->24299 24297 52de0b _Fputc 41 API calls 24298 53aca7 24297->24298 24298->24261 24300 53a69a __FrameHandler3::FrameUnwindToState 24299->24300 24301 53a6a1 24300->24301 24302 53a6c4 24300->24302 24304 52e052 __strnicoll 41 API calls 24301->24304 24310 52ed47 EnterCriticalSection 24302->24310 24306 53a6ba 24304->24306 24305 53a6d2 24311 53a71d 24305->24311 24306->24297 24308 53a6e1 24324 53a713 24308->24324 24310->24305 24312 53a754 24311->24312 24313 53a72c 24311->24313 24314 538464 __fread_nolock 41 API calls 24312->24314 24315 52e052 __strnicoll 41 API calls 24313->24315 24316 53a75d 24314->24316 24317 53a747 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 24315->24317 24327 53b81c 24316->24327 24317->24308 24320 53a807 24330 53aa7d 24320->24330 24322 53a81e 24322->24317 24342 53a8be 24322->24342 24349 52ed5b LeaveCriticalSection 24324->24349 24326 53a71b 24326->24306 24328 53b633 45 API calls 24327->24328 24329 53a77b 24328->24329 24329->24317 24329->24320 24329->24322 24331 53aa8c ___scrt_uninitialize_crt 24330->24331 24332 538464 __fread_nolock 41 API calls 24331->24332 24334 53aaa8 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 24332->24334 24333 52982d CatchGuardHandler 5 API calls 24335 53ac26 24333->24335 24336 53b81c 45 API calls 24334->24336 24341 53aab4 24334->24341 24335->24317 24337 53ab08 24336->24337 24338 53ab3a ReadFile 24337->24338 24337->24341 24339 53ab61 24338->24339 24338->24341 24340 53b81c 45 API calls 24339->24340 24340->24341 24341->24333 24343 538464 __fread_nolock 41 API calls 24342->24343 24344 53a8d1 24343->24344 24345 53b81c 45 API calls 24344->24345 24348 53a919 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 24344->24348 24346 53a96c 24345->24346 24347 53b81c 45 API calls 24346->24347 24346->24348 24347->24348 24348->24317 24349->24326 22458 52ecb5 22459 531c0c ___scrt_uninitialize_crt 70 API calls 22458->22459 22460 52ecbd 22459->22460 22468 537352 22460->22468 22462 52ecc2 22463 5373fd 14 API calls 22462->22463 22464 52ecd1 DeleteCriticalSection 22463->22464 22464->22462 22465 52ecec 22464->22465 22466 53663b ___free_lconv_mon 14 API calls 22465->22466 22467 52ecf7 22466->22467 22469 53735e __FrameHandler3::FrameUnwindToState 22468->22469 22478 530cb9 EnterCriticalSection 22469->22478 22471 537369 22472 5373d5 22471->22472 22474 5373a9 DeleteCriticalSection 22471->22474 22479 5318d1 22471->22479 22485 5373f4 22472->22485 22477 53663b ___free_lconv_mon 14 API calls 22474->22477 22477->22471 22478->22471 22480 5318e4 _Fputc 22479->22480 22488 5317ac 22480->22488 22482 5318f0 22483 52de0b _Fputc 41 API calls 22482->22483 22484 5318fc 22483->22484 22484->22471 22560 530d01 LeaveCriticalSection 22485->22560 22487 5373e1 22487->22462 22489 5317b8 __FrameHandler3::FrameUnwindToState 22488->22489 22490 5317c2 22489->22490 22491 5317e5 22489->22491 22492 52e052 __strnicoll 41 API calls 22490->22492 22498 5317dd 22491->22498 22499 52ed47 EnterCriticalSection 22491->22499 22492->22498 22494 531803 22500 531843 22494->22500 22496 531810 22514 53183b 22496->22514 22498->22482 22499->22494 22501 531873 22500->22501 22502 531850 22500->22502 22504 53186b 22501->22504 22505 531b3e ___scrt_uninitialize_crt 66 API calls 22501->22505 22503 52e052 __strnicoll 41 API calls 22502->22503 22503->22504 22504->22496 22506 53188b 22505->22506 22507 5373fd 14 API calls 22506->22507 22508 531893 22507->22508 22509 538464 __fread_nolock 41 API calls 22508->22509 22510 53189f 22509->22510 22517 5397a1 22510->22517 22513 53663b ___free_lconv_mon 14 API calls 22513->22504 22559 52ed5b LeaveCriticalSection 22514->22559 22516 531841 22516->22498 22518 5397ca 22517->22518 22523 5318a6 22517->22523 22519 539819 22518->22519 22521 5397f1 22518->22521 22520 52e052 __strnicoll 41 API calls 22519->22520 22520->22523 22524 539710 22521->22524 22523->22504 22523->22513 22525 53971c __FrameHandler3::FrameUnwindToState 22524->22525 22532 53de13 EnterCriticalSection 22525->22532 22527 53972a 22528 53975b 22527->22528 22533 539844 22527->22533 22546 539795 22528->22546 22532->22527 22534 53deea __fread_nolock 41 API calls 22533->22534 22537 539854 22534->22537 22535 53985a 22549 53de59 22535->22549 22537->22535 22538 53988c 22537->22538 22540 53deea __fread_nolock 41 API calls 22537->22540 22538->22535 22539 53deea __fread_nolock 41 API calls 22538->22539 22542 539898 CloseHandle 22539->22542 22541 539883 22540->22541 22543 53deea __fread_nolock 41 API calls 22541->22543 22542->22535 22544 5398a4 GetLastError 22542->22544 22543->22538 22544->22535 22545 5398b2 __fread_nolock 22545->22528 22558 53de36 LeaveCriticalSection 22546->22558 22548 53977e 22548->22523 22550 53de68 22549->22550 22551 53decf 22549->22551 22550->22551 22557 53de92 22550->22557 22552 532b87 __dosmaperr 14 API calls 22551->22552 22553 53ded4 22552->22553 22554 532b74 __dosmaperr 14 API calls 22553->22554 22555 53debf 22554->22555 22555->22545 22556 53deb9 SetStdHandle 22556->22555 22557->22555 22557->22556 22558->22548 22559->22516 22560->22487 24548 52837b 24549 528382 24548->24549 24550 5283ce 24548->24550 24553 52ed47 EnterCriticalSection 24549->24553 24552 528387 24553->24552 20938 524d60 20939 524d68 20938->20939 20940 5261d0 43 API calls 20939->20940 20941 524d8a 20940->20941 20944 5245a0 20941->20944 20942 524d9c 20945 5245b0 Concurrency::cancel_current_task 20944->20945 20946 5245ab 20944->20946 20945->20942 20947 52a530 CallUnexpected RaiseException 20945->20947 20950 547ab0 20946->20950 20948 5264df 20947->20948 20951 547bc0 20950->20951 20961 547ada messages 20950->20961 20952 547beb messages 20951->20952 20954 547c09 20951->20954 20953 52982d CatchGuardHandler 5 API calls 20952->20953 20955 547c03 20953->20955 20956 52e0df std::_Throw_Cpp_error 41 API calls 20954->20956 20955->20945 20957 547c0e CreateThread WaitForSingleObject 20956->20957 20957->20945 20996 547c30 20957->20996 20958 521660 111 API calls 20958->20961 20959 522010 111 API calls 20959->20961 20961->20951 20961->20954 20961->20958 20961->20959 20962 52eb9e 20961->20962 20963 52ebb1 _Fputc 20962->20963 20968 52e1c0 20963->20968 20965 52ebcb 20966 52de0b _Fputc 41 API calls 20965->20966 20967 52ebd8 20966->20967 20967->20961 20969 52eacb std::_Locinfo::_Locinfo_ctor 41 API calls 20968->20969 20971 52e1d2 20969->20971 20970 52e21a 20974 52ea70 std::_Locinfo::_Locinfo_ctor 41 API calls 20970->20974 20976 52e23e 20970->20976 20971->20970 20972 52e1e7 20971->20972 20981 52e202 std::_Locinfo::_Locinfo_ctor 20971->20981 20973 52e052 __strnicoll 41 API calls 20972->20973 20973->20981 20974->20976 20978 52e262 20976->20978 20982 52eb08 20976->20982 20977 52e2ea 20979 52ea11 41 API calls 20977->20979 20978->20977 20980 52ea11 41 API calls 20978->20980 20979->20981 20980->20977 20981->20965 20983 52eb14 20982->20983 20984 52eb2a 20982->20984 20985 531160 __Getctype 41 API calls 20983->20985 20986 52eb3a 20984->20986 20989 5369e4 20984->20989 20987 52eb1f std::_Locinfo::_Locinfo_ctor 20985->20987 20986->20976 20987->20976 20990 532b9a __strnicoll 41 API calls 20989->20990 20991 536a01 20990->20991 20992 53936c std::_Locinfo::_Locinfo_ctor 44 API calls 20991->20992 20993 536a11 20991->20993 20992->20993 20994 52982d CatchGuardHandler 5 API calls 20993->20994 20995 536aad 20994->20995 20995->20986 20997 521900 std::_Throw_Cpp_error 112 API calls 20996->20997 20998 547c5e 20997->20998 20999 5294e4 codecvt 16 API calls 20998->20999 21000 547c9a 20999->21000 21001 547cb2 VirtualAlloc 21000->21001 21012 5478a0 21001->21012 21003 547cd0 _Yarn 21033 5475d0 21003->21033 21005 547d2b messages 21007 52982d CatchGuardHandler 5 API calls 21005->21007 21009 547d42 21007->21009 21008 547d46 21010 52e0df std::_Throw_Cpp_error 41 API calls 21008->21010 21011 547d4b 21010->21011 21013 5294e4 codecvt 16 API calls 21012->21013 21014 5478bf messages 21013->21014 21016 547aa3 21014->21016 21017 547983 21014->21017 21051 521d60 21014->21051 21018 52e0df std::_Throw_Cpp_error 41 API calls 21016->21018 21019 5479ec _Yarn 21017->21019 21022 547a99 21017->21022 21023 547a06 21017->21023 21024 5479db 21017->21024 21020 547aa8 21018->21020 21019->21016 21021 547ab0 113 API calls 21019->21021 21029 547a4e messages 21021->21029 21026 525360 std::_Throw_Cpp_error 113 API calls 21022->21026 21023->21019 21028 5294e4 codecvt 16 API calls 21023->21028 21024->21022 21025 5479e6 21024->21025 21027 5294e4 codecvt 16 API calls 21025->21027 21026->21016 21027->21019 21028->21019 21029->21016 21030 547a7c messages 21029->21030 21031 52982d CatchGuardHandler 5 API calls 21030->21031 21032 547a95 21031->21032 21032->21003 21034 5294e4 codecvt 16 API calls 21033->21034 21037 547609 21034->21037 21035 521660 111 API calls 21035->21037 21036 522010 111 API calls 21036->21037 21037->21035 21037->21036 21039 547679 21037->21039 21038 521660 111 API calls 21038->21039 21039->21038 21040 522010 111 API calls 21039->21040 21041 5476d0 messages 21039->21041 21040->21039 21042 54770e OffsetRect Polyline 21041->21042 21044 547852 messages 21041->21044 21048 54788c 21041->21048 21114 521ba0 21041->21114 21101 5219f0 21042->21101 21046 52982d CatchGuardHandler 5 API calls 21044->21046 21047 547885 21046->21047 21047->21005 21047->21008 21049 52e0df std::_Throw_Cpp_error 41 API calls 21048->21049 21050 547891 21049->21050 21052 521db0 21051->21052 21056 521dec _Yarn 21051->21056 21058 5218a0 21052->21058 21053 52e0df std::_Throw_Cpp_error 41 API calls 21055 521ec6 21053->21055 21056->21053 21057 521e71 messages 21056->21057 21057->21014 21059 5218ad 21058->21059 21065 5218ed codecvt 21058->21065 21060 5218c4 21059->21060 21061 5218be 21059->21061 21059->21065 21062 5218cd 21060->21062 21064 5294e4 codecvt 16 API calls 21060->21064 21063 5294e4 codecvt 16 API calls 21061->21063 21062->21056 21063->21060 21067 5218e6 21064->21067 21066 52a530 CallUnexpected RaiseException 21065->21066 21068 52537a 21066->21068 21067->21056 21069 52a530 CallUnexpected RaiseException 21068->21069 21070 52539a 21069->21070 21071 522bc0 42 API calls 21070->21071 21072 5253af 21071->21072 21073 52a530 CallUnexpected RaiseException 21072->21073 21074 5253be 21073->21074 21075 527043 12 API calls 21074->21075 21076 5253d4 21075->21076 21077 5253db 21076->21077 21078 52543c 21076->21078 21080 525443 21077->21080 21084 5253e5 21077->21084 21079 5273c0 std::_Throw_Cpp_error 113 API calls 21078->21079 21081 5273c0 std::_Throw_Cpp_error 113 API calls 21080->21081 21083 52544e 21081->21083 21082 525423 21085 525433 21082->21085 21089 527054 ReleaseSRWLockExclusive 21082->21089 21086 524ad0 21083->21086 21087 52545e 21083->21087 21084->21082 21088 5271ef 43 API calls 21084->21088 21085->21056 21090 522c40 42 API calls 21086->21090 21091 525515 21087->21091 21093 525470 113 API calls 21087->21093 21088->21084 21089->21085 21092 524ae0 21090->21092 21095 525470 113 API calls 21091->21095 21098 52553c 21091->21098 21094 52a530 CallUnexpected RaiseException 21092->21094 21093->21091 21096 524aef 21094->21096 21095->21098 21097 525544 21097->21056 21098->21097 21099 524d60 113 API calls 21098->21099 21100 5255af 21099->21100 21102 521b84 21101->21102 21103 521a3c 21101->21103 21107 525360 std::_Throw_Cpp_error 113 API calls 21102->21107 21104 521a56 21103->21104 21105 521aa4 21103->21105 21106 521a94 21103->21106 21108 5294e4 codecvt 16 API calls 21104->21108 21109 5294e4 codecvt 16 API calls 21105->21109 21110 521a69 _Yarn 21105->21110 21106->21102 21106->21104 21107->21110 21108->21110 21109->21110 21111 52e0df std::_Throw_Cpp_error 41 API calls 21110->21111 21113 521b38 messages 21110->21113 21112 521b93 21111->21112 21113->21041 21115 521bf2 21114->21115 21121 521c4d _Yarn 21114->21121 21116 521d34 21115->21116 21119 521c69 21115->21119 21120 521c3c 21115->21120 21117 525360 std::_Throw_Cpp_error 113 API calls 21116->21117 21117->21121 21118 52e0df std::_Throw_Cpp_error 41 API calls 21122 521d43 21118->21122 21119->21121 21124 5294e4 codecvt 16 API calls 21119->21124 21120->21116 21123 521c47 21120->21123 21121->21118 21130 521cff messages 21121->21130 21131 525830 21122->21131 21126 5294e4 codecvt 16 API calls 21123->21126 21124->21121 21126->21121 21127 521d51 21128 52a530 CallUnexpected RaiseException 21127->21128 21129 521d5a 21128->21129 21130->21041 21132 525847 21131->21132 21133 525857 messages 21131->21133 21132->21133 21134 52e0df std::_Throw_Cpp_error 41 API calls 21132->21134 21133->21127 21135 52586b 21134->21135 21135->21127 21136 52e130 21137 53663b ___free_lconv_mon 14 API calls 21136->21137 21138 52e148 21137->21138 18768 528522 18769 52853e 18768->18769 18772 528545 18768->18772 18786 52982d 18769->18786 18771 528628 18772->18769 18774 5285eb 18772->18774 18775 52858e 18772->18775 18774->18769 18780 532746 18774->18780 18775->18769 18777 527c6e 18775->18777 18793 530e94 18777->18793 18781 532759 _Fputc 18780->18781 19178 532525 18781->19178 18783 53276e 18784 52de0b _Fputc 41 API calls 18783->18784 18785 53277b 18784->18785 18785->18769 18787 529836 IsProcessorFeaturePresent 18786->18787 18788 529835 18786->18788 18790 52a142 18787->18790 18788->18771 19387 52a105 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 18790->19387 18792 52a225 18792->18771 18794 530ea7 _Fputc 18793->18794 18799 530d3a 18794->18799 18796 530eb6 18813 52de0b 18796->18813 18800 530d46 __FrameHandler3::FrameUnwindToState 18799->18800 18801 530d73 18800->18801 18802 530d4f 18800->18802 18819 52ed47 EnterCriticalSection 18801->18819 18820 52e052 18802->18820 18805 530d7c 18806 530e27 _Fputc 18805->18806 18831 538464 18805->18831 18838 530e5f 18806->18838 18809 530df6 18811 52e052 __strnicoll 41 API calls 18809->18811 18810 530d95 18810->18806 18810->18809 18812 530d68 _Fputc 18811->18812 18812->18796 18814 52de17 18813->18814 18816 52de2e 18814->18816 19027 52deb6 18814->19027 18817 527c7e 18816->18817 18818 52deb6 _Fputc 41 API calls 18816->18818 18817->18769 18818->18817 18819->18805 18821 52e062 18820->18821 18822 52e069 18820->18822 18841 52de70 GetLastError 18821->18841 18827 52e077 18822->18827 18845 52de47 18822->18845 18825 52e09e 18825->18827 18848 52e0fc IsProcessorFeaturePresent 18825->18848 18827->18812 18828 52e0ce 18852 52e01b 18828->18852 18832 538470 18831->18832 18833 538485 18831->18833 18834 532b87 __dosmaperr 14 API calls 18832->18834 18833->18810 18835 538475 18834->18835 19023 52e0cf 18835->19023 19026 52ed5b LeaveCriticalSection 18838->19026 18840 530e65 18840->18812 18842 52de89 18841->18842 18858 536552 18842->18858 18846 52de52 GetLastError SetLastError 18845->18846 18847 52de6b 18845->18847 18846->18825 18847->18825 18849 52e108 18848->18849 19017 52ded3 18849->19017 18853 52e02d _Fputc 18852->18853 18854 52e052 __strnicoll 41 API calls 18853->18854 18855 52e045 18854->18855 18856 52de0b _Fputc 41 API calls 18855->18856 18857 52e050 18856->18857 18857->18812 18859 536565 18858->18859 18860 53656b 18858->18860 18880 53707a 18859->18880 18878 52dea1 SetLastError 18860->18878 18885 5370b9 18860->18885 18865 536595 18866 5365b2 18865->18866 18867 53659d 18865->18867 18869 5370b9 __Getctype 6 API calls 18866->18869 18868 5370b9 __Getctype 6 API calls 18867->18868 18870 5365a9 18868->18870 18871 5365be 18869->18871 18897 53663b 18870->18897 18872 5365c2 18871->18872 18873 5365d1 18871->18873 18875 5370b9 __Getctype 6 API calls 18872->18875 18903 53617e 18873->18903 18875->18870 18878->18822 18879 53663b ___free_lconv_mon 14 API calls 18879->18878 18908 536e69 18880->18908 18882 537096 18883 5370b1 TlsGetValue 18882->18883 18884 53709f 18882->18884 18884->18860 18886 536e69 std::_Lockit::_Lockit 5 API calls 18885->18886 18887 5370d5 18886->18887 18888 5370f3 TlsSetValue 18887->18888 18889 536585 18887->18889 18889->18878 18890 536b6b 18889->18890 18895 536b78 __Getctype 18890->18895 18891 536bb8 18925 532b87 18891->18925 18892 536ba3 HeapAlloc 18894 536bb6 18892->18894 18892->18895 18894->18865 18895->18891 18895->18892 18922 53365b 18895->18922 18898 536670 18897->18898 18899 536646 RtlFreeHeap 18897->18899 18898->18878 18899->18898 18900 53665b GetLastError 18899->18900 18901 536668 __dosmaperr 18900->18901 18902 532b87 __dosmaperr 12 API calls 18901->18902 18902->18898 18961 536012 18903->18961 18909 536e97 18908->18909 18913 536e93 std::_Lockit::_Lockit 18908->18913 18909->18913 18914 536d9e 18909->18914 18912 536eb1 GetProcAddress 18912->18913 18913->18882 18920 536daf ___vcrt_FlsGetValue 18914->18920 18915 536e45 18915->18912 18915->18913 18916 536dcd LoadLibraryExW 18917 536de8 GetLastError 18916->18917 18918 536e4c 18916->18918 18917->18920 18918->18915 18919 536e5e FreeLibrary 18918->18919 18919->18915 18920->18915 18920->18916 18921 536e1b LoadLibraryExW 18920->18921 18921->18918 18921->18920 18928 533688 18922->18928 18938 5364a1 GetLastError 18925->18938 18927 532b8c 18927->18894 18929 533694 __FrameHandler3::FrameUnwindToState 18928->18929 18934 530cb9 EnterCriticalSection 18929->18934 18931 53369f 18935 5336db 18931->18935 18934->18931 18936 530d01 std::_Lockit::~_Lockit LeaveCriticalSection 18935->18936 18937 533666 18936->18937 18937->18895 18939 5364bd 18938->18939 18940 5364b7 18938->18940 18942 5370b9 __Getctype 6 API calls 18939->18942 18944 5364c1 SetLastError 18939->18944 18941 53707a __Getctype 6 API calls 18940->18941 18941->18939 18943 5364d9 18942->18943 18943->18944 18946 536b6b __Getctype 12 API calls 18943->18946 18944->18927 18947 5364ee 18946->18947 18948 536507 18947->18948 18949 5364f6 18947->18949 18951 5370b9 __Getctype 6 API calls 18948->18951 18950 5370b9 __Getctype 6 API calls 18949->18950 18958 536504 18950->18958 18952 536513 18951->18952 18953 536517 18952->18953 18954 53652e 18952->18954 18955 5370b9 __Getctype 6 API calls 18953->18955 18957 53617e __Getctype 12 API calls 18954->18957 18955->18958 18956 53663b ___free_lconv_mon 12 API calls 18956->18944 18959 536539 18957->18959 18958->18956 18960 53663b ___free_lconv_mon 12 API calls 18959->18960 18960->18944 18962 53601e __FrameHandler3::FrameUnwindToState 18961->18962 18975 530cb9 EnterCriticalSection 18962->18975 18964 536028 18976 536058 18964->18976 18967 536124 18968 536130 __FrameHandler3::FrameUnwindToState 18967->18968 18980 530cb9 EnterCriticalSection 18968->18980 18970 53613a 18981 536305 18970->18981 18972 536152 18985 536172 18972->18985 18975->18964 18979 530d01 LeaveCriticalSection 18976->18979 18978 536046 18978->18967 18979->18978 18980->18970 18982 53633b __Getctype 18981->18982 18983 536314 __Getctype 18981->18983 18982->18972 18983->18982 18988 53ecb6 18983->18988 19016 530d01 LeaveCriticalSection 18985->19016 18987 536160 18987->18879 18989 53ed36 18988->18989 18992 53eccc 18988->18992 18991 53663b ___free_lconv_mon 14 API calls 18989->18991 19014 53ed84 18989->19014 18990 53ee27 __Getctype 14 API calls 18998 53ed92 18990->18998 18993 53ed58 18991->18993 18992->18989 18996 53ecff 18992->18996 18999 53663b ___free_lconv_mon 14 API calls 18992->18999 18994 53663b ___free_lconv_mon 14 API calls 18993->18994 18995 53ed6b 18994->18995 19001 53663b ___free_lconv_mon 14 API calls 18995->19001 19002 53663b ___free_lconv_mon 14 API calls 18996->19002 19015 53ed21 18996->19015 18997 53663b ___free_lconv_mon 14 API calls 19003 53ed2b 18997->19003 19004 53edf2 18998->19004 19005 53663b 14 API calls ___free_lconv_mon 18998->19005 19000 53ecf4 18999->19000 19006 53df6c ___free_lconv_mon 14 API calls 19000->19006 19007 53ed79 19001->19007 19008 53ed16 19002->19008 19009 53663b ___free_lconv_mon 14 API calls 19003->19009 19010 53663b ___free_lconv_mon 14 API calls 19004->19010 19005->18998 19006->18996 19012 53663b ___free_lconv_mon 14 API calls 19007->19012 19013 53e420 __Getctype 14 API calls 19008->19013 19009->18989 19011 53edf8 19010->19011 19011->18982 19012->19014 19013->19015 19014->18990 19015->18997 19016->18987 19018 52deef __InternalCxxFrameHandler __fread_nolock 19017->19018 19019 52df1b IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 19018->19019 19020 52dfec __InternalCxxFrameHandler 19019->19020 19021 52982d CatchGuardHandler 5 API calls 19020->19021 19022 52e00a GetCurrentProcess TerminateProcess 19021->19022 19022->18828 19024 52e01b __strnicoll 41 API calls 19023->19024 19025 52e0db 19024->19025 19025->18810 19026->18840 19028 52dec0 19027->19028 19029 52dec9 19027->19029 19030 52de70 __strnicoll 16 API calls 19028->19030 19029->18816 19031 52dec5 19030->19031 19031->19029 19034 52e14b 19031->19034 19045 536743 19034->19045 19037 52e15b 19039 52e165 IsProcessorFeaturePresent 19037->19039 19044 52e184 19037->19044 19040 52e171 19039->19040 19042 52ded3 __InternalCxxFrameHandler 8 API calls 19040->19042 19042->19044 19075 533b5d 19044->19075 19078 536675 19045->19078 19048 536788 19049 536794 __FrameHandler3::FrameUnwindToState 19048->19049 19050 5364a1 __dosmaperr 14 API calls 19049->19050 19054 5367c1 __InternalCxxFrameHandler 19049->19054 19055 5367bb __InternalCxxFrameHandler 19049->19055 19050->19055 19051 536808 19052 532b87 __dosmaperr 14 API calls 19051->19052 19053 53680d 19052->19053 19056 52e0cf __strnicoll 41 API calls 19053->19056 19057 536834 19054->19057 19089 530cb9 EnterCriticalSection 19054->19089 19055->19051 19055->19054 19074 5367f2 19055->19074 19056->19074 19059 536967 19057->19059 19060 536876 19057->19060 19071 5368a5 19057->19071 19063 536972 19059->19063 19121 530d01 LeaveCriticalSection 19059->19121 19060->19071 19090 536350 GetLastError 19060->19090 19065 533b5d __InternalCxxFrameHandler 23 API calls 19063->19065 19067 53697a 19065->19067 19068 536350 __Getctype 41 API calls 19072 5368fa 19068->19072 19070 536350 __Getctype 41 API calls 19070->19071 19117 536914 19071->19117 19073 536350 __Getctype 41 API calls 19072->19073 19072->19074 19073->19074 19074->19037 19123 533981 19075->19123 19079 536681 __FrameHandler3::FrameUnwindToState 19078->19079 19084 530cb9 EnterCriticalSection 19079->19084 19081 53668f 19085 5366cd 19081->19085 19084->19081 19088 530d01 LeaveCriticalSection 19085->19088 19087 52e150 19087->19037 19087->19048 19088->19087 19089->19057 19091 53636c 19090->19091 19092 536366 19090->19092 19093 5370b9 __Getctype 6 API calls 19091->19093 19096 536370 SetLastError 19091->19096 19094 53707a __Getctype 6 API calls 19092->19094 19095 536388 19093->19095 19094->19091 19095->19096 19098 536b6b __Getctype 14 API calls 19095->19098 19100 536400 19096->19100 19101 536405 19096->19101 19099 53639d 19098->19099 19102 5363b6 19099->19102 19103 5363a5 19099->19103 19100->19070 19104 52e14b __FrameHandler3::FrameUnwindToState 39 API calls 19101->19104 19106 5370b9 __Getctype 6 API calls 19102->19106 19105 5370b9 __Getctype 6 API calls 19103->19105 19107 53640a 19104->19107 19108 5363b3 19105->19108 19109 5363c2 19106->19109 19112 53663b ___free_lconv_mon 14 API calls 19108->19112 19110 5363c6 19109->19110 19111 5363dd 19109->19111 19114 5370b9 __Getctype 6 API calls 19110->19114 19113 53617e __Getctype 14 API calls 19111->19113 19112->19096 19115 5363e8 19113->19115 19114->19108 19116 53663b ___free_lconv_mon 14 API calls 19115->19116 19116->19096 19118 5368eb 19117->19118 19119 53691a 19117->19119 19118->19068 19118->19072 19118->19074 19122 530d01 LeaveCriticalSection 19119->19122 19121->19063 19122->19118 19124 5339ae 19123->19124 19133 5339bf 19123->19133 19134 533a49 GetModuleHandleW 19124->19134 19129 52e18e 19141 53382a 19133->19141 19135 5339b3 19134->19135 19135->19133 19136 533aae GetModuleHandleExW 19135->19136 19137 533b01 19136->19137 19138 533aed GetProcAddress 19136->19138 19139 533b14 FreeLibrary 19137->19139 19140 533b1d 19137->19140 19138->19137 19139->19140 19140->19133 19142 533836 __FrameHandler3::FrameUnwindToState 19141->19142 19156 530cb9 EnterCriticalSection 19142->19156 19144 533840 19157 533896 19144->19157 19146 53384d 19161 53386b 19146->19161 19149 533a18 19169 533a8c 19149->19169 19152 533a36 19154 533aae __InternalCxxFrameHandler 3 API calls 19152->19154 19153 533a26 GetCurrentProcess TerminateProcess 19153->19152 19155 533a3e ExitProcess 19154->19155 19156->19144 19158 5338a2 __FrameHandler3::FrameUnwindToState 19157->19158 19160 533909 __InternalCxxFrameHandler 19158->19160 19164 534421 19158->19164 19160->19146 19168 530d01 LeaveCriticalSection 19161->19168 19163 533859 19163->19129 19163->19149 19165 53442d __EH_prolog3 19164->19165 19166 534179 __InternalCxxFrameHandler 14 API calls 19165->19166 19167 534454 Concurrency::details::_ContextCallback::_CallInContext 19166->19167 19167->19160 19168->19163 19174 5385c5 GetPEB 19169->19174 19172 533a96 GetPEB 19173 533a22 19172->19173 19173->19152 19173->19153 19175 5385df 19174->19175 19176 533a91 19174->19176 19177 536eec __InternalCxxFrameHandler 5 API calls 19175->19177 19176->19172 19176->19173 19177->19176 19179 53255b 19178->19179 19180 532533 19178->19180 19179->18783 19180->19179 19181 532562 19180->19181 19182 532540 19180->19182 19186 53247e 19181->19186 19183 52e052 __strnicoll 41 API calls 19182->19183 19183->19179 19187 53248a __FrameHandler3::FrameUnwindToState 19186->19187 19194 52ed47 EnterCriticalSection 19187->19194 19189 532498 19195 5324d9 19189->19195 19194->19189 19205 5384db 19195->19205 19202 5324cd 19386 52ed5b LeaveCriticalSection 19202->19386 19204 5324b6 19204->18783 19227 5384a0 19205->19227 19207 5384ec 19208 53853c 19207->19208 19209 5324f1 19207->19209 19233 53762f 19208->19233 19214 53259c 19209->19214 19212 53663b ___free_lconv_mon 14 API calls 19213 53854f 19212->19213 19213->19209 19217 5325ae 19214->19217 19218 53250f 19214->19218 19215 5325bc 19216 52e052 __strnicoll 41 API calls 19215->19216 19216->19218 19217->19215 19217->19218 19221 5325f2 _Yarn _Fputc 19217->19221 19223 538587 19218->19223 19220 538464 __fread_nolock 41 API calls 19220->19221 19221->19218 19221->19220 19249 531b3e 19221->19249 19255 53a1ec 19221->19255 19224 5324a5 19223->19224 19225 538592 19223->19225 19224->19202 19225->19224 19226 531b3e ___scrt_uninitialize_crt 66 API calls 19225->19226 19226->19224 19228 5384ac 19227->19228 19229 5384cd 19228->19229 19230 538464 __fread_nolock 41 API calls 19228->19230 19229->19207 19231 5384c7 19230->19231 19240 54215c 19231->19240 19234 53766d 19233->19234 19239 53763d __Getctype 19233->19239 19235 532b87 __dosmaperr 14 API calls 19234->19235 19237 53766b 19235->19237 19236 537658 HeapAlloc 19236->19237 19236->19239 19237->19212 19238 53365b codecvt 2 API calls 19238->19239 19239->19234 19239->19236 19239->19238 19241 542176 19240->19241 19242 542169 19240->19242 19245 542182 19241->19245 19246 532b87 __dosmaperr 14 API calls 19241->19246 19243 532b87 __dosmaperr 14 API calls 19242->19243 19244 54216e 19243->19244 19244->19229 19245->19229 19247 5421a3 19246->19247 19248 52e0cf __strnicoll 41 API calls 19247->19248 19248->19244 19250 531b7e 19249->19250 19251 531b57 19249->19251 19250->19221 19251->19250 19252 538464 __fread_nolock 41 API calls 19251->19252 19253 531b73 19252->19253 19254 53a1ec ___scrt_uninitialize_crt 66 API calls 19253->19254 19254->19250 19257 53a1f8 __FrameHandler3::FrameUnwindToState 19255->19257 19256 53a200 19256->19221 19257->19256 19258 53a2bc 19257->19258 19260 53a24d 19257->19260 19259 52e052 __strnicoll 41 API calls 19258->19259 19259->19256 19266 53de13 EnterCriticalSection 19260->19266 19262 53a253 19263 53a270 19262->19263 19267 53a2f4 19262->19267 19295 53a2b4 19263->19295 19266->19262 19268 53a319 19267->19268 19292 53a33c __fread_nolock 19267->19292 19269 53a31d 19268->19269 19271 53a37b 19268->19271 19270 52e052 __strnicoll 41 API calls 19269->19270 19270->19292 19272 53a392 19271->19272 19312 53b87a 19271->19312 19298 539e78 19272->19298 19276 53a3e2 19278 53a3f6 19276->19278 19279 53a445 WriteFile 19276->19279 19277 53a3a2 19280 53a3a9 19277->19280 19281 53a3cc 19277->19281 19284 53a433 19278->19284 19285 53a3fe 19278->19285 19282 53a467 GetLastError 19279->19282 19294 53a3dd 19279->19294 19280->19292 19315 539e10 19280->19315 19320 539a3e GetConsoleOutputCP 19281->19320 19282->19294 19305 539ef6 19284->19305 19286 53a403 19285->19286 19287 53a421 19285->19287 19290 53a40c 19286->19290 19286->19292 19340 53a0ba 19287->19340 19333 539fd1 19290->19333 19292->19263 19294->19292 19385 53de36 LeaveCriticalSection 19295->19385 19297 53a2ba 19297->19256 19299 54215c __fread_nolock 41 API calls 19298->19299 19300 539e8a 19299->19300 19303 539eb8 19300->19303 19304 539eeb 19300->19304 19348 52ea70 19300->19348 19302 539ed2 GetConsoleMode 19302->19304 19303->19302 19303->19304 19304->19276 19304->19277 19306 539f05 ___scrt_uninitialize_crt 19305->19306 19309 539f75 WriteFile 19306->19309 19311 539fb6 19306->19311 19307 52982d CatchGuardHandler 5 API calls 19308 539fcf 19307->19308 19308->19292 19309->19306 19310 539fb8 GetLastError 19309->19310 19310->19311 19311->19307 19363 53b759 19312->19363 19314 53b893 19314->19272 19317 539e67 19315->19317 19319 539e32 19315->19319 19316 539e69 GetLastError 19316->19317 19317->19292 19318 542b66 5 API calls ___scrt_uninitialize_crt 19318->19319 19319->19316 19319->19317 19319->19318 19321 539ab0 19320->19321 19329 539ab7 _Yarn 19320->19329 19322 52ea70 std::_Locinfo::_Locinfo_ctor 41 API calls 19321->19322 19322->19329 19323 52982d CatchGuardHandler 5 API calls 19324 539e09 19323->19324 19324->19294 19325 538331 42 API calls ___scrt_uninitialize_crt 19325->19329 19326 539d74 19326->19323 19328 539cef WriteFile 19328->19329 19330 539de7 GetLastError 19328->19330 19329->19325 19329->19326 19329->19328 19331 542054 5 API calls std::_Locinfo::_Locinfo_ctor 19329->19331 19332 539d2f WriteFile 19329->19332 19382 53c3ca 19329->19382 19330->19326 19331->19329 19332->19329 19332->19330 19334 539fe0 ___scrt_uninitialize_crt 19333->19334 19335 53a09f 19334->19335 19336 53a055 WriteFile 19334->19336 19337 52982d CatchGuardHandler 5 API calls 19335->19337 19336->19334 19338 53a0a1 GetLastError 19336->19338 19339 53a0b8 19337->19339 19338->19335 19339->19292 19347 53a0c9 ___scrt_uninitialize_crt 19340->19347 19341 53a1d1 19342 52982d CatchGuardHandler 5 API calls 19341->19342 19343 53a1ea 19342->19343 19343->19294 19344 53c3ca std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 19344->19347 19345 53a1d3 GetLastError 19345->19341 19346 53a188 WriteFile 19346->19345 19346->19347 19347->19341 19347->19344 19347->19345 19347->19346 19349 52deb6 _Fputc 41 API calls 19348->19349 19350 52ea80 19349->19350 19355 536adc 19350->19355 19356 536af3 19355->19356 19357 52ea9d 19355->19357 19356->19357 19358 53ef02 __Getctype 41 API calls 19356->19358 19359 536b3a 19357->19359 19358->19357 19360 536b51 19359->19360 19361 52eaaa 19359->19361 19360->19361 19362 53d366 __strnicoll 41 API calls 19360->19362 19361->19303 19362->19361 19369 53deea 19363->19369 19365 53b76b 19366 53b787 SetFilePointerEx 19365->19366 19368 53b773 __fread_nolock 19365->19368 19367 53b79f GetLastError 19366->19367 19366->19368 19367->19368 19368->19314 19370 53def7 19369->19370 19371 53df0c 19369->19371 19372 532b74 __dosmaperr 14 API calls 19370->19372 19373 532b74 __dosmaperr 14 API calls 19371->19373 19375 53df31 19371->19375 19374 53defc 19372->19374 19376 53df3c 19373->19376 19377 532b87 __dosmaperr 14 API calls 19374->19377 19375->19365 19378 532b87 __dosmaperr 14 API calls 19376->19378 19379 53df04 19377->19379 19380 53df44 19378->19380 19379->19365 19381 52e0cf __strnicoll 41 API calls 19380->19381 19381->19379 19384 53c3e1 WideCharToMultiByte 19382->19384 19384->19329 19385->19297 19386->19204 19387->18792 19388 529923 19389 52992f __FrameHandler3::FrameUnwindToState 19388->19389 19414 52959d 19389->19414 19391 529936 19392 529a8f 19391->19392 19402 529960 ___scrt_is_nonwritable_in_current_image __InternalCxxFrameHandler ___scrt_release_startup_lock 19391->19402 19454 529eef IsProcessorFeaturePresent 19392->19454 19394 529a96 19458 533b99 19394->19458 19397 533b5d __InternalCxxFrameHandler 23 API calls 19398 529aa4 19397->19398 19399 52997f 19400 529a00 19425 534160 19400->19425 19402->19399 19402->19400 19436 533b73 19402->19436 19404 529a06 19429 547d50 19404->19429 19409 529a2b 19410 529a34 19409->19410 19445 533b4e 19409->19445 19448 52970e 19410->19448 19415 5295a6 19414->19415 19461 529c95 IsProcessorFeaturePresent 19415->19461 19419 5295b7 19420 5295bb 19419->19420 19471 5345b6 19419->19471 19420->19391 19423 5295d2 19423->19391 19426 53416e 19425->19426 19427 534169 19425->19427 19426->19404 19543 533eba 19427->19543 19872 526330 19429->19872 19433 529a1d 19443 52a009 GetModuleHandleW 19433->19443 19434 547d9e 19434->19433 19886 547590 19434->19886 19437 5308ab __FrameHandler3::FrameUnwindToState 19436->19437 19438 533b89 std::_Lockit::_Lockit 19436->19438 19439 536350 __Getctype 41 API calls 19437->19439 19438->19400 19441 5308bc 19439->19441 19440 52e14b __FrameHandler3::FrameUnwindToState 41 API calls 19442 5308e6 _unexpected 19440->19442 19441->19440 19442->19400 19444 529a27 19443->19444 19444->19394 19444->19409 19446 533981 __InternalCxxFrameHandler 23 API calls 19445->19446 19447 533b59 19446->19447 19447->19410 19449 52971a 19448->19449 19453 529730 19449->19453 20799 5345c8 19449->20799 19451 529728 19452 52c89b ___scrt_uninitialize_crt 7 API calls 19451->19452 19452->19453 19453->19399 19455 529f05 __InternalCxxFrameHandler __fread_nolock 19454->19455 19456 529fb0 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 19455->19456 19457 529ff4 __InternalCxxFrameHandler 19456->19457 19457->19394 19459 533981 __InternalCxxFrameHandler 23 API calls 19458->19459 19460 529a9c 19459->19460 19460->19397 19462 5295b2 19461->19462 19463 52c87c 19462->19463 19480 52d94c 19463->19480 19467 52c88d 19468 52c898 19467->19468 19494 52d988 19467->19494 19468->19419 19470 52c885 19470->19419 19534 53dad0 19471->19534 19474 52c89b 19475 52c8a4 19474->19475 19476 52c8ae 19474->19476 19477 52cbc0 ___vcrt_uninitialize_ptd 6 API calls 19475->19477 19476->19420 19478 52c8a9 19477->19478 19479 52d988 ___vcrt_uninitialize_locks DeleteCriticalSection 19478->19479 19479->19476 19481 52d955 19480->19481 19483 52d97e 19481->19483 19484 52c881 19481->19484 19498 52dd01 19481->19498 19485 52d988 ___vcrt_uninitialize_locks DeleteCriticalSection 19483->19485 19484->19470 19486 52cb8d 19484->19486 19485->19484 19515 52dc12 19486->19515 19489 52cba2 19489->19467 19492 52cbbd 19492->19467 19495 52d9b2 19494->19495 19496 52d993 19494->19496 19495->19470 19497 52d99d DeleteCriticalSection 19496->19497 19497->19495 19497->19497 19503 52db27 19498->19503 19501 52dd39 InitializeCriticalSectionAndSpinCount 19502 52dd24 19501->19502 19502->19481 19504 52db44 19503->19504 19507 52db48 19503->19507 19504->19501 19504->19502 19505 52dbb0 GetProcAddress 19505->19504 19507->19504 19507->19505 19508 52dba1 19507->19508 19510 52dbc7 LoadLibraryExW 19507->19510 19508->19505 19509 52dba9 FreeLibrary 19508->19509 19509->19505 19511 52dc0e 19510->19511 19512 52dbde GetLastError 19510->19512 19511->19507 19512->19511 19513 52dbe9 ___vcrt_FlsGetValue 19512->19513 19513->19511 19514 52dbff LoadLibraryExW 19513->19514 19514->19507 19516 52db27 ___vcrt_FlsGetValue 5 API calls 19515->19516 19517 52dc2c 19516->19517 19518 52dc45 TlsAlloc 19517->19518 19519 52cb97 19517->19519 19519->19489 19520 52dcc3 19519->19520 19521 52db27 ___vcrt_FlsGetValue 5 API calls 19520->19521 19522 52dcdd 19521->19522 19523 52dcf8 TlsSetValue 19522->19523 19524 52cbb0 19522->19524 19523->19524 19524->19492 19525 52cbc0 19524->19525 19526 52cbca 19525->19526 19528 52cbd0 19525->19528 19529 52dc4d 19526->19529 19528->19489 19530 52db27 ___vcrt_FlsGetValue 5 API calls 19529->19530 19531 52dc67 19530->19531 19532 52dc7f TlsFree 19531->19532 19533 52dc73 19531->19533 19532->19533 19533->19528 19535 53dae0 19534->19535 19536 5295c4 19534->19536 19535->19536 19538 5374f3 19535->19538 19536->19423 19536->19474 19542 5374fa 19538->19542 19539 53753d GetStdHandle 19539->19542 19540 53759f 19540->19535 19541 537550 GetFileType 19541->19542 19542->19539 19542->19540 19542->19541 19544 533ec3 19543->19544 19547 533ed9 19543->19547 19544->19547 19549 533ee6 19544->19549 19546 533ed0 19546->19547 19566 534051 19546->19566 19547->19426 19550 533ef2 19549->19550 19551 533eef 19549->19551 19574 53d31e 19550->19574 19551->19546 19556 533f03 19558 53663b ___free_lconv_mon 14 API calls 19556->19558 19557 533f0f 19602 533f40 19557->19602 19560 533f09 19558->19560 19560->19546 19562 53663b ___free_lconv_mon 14 API calls 19563 533f33 19562->19563 19564 53663b ___free_lconv_mon 14 API calls 19563->19564 19565 533f39 19564->19565 19565->19546 19567 5340c2 19566->19567 19569 534060 19566->19569 19567->19547 19568 53c3ca WideCharToMultiByte std::_Locinfo::_Locinfo_ctor 19568->19569 19569->19567 19569->19568 19570 536b6b __Getctype 14 API calls 19569->19570 19572 5340c6 19569->19572 19573 53663b ___free_lconv_mon 14 API calls 19569->19573 19570->19569 19571 53663b ___free_lconv_mon 14 API calls 19571->19567 19572->19571 19573->19569 19575 53d327 19574->19575 19579 533ef8 19574->19579 19624 53640b 19575->19624 19580 53d620 GetEnvironmentStringsW 19579->19580 19581 53d638 19580->19581 19582 533efd 19580->19582 19583 53c3ca std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 19581->19583 19582->19556 19582->19557 19584 53d655 19583->19584 19585 53d66a 19584->19585 19586 53d65f FreeEnvironmentStringsW 19584->19586 19587 53762f std::_Locinfo::_Locinfo_ctor 15 API calls 19585->19587 19586->19582 19588 53d671 19587->19588 19589 53d68a 19588->19589 19590 53d679 19588->19590 19592 53c3ca std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 19589->19592 19591 53663b ___free_lconv_mon 14 API calls 19590->19591 19593 53d67e FreeEnvironmentStringsW 19591->19593 19594 53d69a 19592->19594 19595 53d6bb 19593->19595 19596 53d6a1 19594->19596 19597 53d6a9 19594->19597 19595->19582 19598 53663b ___free_lconv_mon 14 API calls 19596->19598 19599 53663b ___free_lconv_mon 14 API calls 19597->19599 19600 53d6a7 FreeEnvironmentStringsW 19598->19600 19599->19600 19600->19595 19603 533f55 19602->19603 19604 536b6b __Getctype 14 API calls 19603->19604 19605 533f7c 19604->19605 19606 533f84 19605->19606 19612 533f8e 19605->19612 19607 53663b ___free_lconv_mon 14 API calls 19606->19607 19608 533f16 19607->19608 19608->19562 19609 533feb 19610 53663b ___free_lconv_mon 14 API calls 19609->19610 19610->19608 19611 536b6b __Getctype 14 API calls 19611->19612 19612->19609 19612->19611 19613 533ffa 19612->19613 19618 534015 19612->19618 19620 53663b ___free_lconv_mon 14 API calls 19612->19620 19857 535ef7 19612->19857 19866 534022 19613->19866 19617 53663b ___free_lconv_mon 14 API calls 19619 534007 19617->19619 19621 52e0fc __Getctype 11 API calls 19618->19621 19622 53663b ___free_lconv_mon 14 API calls 19619->19622 19620->19612 19623 534021 19621->19623 19622->19608 19625 536416 19624->19625 19626 53641c 19624->19626 19628 53707a __Getctype 6 API calls 19625->19628 19627 5370b9 __Getctype 6 API calls 19626->19627 19646 536422 19626->19646 19629 536436 19627->19629 19628->19626 19630 536b6b __Getctype 14 API calls 19629->19630 19629->19646 19632 536446 19630->19632 19631 52e14b __FrameHandler3::FrameUnwindToState 41 API calls 19633 5364a0 19631->19633 19634 536463 19632->19634 19635 53644e 19632->19635 19637 5370b9 __Getctype 6 API calls 19634->19637 19636 5370b9 __Getctype 6 API calls 19635->19636 19639 53645a 19636->19639 19638 53646f 19637->19638 19640 536473 19638->19640 19641 536482 19638->19641 19644 53663b ___free_lconv_mon 14 API calls 19639->19644 19642 5370b9 __Getctype 6 API calls 19640->19642 19643 53617e __Getctype 14 API calls 19641->19643 19642->19639 19645 53648d 19643->19645 19644->19646 19647 53663b ___free_lconv_mon 14 API calls 19645->19647 19646->19631 19648 536427 19646->19648 19647->19648 19649 53d129 19648->19649 19672 53d27e 19649->19672 19654 53d16c 19654->19579 19655 53762f std::_Locinfo::_Locinfo_ctor 15 API calls 19656 53d17d 19655->19656 19657 53d193 19656->19657 19658 53d185 19656->19658 19690 53d379 19657->19690 19659 53663b ___free_lconv_mon 14 API calls 19658->19659 19659->19654 19662 53d1cb 19663 532b87 __dosmaperr 14 API calls 19662->19663 19666 53d1d0 19663->19666 19664 53d212 19667 53d25b 19664->19667 19701 53cd9b 19664->19701 19665 53d1e6 19665->19664 19669 53663b ___free_lconv_mon 14 API calls 19665->19669 19668 53663b ___free_lconv_mon 14 API calls 19666->19668 19671 53663b ___free_lconv_mon 14 API calls 19667->19671 19668->19654 19669->19664 19671->19654 19673 53d28a __FrameHandler3::FrameUnwindToState 19672->19673 19674 53d2a4 19673->19674 19709 530cb9 EnterCriticalSection 19673->19709 19676 53d153 19674->19676 19679 52e14b __FrameHandler3::FrameUnwindToState 41 API calls 19674->19679 19683 53cea9 19676->19683 19677 53d2e0 19710 53d2fd 19677->19710 19680 53d31d 19679->19680 19681 53d2b4 19681->19677 19682 53663b ___free_lconv_mon 14 API calls 19681->19682 19682->19677 19714 532b9a 19683->19714 19686 53ceca GetOEMCP 19689 53cef3 19686->19689 19687 53cedc 19688 53cee1 GetACP 19687->19688 19687->19689 19688->19689 19689->19654 19689->19655 19691 53cea9 43 API calls 19690->19691 19692 53d399 19691->19692 19693 53d3d6 IsValidCodePage 19692->19693 19699 53d412 __fread_nolock 19692->19699 19695 53d3e8 19693->19695 19693->19699 19694 52982d CatchGuardHandler 5 API calls 19696 53d1c0 19694->19696 19697 53d417 GetCPInfo 19695->19697 19700 53d3f1 __fread_nolock 19695->19700 19696->19662 19696->19665 19697->19699 19697->19700 19699->19694 19699->19699 19756 53cf7d 19700->19756 19702 53cda7 __FrameHandler3::FrameUnwindToState 19701->19702 19831 530cb9 EnterCriticalSection 19702->19831 19704 53cdb1 19832 53cde8 19704->19832 19709->19681 19713 530d01 LeaveCriticalSection 19710->19713 19712 53d304 19712->19674 19713->19712 19715 532bb8 19714->19715 19721 532bb1 19714->19721 19716 536350 __Getctype 41 API calls 19715->19716 19715->19721 19717 532bd9 19716->19717 19722 536aaf 19717->19722 19721->19686 19721->19687 19723 536ac2 19722->19723 19725 532bef 19722->19725 19723->19725 19730 53ef02 19723->19730 19726 536b0d 19725->19726 19727 536b20 19726->19727 19728 536b35 19726->19728 19727->19728 19751 53d366 19727->19751 19728->19721 19731 53ef0e __FrameHandler3::FrameUnwindToState 19730->19731 19732 536350 __Getctype 41 API calls 19731->19732 19733 53ef17 19732->19733 19734 53ef5d 19733->19734 19743 530cb9 EnterCriticalSection 19733->19743 19734->19725 19736 53ef35 19744 53ef83 19736->19744 19741 52e14b __FrameHandler3::FrameUnwindToState 41 API calls 19742 53ef82 19741->19742 19743->19736 19745 53ef91 __Getctype 19744->19745 19747 53ef46 19744->19747 19746 53ecb6 __Getctype 14 API calls 19745->19746 19745->19747 19746->19747 19748 53ef62 19747->19748 19749 530d01 std::_Lockit::~_Lockit LeaveCriticalSection 19748->19749 19750 53ef59 19749->19750 19750->19734 19750->19741 19752 536350 __Getctype 41 API calls 19751->19752 19753 53d36b 19752->19753 19754 53d27e __strnicoll 41 API calls 19753->19754 19755 53d376 19754->19755 19755->19728 19757 53cfa5 GetCPInfo 19756->19757 19758 53d06e 19756->19758 19757->19758 19759 53cfbd 19757->19759 19761 52982d CatchGuardHandler 5 API calls 19758->19761 19767 53936c 19759->19767 19763 53d127 19761->19763 19763->19699 19768 532b9a __strnicoll 41 API calls 19767->19768 19769 53938c 19768->19769 19787 53c34e 19769->19787 19771 539450 19772 539448 19773 5393b9 19773->19771 19773->19772 19776 53762f std::_Locinfo::_Locinfo_ctor 15 API calls 19773->19776 19778 5393de __fread_nolock __alloca_probe_16 19773->19778 19776->19778 19778->19772 19779 53c34e __strnicoll MultiByteToWideChar 19778->19779 19788 53c35f MultiByteToWideChar 19787->19788 19788->19773 19831->19704 19842 5320ad 19832->19842 19834 53ce0a 19835 5320ad __fread_nolock 41 API calls 19834->19835 19843 5320be 19842->19843 19852 5320ba _Yarn 19842->19852 19844 5320c5 19843->19844 19847 5320d8 __fread_nolock 19843->19847 19845 532b87 __dosmaperr 14 API calls 19844->19845 19849 532106 19847->19849 19850 53210f 19847->19850 19847->19852 19850->19852 19852->19834 19858 535f13 19857->19858 19859 535f05 19857->19859 19860 532b87 __dosmaperr 14 API calls 19858->19860 19859->19858 19864 535f2b 19859->19864 19861 535f1b 19860->19861 19863 52e0cf __strnicoll 41 API calls 19861->19863 19862 535f25 19862->19612 19863->19862 19864->19862 19865 532b87 __dosmaperr 14 API calls 19864->19865 19865->19861 19870 534000 19866->19870 19871 53402f 19866->19871 19867 534046 19868 53663b ___free_lconv_mon 14 API calls 19867->19868 19868->19870 19869 53663b ___free_lconv_mon 14 API calls 19869->19871 19870->19617 19871->19867 19871->19869 19873 52633c 19872->19873 19891 530807 19873->19891 19876 5294e4 19879 5294e9 19876->19879 19878 529503 19878->19434 19879->19878 19880 53365b codecvt 2 API calls 19879->19880 19881 529505 codecvt 19879->19881 20176 530d2f 19879->20176 19880->19879 19882 529ec0 codecvt 19881->19882 20185 52a530 19881->20185 19883 52a530 CallUnexpected RaiseException 19882->19883 19885 529edd 19883->19885 20188 521660 19886->20188 19892 53081b _Fputc 19891->19892 19893 53083d 19892->19893 19895 530864 19892->19895 19894 52e052 __strnicoll 41 API calls 19893->19894 19897 530858 19894->19897 19900 52ed6f 19895->19900 19898 52de0b _Fputc 41 API calls 19897->19898 19899 526357 FreeConsole 19898->19899 19899->19876 19901 52ed7b __FrameHandler3::FrameUnwindToState 19900->19901 19908 52ed47 EnterCriticalSection 19901->19908 19903 52ed89 19909 52f8ef 19903->19909 19908->19903 19910 5384db 42 API calls 19909->19910 19911 52f916 19910->19911 19923 52fafa 19911->19923 19916 538587 66 API calls 19917 52f977 19916->19917 19918 52982d CatchGuardHandler 5 API calls 19917->19918 19919 52ed96 19918->19919 19920 52edbe 19919->19920 20175 52ed5b LeaveCriticalSection 19920->20175 19922 52eda7 19922->19897 19941 530641 19923->19941 19926 52fb23 19927 52e052 __strnicoll 41 API calls 19926->19927 19928 52f95d 19927->19928 19938 52f8b1 19928->19938 19931 52ea70 std::_Locinfo::_Locinfo_ctor 41 API calls 19933 52fb4e std::_Locinfo::_Locinfo_ctor 19931->19933 19933->19928 19933->19931 19934 52fd2b 19933->19934 19947 52fa82 19933->19947 19950 52fda6 19933->19950 19984 52ff04 19933->19984 19935 52e052 __strnicoll 41 API calls 19934->19935 19936 52fd47 19935->19936 19937 52e052 __strnicoll 41 API calls 19936->19937 19937->19928 19939 53663b ___free_lconv_mon 14 API calls 19938->19939 19940 52f8c1 19939->19940 19940->19916 19942 53066e 19941->19942 19943 53064c 19941->19943 20013 530679 19942->20013 19944 52e052 __strnicoll 41 API calls 19943->19944 19946 52fb15 19944->19946 19946->19926 19946->19928 19946->19933 20021 52ee94 19947->20021 19949 52fabd 19949->19933 19951 52fdc4 19950->19951 19952 52fdad 19950->19952 19953 52e052 __strnicoll 41 API calls 19951->19953 19954 52fe03 19951->19954 19952->19954 19955 52ff28 19952->19955 19956 52ff99 19952->19956 19959 52fdf8 19953->19959 19954->19933 19960 52ffc6 19955->19960 19961 52ff2e 19955->19961 19957 52ff9e 19956->19957 19958 52ffec 19956->19958 19962 52ffe0 19957->19962 19963 52ffa0 19957->19963 19958->19960 19967 52ff6b 19958->19967 19983 52ff50 19958->19983 19959->19933 20063 52f23e 19960->20063 19961->19967 19972 52ff34 19961->19972 20080 5305ba 19962->20080 19965 52ff42 19963->19965 19966 52ffa5 19963->19966 19982 52ff64 19965->19982 19965->19983 20070 5302fa 19965->20070 19966->19960 19971 52ffaa 19966->19971 19967->19982 20044 52f3bb 19967->20044 19970 52ff80 19970->19982 20051 530484 19970->20051 19974 52ffaf 19971->19974 19975 52ffbd 19971->19975 19972->19965 19972->19970 19972->19983 19974->19982 20055 53059d 19974->20055 20059 530519 19975->20059 19977 52982d CatchGuardHandler 5 API calls 19979 53024a 19977->19979 19979->19933 19982->19977 19983->19982 20083 5381c7 19983->20083 19985 52ff28 19984->19985 19986 52ff99 19984->19986 19989 52ffc6 19985->19989 19990 52ff2e 19985->19990 19987 52ff9e 19986->19987 19988 52ffec 19986->19988 19991 52ffe0 19987->19991 19992 52ffa0 19987->19992 19988->19989 19999 52ff6b 19988->19999 20012 52ff50 19988->20012 19996 52f23e 42 API calls 19989->19996 19993 52ff34 19990->19993 19990->19999 19995 5305ba 42 API calls 19991->19995 19994 52ffa5 19992->19994 20004 52ff42 19992->20004 20000 52ff80 19993->20000 19993->20004 19993->20012 19994->19989 19998 52ffaa 19994->19998 19995->20012 19996->20012 19997 5302fa 44 API calls 19997->20012 20001 52ffaf 19998->20001 20002 52ffbd 19998->20002 20003 52f3bb 42 API calls 19999->20003 20011 52ff64 19999->20011 20007 530484 43 API calls 20000->20007 20000->20011 20009 53059d 42 API calls 20001->20009 20001->20011 20006 530519 41 API calls 20002->20006 20003->20012 20004->19997 20004->20011 20004->20012 20005 52982d CatchGuardHandler 5 API calls 20008 53024a 20005->20008 20006->20012 20007->20012 20008->19933 20009->20012 20010 5381c7 43 API calls 20010->20012 20011->20005 20012->20010 20012->20011 20014 5306f7 20013->20014 20015 53068d 20013->20015 20014->19946 20016 538464 __fread_nolock 41 API calls 20015->20016 20017 530694 20016->20017 20017->20014 20018 532b87 __dosmaperr 14 API calls 20017->20018 20019 5306ec 20018->20019 20020 52e0cf __strnicoll 41 API calls 20019->20020 20020->20014 20031 52eacb 20021->20031 20023 52eea6 20024 52eebb 20023->20024 20027 52eeee 20023->20027 20030 52eed6 std::_Locinfo::_Locinfo_ctor 20023->20030 20025 52e052 __strnicoll 41 API calls 20024->20025 20025->20030 20026 52ef85 20028 52ea11 41 API calls 20026->20028 20027->20026 20038 52ea11 20027->20038 20028->20030 20030->19949 20032 52eae3 20031->20032 20033 52ead0 20031->20033 20032->20023 20034 532b87 __dosmaperr 14 API calls 20033->20034 20035 52ead5 20034->20035 20036 52e0cf __strnicoll 41 API calls 20035->20036 20037 52eae0 20036->20037 20037->20023 20039 52ea22 20038->20039 20040 52ea36 20038->20040 20039->20040 20041 532b87 __dosmaperr 14 API calls 20039->20041 20040->20026 20042 52ea2b 20041->20042 20043 52e0cf __strnicoll 41 API calls 20042->20043 20043->20040 20045 52f3cf 20044->20045 20046 52f3f1 20045->20046 20048 52f418 20045->20048 20047 52e052 __strnicoll 41 API calls 20046->20047 20050 52f40e 20047->20050 20048->20050 20093 52ede2 20048->20093 20050->19983 20052 53049f 20051->20052 20053 5304d6 20052->20053 20054 5381c7 43 API calls 20052->20054 20053->19983 20054->20053 20056 5305a9 20055->20056 20107 52f0c1 20056->20107 20058 5305b9 20058->19983 20062 53052e 20059->20062 20060 52e052 __strnicoll 41 API calls 20061 53054f 20060->20061 20061->19983 20062->20060 20062->20061 20064 52f252 20063->20064 20065 52f274 20064->20065 20066 52f29b 20064->20066 20067 52e052 __strnicoll 41 API calls 20065->20067 20068 52f291 20066->20068 20069 52ede2 15 API calls 20066->20069 20067->20068 20068->19983 20069->20068 20071 530314 20070->20071 20072 52ede2 15 API calls 20071->20072 20073 530355 20072->20073 20114 538046 20073->20114 20076 52ea70 std::_Locinfo::_Locinfo_ctor 41 API calls 20077 530403 20076->20077 20078 52ea70 std::_Locinfo::_Locinfo_ctor 41 API calls 20077->20078 20079 530436 20077->20079 20078->20079 20079->19983 20079->20079 20081 52f3bb 42 API calls 20080->20081 20082 5305cf 20081->20082 20082->19983 20084 5381dc 20083->20084 20086 52ea70 std::_Locinfo::_Locinfo_ctor 41 API calls 20084->20086 20087 53821d 20084->20087 20090 5381e0 __fread_nolock std::_Locinfo::_Locinfo_ctor 20084->20090 20092 538209 __fread_nolock 20084->20092 20085 52e052 __strnicoll 41 API calls 20085->20090 20086->20087 20088 53c3ca std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 20087->20088 20087->20090 20087->20092 20089 5382d8 20088->20089 20089->20090 20091 5382ee GetLastError 20089->20091 20090->19983 20091->20090 20091->20092 20092->20085 20092->20090 20094 52ee09 20093->20094 20095 52edf7 20093->20095 20094->20095 20096 53762f std::_Locinfo::_Locinfo_ctor 15 API calls 20094->20096 20095->20050 20097 52ee2d 20096->20097 20098 52ee40 20097->20098 20099 52ee35 20097->20099 20104 52f8cb 20098->20104 20100 53663b ___free_lconv_mon 14 API calls 20099->20100 20100->20095 20103 53663b ___free_lconv_mon 14 API calls 20103->20095 20105 53663b ___free_lconv_mon 14 API calls 20104->20105 20106 52ee4b 20105->20106 20106->20103 20108 52f0d5 20107->20108 20109 52f0f7 20108->20109 20111 52f11e 20108->20111 20110 52e052 __strnicoll 41 API calls 20109->20110 20113 52f114 20110->20113 20112 52ede2 15 API calls 20111->20112 20111->20113 20112->20113 20113->20058 20115 53807b 20114->20115 20118 538057 20114->20118 20117 5380ae 20115->20117 20115->20118 20116 52e052 __strnicoll 41 API calls 20128 5303df 20116->20128 20119 5380e7 20117->20119 20121 538116 20117->20121 20118->20116 20133 537eea 20119->20133 20120 53813f 20125 5381a6 20120->20125 20126 53816c 20120->20126 20121->20120 20122 538144 20121->20122 20141 537782 20122->20141 20168 537aae 20125->20168 20129 538171 20126->20129 20130 53818c 20126->20130 20128->20076 20128->20077 20151 537e1b 20129->20151 20161 537c97 20130->20161 20134 537f00 20133->20134 20135 537f0b 20133->20135 20134->20128 20136 535ef7 std::bad_exception::bad_exception 41 API calls 20135->20136 20137 537f66 20136->20137 20138 537f70 20137->20138 20139 52e0fc __Getctype 11 API calls 20137->20139 20138->20128 20140 537f7e 20139->20140 20142 537795 20141->20142 20143 5377c6 20142->20143 20144 5377a4 20142->20144 20146 5377e0 20143->20146 20148 537835 20143->20148 20145 52e052 __strnicoll 41 API calls 20144->20145 20150 5377bc __alldvrm __fread_nolock _strrchr 20145->20150 20147 537aae 43 API calls 20146->20147 20147->20150 20149 52ea70 std::_Locinfo::_Locinfo_ctor 41 API calls 20148->20149 20148->20150 20149->20150 20150->20128 20152 5409fc 43 API calls 20151->20152 20153 537e4b 20152->20153 20162 5409fc 43 API calls 20161->20162 20163 537cc6 20162->20163 20169 5409fc 43 API calls 20168->20169 20170 537ad8 20169->20170 20171 540902 41 API calls 20170->20171 20175->19922 20177 53762f 20176->20177 20178 53766d 20177->20178 20180 537658 HeapAlloc 20177->20180 20183 537641 __Getctype 20177->20183 20179 532b87 __dosmaperr 14 API calls 20178->20179 20182 537672 20179->20182 20181 53766b 20180->20181 20180->20183 20181->20182 20182->19879 20183->20178 20183->20180 20184 53365b codecvt 2 API calls 20183->20184 20184->20183 20186 52a577 RaiseException 20185->20186 20187 52a54a 20185->20187 20186->19882 20187->20186 20189 521696 20188->20189 20210 522d20 20189->20210 20192 5216e3 20195 5216e8 20192->20195 20215 526250 20192->20215 20193 52180a 20194 52181d 20193->20194 20218 524af0 20193->20218 20202 522010 20194->20202 20195->20193 20196 521843 std::ios_base::_Init 20195->20196 20222 522ac0 20196->20222 20203 522030 20202->20203 20497 522090 20203->20497 20206 52203a 20526 526080 20206->20526 20212 522d37 20210->20212 20211 522d4b 20211->20192 20212->20211 20236 5259f0 20212->20236 20248 528cc6 20215->20248 20216 526263 20216->20195 20219 524b53 20218->20219 20220 524b2e 20218->20220 20219->20194 20220->20219 20252 5261e0 20220->20252 20223 522b00 20222->20223 20223->20223 20263 521960 20223->20263 20225 522b14 20271 522480 20225->20271 20237 525a31 20236->20237 20238 522d67 20236->20238 20239 522d20 113 API calls 20237->20239 20238->20192 20240 525a3a 20239->20240 20241 525ab2 20240->20241 20243 525aeb std::ios_base::_Init 20240->20243 20241->20238 20242 524af0 113 API calls 20241->20242 20242->20238 20244 522ac0 std::ios_base::_Init 113 API calls 20243->20244 20245 525b1d 20244->20245 20246 52a530 CallUnexpected RaiseException 20245->20246 20247 525b2b 20246->20247 20250 528ce8 _Yarn 20248->20250 20251 528cd5 20248->20251 20249 532746 69 API calls 20249->20251 20250->20249 20250->20251 20251->20216 20255 525740 20252->20255 20254 5261fe 20254->20219 20256 525754 20255->20256 20257 52575d std::ios_base::_Init 20255->20257 20256->20257 20258 52a530 CallUnexpected RaiseException 20256->20258 20257->20254 20259 522ac0 std::ios_base::_Init 113 API calls 20257->20259 20258->20257 20260 5257a3 20259->20260 20261 52a530 CallUnexpected RaiseException 20260->20261 20262 5257b2 20261->20262 20264 5219e9 20263->20264 20266 521970 20263->20266 20310 5255c0 20264->20310 20267 521975 _Yarn 20266->20267 20296 521900 20266->20296 20267->20225 20270 5219c3 _Yarn 20270->20225 20272 5224a8 20271->20272 20273 522665 20272->20273 20276 5224b9 20272->20276 20274 5255c0 std::_Throw_Cpp_error 113 API calls 20273->20274 20275 52266a 20274->20275 20277 52e0df std::_Throw_Cpp_error 41 API calls 20275->20277 20279 521900 std::_Throw_Cpp_error 113 API calls 20276->20279 20284 5224be _Yarn 20276->20284 20278 52266f 20277->20278 20280 52e0df std::_Throw_Cpp_error 41 API calls 20278->20280 20279->20284 20281 522674 20280->20281 20283 52a4ae std::bad_exception::bad_exception 42 API calls 20281->20283 20282 5225aa messages 20285 52a4ae std::bad_exception::bad_exception 42 API calls 20282->20285 20284->20275 20284->20282 20287 5225ff 20285->20287 20287->20278 20288 522630 messages 20287->20288 20289 52982d CatchGuardHandler 5 API calls 20288->20289 20290 52265f 20289->20290 20297 521933 20296->20297 20298 521910 20296->20298 20299 521944 20297->20299 20302 5294e4 codecvt 16 API calls 20297->20302 20300 521917 20298->20300 20301 52194a 20298->20301 20299->20270 20304 5294e4 codecvt 16 API calls 20300->20304 20330 525360 20301->20330 20305 52193d 20302->20305 20306 52191d 20304->20306 20305->20270 20307 52e0df std::_Throw_Cpp_error 41 API calls 20306->20307 20308 521926 20306->20308 20309 521954 20307->20309 20308->20270 20486 5264e0 20310->20486 20331 52536b codecvt 20330->20331 20332 52a530 CallUnexpected RaiseException 20331->20332 20333 52537a 20332->20333 20334 52a530 CallUnexpected RaiseException 20333->20334 20335 52539a 20334->20335 20369 522bc0 20335->20369 20370 52a4ae std::bad_exception::bad_exception 42 API calls 20369->20370 20371 522bee 20370->20371 20491 526477 20486->20491 20489 52a530 CallUnexpected RaiseException 20490 5264ff 20489->20490 20494 522a00 20491->20494 20495 52a4ae std::bad_exception::bad_exception 42 API calls 20494->20495 20496 522a2e 20495->20496 20496->20489 20537 526389 20497->20537 20500 526389 std::_Lockit::_Lockit 7 API calls 20503 5220c4 20500->20503 20501 5220e5 20506 522132 20501->20506 20507 522147 20501->20507 20517 522214 20501->20517 20502 5263e1 std::_Lockit::~_Lockit 2 API calls 20505 52222d 20502->20505 20543 5263e1 20503->20543 20505->20206 20509 5263e1 std::_Lockit::~_Lockit 2 API calls 20506->20509 20508 5294e4 codecvt 16 API calls 20507->20508 20513 52214e 20508->20513 20510 52213d 20509->20510 20510->20206 20511 5221ea 20512 52220e 20511->20512 20571 522f90 20511->20571 20586 527554 20512->20586 20513->20511 20516 526389 std::_Lockit::_Lockit 7 API calls 20513->20516 20518 522182 20516->20518 20517->20502 20519 522237 20518->20519 20520 5221c8 20518->20520 20589 526500 20519->20589 20550 527684 20520->20550 20527 522d20 113 API calls 20526->20527 20528 5260be 20527->20528 20529 526148 20528->20529 20531 526183 std::ios_base::_Init 20528->20531 20538 526398 20537->20538 20539 52639f 20537->20539 20594 530d18 20538->20594 20542 5220aa 20539->20542 20599 528fef EnterCriticalSection 20539->20599 20542->20500 20542->20501 20544 530d26 20543->20544 20546 5263eb 20543->20546 20652 530d01 LeaveCriticalSection 20544->20652 20547 5263fe 20546->20547 20651 528ffd LeaveCriticalSection 20546->20651 20547->20501 20548 530d2d 20548->20501 20653 531128 20550->20653 20792 5276cf 20571->20792 20574 522fa9 20575 52e130 _Yarn 14 API calls 20575->20574 20587 5294e4 codecvt 16 API calls 20586->20587 20588 52755f 20587->20588 20588->20517 20796 522ce0 20589->20796 20600 5372d1 20594->20600 20599->20542 20621 536c80 20600->20621 20622 536e69 std::_Lockit::_Lockit 5 API calls 20621->20622 20623 536c96 20622->20623 20624 536c9a 20623->20624 20625 536e69 std::_Lockit::_Lockit 5 API calls 20624->20625 20626 536cb0 20625->20626 20627 536cb4 20626->20627 20628 536e69 std::_Lockit::_Lockit 5 API calls 20627->20628 20651->20547 20652->20548 20793 522f99 20792->20793 20794 5276db 20792->20794 20793->20574 20793->20575 20795 531128 std::_Locinfo::_Locinfo_ctor 68 API calls 20794->20795 20795->20793 20800 5345d3 20799->20800 20801 5345e5 ___scrt_uninitialize_crt 20799->20801 20802 5345e1 20800->20802 20804 531c0c 20800->20804 20801->19451 20802->19451 20807 531a99 20804->20807 20810 53198d 20807->20810 20811 531999 __FrameHandler3::FrameUnwindToState 20810->20811 20818 530cb9 EnterCriticalSection 20811->20818 20813 531a0f 20827 531a2d 20813->20827 20814 5319a3 ___scrt_uninitialize_crt 20814->20813 20819 531901 20814->20819 20818->20814 20820 53190d __FrameHandler3::FrameUnwindToState 20819->20820 20830 52ed47 EnterCriticalSection 20820->20830 20822 531950 20844 531981 20822->20844 20823 531917 ___scrt_uninitialize_crt 20823->20822 20831 531ba7 20823->20831 20879 530d01 LeaveCriticalSection 20827->20879 20829 531a1b 20829->20802 20830->20823 20832 531bbc _Fputc 20831->20832 20833 531bc3 20832->20833 20834 531bce 20832->20834 20836 531a99 ___scrt_uninitialize_crt 70 API calls 20833->20836 20835 531b3e ___scrt_uninitialize_crt 66 API calls 20834->20835 20837 531bd8 20835->20837 20838 531bc9 20836->20838 20837->20838 20840 538464 __fread_nolock 41 API calls 20837->20840 20839 52de0b _Fputc 41 API calls 20838->20839 20878 52ed5b LeaveCriticalSection 20844->20878 20846 53196f 20846->20814 20878->20846 20879->20829 20880 5387d2 20881 538464 __fread_nolock 41 API calls 20880->20881 20883 5387df 20881->20883 20882 5387eb 20883->20882 20885 538837 20883->20885 20903 53899a 20883->20903 20885->20882 20886 5384a0 41 API calls 20885->20886 20891 538899 20885->20891 20889 53888c 20886->20889 20889->20891 20911 53b898 20889->20911 20892 5388c8 20891->20892 20893 538464 __fread_nolock 41 API calls 20892->20893 20894 5388d7 20893->20894 20895 5388ea 20894->20895 20896 53897d 20894->20896 20898 538907 20895->20898 20901 53892e 20895->20901 20897 53a1ec ___scrt_uninitialize_crt 66 API calls 20896->20897 20900 5388aa 20897->20900 20899 53a1ec ___scrt_uninitialize_crt 66 API calls 20898->20899 20899->20900 20901->20900 20916 53b7dc 20901->20916 20904 5389b0 20903->20904 20905 5389b4 20903->20905 20904->20885 20906 53deea __fread_nolock 41 API calls 20905->20906 20910 538a03 20905->20910 20907 5389d5 20906->20907 20908 5389dd SetFilePointerEx 20907->20908 20907->20910 20909 5389f4 GetFileSizeEx 20908->20909 20908->20910 20909->20910 20910->20885 20912 536b6b __Getctype 14 API calls 20911->20912 20913 53b8b5 20912->20913 20914 53663b ___free_lconv_mon 14 API calls 20913->20914 20915 53b8bf 20914->20915 20915->20891 20917 53b7f0 _Fputc 20916->20917 20922 53b633 20917->20922 20920 52de0b _Fputc 41 API calls 20921 53b814 20920->20921 20921->20900 20923 53b63f __FrameHandler3::FrameUnwindToState 20922->20923 20924 53b71d 20923->20924 20926 53b69b 20923->20926 20932 53b647 20923->20932 20925 52e052 __strnicoll 41 API calls 20924->20925 20925->20932 20933 53de13 EnterCriticalSection 20926->20933 20928 53b6a1 20929 53b6c6 20928->20929 20930 53b759 __fread_nolock 43 API calls 20928->20930 20934 53b715 20929->20934 20930->20929 20932->20920 20933->20928 20937 53de36 LeaveCriticalSection 20934->20937 20936 53b71b 20936->20932 20937->20936 21139 7a018d 21142 7a01c5 21139->21142 21140 7a02d3 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 21141 7a03a2 WriteProcessMemory 21140->21141 21140->21142 21143 7a03e7 21141->21143 21142->21140 21144 7a0392 TerminateProcess 21142->21144 21145 7a0429 WriteProcessMemory Wow64SetThreadContext ResumeThread 21143->21145 21146 7a03ec WriteProcessMemory 21143->21146 21144->21140 21146->21143

                                              Control-flow Graph

                                              APIs
                                              • CreateProcessA.KERNELBASE(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,007A00FF,007A00EF), ref: 007A02FC
                                              • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 007A030F
                                              • Wow64GetThreadContext.KERNEL32(00000130,00000000), ref: 007A032D
                                              • ReadProcessMemory.KERNELBASE(0000012C,?,007A0143,00000004,00000000), ref: 007A0351
                                              • VirtualAllocEx.KERNELBASE(0000012C,?,?,00003000,00000040), ref: 007A037C
                                              • TerminateProcess.KERNELBASE(0000012C,00000000), ref: 007A039B
                                              • WriteProcessMemory.KERNELBASE(0000012C,00000000,?,?,00000000,?), ref: 007A03D4
                                              • WriteProcessMemory.KERNELBASE(0000012C,00400000,?,?,00000000,?,00000028), ref: 007A041F
                                              • WriteProcessMemory.KERNELBASE(0000012C,?,?,00000004,00000000), ref: 007A045D
                                              • Wow64SetThreadContext.KERNEL32(00000130,007D0000), ref: 007A0499
                                              • ResumeThread.KERNELBASE(00000130), ref: 007A04A8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446451759.00000000007A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 007A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7a0000_rise2406.jbxd
                                              Similarity
                                              • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                                              • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$CreateProcessA$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                              • API String ID: 2440066154-1257834847
                                              • Opcode ID: 6ed679946abb4a161c9f75f6101290084365813039212a6bd0c7882d8dd446c2
                                              • Instruction ID: 94d2544db2dcf14e7deb5fccae4f007d013abbd52beeb77c932c08cccaf34fe0
                                              • Opcode Fuzzy Hash: 6ed679946abb4a161c9f75f6101290084365813039212a6bd0c7882d8dd446c2
                                              • Instruction Fuzzy Hash: 49B1E67664028AAFDB60CF68CC80BDA77A5FF88714F158524EA0CEB341D774FA518B94

                                              Control-flow Graph

                                              APIs
                                              • OffsetRect.USER32(00000000,00000000,00000000), ref: 00547718
                                              • Polyline.GDI32(00000000,00000000,00000000), ref: 00547739
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: OffsetPolylineRect
                                              • String ID: dsdsww$regwgrrwr$size of vector
                                              • API String ID: 1418762327-435021585
                                              • Opcode ID: dc4fe3801c7476f02fd6a64f58c948936ebe2eeb6b6e56d99cbf21f071db0a69
                                              • Instruction ID: 55a3f51da157deb4659d3d6420139a6befd5f2996e841f0ee82ad0ca59d4f4fa
                                              • Opcode Fuzzy Hash: dc4fe3801c7476f02fd6a64f58c948936ebe2eeb6b6e56d99cbf21f071db0a69
                                              • Instruction Fuzzy Hash: B071BA712093915BD314AF28D899B6FBFE0BFC9308F180A6DF59987292C7799508CB52

                                              Control-flow Graph

                                              APIs
                                              • CreateThread.KERNELBASE(00000000,00000000,00547C30,00000000,00000000,00000000), ref: 00547C1F
                                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00547C28
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: CreateObjectSingleThreadWait
                                              • String ID: 4$Earth$Own head
                                              • API String ID: 1891408510-3926490352
                                              • Opcode ID: c35976d47c9ecf2b06bff28d85418e335433130c7e23bfb9e95c2e99df05a793
                                              • Instruction ID: 782a1f421d95000733ea66137e58ebf217d53a13bfa4a8ee9f64c3724b1411d8
                                              • Opcode Fuzzy Hash: c35976d47c9ecf2b06bff28d85418e335433130c7e23bfb9e95c2e99df05a793
                                              • Instruction Fuzzy Hash: BD415B316043916BCB109F388C89B9FBFE1BFCA708F644A58F4949B1C6D734EA448756

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 131 528522-52853c 132 528545-52854d 131->132 133 52853e-528540 131->133 135 528571-528575 132->135 136 52854f-528559 132->136 134 52861c-528629 call 52982d 133->134 139 52857b-52858c call 528389 135->139 140 528618 135->140 136->135 138 52855b-52856c 136->138 143 528614-528616 138->143 146 528594-5285c8 139->146 147 52858e-528592 139->147 141 52861b 140->141 141->134 143->141 154 5285ca-5285cd 146->154 155 5285eb-5285f3 146->155 148 5285db call 527c6e 147->148 151 5285e0-5285e4 148->151 151->143 153 5285e6-5285e9 151->153 153->143 154->155 156 5285cf-5285d3 154->156 157 5285f5-528606 call 532746 155->157 158 528608-528612 155->158 156->140 159 5285d5-5285d8 156->159 157->140 157->158 158->140 158->143 159->148
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: -lR
                                              • API String ID: 0-2214140114
                                              • Opcode ID: 110a8ab1c36114e3631bfe4406143cdf1de7d0f7df094fb1b6159f7af64dd40e
                                              • Instruction ID: 788a02fc8d80e6ef2b9c832fe6c97ae337503ddbeee7b21a9e23b3a8962b999b
                                              • Opcode Fuzzy Hash: 110a8ab1c36114e3631bfe4406143cdf1de7d0f7df094fb1b6159f7af64dd40e
                                              • Instruction Fuzzy Hash: 1031687290252AAFCF14CFA4E8849FDBBB9BF1A310B144556E501A77D1DB31F944CBA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 162 547d50-547d99 call 526330 FreeConsole call 5294e4 166 547d9e-547da3 162->166 167 547da5-547dae call 547010 166->167 168 547db9-547dd3 166->168 167->168 171 547db0-547db4 call 547590 167->171 171->168
                                              APIs
                                              • FreeConsole.KERNELBASE(00000000,0000001F), ref: 00547D8A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ConsoleFree
                                              • String ID: Illkjmuueghu %d
                                              • API String ID: 771614528-1805681028
                                              • Opcode ID: b9c4047ba4c9a4900976330c42bc2bdf06cade384b12d2928016a6339003eab7
                                              • Instruction ID: 919ca706f4815fa1c77523774bfaf8c1754e2ada9ea37d52111c07f61feaf82f
                                              • Opcode Fuzzy Hash: b9c4047ba4c9a4900976330c42bc2bdf06cade384b12d2928016a6339003eab7
                                              • Instruction Fuzzy Hash: 8A01DB75E04249ABDB109B699C0ABEEBFE8FB49728F000A25F915D73C2EB7295044691

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 173 53a2f4-53a313 174 53a319-53a31b 173->174 175 53a4ed 173->175 176 53a347-53a36d 174->176 177 53a31d-53a33c call 52e052 174->177 178 53a4ef-53a4f3 175->178 179 53a373-53a379 176->179 180 53a36f-53a371 176->180 186 53a33f-53a342 177->186 179->177 182 53a37b-53a385 179->182 180->179 180->182 184 53a387-53a392 call 53b87a 182->184 185 53a395-53a3a0 call 539e78 182->185 184->185 191 53a3e2-53a3f4 185->191 192 53a3a2-53a3a7 185->192 186->178 193 53a3f6-53a3fc 191->193 194 53a445-53a465 WriteFile 191->194 195 53a3a9-53a3ad 192->195 196 53a3cc-53a3e0 call 539a3e 192->196 200 53a433-53a43e call 539ef6 193->200 201 53a3fe-53a401 193->201 197 53a470 194->197 198 53a467-53a46d GetLastError 194->198 202 53a3b3-53a3c2 call 539e10 195->202 203 53a4b5-53a4c7 195->203 212 53a3c5-53a3c7 196->212 205 53a473-53a47e 197->205 198->197 218 53a443 200->218 206 53a403-53a406 201->206 207 53a421-53a431 call 53a0ba 201->207 202->212 208 53a4d1-53a4e3 203->208 209 53a4c9-53a4cf 203->209 213 53a480-53a485 205->213 214 53a4e8-53a4eb 205->214 206->203 215 53a40c-53a417 call 539fd1 206->215 223 53a41c-53a41f 207->223 208->186 209->175 209->208 212->205 219 53a4b3 213->219 220 53a487-53a48c 213->220 214->178 215->223 218->223 219->203 224 53a4a5-53a4ae call 532b50 220->224 225 53a48e-53a4a0 220->225 223->212 224->186 225->186
                                              APIs
                                                • Part of subcall function 00539A3E: GetConsoleOutputCP.KERNEL32(BDD10849,00000000,00000000,00000000), ref: 00539AA1
                                              • WriteFile.KERNEL32(?,00000000,00000000,00531810,00000000,00000000,00000000,00000000,00000000,?,00531810,00000000,?,00553088,00000010,00000000), ref: 0053A45D
                                              • GetLastError.KERNEL32(?,00531810,00000000,?,00553088,00000010,00000000,00000000,00000000,00000000,00000000), ref: 0053A467
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ConsoleErrorFileLastOutputWrite
                                              • String ID:
                                              • API String ID: 2915228174-0
                                              • Opcode ID: 7aee9661956af60d6d3fe7d01a2336362c9cf1552a83ff79c027780633a5143d
                                              • Instruction ID: 57239d2b09bbc685de222b94023f5fca2a0a5ad5bb8966675855fb91de28628d
                                              • Opcode Fuzzy Hash: 7aee9661956af60d6d3fe7d01a2336362c9cf1552a83ff79c027780633a5143d
                                              • Instruction Fuzzy Hash: 8361C5B1D04259AFDF11CFA8C888EEEBFB9BF49304F144455E890AB252E371D905CB62

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 228 539ef6-539f4b call 52a460 231 539fc0-539fd0 call 52982d 228->231 232 539f4d 228->232 233 539f53 232->233 235 539f59-539f5b 233->235 237 539f75-539f9a WriteFile 235->237 238 539f5d-539f62 235->238 241 539fb8-539fbe GetLastError 237->241 242 539f9c-539fa7 237->242 239 539f64-539f6a 238->239 240 539f6b-539f73 238->240 239->240 240->235 240->237 241->231 242->231 243 539fa9-539fb4 242->243 243->233 244 539fb6 243->244 244->231
                                              APIs
                                              • WriteFile.KERNELBASE(?,?,?,?,00000000,00000000,00000000,00000000,?,0053A443,?,00000000,00000000,00000000,00000000,00000000), ref: 00539F92
                                              • GetLastError.KERNEL32(?,0053A443,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00531810,00000000,?,00553088,00000010), ref: 00539FB8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ErrorFileLastWrite
                                              • String ID:
                                              • API String ID: 442123175-0
                                              • Opcode ID: 4017831e56e32fb9be00624ee9852c1ebfd3d5cce3c92a78ef14a439ba607a28
                                              • Instruction ID: d63aafc065a81e45fabe409092e0c778fad33437e0e9c7f39d5d6f6799ceb9f5
                                              • Opcode Fuzzy Hash: 4017831e56e32fb9be00624ee9852c1ebfd3d5cce3c92a78ef14a439ba607a28
                                              • Instruction Fuzzy Hash: 5A21A375A002199BCF16CF29DC809EDBBB9FF89305F1484A9E90AD7251D670DE46CFA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 245 5374f3-5374f8 246 5374fa-537512 245->246 247 537520-537529 246->247 248 537514-537518 246->248 250 53753b 247->250 251 53752b-53752e 247->251 248->247 249 53751a-53751e 248->249 252 537595-537599 249->252 255 53753d-53754a GetStdHandle 250->255 253 537530-537535 251->253 254 537537-537539 251->254 252->246 256 53759f-5375a2 252->256 253->255 254->255 257 537577-537589 255->257 258 53754c-53754e 255->258 257->252 259 53758b-53758e 257->259 258->257 260 537550-537559 GetFileType 258->260 259->252 260->257 261 53755b-537564 260->261 262 537566-53756a 261->262 263 53756c-53756f 261->263 262->252 263->252 264 537571-537575 263->264 264->252
                                              APIs
                                              • GetStdHandle.KERNEL32(000000F6), ref: 0053753F
                                              • GetFileType.KERNELBASE(00000000), ref: 00537551
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: FileHandleType
                                              • String ID:
                                              • API String ID: 3000768030-0
                                              • Opcode ID: 0eeba1e469c89990dd7d910846c9c879c795b3dfb954e6a793af7797961ab28c
                                              • Instruction ID: 07a643a5e8991f55d6d082fabf94174fad6d74a97b60ad867b1fb0aaf2db47d8
                                              • Opcode Fuzzy Hash: 0eeba1e469c89990dd7d910846c9c879c795b3dfb954e6a793af7797961ab28c
                                              • Instruction Fuzzy Hash: 8B1190B190C74947D7384E3E9C886266F95B75E330F380B5DD0B69A1F1C630D985D651

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 265 53663b-536644 266 536673-536674 265->266 267 536646-536659 RtlFreeHeap 265->267 267->266 268 53665b-536672 GetLastError call 532aea call 532b87 267->268 268->266
                                              APIs
                                              • RtlFreeHeap.NTDLL(00000000,00000000,?,0053E6B3,?,00000000,?,?,0053E954,?,00000007,?,?,0053EE4D,?,?), ref: 00536651
                                              • GetLastError.KERNEL32(?,?,0053E6B3,?,00000000,?,?,0053E954,?,00000007,?,?,0053EE4D,?,?), ref: 0053665C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ErrorFreeHeapLast
                                              • String ID:
                                              • API String ID: 485612231-0
                                              • Opcode ID: 75ce134565930e85ab3765c84e87b1bb44deeb229315c64a4dca56c2c4f12476
                                              • Instruction ID: 4ff0bd1f6fe91ba5b21dbe333fa30b98869c2a31abe16609d131c2c53f0ac139
                                              • Opcode Fuzzy Hash: 75ce134565930e85ab3765c84e87b1bb44deeb229315c64a4dca56c2c4f12476
                                              • Instruction Fuzzy Hash: 66E08C32100614ABCB112FA0EC0DBEA3F68BB91799F044025F60CDA4A0CA308985E798

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 305 547c30-547c9f call 521900 call 5294e4 310 547ca1-547caf call 5470c0 305->310 311 547cb2-547d0c VirtualAlloc call 5478a0 call 52a950 call 5475d0 305->311 310->311 321 547d35-547d45 call 52982d 311->321 322 547d0e-547d19 311->322 323 547d2b-547d2d call 529514 322->323 324 547d1b-547d29 322->324 330 547d32 323->330 324->323 326 547d46-547d4b call 52e0df 324->326 330->321
                                              APIs
                                              • VirtualAlloc.KERNELBASE(00000000,000004AC,00001000,00000040), ref: 00547CC0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 3ec0135f9e63189a7543f440eb4ec7fff1fe1e5bd6f48f4e365a56d1ba6d6889
                                              • Instruction ID: 373d2248df7aadb7bc21b0df9741ba22b6102a4f6755bb5711e4d25d8606bb73
                                              • Opcode Fuzzy Hash: 3ec0135f9e63189a7543f440eb4ec7fff1fe1e5bd6f48f4e365a56d1ba6d6889
                                              • Instruction Fuzzy Hash: 2631C971E002596BD700AF64DC89BEDBBB4BF5D304F144259F50477282EB746A848764
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: __floor_pentium4
                                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                              • API String ID: 4168288129-2761157908
                                              • Opcode ID: a4ab409d50cc4c0a993de20da37aed43e472218471b8bd3eb9c7f689164b8ec3
                                              • Instruction ID: 0ebec2e4b60e6efa2da155aafcde379d45558a3aab6ebe1f63007aae4f46e1f9
                                              • Opcode Fuzzy Hash: a4ab409d50cc4c0a993de20da37aed43e472218471b8bd3eb9c7f689164b8ec3
                                              • Instruction Fuzzy Hash: E6D22871E086298FDB65CE28DD447EABBB5FB84308F1445EAD40DE7240EB74AE858F44
                                              APIs
                                              • GetLocaleInfoW.KERNEL32(?,2000000B,0054017C,00000002,00000000,?,?,?,0054017C,?,00000000), ref: 0053FEF7
                                              • GetLocaleInfoW.KERNEL32(?,20001004,0054017C,00000002,00000000,?,?,?,0054017C,?,00000000), ref: 0053FF20
                                              • GetACP.KERNEL32(?,?,0054017C,?,00000000), ref: 0053FF35
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: InfoLocale
                                              • String ID: ACP$OCP
                                              • API String ID: 2299586839-711371036
                                              • Opcode ID: 5765764b3ab6ebf60e14b0dbb3c0ac2e5216daebac23baca4380c54d7bdd335b
                                              • Instruction ID: 27a340db9414e7e07bde61ef09da24503adb5fb237c5f97bd365ea337db1dc2e
                                              • Opcode Fuzzy Hash: 5765764b3ab6ebf60e14b0dbb3c0ac2e5216daebac23baca4380c54d7bdd335b
                                              • Instruction Fuzzy Hash: AB21D732E00101AADB70CF64D905AAB7BAAFF55B54F568834FD0AD7221E732DD41E350
                                              APIs
                                                • Part of subcall function 00536350: GetLastError.KERNEL32(?,00000008,0053694F), ref: 00536354
                                                • Part of subcall function 00536350: SetLastError.KERNEL32(00000000,00000001,00000005,000000FF), ref: 005363F6
                                              • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 0054013F
                                              • IsValidCodePage.KERNEL32(00000000), ref: 00540188
                                              • IsValidLocale.KERNEL32(?,00000001), ref: 00540197
                                              • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 005401DF
                                              • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 005401FE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                              • String ID:
                                              • API String ID: 415426439-0
                                              • Opcode ID: 5a9b694ccad1606557900b6d483f9d7d1c23a9eb2e06e4125614d4bfbc40980b
                                              • Instruction ID: c61a550058ed985a65643d47b61fbe094fcfb863a5898c7457cc3f5d6e4e3566
                                              • Opcode Fuzzy Hash: 5a9b694ccad1606557900b6d483f9d7d1c23a9eb2e06e4125614d4bfbc40980b
                                              • Instruction Fuzzy Hash: 0F518172A0020AABDB10DFA4CC45BFE7BB8BF59704F245429EA14EB190DB70D944DB61
                                              APIs
                                                • Part of subcall function 00536350: GetLastError.KERNEL32(?,00000008,0053694F), ref: 00536354
                                                • Part of subcall function 00536350: SetLastError.KERNEL32(00000000,00000001,00000005,000000FF), ref: 005363F6
                                              • GetACP.KERNEL32(?,?,?,?,?,?,00534EF0,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 0053F790
                                              • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00534EF0,?,?,?,00000055,?,-00000050,?,?), ref: 0053F7BB
                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 0053F91E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ErrorLast$CodeInfoLocalePageValid
                                              • String ID: utf8
                                              • API String ID: 607553120-905460609
                                              • Opcode ID: fc298077b545e6d3742210103c8b2c4bed37c5513cec2fada783f90e07c561bf
                                              • Instruction ID: 89354b0d75ce7061685ce710a26d2a2b55f5320fb72756926cfffd3521ed9358
                                              • Opcode Fuzzy Hash: fc298077b545e6d3742210103c8b2c4bed37c5513cec2fada783f90e07c561bf
                                              • Instruction Fuzzy Hash: A271B972E00206AAEB28AB74CC4AFA6BBA8FF45744F14447AF505D7181EB74DD45C760
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: _strrchr
                                              • String ID:
                                              • API String ID: 3213747228-0
                                              • Opcode ID: c6eacb7953bbba39f711a7e71ff673c16b34cf1b21946f2f6922c52105c3e655
                                              • Instruction ID: d9a54762d13fda3415daa393eb86967f1ea8d6fb0327e96f1e86201dff470b1f
                                              • Opcode Fuzzy Hash: c6eacb7953bbba39f711a7e71ff673c16b34cf1b21946f2f6922c52105c3e655
                                              • Instruction Fuzzy Hash: 78B149B2E0865A9FDB25CF68C881BEEBFA5FF5D310F14456AE405AB242D2349D01C7A0
                                              APIs
                                              • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00529EFB
                                              • IsDebuggerPresent.KERNEL32 ref: 00529FC7
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00529FE0
                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 00529FEA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                              • String ID:
                                              • API String ID: 254469556-0
                                              • Opcode ID: 14b7dd27583396d27d01840b3b462f8946b0ca49b1f7105b2293d17d4b0fda4e
                                              • Instruction ID: 81346fbeca86a7ba87d272e2e846866d2f4ed73f2d929a09d532ce2dfba7ee8c
                                              • Opcode Fuzzy Hash: 14b7dd27583396d27d01840b3b462f8946b0ca49b1f7105b2293d17d4b0fda4e
                                              • Instruction Fuzzy Hash: FC311A75C013299BDB21DF64D84D7CDBBB8BF59300F10419AE50DA7290EB719A889F45
                                              APIs
                                                • Part of subcall function 00536350: GetLastError.KERNEL32(?,00000008,0053694F), ref: 00536354
                                                • Part of subcall function 00536350: SetLastError.KERNEL32(00000000,00000001,00000005,000000FF), ref: 005363F6
                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0053FB36
                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0053FB80
                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0053FC46
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: InfoLocale$ErrorLast
                                              • String ID:
                                              • API String ID: 661929714-0
                                              • Opcode ID: fed83b30cc917216bf1a61870a8a879cfe94e8c61bec6b188426e16158ae2c11
                                              • Instruction ID: eca11557a6fb1f082b8b2bb733639b98515e5e682b9826dba10d97c717bbde60
                                              • Opcode Fuzzy Hash: fed83b30cc917216bf1a61870a8a879cfe94e8c61bec6b188426e16158ae2c11
                                              • Instruction Fuzzy Hash: A561AD7194420B9FEB289F28DC86BBABBA8FF04304F20447AED05C6585EB34DD91DB50
                                              APIs
                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000001), ref: 0052DFCB
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000001), ref: 0052DFD5
                                              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000001), ref: 0052DFE2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                              • String ID:
                                              • API String ID: 3906539128-0
                                              • Opcode ID: d07e35309131663fa57df10d1ceceaaf8c28754d46d3d1b3e9dfa511d0683b67
                                              • Instruction ID: 45735a7e193b4f077de27ca6f61c252e0282ec6a8db80b6e928b04e9cd804236
                                              • Opcode Fuzzy Hash: d07e35309131663fa57df10d1ceceaaf8c28754d46d3d1b3e9dfa511d0683b67
                                              • Instruction Fuzzy Hash: E731D47490122DABCB21DF24DC88BDDBBB8BF59310F5041DAE41CA7291EB309B858F55
                                              APIs
                                              • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00535A56,?,20001004,00000000,00000002,?,?,00535058), ref: 0053712F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: InfoLocale
                                              • String ID: -lR
                                              • API String ID: 2299586839-2214140114
                                              • Opcode ID: 36b555a1b658dfc772ace3c6df1dbae6e1fcd7a243bf35ec6d105bd863bd1517
                                              • Instruction ID: 4ba4deef10dcba80f3078637a53be66297250d8fbf29e13a0a322c0f1fdb38fb
                                              • Opcode Fuzzy Hash: 36b555a1b658dfc772ace3c6df1dbae6e1fcd7a243bf35ec6d105bd863bd1517
                                              • Instruction Fuzzy Hash: BFE01A7694421DBBCB222F61DC09AAE7F25FB59761F044011FC05661608B318D21EAD0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2692ef2465f7c715e646551b9f84a9b96eae746530df55d46b013212d61f18f7
                                              • Instruction ID: fd3f4a59c0c85e4b3474320be6282f4cc0d94c9218c4464ddcef7112d8467056
                                              • Opcode Fuzzy Hash: 2692ef2465f7c715e646551b9f84a9b96eae746530df55d46b013212d61f18f7
                                              • Instruction Fuzzy Hash: 83F13E71E006199FDF18CF68C8846ADBBB1FF88314F158269E815EB395D731AE45CB90
                                              APIs
                                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0053BC8D,?,?,00000008,?,?,00544202,00000000), ref: 0053BEBF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ExceptionRaise
                                              • String ID:
                                              • API String ID: 3997070919-0
                                              • Opcode ID: 6928190ff74c186704e969a4af716cde2ba39427cc8e3dd48169d6a84ba3509b
                                              • Instruction ID: 6e7c1f77c019a60f31b52e1aafd6fc0eb13906211894a3c374c660f67373ae2c
                                              • Opcode Fuzzy Hash: 6928190ff74c186704e969a4af716cde2ba39427cc8e3dd48169d6a84ba3509b
                                              • Instruction Fuzzy Hash: 92B11A35610609DFEB15CF2CC486BA57FA0FF45364F298658EA9ACF2A1C335E991CB40
                                              APIs
                                              • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00529CAB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: FeaturePresentProcessor
                                              • String ID:
                                              • API String ID: 2325560087-0
                                              • Opcode ID: bc3a05ca9057ddc936142ec1374b37c2e0a995d19cda3e0e5a13ef27f079f35e
                                              • Instruction ID: ff5673b8f92f9712fa0be9dd9ec54394c955b728e2e68bb4d15da656cb03463f
                                              • Opcode Fuzzy Hash: bc3a05ca9057ddc936142ec1374b37c2e0a995d19cda3e0e5a13ef27f079f35e
                                              • Instruction Fuzzy Hash: 55517AB1A103598FEB14CF69E8C57AABBF9FB49310F14842AD819EB3A0D7759904CF50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 75a56c14251f2176ed564e858b9a0c9924faca1bed559dfacb45f5f09b5cd704
                                              • Instruction ID: 86bc40386b0332dd27c2620667f98879d518312e8aa093c1e5bbd01fb4ec54f9
                                              • Opcode Fuzzy Hash: 75a56c14251f2176ed564e858b9a0c9924faca1bed559dfacb45f5f09b5cd704
                                              • Instruction Fuzzy Hash: 2041A47680421DAEDB20DF69CC89AEABFB9FF85304F1442D9E419E3201DA359E458F10
                                              APIs
                                                • Part of subcall function 00536350: GetLastError.KERNEL32(?,00000008,0053694F), ref: 00536354
                                                • Part of subcall function 00536350: SetLastError.KERNEL32(00000000,00000001,00000005,000000FF), ref: 005363F6
                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0053FD89
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ErrorLast$InfoLocale
                                              • String ID:
                                              • API String ID: 3736152602-0
                                              • Opcode ID: a4f6739c5385c9e2f051907e825022fecbbf4e0adaf149d30b62faeec1308424
                                              • Instruction ID: 28648b2bf310a538952371534e28dd5dd36279d2b24bd3f8e552b51b884e99c9
                                              • Opcode Fuzzy Hash: a4f6739c5385c9e2f051907e825022fecbbf4e0adaf149d30b62faeec1308424
                                              • Instruction Fuzzy Hash: DF21B072A10207ABDB289E24DC4AEBA7BA8FF55305F10447AFD02DB141EB35ED44CB50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0
                                              • API String ID: 0-4108050209
                                              • Opcode ID: cd625ae76308d19fbeeb198155a63df799f76d820ed7533acb3f104a3ac2da33
                                              • Instruction ID: 0dc8f2d659d4482ce8951545cf4eb657db6d6683b662733fbf9060eb2b90c95b
                                              • Opcode Fuzzy Hash: cd625ae76308d19fbeeb198155a63df799f76d820ed7533acb3f104a3ac2da33
                                              • Instruction Fuzzy Hash: 7AB1E57090071A8BCB28CF68DAA96BFBFB1BF46300F14192AE456D72D1D731A946CB51
                                              APIs
                                                • Part of subcall function 00536350: GetLastError.KERNEL32(?,00000008,0053694F), ref: 00536354
                                                • Part of subcall function 00536350: SetLastError.KERNEL32(00000000,00000001,00000005,000000FF), ref: 005363F6
                                              • EnumSystemLocalesW.KERNEL32(0053FAE2,00000001,00000000,?,-00000050,?,00540113,00000000,?,?,?,00000055,?), ref: 0053FA2E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ErrorLast$EnumLocalesSystem
                                              • String ID:
                                              • API String ID: 2417226690-0
                                              • Opcode ID: d8cfc478d418cfdda9cd61983864e7c533a2c55c2bb723c61bf4fa261a717cbf
                                              • Instruction ID: c589061378720036e4c732193ac87a63ae01f850a59e1319fa611de356ae0b67
                                              • Opcode Fuzzy Hash: d8cfc478d418cfdda9cd61983864e7c533a2c55c2bb723c61bf4fa261a717cbf
                                              • Instruction Fuzzy Hash: A611E9376007019FDB189F39C8956BABBD1FF84359F14443DE98A47B40E7716942C740
                                              APIs
                                                • Part of subcall function 00536350: GetLastError.KERNEL32(?,00000008,0053694F), ref: 00536354
                                                • Part of subcall function 00536350: SetLastError.KERNEL32(00000000,00000001,00000005,000000FF), ref: 005363F6
                                              • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0053FDDF,00000000,00000000,?), ref: 0053FF90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ErrorLast$InfoLocale
                                              • String ID:
                                              • API String ID: 3736152602-0
                                              • Opcode ID: b2674a5d5cb6f7b2d9e197e08590812bcd191872f4818cd861ea1a234c2fac0d
                                              • Instruction ID: ab703c91021a1415aa915798f4ae90577f6063cd215c3640b474254bd91a9f39
                                              • Opcode Fuzzy Hash: b2674a5d5cb6f7b2d9e197e08590812bcd191872f4818cd861ea1a234c2fac0d
                                              • Instruction Fuzzy Hash: C4F0A936E101227BDB289724C805ABA7F54FB41758F154839ED16E3180DB74FD41C790
                                              APIs
                                                • Part of subcall function 00536350: GetLastError.KERNEL32(?,00000008,0053694F), ref: 00536354
                                                • Part of subcall function 00536350: SetLastError.KERNEL32(00000000,00000001,00000005,000000FF), ref: 005363F6
                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 0053F91E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ErrorLast$InfoLocale
                                              • String ID: utf8
                                              • API String ID: 3736152602-905460609
                                              • Opcode ID: 4ca2b281868e0bef51069f8386dd4c6ddc8e41c05136a9709934d2044bcc4abe
                                              • Instruction ID: b9030e896b0cd823f10e0d7a14250d2fb2ccda8b49bfd120bbb97475fc77c124
                                              • Opcode Fuzzy Hash: 4ca2b281868e0bef51069f8386dd4c6ddc8e41c05136a9709934d2044bcc4abe
                                              • Instruction Fuzzy Hash: 2DF0A432A0010AABD714AB34DC4AEFE77A8EF85715F15407AB606D7281EA74AD059790
                                              APIs
                                                • Part of subcall function 00536350: GetLastError.KERNEL32(?,00000008,0053694F), ref: 00536354
                                                • Part of subcall function 00536350: SetLastError.KERNEL32(00000000,00000001,00000005,000000FF), ref: 005363F6
                                              • EnumSystemLocalesW.KERNEL32(0053FD35,00000001,?,?,-00000050,?,005400D7,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 0053FAA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ErrorLast$EnumLocalesSystem
                                              • String ID:
                                              • API String ID: 2417226690-0
                                              • Opcode ID: c9dba276dddaa2aa909e92efdb0986688b3848a6c0c20701eea0c14958d3a507
                                              • Instruction ID: 3a9d438e35afb44e2045dd779c3a03e9005c1a7d0d58e80ab829fccee92b3a46
                                              • Opcode Fuzzy Hash: c9dba276dddaa2aa909e92efdb0986688b3848a6c0c20701eea0c14958d3a507
                                              • Instruction Fuzzy Hash: DFF0F6366003055FDB249F75D885A7A7FD1FF80368F05443DFA4A8B680CA719C02C750
                                              APIs
                                                • Part of subcall function 00530CB9: EnterCriticalSection.KERNEL32(?,?,0053369F,00000000,005531C8,0000000C,00533666,?,?,00536B9E,?,?,005364EE,00000001,00000364,?), ref: 00530CC8
                                              • EnumSystemLocalesW.KERNEL32(00536BC8,00000001,005533B8,0000000C,00536FF7,00000000), ref: 00536C0D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: CriticalEnterEnumLocalesSectionSystem
                                              • String ID:
                                              • API String ID: 1272433827-0
                                              • Opcode ID: 38c0265d7702e4a1916ca4b5cf7b4f4deca2d58873603f544c2347a11436aed2
                                              • Instruction ID: 24165dff06239e3a7fb77b8678d978fc5a9777baaf62bb6b7a11d3f6ffb3b2a0
                                              • Opcode Fuzzy Hash: 38c0265d7702e4a1916ca4b5cf7b4f4deca2d58873603f544c2347a11436aed2
                                              • Instruction Fuzzy Hash: 20F01932A00305EFD700EF58E856B98BBE1FB45725F10516AF8159B2A1CA754A08CB90
                                              APIs
                                                • Part of subcall function 00536350: GetLastError.KERNEL32(?,00000008,0053694F), ref: 00536354
                                                • Part of subcall function 00536350: SetLastError.KERNEL32(00000000,00000001,00000005,000000FF), ref: 005363F6
                                              • EnumSystemLocalesW.KERNEL32(0053F8CA,00000001,?,?,?,00540135,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 0053F9A8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ErrorLast$EnumLocalesSystem
                                              • String ID:
                                              • API String ID: 2417226690-0
                                              • Opcode ID: 56cfabcb718522590e151585aee150a337b13c1ce182c7518880520a1d2db25a
                                              • Instruction ID: f323a9ade250c72479ad97f52067bacc71af73599e017d78283f8f76e0783363
                                              • Opcode Fuzzy Hash: 56cfabcb718522590e151585aee150a337b13c1ce182c7518880520a1d2db25a
                                              • Instruction Fuzzy Hash: 4FF0E53A70020567CB089F35D8557BABF94FFC6754F4A406DEA098B250C6719843C790
                                              APIs
                                              • SetUnhandledExceptionFilter.KERNEL32(Function_0000A057,00529916), ref: 0052A050
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled
                                              • String ID:
                                              • API String ID: 3192549508-0
                                              • Opcode ID: a0e1e4ecbb2359faa34755ce4fb1c1d08d8febdd70931a8bef25eaf6dbc252b7
                                              • Instruction ID: 8861a4819c5f5fae0f16db4e3250a82d0cb29fee0d2c1e2154bdf7262eaca06a
                                              • Opcode Fuzzy Hash: a0e1e4ecbb2359faa34755ce4fb1c1d08d8febdd70931a8bef25eaf6dbc252b7
                                              • Instruction Fuzzy Hash:
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: HeapProcess
                                              • String ID:
                                              • API String ID: 54951025-0
                                              • Opcode ID: 1715ef7f1c3d2340d97ba1f4c852e4370662c7a8b8ded6b2e2d187cf409290b2
                                              • Instruction ID: c827f2e46ecd2f77f8e3fd0d4072a9f2f958b0108f1c3a93780d7cf1461a8ecb
                                              • Opcode Fuzzy Hash: 1715ef7f1c3d2340d97ba1f4c852e4370662c7a8b8ded6b2e2d187cf409290b2
                                              • Instruction Fuzzy Hash: 74A012301003008B53004F315D8828C36E5590268030400549008C5070DA30408C7644
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fc171e892d3061e58fa2661b4fe82ab51c16a148d9ca4a8156c81c687042340a
                                              • Instruction ID: 8d4c94566003ada41dd83bb63b5771626a7de3eadb219d3ee823049eee2422e0
                                              • Opcode Fuzzy Hash: fc171e892d3061e58fa2661b4fe82ab51c16a148d9ca4a8156c81c687042340a
                                              • Instruction Fuzzy Hash: 72D11971E086298FDB25CE28DC807E9BBB5FB85358F1445EAD40DE7240DB78AE858F44
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 913097a76a2aa3f9716249509b8196a2f4b16ccbac58342a843d0fa289859693
                                              • Instruction ID: c63e321deb9560ab25937fa99d57d3812009fbe7ab7cfd7cbc4506e7ddca4725
                                              • Opcode Fuzzy Hash: 913097a76a2aa3f9716249509b8196a2f4b16ccbac58342a843d0fa289859693
                                              • Instruction Fuzzy Hash: BBE04632911228EBCB29DB88C90899ABBACFB85B00F11409AB501D3100C670DE00D7D0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ad2e9a7be51ed71085fad7bcd48806db607c783d97970506649736f56e1902a2
                                              • Instruction ID: 2dbe0eac85a2e8d184ff8ee4651d23280d2d6bad96f5f14f206e5837da5926d3
                                              • Opcode Fuzzy Hash: ad2e9a7be51ed71085fad7bcd48806db607c783d97970506649736f56e1902a2
                                              • Instruction Fuzzy Hash: 0DC08C35021E0046CF29891082B13B437F4B3D1782F80048CC4430B682CA1E9D83DA00
                                              APIs
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 005220A5
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 005220BF
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 005220E0
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00522138
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 0052217D
                                              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 005221CE
                                              • __Getctype.LIBCPMT ref: 005221E5
                                              • std::_Facet_Register.LIBCPMT ref: 0052220F
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00522228
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeLocinfo::_Locinfo_ctorRegister
                                              • String ID: bad locale name
                                              • API String ID: 2236780835-1405518554
                                              • Opcode ID: 17b8267484b78603201674d1caf385fdb1386055106bba40cec7184af2189e76
                                              • Instruction ID: c056cc8386133068516d69b006f6449b09e3f29eb1a296195ad781fd8bfcaec3
                                              • Opcode Fuzzy Hash: 17b8267484b78603201674d1caf385fdb1386055106bba40cec7184af2189e76
                                              • Instruction Fuzzy Hash: 4041DF395043A19FC311DF58E884B5ABFE1BFD6710F14495CF8889B291DB31E94ACB92
                                              APIs
                                              • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00529450
                                              • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 0052945E
                                              • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 0052946F
                                              • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 00529480
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: AddressProc$HandleModule
                                              • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                              • API String ID: 667068680-1247241052
                                              • Opcode ID: 5c768cc590e025e5a0307baabdf4c914b770cc1c80ea28886e8b74ae20a9f8e4
                                              • Instruction ID: 8ba30ddf2667da61eefa2ebda48aa7cea683cb0cd84828f4cd8c7f0f7e13d712
                                              • Opcode Fuzzy Hash: 5c768cc590e025e5a0307baabdf4c914b770cc1c80ea28886e8b74ae20a9f8e4
                                              • Instruction Fuzzy Hash: 39E08CB5960360AF87019F74BC0E8DE3FAAFE2A71D3204012F61CD3220DE7004089BA0
                                              APIs
                                              • type_info::operator==.LIBVCRUNTIME ref: 0052CF51
                                              • ___TypeMatch.LIBVCRUNTIME ref: 0052D05F
                                              • _UnwindNestedFrames.LIBCMT ref: 0052D1B1
                                              • CallUnexpected.LIBVCRUNTIME ref: 0052D1CC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                              • String ID: csm$csm$csm
                                              • API String ID: 2751267872-393685449
                                              • Opcode ID: 45ab5721b43d1c61d622b3cc0804e56312e71258e63118875eb75bec1dbb87ca
                                              • Instruction ID: 07fbbc29f97eee7bd3a3a15a1327f3c120aaf737c579bc3eaf5ccca668b98072
                                              • Opcode Fuzzy Hash: 45ab5721b43d1c61d622b3cc0804e56312e71258e63118875eb75bec1dbb87ca
                                              • Instruction Fuzzy Hash: 7BB1BE3180022ADFCF19DFA4E9859AEBFB5FF56310F14415AE8016B292D731DA61CFA1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID: 0-3907804496
                                              • Opcode ID: 1fdb346767efe49b9b0cd11e84885f8a5295f58cf86569405216c85c0554aa07
                                              • Instruction ID: bd0a11fff86b8664f836a4781a78aec6e4e26f74966fca3ca1b6112bee7f5aa9
                                              • Opcode Fuzzy Hash: 1fdb346767efe49b9b0cd11e84885f8a5295f58cf86569405216c85c0554aa07
                                              • Instruction Fuzzy Hash: 2DB104B0A0034AAFEF11DF99C895BBDBFB2BF95314F144158E604AB292D7709D42CB61
                                              APIs
                                              • _ValidateLocalCookies.LIBCMT ref: 0052C937
                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 0052C93F
                                              • _ValidateLocalCookies.LIBCMT ref: 0052C9C8
                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 0052C9F3
                                              • _ValidateLocalCookies.LIBCMT ref: 0052CA48
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                              • String ID: -lR$csm
                                              • API String ID: 1170836740-1122130300
                                              • Opcode ID: addd2846a48b5a2b7777b227c2a41dc32c5a2eac45db6097d566fb551667fb74
                                              • Instruction ID: 74ed3646371fed90ee3565e0294dab5b3e0cb91a23aec1038157904e54934935
                                              • Opcode Fuzzy Hash: addd2846a48b5a2b7777b227c2a41dc32c5a2eac45db6097d566fb551667fb74
                                              • Instruction Fuzzy Hash: 6141D635A002299FCF10DF68E885AAEBFB5BF46324F148055E8156B3D3D731EA55CB90
                                              APIs
                                              • GetCPInfo.KERNEL32(00A44788,00A44788,?,7FFFFFFF,?,005447E4,00A44788,00A44788,?,00A44788,?,?,?,?,00A44788,?), ref: 005445BA
                                              • __alloca_probe_16.LIBCMT ref: 00544675
                                              • __alloca_probe_16.LIBCMT ref: 00544704
                                              • __freea.LIBCMT ref: 0054474F
                                              • __freea.LIBCMT ref: 00544755
                                              • __freea.LIBCMT ref: 0054478B
                                              • __freea.LIBCMT ref: 00544791
                                              • __freea.LIBCMT ref: 005447A1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: __freea$__alloca_probe_16$Info
                                              • String ID:
                                              • API String ID: 127012223-0
                                              • Opcode ID: 969cae86715de58dca9bb9d6a8b4459a844839048890c42d88c51ea417237d32
                                              • Instruction ID: 44baedd1c915efd17654c704f9735244c3a1fc5ef2bfebe220e6715f09367a79
                                              • Opcode Fuzzy Hash: 969cae86715de58dca9bb9d6a8b4459a844839048890c42d88c51ea417237d32
                                              • Instruction Fuzzy Hash: FD71D772940256AFDF219F949C85BEE7FB9FF86318F150459E904B7281D7359C028F90
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 00529169
                                              • __alloca_probe_16.LIBCMT ref: 00529195
                                              • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 005291D4
                                              • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 005291F1
                                              • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00529230
                                              • __alloca_probe_16.LIBCMT ref: 0052924D
                                              • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0052928F
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 005292B2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                              • String ID:
                                              • API String ID: 2040435927-0
                                              • Opcode ID: a7d2eb1820b0f6e99b403a66256c9c74cc9a9a7109eec62d703708f7badee12e
                                              • Instruction ID: 00bd8b7cd2f636a8a8c7a20c9d627a9f23f59e66e11754f5d03330ae6f753ae8
                                              • Opcode Fuzzy Hash: a7d2eb1820b0f6e99b403a66256c9c74cc9a9a7109eec62d703708f7badee12e
                                              • Instruction Fuzzy Hash: 7C51AE7650022AFBEF205F61EC49FAA7FA9FF86750F154425F914E6290DB309C14DBA0
                                              APIs
                                              • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,BDD10849,?,00536EAB,?,?,?,00000000), ref: 00536E5F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: FreeLibrary
                                              • String ID: api-ms-$ext-ms-
                                              • API String ID: 3664257935-537541572
                                              • Opcode ID: 80cc86c8306bb875bcf0bc44b33d2011e04f154de9d15d8427bafa95f7a2c3b8
                                              • Instruction ID: bde3cdc9a3f74f1c9e5898e20313de93c81c04dfce1e2a544f1450c7113d3925
                                              • Opcode Fuzzy Hash: 80cc86c8306bb875bcf0bc44b33d2011e04f154de9d15d8427bafa95f7a2c3b8
                                              • Instruction Fuzzy Hash: D4213079600210BBC7219B64DC44AAF3F5DFF92764F254115E906AB2D0EB70ED09E5E0
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00527C8F
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 00527C99
                                                • Part of subcall function 005233F0: std::_Lockit::_Lockit.LIBCPMT ref: 005233FF
                                                • Part of subcall function 005233F0: std::_Lockit::~_Lockit.LIBCPMT ref: 0052341A
                                              • codecvt.LIBCPMT ref: 00527CD3
                                              • std::_Facet_Register.LIBCPMT ref: 00527CEA
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00527D0A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                              • String ID: -lR
                                              • API String ID: 712880209-2214140114
                                              • Opcode ID: 48fb33c1536a8f736d3ae38d8f6811942b5c772352fa88cfa8323d780c040269
                                              • Instruction ID: 36d3d3f8fb9fa95c34fac7fddb12a56d9df3e90bde5361fac08de6810ef6977d
                                              • Opcode Fuzzy Hash: 48fb33c1536a8f736d3ae38d8f6811942b5c772352fa88cfa8323d780c040269
                                              • Instruction Fuzzy Hash: E911AF7190026A9FCB05EB68E84A5AEBFB5BF96320F140909E405A73C1EF709E00CB91
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 0052758D
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 00527598
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00527606
                                                • Part of subcall function 005276E9: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00527701
                                              • std::locale::_Setgloballocale.LIBCPMT ref: 005275B3
                                              • _Yarn.LIBCPMT ref: 005275C9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                              • String ID: -lR
                                              • API String ID: 1088826258-2214140114
                                              • Opcode ID: 1c839aafee4e539a8606e04a8898924a64f1e323d31385d98dbc18c6fef45c87
                                              • Instruction ID: f84f25a4142d3245ec9f449509424bafe755c2d17ee4793af3a2d79bd35500f1
                                              • Opcode Fuzzy Hash: 1c839aafee4e539a8606e04a8898924a64f1e323d31385d98dbc18c6fef45c87
                                              • Instruction Fuzzy Hash: 26017C75A056269BC706EF60E88A9BD7F66BFCA340B180049E806573C1DF34AE06CBD1
                                              APIs
                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BDD10849,?,?,00000000,00545E79,000000FF,?,00533A3E,?,?,00533A12,00000016), ref: 00533AE3
                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00533AF5
                                              • FreeLibrary.KERNEL32(00000000,?,00000000,00545E79,000000FF,?,00533A3E,?,?,00533A12,00000016), ref: 00533B17
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: AddressFreeHandleLibraryModuleProc
                                              • String ID: -lR$CorExitProcess$mscoree.dll
                                              • API String ID: 4061214504-112635629
                                              • Opcode ID: 2583c458e598e1f9ece4b4df4d18cbdd5b8bbbe868ab56e0dd81f2e44c9ae486
                                              • Instruction ID: 097b592b410a1b38dbfbed2aab66080c8b85dd8f5aeeb31d420d093ae9bb79f0
                                              • Opcode Fuzzy Hash: 2583c458e598e1f9ece4b4df4d18cbdd5b8bbbe868ab56e0dd81f2e44c9ae486
                                              • Instruction Fuzzy Hash: 4401D635A10619EFDB119F50CC09FFEBFB8FB04B58F000126F812A22A0DB749904CA50
                                              APIs
                                              • GetLastError.KERNEL32(?,?,0052CABB,0052B083,00526E89,BDD10849,?,?,?,00000000,00545C52,000000FF,?,005257DE,?,?), ref: 0052CAD2
                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0052CAE0
                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0052CAF9
                                              • SetLastError.KERNEL32(00000000,?,0052CABB,0052B083,00526E89,BDD10849,?,?,?,00000000,00545C52,000000FF,?,005257DE,?,?), ref: 0052CB4B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ErrorLastValue___vcrt_
                                              • String ID:
                                              • API String ID: 3852720340-0
                                              • Opcode ID: 7ea544592eeb423077e34246fa6f0baa80cc9d0bf516ddc896b605c4f74df185
                                              • Instruction ID: da7bc90c90d7f994778e1fed911e73b58945f820b4d43611875d42d6599b6d4e
                                              • Opcode Fuzzy Hash: 7ea544592eeb423077e34246fa6f0baa80cc9d0bf516ddc896b605c4f74df185
                                              • Instruction Fuzzy Hash: D60124326297326EE7242B78BC8F96E2F95FF637B5720023AF111640E2EF510C00A594
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: AdjustPointer
                                              • String ID: -lR
                                              • API String ID: 1740715915-2214140114
                                              • Opcode ID: 3958e5afc9be9e3715c6b5321cfe6259c8e90303971f02d8509db9ae53f9ab2d
                                              • Instruction ID: 4f3987b482847a2698796db02e8cd9b3d3049c5d0cc671c4895ac8c0f657891f
                                              • Opcode Fuzzy Hash: 3958e5afc9be9e3715c6b5321cfe6259c8e90303971f02d8509db9ae53f9ab2d
                                              • Instruction Fuzzy Hash: 0851D1726046629FDB298F14F845BAE7FA4FF46310F244539E819972D2E731AC80CB90
                                              APIs
                                              • __alloca_probe_16.LIBCMT ref: 005394FC
                                              • __alloca_probe_16.LIBCMT ref: 005395BD
                                              • __freea.LIBCMT ref: 00539624
                                                • Part of subcall function 0053762F: HeapAlloc.KERNEL32(00000000,?,?,?,005294FE,?,?,0052193D,?,?,00547C5E,?,?), ref: 00537661
                                              • __freea.LIBCMT ref: 00539639
                                              • __freea.LIBCMT ref: 00539649
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: __freea$__alloca_probe_16$AllocHeap
                                              • String ID:
                                              • API String ID: 1096550386-0
                                              • Opcode ID: f4ef57bf97c65fab3b8144759152d3ae3acbe1aa51e7f62b3d2131bd3490b8ab
                                              • Instruction ID: 82794490fdffeeb3a4273156dee6b92d90dcaffa34eaed52fbb0c8acb1338665
                                              • Opcode Fuzzy Hash: f4ef57bf97c65fab3b8144759152d3ae3acbe1aa51e7f62b3d2131bd3490b8ab
                                              • Instruction Fuzzy Hash: 265180B2A01116AFEB219EA4DC86DEB7FA9FF84350F150528FC05D6250E6B1CD5097A0
                                              APIs
                                              • GetCurrentThreadId.KERNEL32 ref: 00527086
                                              • AcquireSRWLockExclusive.KERNEL32(?,?,00000000,?,005253D4,?,?,?,?,?), ref: 005270A5
                                              • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,?,005253D4,?,?,?,?,?), ref: 005270D3
                                              • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,?,005253D4,?,?,?,?,?), ref: 0052712E
                                              • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,?,005253D4,?,?,?,?,?), ref: 00527145
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: AcquireExclusiveLock$CurrentThread
                                              • String ID:
                                              • API String ID: 66001078-0
                                              • Opcode ID: f755866bf60a3a1586afea738bb5c41dc0db3a7c36ccb16ad9ce11d5d0e84a0b
                                              • Instruction ID: 653fa25be927f85d19278186cb128155c1c2b9aefb85c4fa302f020b3f828be9
                                              • Opcode Fuzzy Hash: f755866bf60a3a1586afea738bb5c41dc0db3a7c36ccb16ad9ce11d5d0e84a0b
                                              • Instruction Fuzzy Hash: B3417C3190862ADFCB20DF25E8859AABBF9FF0F350B104919D446D76C0E730E959CB51
                                              APIs
                                              • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,0052DB78,?,?,00000000,?,?,?,0052DCA2,00000002,FlsGetValue,0054A0D0,FlsGetValue), ref: 0052DBD4
                                              • GetLastError.KERNEL32(?,0052DB78,?,?,00000000,?,?,?,0052DCA2,00000002,FlsGetValue,0054A0D0,FlsGetValue,?,?,0052CAE5), ref: 0052DBDE
                                              • LoadLibraryExW.KERNEL32(?,00000000,00000000,00552844,ios_base::failbit set,00000000), ref: 0052DC06
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: LibraryLoad$ErrorLast
                                              • String ID: api-ms-
                                              • API String ID: 3177248105-2084034818
                                              • Opcode ID: fd2001dd1a43953ae5d179e6b96a28c5475178c9fe26c9838cd4827180a14fe8
                                              • Instruction ID: 53f73c9d52a0fe7a10051129b78fd4e98482033e2cc8bee751b452ca82de6145
                                              • Opcode Fuzzy Hash: fd2001dd1a43953ae5d179e6b96a28c5475178c9fe26c9838cd4827180a14fe8
                                              • Instruction Fuzzy Hash: ACE01270690208F6EE101B61ED0AB6D3F69BF11B55F104420F90DB40E1DBA2D9589964
                                              APIs
                                              • GetConsoleOutputCP.KERNEL32(BDD10849,00000000,00000000,00000000), ref: 00539AA1
                                                • Part of subcall function 0053C3CA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,0053961A,?,00000000,-00000008), ref: 0053C476
                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00539CFC
                                              • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00539D44
                                              • GetLastError.KERNEL32 ref: 00539DE7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                              • String ID:
                                              • API String ID: 2112829910-0
                                              • Opcode ID: ee83f8375c98246ffc3b1b4b4447044c5ae522c90590606465137a1807cd2582
                                              • Instruction ID: e043f8593a8616d21d4f09aab2a1acfbe299d7c931ac8f7e7b339e5d50bc033b
                                              • Opcode Fuzzy Hash: ee83f8375c98246ffc3b1b4b4447044c5ae522c90590606465137a1807cd2582
                                              • Instruction Fuzzy Hash: BBD198B5E002589FCB05CFA8D885AEDBFB5FF49310F18452AE816EB352E770A941CB50
                                              APIs
                                              • std::_Throw_Cpp_error.LIBCPMT ref: 005247F6
                                              • std::_Throw_Cpp_error.LIBCPMT ref: 00524801
                                              • std::_Throw_Cpp_error.LIBCPMT ref: 00524905
                                              • std::_Throw_Cpp_error.LIBCPMT ref: 00524910
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: Cpp_errorThrow_std::_
                                              • String ID:
                                              • API String ID: 2134207285-0
                                              • Opcode ID: 5aa551c2e007ad71110fac8a0eca4de03544fd426d23c165351cf009ee830d3b
                                              • Instruction ID: 4a6432a3b517517063507767de77dbe9f934024c1812cf1f2777ed82d5697dd9
                                              • Opcode Fuzzy Hash: 5aa551c2e007ad71110fac8a0eca4de03544fd426d23c165351cf009ee830d3b
                                              • Instruction Fuzzy Hash: 6E51F2718047A56BD724EA70B80A76ABFE8BF93300F044D1DF996025D2D7B1A54CCBA3
                                              APIs
                                              • InitOnceBeginInitialize.KERNEL32(006E82A4,00000000,?,00000000,00000000,?,00000000), ref: 00525B61
                                              • InitOnceComplete.KERNEL32(006E82A4,00000000,00000000), ref: 00525B84
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: InitOnce$BeginCompleteInitialize
                                              • String ID:
                                              • API String ID: 51270584-0
                                              • Opcode ID: ed759c3ae39e9458795d50c43d71fa3859849347c55541c3dad3443c06b0e0c8
                                              • Instruction ID: eb3153adf7b6cf3b25add60b40519991921087f7054c66dfe4c5ab9d96a55209
                                              • Opcode Fuzzy Hash: ed759c3ae39e9458795d50c43d71fa3859849347c55541c3dad3443c06b0e0c8
                                              • Instruction Fuzzy Hash: D8310771A00719EFD710EF54EC4AB5ABBA4FF46710F10466AFA19972C0EB31A908CF91
                                              APIs
                                                • Part of subcall function 0053C3CA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,0053961A,?,00000000,-00000008), ref: 0053C476
                                              • GetLastError.KERNEL32 ref: 0053C6EE
                                              • __dosmaperr.LIBCMT ref: 0053C6F5
                                              • GetLastError.KERNEL32(?,?,?,?), ref: 0053C72F
                                              • __dosmaperr.LIBCMT ref: 0053C736
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                              • String ID:
                                              • API String ID: 1913693674-0
                                              • Opcode ID: 96ad46b4c3b9fcc4c9bd85b1e66744485e4dd16e29f33a06a5458c8ffac8d57a
                                              • Instruction ID: 45913d8d195c287a85af365b808f7c72a5b162b9bc9de53565a6c4068de08a3b
                                              • Opcode Fuzzy Hash: 96ad46b4c3b9fcc4c9bd85b1e66744485e4dd16e29f33a06a5458c8ffac8d57a
                                              • Instruction Fuzzy Hash: B821B371600616AF9B10AF698889D6BBFA8FF40364F10891DF919A7511DB30EC109B90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: eb3a38a3e4c69cd2bd36415bcdde27b05bd9dd74f998368cd6c55e4aa275f01d
                                              • Instruction ID: 1aae6960b1e1502d5304b8fa124fe4565dad375ac9292ea643149e228455b65e
                                              • Opcode Fuzzy Hash: eb3a38a3e4c69cd2bd36415bcdde27b05bd9dd74f998368cd6c55e4aa275f01d
                                              • Instruction Fuzzy Hash: 0521D579600206AFCB11AF65CC85D6BBFA9FF40368F108928F919D7140DB31EE00CBA0
                                              APIs
                                              • GetEnvironmentStringsW.KERNEL32 ref: 0053D628
                                                • Part of subcall function 0053C3CA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,0053961A,?,00000000,-00000008), ref: 0053C476
                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0053D660
                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0053D680
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                              • String ID:
                                              • API String ID: 158306478-0
                                              • Opcode ID: 4a14aec9d67689654ad6874788e82ee8025ad39cba881e85bbb284454c6dfecd
                                              • Instruction ID: 3dde76b96c72331079b9a3f3057b5183ae3d68ff2d1fe4ae3e0f59b2eca4f9fd
                                              • Opcode Fuzzy Hash: 4a14aec9d67689654ad6874788e82ee8025ad39cba881e85bbb284454c6dfecd
                                              • Instruction Fuzzy Hash: 5A1161F65016167F661127B6AC8FCBF6F7CFE96398F200419F816A2101EA249D019575
                                              APIs
                                              • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00542B84,00000000,00000001,00000000,00000000,?,00539E3B,00000000,00000000,00000000), ref: 00544360
                                              • GetLastError.KERNEL32(?,00542B84,00000000,00000001,00000000,00000000,?,00539E3B,00000000,00000000,00000000,00000000,00000000,?,0053A3C2,?), ref: 0054436C
                                                • Part of subcall function 00544332: CloseHandle.KERNEL32(FFFFFFFE,0054437C,?,00542B84,00000000,00000001,00000000,00000000,?,00539E3B,00000000,00000000,00000000,00000000,00000000), ref: 00544342
                                              • ___initconout.LIBCMT ref: 0054437C
                                                • Part of subcall function 005442F4: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00544323,00542B71,00000000,?,00539E3B,00000000,00000000,00000000,00000000), ref: 00544307
                                              • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,?,00542B84,00000000,00000001,00000000,00000000,?,00539E3B,00000000,00000000,00000000,00000000), ref: 00544391
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                              • String ID:
                                              • API String ID: 2744216297-0
                                              • Opcode ID: 736014c420e65740ba72912d653ceb245cb690194b62f518968c951b29b4b270
                                              • Instruction ID: d21b3f11222e55576800af8fb055754e5ff4d474c05e5fc837a03867635b68b4
                                              • Opcode Fuzzy Hash: 736014c420e65740ba72912d653ceb245cb690194b62f518968c951b29b4b270
                                              • Instruction Fuzzy Hash: 91F01C3A040215FBCF226FD5EC08ADD3F66FF597A8B045414FA1886130DA328861FF91
                                              APIs
                                                • Part of subcall function 0053663B: RtlFreeHeap.NTDLL(00000000,00000000,?,0053E6B3,?,00000000,?,?,0053E954,?,00000007,?,?,0053EE4D,?,?), ref: 00536651
                                                • Part of subcall function 0053663B: GetLastError.KERNEL32(?,?,0053E6B3,?,00000000,?,?,0053E954,?,00000007,?,?,0053EE4D,?,?), ref: 0053665C
                                              • ___free_lconv_mon.LIBCMT ref: 0053ECFA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ErrorFreeHeapLast___free_lconv_mon
                                              • String ID: 8ln$dkn
                                              • API String ID: 4068849827-324638688
                                              • Opcode ID: 1ef4d4644bce16ac8d2b49dd27dc6988d5608955552f8cdbe3fc1248059450d5
                                              • Instruction ID: 05eddf4d93d163511aeddbe855243ed3063c1defe47917b9ebb6c9bc4bc2b60d
                                              • Opcode Fuzzy Hash: 1ef4d4644bce16ac8d2b49dd27dc6988d5608955552f8cdbe3fc1248059450d5
                                              • Instruction Fuzzy Hash: 7C312A71600602AFEB21AAB9D94BB5A7BE9BF90390F248C1DF055D71E1DB31AC408B24
                                              APIs
                                              • EncodePointer.KERNEL32(00000000,?), ref: 0052D1FC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: EncodePointer
                                              • String ID: MOC$RCC
                                              • API String ID: 2118026453-2084237596
                                              • Opcode ID: c255f4c417332b660d2c455e70e70417b464dbe3727a2c486b3033939c8daaba
                                              • Instruction ID: 76e22d7376d4da2cb62daf7633bc89094c61108412911cd7075656794b2237b7
                                              • Opcode Fuzzy Hash: c255f4c417332b660d2c455e70e70417b464dbe3727a2c486b3033939c8daaba
                                              • Instruction Fuzzy Hash: 92416875900129EFCF16CF98E881AAEBFB5FF4A304F188059F904A6291D335E950DB61
                                              APIs
                                              • __alloca_probe_16.LIBCMT ref: 00526FD2
                                              • RaiseException.KERNEL32(?,?,?,?,00000000,00000000), ref: 00526FF7
                                                • Part of subcall function 0052A530: RaiseException.KERNEL32(E06D7363,00000001,00000003,00529EDD,?,?,?,?,00529EDD,?,0055273C), ref: 0052A590
                                                • Part of subcall function 0052E14B: IsProcessorFeaturePresent.KERNEL32(00000017,0052DED2,?,0052DE41,00000001,00000016,0052E050,?,?,?,?,?,00000000), ref: 0052E167
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: ExceptionRaise$FeaturePresentProcessor__alloca_probe_16
                                              • String ID: csm
                                              • API String ID: 1924019822-1018135373
                                              • Opcode ID: df49bb7044719f9c68af482a9ba01aece48cf95a967145db78b401f4b9432197
                                              • Instruction ID: 2242e02b10b27c49a451a0bf55d43d171d5ce04c1dc2323e485c8525c5c22539
                                              • Opcode Fuzzy Hash: df49bb7044719f9c68af482a9ba01aece48cf95a967145db78b401f4b9432197
                                              • Instruction Fuzzy Hash: CA216035D002289BCF25DF94F949AAEBFB9BF86710F540019E405AB294D770ED49CB81
                                              APIs
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 0052761F
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 0052767B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                              • String ID: -lR
                                              • API String ID: 593203224-2214140114
                                              • Opcode ID: 7965115942a42729fdb604570a41448da5dd0c9ee8fd3cf72c96703c76aa80bc
                                              • Instruction ID: e11c6746dac82e18e902329388e7f5b42251100d24aedc2150ee00867c351553
                                              • Opcode Fuzzy Hash: 7965115942a42729fdb604570a41448da5dd0c9ee8fd3cf72c96703c76aa80bc
                                              • Instruction Fuzzy Hash: D8019E35600A29EFCB04DB18D889EAD7BB8FF86754B140099E4019B3A1DF70FE45CB60
                                              APIs
                                              • std::_Throw_Cpp_error.LIBCPMT ref: 005252E6
                                              • std::_Throw_Cpp_error.LIBCPMT ref: 005252F1
                                                • Part of subcall function 00527054: ReleaseSRWLockExclusive.KERNEL32(005254A2,?,005254AA,00000000,?,?,?,00000006,?,?,?), ref: 00527068
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: Cpp_errorThrow_std::_$ExclusiveLockRelease
                                              • String ID: vn
                                              • API String ID: 3666349979-342035933
                                              • Opcode ID: 81100ccba26ae77ad6c8fae295a8ad6332583df0cb044b36fcbe9c483d048960
                                              • Instruction ID: 2ed25a423af52313c2cb15b95c7ab1bd193f1f7547b8c2b19e141f0d8c9f8d57
                                              • Opcode Fuzzy Hash: 81100ccba26ae77ad6c8fae295a8ad6332583df0cb044b36fcbe9c483d048960
                                              • Instruction Fuzzy Hash: 9C01F935504652AFD710DB28E80974BBFD5BFAA310F10481DF558871D1E770E859CF52
                                              APIs
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 005223C5
                                              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0052240A
                                                • Part of subcall function 00527684: _Yarn.LIBCPMT ref: 005276A3
                                                • Part of subcall function 00527684: _Yarn.LIBCPMT ref: 005276C7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: Yarnstd::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                              • String ID: bad locale name
                                              • API String ID: 1908188788-1405518554
                                              • Opcode ID: e33e907576e6f44c41c0aa01bcb90349f41e9433f4218010a05e81ef78cdf540
                                              • Instruction ID: a8ef3a3762a6da384073fe934b1e9c9483a9d9ac7803fd1a45fb99e831846ff9
                                              • Opcode Fuzzy Hash: e33e907576e6f44c41c0aa01bcb90349f41e9433f4218010a05e81ef78cdf540
                                              • Instruction Fuzzy Hash: BAF0F470505B918ED370DF399808747BEE0BF2A714F048E1DE58AC7A82E375E5088BA6
                                              APIs
                                              • GetSystemTimePreciseAsFileTime.KERNEL32(?,00529057,?,00000000,00000000,?,00529016,?,?,?,?,005270FC,?,?), ref: 005294C7
                                              • GetSystemTimeAsFileTime.KERNEL32(?,BDD10849,?,?,00545E5C,000000FF,?,00529057,?,00000000,00000000,?,00529016,?,?), ref: 005294CB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: Time$FileSystem$Precise
                                              • String ID: -lR
                                              • API String ID: 743729956-2214140114
                                              • Opcode ID: af1d684d51938dccf513381899501350259db7a9b9cddc45d4398e274a0ef06e
                                              • Instruction ID: d373883f8fbf939dead0c01b56d94d5a93ffdd8c9a3d64b1610f1e4e3d974055
                                              • Opcode Fuzzy Hash: af1d684d51938dccf513381899501350259db7a9b9cddc45d4398e274a0ef06e
                                              • Instruction Fuzzy Hash: 8CF06536904A68EFCB019F54DC45B9DBBA9FB49B14F00452AE81697790DB356904CBD0
                                              APIs
                                              • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?), ref: 005371B6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: CountCriticalInitializeSectionSpin
                                              • String ID: -lR$InitializeCriticalSectionEx
                                              • API String ID: 2593887523-3079937702
                                              • Opcode ID: 599694b193830ec2c72ab51ce988dbcc447b7715b068312d9b9100da74156afe
                                              • Instruction ID: 93dd35c1b72892ff05ca2473f19186c95629469bf46f439467d85859198d1468
                                              • Opcode Fuzzy Hash: 599694b193830ec2c72ab51ce988dbcc447b7715b068312d9b9100da74156afe
                                              • Instruction Fuzzy Hash: FAE0DF3A68421CB7CB212F91DC0AEDE7F15FB84B64F008412FD0825161DBB28820EBE0
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: Alloc
                                              • String ID: -lR$FlsAlloc
                                              • API String ID: 2773662609-2287682372
                                              • Opcode ID: 5c8674cfd7fba78cf4f665d60c23cb245891f4629874499a82a08fa06837f7eb
                                              • Instruction ID: 55a6c60e7818849f9f7266b6effbb179c27ab9004737b30535bca3626b1bc2e8
                                              • Opcode Fuzzy Hash: 5c8674cfd7fba78cf4f665d60c23cb245891f4629874499a82a08fa06837f7eb
                                              • Instruction Fuzzy Hash: 1BE0C239AC122C73863436D19D0EEEE7F04FB94BBAF044021FF08211408DE10804A6E6
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1446193832.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                                              • Associated: 00000000.00000002.1446176514.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446218826.0000000000548000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1446354737.00000000006EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_520000_rise2406.jbxd
                                              Similarity
                                              • API ID: H_prolog3
                                              • String ID: <in$hn
                                              • API String ID: 431132790-2199986705
                                              • Opcode ID: a1c50f119cdb051e5e8b4379206db1fedbde429cc292ea6239e686a17fe2477a
                                              • Instruction ID: 7f7edbcc17f00b7b1eb32c7115bbbfa83c53499502f7fa85583eed4f1d04ad7e
                                              • Opcode Fuzzy Hash: a1c50f119cdb051e5e8b4379206db1fedbde429cc292ea6239e686a17fe2477a
                                              • Instruction Fuzzy Hash: 97E09270D8135ADBC700AF91CD0E39D3DA1FF42344F904114B020663C2D7B60A049761

                                              Execution Graph

                                              Execution Coverage:1.4%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:2.1%
                                              Total number of Nodes:771
                                              Total number of Limit Nodes:15
                                              execution_graph 69898 45db00 GetCursorPos 69899 45db15 GetCursorPos 69898->69899 69900 45dbe8 GetPEB 69899->69900 69903 45db27 69899->69903 69900->69903 69901 45db33 GetPEB 69901->69903 69902 45dc5d Sleep 69902->69899 69903->69900 69903->69901 69903->69902 69903->69903 69904 45dba8 Sleep GetCursorPos 69903->69904 69905 45dc87 69903->69905 69904->69900 69904->69903 69906 44c993 69907 44c9a0 69906->69907 69911 44c9b8 69906->69911 69963 4416ff 14 API calls __dosmaperr 69907->69963 69909 44c9a5 69964 438c60 41 API calls __wsopen_s 69909->69964 69912 44ca17 69911->69912 69920 44c9b0 69911->69920 69965 44d685 14 API calls 2 library calls 69911->69965 69926 44a1e9 69912->69926 69915 44ca30 69933 4487f7 69915->69933 69918 44a1e9 __fread_nolock 41 API calls 69919 44ca69 69918->69919 69919->69920 69921 44a1e9 __fread_nolock 41 API calls 69919->69921 69922 44ca77 69921->69922 69922->69920 69923 44a1e9 __fread_nolock 41 API calls 69922->69923 69924 44ca85 69923->69924 69925 44a1e9 __fread_nolock 41 API calls 69924->69925 69925->69920 69927 44a1f5 69926->69927 69928 44a20a 69926->69928 69966 4416ff 14 API calls __dosmaperr 69927->69966 69928->69915 69930 44a1fa 69967 438c60 41 API calls __wsopen_s 69930->69967 69932 44a205 69932->69915 69934 448803 __FrameHandler3::FrameUnwindToState 69933->69934 69935 448826 69934->69935 69936 44880b 69934->69936 69940 44883d 69935->69940 69941 448878 69935->69941 70034 4416ec 14 API calls __dosmaperr 69936->70034 69938 448810 70035 4416ff 14 API calls __dosmaperr 69938->70035 70036 4416ec 14 API calls __dosmaperr 69940->70036 69943 448896 69941->69943 69944 448881 69941->69944 69968 44e6c4 EnterCriticalSection 69943->69968 70039 4416ec 14 API calls __dosmaperr 69944->70039 69945 448842 70037 4416ff 14 API calls __dosmaperr 69945->70037 69949 44884a 70038 438c60 41 API calls __wsopen_s 69949->70038 69950 448886 70040 4416ff 14 API calls __dosmaperr 69950->70040 69951 44889c 69953 4488d0 69951->69953 69954 4488bb 69951->69954 69969 448910 69953->69969 70041 4416ff 14 API calls __dosmaperr 69954->70041 69958 4488c0 70042 4416ec 14 API calls __dosmaperr 69958->70042 69959 4488cb 70043 448908 LeaveCriticalSection __wsopen_s 69959->70043 69962 448818 69962->69918 69962->69920 69963->69909 69964->69920 69965->69912 69966->69930 69967->69932 69968->69951 69970 448922 69969->69970 69971 44893a 69969->69971 70053 4416ec 14 API calls __dosmaperr 69970->70053 69973 448c7c 69971->69973 69976 44897d 69971->69976 70072 4416ec 14 API calls __dosmaperr 69973->70072 69974 448927 70054 4416ff 14 API calls __dosmaperr 69974->70054 69979 448988 69976->69979 69980 44892f 69976->69980 69987 4489b8 69976->69987 69978 448c81 70073 4416ff 14 API calls __dosmaperr 69978->70073 70055 4416ec 14 API calls __dosmaperr 69979->70055 69980->69959 69983 448995 70074 438c60 41 API calls __wsopen_s 69983->70074 69984 44898d 70056 4416ff 14 API calls __dosmaperr 69984->70056 69988 4489d1 69987->69988 69989 448a0c 69987->69989 69990 4489de 69987->69990 69988->69990 69992 4489fa 69988->69992 70060 44b094 15 API calls 3 library calls 69989->70060 70057 4416ec 14 API calls __dosmaperr 69990->70057 70044 453be3 69992->70044 69994 4489e3 70058 4416ff 14 API calls __dosmaperr 69994->70058 69996 448a1d 70061 44b01a 14 API calls 2 library calls 69996->70061 69998 4489ea 70059 438c60 41 API calls __wsopen_s 69998->70059 69999 448b58 70002 448bcc 69999->70002 70005 448b71 GetConsoleMode 69999->70005 70004 448bd0 ReadFile 70002->70004 70003 448a26 70062 44b01a 14 API calls 2 library calls 70003->70062 70007 448c44 GetLastError 70004->70007 70008 448be8 70004->70008 70005->70002 70009 448b82 70005->70009 70011 448c51 70007->70011 70012 448ba8 70007->70012 70008->70007 70013 448bc1 70008->70013 70009->70004 70014 448b88 ReadConsoleW 70009->70014 70010 448a2d 70015 448a37 70010->70015 70016 448a52 70010->70016 70070 4416ff 14 API calls __dosmaperr 70011->70070 70031 4489f5 __fread_nolock 70012->70031 70066 4416a5 14 API calls 2 library calls 70012->70066 70027 448c24 70013->70027 70028 448c0d 70013->70028 70013->70031 70014->70013 70019 448ba2 GetLastError 70014->70019 70063 4416ff 14 API calls __dosmaperr 70015->70063 70065 4425fd 43 API calls 2 library calls 70016->70065 70019->70012 70022 448a3c 70064 4416ec 14 API calls __dosmaperr 70022->70064 70023 448c56 70071 4416ec 14 API calls __dosmaperr 70023->70071 70030 448c3d 70027->70030 70027->70031 70068 448622 46 API calls 4 library calls 70028->70068 70069 448468 44 API calls __fread_nolock 70030->70069 70067 44b01a 14 API calls 2 library calls 70031->70067 70033 448c42 70033->70031 70034->69938 70035->69962 70036->69945 70037->69949 70038->69962 70039->69950 70040->69949 70041->69958 70042->69959 70043->69962 70045 453bf0 70044->70045 70046 453bfd 70044->70046 70075 4416ff 14 API calls __dosmaperr 70045->70075 70049 453c09 70046->70049 70076 4416ff 14 API calls __dosmaperr 70046->70076 70048 453bf5 70048->69999 70049->69999 70051 453c2a 70077 438c60 41 API calls __wsopen_s 70051->70077 70053->69974 70054->69980 70055->69984 70056->69983 70057->69994 70058->69998 70059->70031 70060->69996 70061->70003 70062->70010 70063->70022 70064->70031 70065->69992 70066->70031 70067->69980 70068->70031 70069->70033 70070->70023 70071->70031 70072->69978 70073->69983 70074->69980 70075->70048 70076->70051 70077->70048 70078 44ac7f 70083 44aa55 70078->70083 70081 44acbe 70084 44aa74 70083->70084 70085 44aa87 70084->70085 70089 44aa9c 70084->70089 70103 4416ff 14 API calls __dosmaperr 70085->70103 70087 44aa8c 70104 438c60 41 API calls __wsopen_s 70087->70104 70098 44abbc 70089->70098 70105 440fae 41 API calls 2 library calls 70089->70105 70090 44aa97 70090->70081 70100 442cb3 70090->70100 70092 44ac6d 70109 438c60 41 API calls __wsopen_s 70092->70109 70095 44ac0c 70095->70098 70106 440fae 41 API calls 2 library calls 70095->70106 70097 44ac2a 70097->70098 70107 440fae 41 API calls 2 library calls 70097->70107 70098->70090 70108 4416ff 14 API calls __dosmaperr 70098->70108 70110 44265b 70100->70110 70103->70087 70104->70090 70105->70095 70106->70097 70107->70098 70108->70092 70109->70090 70112 442667 __FrameHandler3::FrameUnwindToState 70110->70112 70111 44266e 70130 4416ff 14 API calls __dosmaperr 70111->70130 70112->70111 70114 442699 70112->70114 70121 442c45 70114->70121 70115 442673 70131 438c60 41 API calls __wsopen_s 70115->70131 70118 44267d 70118->70081 70133 43d1a7 70121->70133 70126 442c7b 70128 4426bd 70126->70128 70188 44b01a 14 API calls 2 library calls 70126->70188 70132 4426f0 LeaveCriticalSection __wsopen_s 70128->70132 70130->70115 70131->70118 70132->70118 70189 4395ae 70133->70189 70137 43d1cb 70138 43d18a 70137->70138 70201 43d0d8 70138->70201 70141 442cd3 70226 442a21 70141->70226 70144 442d05 70258 4416ec 14 API calls __dosmaperr 70144->70258 70145 442d1e 70244 44e79c 70145->70244 70148 442d0a 70259 4416ff 14 API calls __dosmaperr 70148->70259 70150 442d43 70257 44298c CreateFileW 70150->70257 70151 442d2c 70260 4416ec 14 API calls __dosmaperr 70151->70260 70155 442d31 70261 4416ff 14 API calls __dosmaperr 70155->70261 70156 442df9 GetFileType 70159 442e04 GetLastError 70156->70159 70160 442e4b 70156->70160 70158 442dce GetLastError 70263 4416a5 14 API calls 2 library calls 70158->70263 70264 4416a5 14 API calls 2 library calls 70159->70264 70266 44e6e7 15 API calls 3 library calls 70160->70266 70161 442d7c 70161->70156 70161->70158 70262 44298c CreateFileW 70161->70262 70165 442e12 CloseHandle 70165->70148 70168 442e3b 70165->70168 70167 442dc1 70167->70156 70167->70158 70265 4416ff 14 API calls __dosmaperr 70168->70265 70169 442e6c 70172 442eb8 70169->70172 70267 442b9b 75 API calls 4 library calls 70169->70267 70171 442e40 70171->70148 70176 442ebf 70172->70176 70269 442736 75 API calls 4 library calls 70172->70269 70175 442eed 70175->70176 70177 442efb 70175->70177 70268 448dcf 44 API calls __wsopen_s 70176->70268 70178 442d17 70177->70178 70180 442f77 CloseHandle 70177->70180 70178->70126 70270 44298c CreateFileW 70180->70270 70182 442fa2 70183 442fac GetLastError 70182->70183 70184 442fd8 70182->70184 70271 4416a5 14 API calls 2 library calls 70183->70271 70184->70178 70186 442fb8 70272 44e8af 15 API calls 3 library calls 70186->70272 70188->70128 70190 4395cc 70189->70190 70196 4395c5 70189->70196 70190->70196 70198 449e42 41 API calls 3 library calls 70190->70198 70192 4395ed 70199 44a12d 41 API calls __Getctype 70192->70199 70194 439603 70200 44a18b 41 API calls _strftime 70194->70200 70196->70137 70197 44b50e 5 API calls std::_Lockit::_Lockit 70196->70197 70197->70137 70198->70192 70199->70194 70200->70196 70202 43d100 70201->70202 70203 43d0e6 70201->70203 70205 43d107 70202->70205 70206 43d126 70202->70206 70219 43d1e6 14 API calls ___std_exception_copy 70203->70219 70218 43d0f0 70205->70218 70220 43d200 15 API calls _strftime 70205->70220 70221 44b17a MultiByteToWideChar _strftime 70206->70221 70209 43d135 70210 43d13c GetLastError 70209->70210 70212 43d162 70209->70212 70224 43d200 15 API calls _strftime 70209->70224 70222 4416a5 14 API calls 2 library calls 70210->70222 70212->70218 70225 44b17a MultiByteToWideChar _strftime 70212->70225 70213 43d148 70223 4416ff 14 API calls __dosmaperr 70213->70223 70217 43d179 70217->70210 70217->70218 70218->70126 70218->70141 70219->70218 70220->70218 70221->70209 70222->70213 70223->70218 70224->70212 70225->70217 70227 442a42 70226->70227 70228 442a5c 70226->70228 70227->70228 70280 4416ff 14 API calls __dosmaperr 70227->70280 70273 4429b1 70228->70273 70231 442a94 70234 442ac3 70231->70234 70282 4416ff 14 API calls __dosmaperr 70231->70282 70232 442a51 70281 438c60 41 API calls __wsopen_s 70232->70281 70242 442b16 70234->70242 70284 446a20 41 API calls 2 library calls 70234->70284 70237 442b11 70239 442b8e 70237->70239 70237->70242 70238 442ab8 70283 438c60 41 API calls __wsopen_s 70238->70283 70285 438c8d 11 API calls std::locale::_Setgloballocale 70239->70285 70242->70144 70242->70145 70243 442b9a 70245 44e7a8 __FrameHandler3::FrameUnwindToState 70244->70245 70288 44424b EnterCriticalSection 70245->70288 70247 44e7af 70249 44e7d4 70247->70249 70253 44e843 EnterCriticalSection 70247->70253 70256 44e7f6 70247->70256 70292 44e576 15 API calls 3 library calls 70249->70292 70252 44e7d9 70252->70256 70293 44e6c4 EnterCriticalSection 70252->70293 70255 44e850 LeaveCriticalSection 70253->70255 70253->70256 70255->70247 70289 44e8a6 70256->70289 70257->70161 70258->70148 70259->70178 70260->70155 70261->70148 70262->70167 70263->70148 70264->70165 70265->70171 70266->70169 70267->70172 70268->70178 70269->70175 70270->70182 70271->70186 70272->70184 70276 4429c9 70273->70276 70274 4429e4 70274->70231 70276->70274 70286 4416ff 14 API calls __dosmaperr 70276->70286 70277 442a08 70287 438c60 41 API calls __wsopen_s 70277->70287 70279 442a13 70279->70231 70280->70232 70281->70228 70282->70238 70283->70234 70284->70237 70285->70243 70286->70277 70287->70279 70288->70247 70294 444293 LeaveCriticalSection 70289->70294 70291 442d23 70291->70150 70291->70151 70292->70252 70293->70256 70294->70291 70295 4c77f0 70296 4c781e 70295->70296 70304 4163b0 70296->70304 70298 4c7838 70309 409280 70298->70309 70300 4c784f 70301 4c7872 70300->70301 70302 4c785f 70300->70302 70303 4c7865 Sleep 70302->70303 70303->70301 70303->70303 70306 4163d8 70304->70306 70305 4163e7 70305->70298 70306->70305 70325 4032d0 70306->70325 70308 41642a __Strxfrm 70308->70298 70310 4163b0 std::_Throw_Cpp_error 43 API calls 70309->70310 70312 4092d4 70310->70312 70364 402df0 70312->70364 70313 409482 70316 409523 __Strxfrm 70313->70316 70375 418dc0 70313->70375 70315 4095f0 GetModuleHandleA GetProcAddress WSASend 70315->70316 70317 4096e2 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 70315->70317 70316->70315 70316->70317 70319 40975d std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 70317->70319 70384 438c70 41 API calls 2 library calls 70317->70384 70319->70300 70326 4032e2 70325->70326 70327 403306 70325->70327 70329 4032e9 70326->70329 70330 40331f 70326->70330 70328 403318 70327->70328 70331 433672 std::_Facet_Register 43 API calls 70327->70331 70328->70308 70339 433672 70329->70339 70350 402b50 43 API calls 2 library calls 70330->70350 70334 403310 70331->70334 70334->70308 70335 4032ef 70337 4032f8 70335->70337 70351 438c70 41 API calls 2 library calls 70335->70351 70337->70308 70342 433677 70339->70342 70341 433691 70341->70335 70342->70341 70345 402b50 Concurrency::cancel_current_task 70342->70345 70352 4423ec 70342->70352 70361 445a89 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 70342->70361 70344 43369d 70344->70344 70345->70344 70359 4351fb RaiseException 70345->70359 70347 402b6c 70360 434b15 42 API calls ___std_exception_copy 70347->70360 70349 402bac 70349->70335 70350->70335 70357 44b094 _strftime 70352->70357 70353 44b0d2 70363 4416ff 14 API calls __dosmaperr 70353->70363 70355 44b0bd RtlAllocateHeap 70356 44b0d0 70355->70356 70355->70357 70356->70342 70357->70353 70357->70355 70362 445a89 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 70357->70362 70359->70347 70360->70349 70361->70342 70362->70357 70363->70356 70365 402e13 70364->70365 70366 402e2e std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 70364->70366 70365->70366 70385 438c70 41 API calls 2 library calls 70365->70385 70366->70313 70376 418e11 70375->70376 70377 418de2 __fread_nolock 70375->70377 70378 418ef8 70376->70378 70379 4032d0 std::_Throw_Cpp_error 43 API calls 70376->70379 70377->70316 70380 418e66 __fread_nolock __Strxfrm 70379->70380 70381 418ecb __fread_nolock __Strxfrm 70380->70381 70386 402fe0 41 API calls 2 library calls 70380->70386 70381->70316 70383 418eb8 70383->70316 70386->70383 70387 4c7b00 70388 4c7ecc 70387->70388 70406 4c7b3e __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 70387->70406 70389 4c7b87 setsockopt recv WSAGetLastError 70389->70388 70389->70406 70391 4c7eb7 Sleep 70391->70388 70391->70406 70392 4c7e15 recv 70394 4c7eaf Sleep 70392->70394 70394->70391 70395 418dc0 43 API calls 70396 4c7c2d recv 70395->70396 70397 4c7c4e recv 70396->70397 70396->70406 70397->70406 70398 409280 46 API calls 70398->70406 70399 4c7ee1 70424 438c70 41 API calls 2 library calls 70399->70424 70400 4163b0 std::_Throw_Cpp_error 43 API calls 70400->70406 70401 4c7cd6 setsockopt recv 70401->70406 70402 418dc0 43 API calls 70402->70401 70406->70389 70406->70391 70406->70392 70406->70394 70406->70395 70406->70398 70406->70399 70406->70400 70406->70401 70406->70402 70407 4c8590 WSAStartup 70406->70407 70420 433069 70406->70420 70423 4c7ef0 98 API calls std::_Throw_Cpp_error 70406->70423 70408 4c8696 70407->70408 70409 4c85c8 70407->70409 70408->70406 70409->70408 70410 4c85fe getaddrinfo 70409->70410 70411 4c8690 WSACleanup 70410->70411 70412 4c8646 70410->70412 70411->70408 70413 4c86a4 freeaddrinfo 70412->70413 70414 4c8654 socket 70412->70414 70413->70411 70415 4c86b0 70413->70415 70414->70411 70416 4c866a connect 70414->70416 70415->70406 70417 4c867c closesocket 70416->70417 70418 4c86a0 70416->70418 70417->70414 70419 4c8686 freeaddrinfo 70417->70419 70418->70413 70419->70411 70425 43361d 70420->70425 70423->70406 70426 433659 GetSystemTimeAsFileTime 70425->70426 70427 43364d GetSystemTimePreciseAsFileTime 70425->70427 70428 433077 70426->70428 70427->70428 70428->70406 70430 4e4bd0 70501 4e71e0 GetCurrentProcess IsWow64Process 70430->70501 70434 4e4cc8 RegOpenKeyExA 70435 4e4ee7 70434->70435 70436 4e4e03 RegQueryValueExA 70434->70436 70439 403040 std::_Throw_Cpp_error 43 API calls 70435->70439 70437 4e4ede RegCloseKey 70436->70437 70438 4e4ebc 70436->70438 70437->70435 70543 416130 43 API calls 2 library calls 70438->70543 70441 4e4fb0 __fread_nolock 70439->70441 70442 4e4fc4 GetCurrentHwProfileA 70441->70442 70443 4e4ffd 70442->70443 70444 4e4fd8 70442->70444 70509 4e57f0 70443->70509 70544 416130 43 API calls 2 library calls 70444->70544 70446 4e5008 70538 4e5d00 SetupDiGetClassDevsA 70446->70538 70449 4e558c 70551 438c70 41 API calls 2 library calls 70449->70551 70452 4e51ff 70546 418f00 43 API calls 3 library calls 70452->70546 70455 4e5531 70500 4e555b std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 70455->70500 70552 438c70 41 API calls 2 library calls 70455->70552 70456 4e5230 70547 41abb0 43 API calls std::_Throw_Cpp_error 70456->70547 70460 4e5295 70548 41e710 43 API calls 2 library calls 70460->70548 70463 4e52ac 70549 41abb0 43 API calls std::_Throw_Cpp_error 70463->70549 70468 4e52cb 70550 41ae20 43 API calls 70468->70550 70474 4e52e0 70477 402df0 std::_Throw_Cpp_error 43 API calls 70474->70477 70478 4e52f2 70477->70478 70479 402df0 std::_Throw_Cpp_error 43 API calls 70478->70479 70481 4e530f 70479->70481 70484 402df0 std::_Throw_Cpp_error 43 API calls 70481->70484 70485 4e531e 70484->70485 70485->70449 70487 4e5358 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 70485->70487 70488 402df0 std::_Throw_Cpp_error 43 API calls 70487->70488 70490 4e5392 70488->70490 70491 402df0 std::_Throw_Cpp_error 43 API calls 70490->70491 70492 4e53a1 70491->70492 70493 402df0 std::_Throw_Cpp_error 43 API calls 70492->70493 70494 4e53b0 __Strxfrm 70493->70494 70495 403040 std::_Throw_Cpp_error 43 API calls 70494->70495 70496 4e550f 70495->70496 70497 402df0 std::_Throw_Cpp_error 43 API calls 70496->70497 70498 4e5522 70497->70498 70499 402df0 std::_Throw_Cpp_error 43 API calls 70498->70499 70499->70455 70502 4e4c13 70501->70502 70503 403040 70502->70503 70505 403052 70503->70505 70506 4030c8 70503->70506 70504 403057 __Strxfrm 70504->70434 70505->70504 70507 4032d0 std::_Throw_Cpp_error 43 API calls 70505->70507 70506->70434 70508 4030a3 __Strxfrm 70507->70508 70508->70434 70553 4359b0 70509->70553 70512 4e589d 70512->70512 70513 403040 std::_Throw_Cpp_error 43 API calls 70512->70513 70514 4e5946 70513->70514 70515 403040 std::_Throw_Cpp_error 43 API calls 70514->70515 70516 4e59fb 70515->70516 70517 403040 std::_Throw_Cpp_error 43 API calls 70516->70517 70518 4e5a3c 70517->70518 70555 4e64d0 70518->70555 70521 4e5b78 GetVolumeInformationA 70522 4e5c7f 70521->70522 70523 4e5ba9 __fread_nolock 70521->70523 70587 4185d0 74 API calls 3 library calls 70522->70587 70585 403440 46 API calls 70523->70585 70526 402df0 std::_Throw_Cpp_error 43 API calls 70526->70521 70528 4e5af1 70531 4e5ce9 70528->70531 70532 4e5b2b std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 70528->70532 70529 4e5cb8 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 70529->70446 70530 4e5c5b 70586 416130 43 API calls 2 library calls 70530->70586 70588 438c70 41 API calls 2 library calls 70531->70588 70532->70526 70533 4e5c8e 70533->70529 70589 438c70 41 API calls 2 library calls 70533->70589 70539 4e5d79 70538->70539 70540 4e509f 70538->70540 70596 4e5db0 53 API calls 3 library calls 70539->70596 70540->70449 70545 41e8a0 43 API calls 2 library calls 70540->70545 70542 4e5d83 70542->70540 70543->70437 70544->70443 70545->70452 70546->70456 70547->70460 70548->70463 70549->70468 70550->70474 70554 4359c7 GetWindowsDirectoryA 70553->70554 70554->70512 70554->70529 70556 4e6562 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 70555->70556 70557 4e668f 70556->70557 70558 4e6767 70556->70558 70562 403040 std::_Throw_Cpp_error 43 API calls 70556->70562 70582 4e6762 70556->70582 70590 4242a0 43 API calls 70556->70590 70559 4e6698 70557->70559 70560 4e6713 70557->70560 70595 419e60 43 API calls 70558->70595 70591 415f60 43 API calls std::_Throw_Cpp_error 70559->70591 70565 4e672d 70560->70565 70566 4e6722 70560->70566 70575 4e66fa 70560->70575 70562->70556 70593 424400 43 API calls std::_Throw_Cpp_error 70565->70593 70569 4163b0 std::_Throw_Cpp_error 43 API calls 70566->70569 70567 4e66a9 70571 4e66fc 70567->70571 70572 4e66b5 70567->70572 70568 402df0 std::_Throw_Cpp_error 43 API calls 70573 4e6741 70568->70573 70569->70575 70592 4242a0 43 API calls 70571->70592 70577 402df0 std::_Throw_Cpp_error 43 API calls 70572->70577 70578 402df0 std::_Throw_Cpp_error 43 API calls 70573->70578 70575->70568 70577->70575 70579 4e5a4f 70578->70579 70579->70521 70584 41ab20 43 API calls 70579->70584 70580 4e6705 70581 402df0 std::_Throw_Cpp_error 43 API calls 70580->70581 70581->70575 70594 438c70 41 API calls 2 library calls 70582->70594 70584->70528 70585->70530 70586->70522 70587->70533 70590->70556 70591->70567 70592->70580 70593->70575 70596->70542 70597 4ebf00 70599 4ec096 70597->70599 70600 4ebf18 __fread_nolock __Strxfrm 70597->70600 70598 4032d0 std::_Throw_Cpp_error 43 API calls 70598->70600 70600->70598 70600->70599 70602 402fe0 41 API calls 2 library calls 70600->70602 70602->70600 70603 4ecd20 70607 4ecd54 70603->70607 70604 4ece49 70626 4188d0 41 API calls 2 library calls 70604->70626 70606 4ece77 70607->70604 70611 415eb0 70607->70611 70609 4ece3a 70616 4ec2e0 70609->70616 70613 415ed8 70611->70613 70612 415ee7 70612->70609 70613->70612 70627 424740 43 API calls 3 library calls 70613->70627 70615 415f2a __Strxfrm 70615->70609 70617 4ec329 70616->70617 70621 4ec321 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 70616->70621 70617->70621 70628 418f00 43 API calls 3 library calls 70617->70628 70619 4ec424 70619->70604 70629 4188d0 41 API calls 2 library calls 70621->70629 70622 4ec376 70622->70621 70623 4ec43c 70622->70623 70630 438c70 41 API calls 2 library calls 70623->70630 70626->70606 70627->70615 70628->70622 70629->70619 70631 4e6ca0 70646 432b99 70631->70646 70634 4e6d4d 70650 432534 43 API calls 2 library calls 70634->70650 70635 4e6cd7 70637 4e6d54 70635->70637 70638 4e6ce3 70635->70638 70651 432534 43 API calls 2 library calls 70637->70651 70642 4e6cfb GetFileAttributesA 70638->70642 70645 4e6d12 70638->70645 70644 4e6d07 GetLastError 70642->70644 70642->70645 70643 4e6d38 70644->70645 70649 432baa ReleaseSRWLockExclusive 70645->70649 70652 432bc8 GetCurrentThreadId 70646->70652 70649->70643 70653 432bf2 70652->70653 70654 432c11 70652->70654 70655 432bf7 AcquireSRWLockExclusive 70653->70655 70658 432c07 70653->70658 70656 432c31 70654->70656 70657 432c1a 70654->70657 70655->70658 70660 432c90 70656->70660 70663 432c49 70656->70663 70657->70658 70659 432c25 AcquireSRWLockExclusive 70657->70659 70667 433d77 70658->70667 70659->70658 70660->70658 70662 432c97 TryAcquireSRWLockExclusive 70660->70662 70662->70658 70663->70658 70666 432c80 TryAcquireSRWLockExclusive 70663->70666 70674 43302b GetSystemTimePreciseAsFileTime GetSystemTimeAsFileTime __aulldiv __aullrem __Xtime_get_ticks 70663->70674 70664 432ba6 70664->70634 70664->70635 70666->70658 70666->70663 70668 433d80 IsProcessorFeaturePresent 70667->70668 70669 433d7f 70667->70669 70671 43455a 70668->70671 70669->70664 70675 43451d SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 70671->70675 70673 43463d 70673->70664 70674->70663 70675->70673 70676 4e7330 70695 41ae80 70676->70695 70682 402df0 std::_Throw_Cpp_error 43 API calls 70684 4e749d 70682->70684 70687 43d5f6 68 API calls 70688 4e743e 70687->70688 70689 418dc0 43 API calls 70688->70689 70690 4e7454 70688->70690 70689->70690 70715 44209f 70690->70715 70694 4e748e 70694->70682 70696 433672 std::_Facet_Register 43 API calls 70695->70696 70697 41aeb5 70696->70697 70698 403040 std::_Throw_Cpp_error 43 API calls 70697->70698 70699 41af08 70698->70699 70700 439820 70699->70700 70724 43975e 70700->70724 70703 43d5f6 70704 43d609 __wsopen_s 70703->70704 70779 43d34d 70704->70779 70709 4393ab 70710 4393be __wsopen_s 70709->70710 70849 438cc1 70710->70849 70713 43899c __wsopen_s 41 API calls 70714 4393d6 70713->70714 70714->70687 70900 4420bc 70715->70900 70718 43d0a8 70719 43d0bb __wsopen_s 70718->70719 70934 43cf83 70719->70934 70721 43d0c7 70722 43899c __wsopen_s 41 API calls 70721->70722 70723 43d0d3 70722->70723 70723->70694 70727 43976a __FrameHandler3::FrameUnwindToState 70724->70727 70725 439771 70749 4416ff 14 API calls __dosmaperr 70725->70749 70727->70725 70729 439791 70727->70729 70728 439776 70750 438c60 41 API calls __wsopen_s 70728->70750 70731 4397a3 70729->70731 70732 439796 70729->70732 70741 44a8ef 70731->70741 70751 4416ff 14 API calls __dosmaperr 70732->70751 70736 4397b3 70752 4416ff 14 API calls __dosmaperr 70736->70752 70738 4397c0 70753 4397fe LeaveCriticalSection __fread_nolock 70738->70753 70740 439781 70740->70694 70740->70703 70742 44a8fb __FrameHandler3::FrameUnwindToState 70741->70742 70754 44424b EnterCriticalSection 70742->70754 70744 44a909 70755 44a993 70744->70755 70749->70728 70750->70740 70751->70740 70752->70740 70753->70740 70754->70744 70762 44a9b6 70755->70762 70756 44a916 70769 44a94f 70756->70769 70757 44aa0e 70774 44a65a 14 API calls 3 library calls 70757->70774 70759 44aa17 70775 44b01a 14 API calls 2 library calls 70759->70775 70762->70756 70762->70757 70772 441250 EnterCriticalSection 70762->70772 70773 441264 LeaveCriticalSection 70762->70773 70763 44aa20 70763->70756 70776 44b7f4 6 API calls std::locale::_Setgloballocale 70763->70776 70765 44aa3f 70777 441250 EnterCriticalSection 70765->70777 70768 44aa52 70768->70756 70778 444293 LeaveCriticalSection 70769->70778 70771 4397ac 70771->70736 70771->70738 70772->70762 70773->70762 70774->70759 70775->70763 70776->70765 70777->70768 70778->70771 70781 43d359 __FrameHandler3::FrameUnwindToState 70779->70781 70780 43d35f 70806 438be3 41 API calls 2 library calls 70780->70806 70781->70780 70783 43d3a2 70781->70783 70796 441250 EnterCriticalSection 70783->70796 70784 43d37a 70790 43899c 70784->70790 70786 43d3ae 70797 43d4d0 70786->70797 70788 43d3c4 70807 43d3ed LeaveCriticalSection __fread_nolock 70788->70807 70791 4389a8 70790->70791 70792 4389bf 70791->70792 70847 438a47 41 API calls 2 library calls 70791->70847 70795 4389d2 70792->70795 70848 438a47 41 API calls 2 library calls 70792->70848 70795->70709 70796->70786 70798 43d4e3 70797->70798 70799 43d4f6 70797->70799 70798->70788 70808 43d3f7 70799->70808 70801 43d519 70805 43d5a7 70801->70805 70812 439a91 70801->70812 70805->70788 70806->70784 70807->70784 70809 43d460 70808->70809 70810 43d408 70808->70810 70809->70801 70810->70809 70821 4425fd 43 API calls 2 library calls 70810->70821 70813 439ad1 70812->70813 70814 439aaa 70812->70814 70818 44263d 70813->70818 70814->70813 70815 44a1e9 __fread_nolock 41 API calls 70814->70815 70816 439ac6 70815->70816 70822 449678 66 API calls 2 library calls 70816->70822 70823 44251c 70818->70823 70820 442656 70820->70805 70821->70809 70822->70813 70829 44e940 70823->70829 70825 44252e 70826 44254a SetFilePointerEx 70825->70826 70828 442536 __wsopen_s 70825->70828 70827 442562 GetLastError 70826->70827 70826->70828 70827->70828 70828->70820 70830 44e962 70829->70830 70831 44e94d 70829->70831 70835 44e987 70830->70835 70844 4416ec 14 API calls __dosmaperr 70830->70844 70842 4416ec 14 API calls __dosmaperr 70831->70842 70834 44e952 70843 4416ff 14 API calls __dosmaperr 70834->70843 70835->70825 70836 44e992 70845 4416ff 14 API calls __dosmaperr 70836->70845 70839 44e95a 70839->70825 70840 44e99a 70846 438c60 41 API calls __wsopen_s 70840->70846 70842->70834 70843->70839 70844->70836 70845->70840 70846->70839 70847->70792 70848->70795 70850 438ccd __FrameHandler3::FrameUnwindToState 70849->70850 70851 438cf5 70850->70851 70852 438cd4 70850->70852 70860 441250 EnterCriticalSection 70851->70860 70864 438be3 41 API calls 2 library calls 70852->70864 70855 438d00 70861 438dd0 70855->70861 70856 438ced 70856->70713 70860->70855 70866 438e02 70861->70866 70863 438d0f 70865 438d37 LeaveCriticalSection __fread_nolock 70863->70865 70864->70856 70865->70856 70867 438e11 70866->70867 70868 438e39 70866->70868 70883 438be3 41 API calls 2 library calls 70867->70883 70869 44a1e9 __fread_nolock 41 API calls 70868->70869 70871 438e42 70869->70871 70880 4425df 70871->70880 70874 438eec 70884 43916e 46 API calls 4 library calls 70874->70884 70876 438efb 70878 438e2c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 70876->70878 70877 438f03 70877->70878 70885 438fa3 45 API calls 2 library calls 70877->70885 70878->70863 70886 4423f7 70880->70886 70883->70878 70884->70876 70885->70878 70887 442403 __FrameHandler3::FrameUnwindToState 70886->70887 70888 442446 70887->70888 70890 44248c 70887->70890 70896 438e60 70887->70896 70898 438be3 41 API calls 2 library calls 70888->70898 70897 44e6c4 EnterCriticalSection 70890->70897 70892 442492 70893 4424b3 70892->70893 70894 44251c __fread_nolock 43 API calls 70892->70894 70899 442514 LeaveCriticalSection __wsopen_s 70893->70899 70894->70893 70896->70874 70896->70877 70896->70878 70897->70892 70898->70896 70899->70896 70901 4420c8 __FrameHandler3::FrameUnwindToState 70900->70901 70902 442112 70901->70902 70903 4420db __fread_nolock 70901->70903 70912 4420b7 70901->70912 70913 441250 EnterCriticalSection 70902->70913 70927 4416ff 14 API calls __dosmaperr 70903->70927 70906 44211c 70914 441ec6 70906->70914 70907 4420f5 70928 438c60 41 API calls __wsopen_s 70907->70928 70912->70718 70913->70906 70918 441ed8 __fread_nolock 70914->70918 70920 441ef5 70914->70920 70915 441ee5 70930 4416ff 14 API calls __dosmaperr 70915->70930 70917 441f36 __fread_nolock 70917->70920 70922 442061 __fread_nolock 70917->70922 70923 44a1e9 __fread_nolock 41 API calls 70917->70923 70926 448910 __fread_nolock 53 API calls 70917->70926 70932 43ceeb 41 API calls 4 library calls 70917->70932 70918->70915 70918->70917 70918->70920 70929 442151 LeaveCriticalSection __fread_nolock 70920->70929 70933 4416ff 14 API calls __dosmaperr 70922->70933 70923->70917 70925 441eea 70931 438c60 41 API calls __wsopen_s 70925->70931 70926->70917 70927->70907 70928->70912 70929->70912 70930->70925 70931->70920 70932->70917 70933->70925 70935 43cf8f __FrameHandler3::FrameUnwindToState 70934->70935 70936 43cf99 70935->70936 70937 43cfbc 70935->70937 70960 438be3 41 API calls 2 library calls 70936->70960 70944 43cfb4 70937->70944 70945 441250 EnterCriticalSection 70937->70945 70940 43cfda 70946 43d01a 70940->70946 70942 43cfe7 70961 43d012 LeaveCriticalSection __fread_nolock 70942->70961 70944->70721 70945->70940 70947 43d027 70946->70947 70948 43d04a 70946->70948 70973 438be3 41 API calls 2 library calls 70947->70973 70950 43d042 70948->70950 70951 439a91 ___scrt_uninitialize_crt 66 API calls 70948->70951 70950->70942 70952 43d062 70951->70952 70962 44b054 70952->70962 70955 44a1e9 __fread_nolock 41 API calls 70956 43d076 70955->70956 70966 448d2c 70956->70966 70960->70944 70961->70944 70963 43d06a 70962->70963 70964 44b06b 70962->70964 70963->70955 70964->70963 70975 44b01a 14 API calls 2 library calls 70964->70975 70967 448d55 70966->70967 70972 43d07d 70966->70972 70968 448da4 70967->70968 70970 448d7c 70967->70970 70984 438be3 41 API calls 2 library calls 70968->70984 70976 448c9b 70970->70976 70972->70950 70974 44b01a 14 API calls 2 library calls 70972->70974 70973->70950 70974->70950 70975->70963 70977 448ca7 __FrameHandler3::FrameUnwindToState 70976->70977 70985 44e6c4 EnterCriticalSection 70977->70985 70979 448cb5 70980 448ce6 70979->70980 70986 448dff 70979->70986 70999 448d20 LeaveCriticalSection __wsopen_s 70980->70999 70983 448d09 70983->70972 70984->70972 70985->70979 70987 44e940 __wsopen_s 41 API calls 70986->70987 70990 448e0f 70987->70990 70988 448e15 71000 44e8af 15 API calls 3 library calls 70988->71000 70990->70988 70991 448e47 70990->70991 70993 44e940 __wsopen_s 41 API calls 70990->70993 70991->70988 70992 44e940 __wsopen_s 41 API calls 70991->70992 70995 448e53 FindCloseChangeNotification 70992->70995 70994 448e3e 70993->70994 70996 44e940 __wsopen_s 41 API calls 70994->70996 70995->70988 70997 448e5f GetLastError 70995->70997 70996->70991 70997->70988 70998 448e6d __wsopen_s 70998->70980 70999->70983 71000->70998

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 125 4e4bd0-4e4cab call 4e71e0 128 4e4cb2-4e4cb7 125->128 128->128 129 4e4cb9-4e4dfd call 403040 RegOpenKeyExA 128->129 132 4e4ee7-4e4f8a 129->132 133 4e4e03-4e4eba RegQueryValueExA 129->133 136 4e4f94-4e4f99 132->136 134 4e4ede-4e4ee1 RegCloseKey 133->134 135 4e4ebc-4e4ec2 133->135 134->132 137 4e4ec5-4e4eca 135->137 136->136 138 4e4f9b-4e4fd6 call 403040 call 4359b0 GetCurrentHwProfileA 136->138 137->137 139 4e4ecc-4e4ed9 call 416130 137->139 145 4e4ffd-4e509a call 4e57f0 call 4e5d00 138->145 146 4e4fd8-4e4fde 138->146 139->134 153 4e509f-4e51be 145->153 148 4e4fe1-4e4fe6 146->148 148->148 150 4e4fe8-4e4ff8 call 416130 148->150 150->145 154 4e51c0-4e51c5 153->154 154->154 155 4e51c7-4e51d5 154->155 156 4e558c call 402c60 155->156 157 4e51db-4e5331 call 41e8a0 call 418f00 call 41abb0 call 41e710 call 41abb0 call 41ae20 call 402df0 * 3 155->157 160 4e5591 call 438c70 156->160 204 4e5362-4e5437 call 402df0 * 3 157->204 205 4e5333-4e5342 157->205 164 4e5596-4e563a call 438c70 MultiByteToWideChar 160->164 173 4e56ee-4e570b call 402df0 164->173 174 4e5640-4e5650 call 439570 164->174 181 4e56ed 174->181 182 4e5656-4e566c MultiByteToWideChar 174->182 181->173 184 4e566e-4e5696 WideCharToMultiByte 182->184 185 4e56e4-4e56ea call 441c96 182->185 184->185 188 4e5698-4e56a7 call 439570 184->188 185->181 188->185 195 4e56a9-4e56c1 WideCharToMultiByte 188->195 197 4e56db-4e56e1 call 441c96 195->197 198 4e56c3-4e56c5 195->198 197->185 200 4e56c8-4e56cd 198->200 200->200 203 4e56cf-4e56d6 call 416130 200->203 203->197 218 4e5468-4e546a 204->218 219 4e5439-4e543e 204->219 209 4e5358-4e535f call 4338f3 205->209 210 4e5344-4e5352 205->210 209->204 210->160 210->209 221 4e546c-4e548e call 435270 218->221 222 4e5490 218->222 220 4e5440-4e545d call 4eec40 219->220 230 4e545f-4e5465 220->230 223 4e549a-4e54ad call 4ef4b0 221->223 222->223 231 4e54af-4e54d0 223->231 232 4e54d7-4e54f0 223->232 230->218 231->232 233 4e54f7-4e54fc 232->233 233->233 234 4e54fe-4e553b call 403040 call 402df0 * 2 233->234 241 4e553d-4e5549 234->241 242 4e5565-4e558b 234->242 243 4e555b-4e5562 call 4338f3 241->243 244 4e554b-4e5559 241->244 243->242 244->164 244->243
                                              APIs
                                                • Part of subcall function 004E71E0: GetCurrentProcess.KERNEL32(?), ref: 004E71EF
                                                • Part of subcall function 004E71E0: IsWow64Process.KERNEL32(00000000), ref: 004E71F6
                                              • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,-005A5B4A,00000000,?,?,00000000,-00585B31), ref: 004E4DF5
                                              • RegQueryValueExA.KERNELBASE(00000000,?,00000000,00020019,?,00000400), ref: 004E4EB2
                                              • RegCloseKey.ADVAPI32(00000000), ref: 004E4EE1
                                              • GetCurrentHwProfileA.ADVAPI32(?), ref: 004E4FCE
                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 004E562F
                                              • MultiByteToWideChar.KERNEL32(0000000F,00000000,?,000000FF,00000000,0000000F), ref: 004E5664
                                              • WideCharToMultiByte.KERNEL32(000004E3,00000000,00000000,000000FF,00000000,00000000,00000000,00000000), ref: 004E568B
                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000), ref: 004E56B9
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide$CurrentProcess$CloseOpenProfileQueryValueWow64
                                              • String ID:
                                              • API String ID: 1646947450-0
                                              • Opcode ID: ae4292a958d13f34842306830b16d1fa5ccb16088a57fb5a98bfde5e58442c07
                                              • Instruction ID: c0aba00e6514ac26363e67ac76cfd5322cd72c6070033efa120dba6d155bc681
                                              • Opcode Fuzzy Hash: ae4292a958d13f34842306830b16d1fa5ccb16088a57fb5a98bfde5e58442c07
                                              • Instruction Fuzzy Hash: 4E7255B0C042599BDB24CFA9C985BEEBBB1BF08304F204199E449B7291DB745B84CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 374 45db00-45db13 GetCursorPos 375 45db15-45db21 GetCursorPos 374->375 376 45db27-45db2d 375->376 377 45dbe8-45dbf1 GetPEB 375->377 376->377 379 45db33-45db3f GetPEB 376->379 378 45dbf4-45dc08 377->378 380 45dc59-45dc5b 378->380 381 45dc0a-45dc0f 378->381 382 45db40-45db54 379->382 380->378 381->380 385 45dc11-45dc19 381->385 383 45dba4-45dba6 382->383 384 45db56-45db5b 382->384 383->382 384->383 386 45db5d-45db63 384->386 387 45dc20-45dc33 385->387 388 45db65-45db78 386->388 389 45dc35-45dc48 387->389 390 45dc52-45dc57 387->390 392 45db9d-45dba2 388->392 393 45db7a 388->393 389->389 391 45dc4a-45dc50 389->391 390->380 390->387 391->390 394 45dc5d-45dc82 Sleep 391->394 392->383 392->388 395 45db80-45db93 393->395 394->375 395->395 396 45db95-45db9b 395->396 396->392 397 45dba8-45dbda Sleep GetCursorPos 396->397 397->377 398 45dbdc-45dbe2 397->398 398->377 399 45dc87-45dc98 call 4ea420 398->399 402 45dc9e 399->402 403 45dc9a-45dc9c 399->403 404 45dca0-45dcbd call 4ea420 402->404 403->404
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Cursor$Sleep
                                              • String ID:
                                              • API String ID: 1847515627-0
                                              • Opcode ID: 64e1b3b3cfd2bc4f7f18a9e387635337b0495f42438516b07fc99cf1f27a474a
                                              • Instruction ID: ab3f96cd0466869246e3b632190b9ed1b666d42f9e689fec286df2e29c35159e
                                              • Opcode Fuzzy Hash: 64e1b3b3cfd2bc4f7f18a9e387635337b0495f42438516b07fc99cf1f27a474a
                                              • Instruction Fuzzy Hash: E651BB35A04215CFCB25CF58C4D0EAAB7B2EF89705B2A809AD945AF352D735FD49CB80

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 407 409280-4092dd call 4163b0 410 409413-409521 call 402df0 call 4ea420 407->410 411 4092e3-4092e9 407->411 427 409523-409535 410->427 428 409537-40953f call 418dc0 410->428 413 4092f0-409313 411->413 415 409324-409331 413->415 416 409315-40931f 413->416 419 409342-40934f 415->419 420 409333-40933d 415->420 418 409403-409406 416->418 424 409409-40940d 418->424 421 409360-40936d 419->421 422 409351-40935b 419->422 420->418 425 40937e-40938b 421->425 426 40936f-409379 421->426 422->418 424->410 424->413 429 409399-4093a6 425->429 430 40938d-409397 425->430 426->418 431 409544-409597 call 4ea420 * 2 427->431 428->431 433 4093b4-4093c1 429->433 434 4093a8-4093b2 429->434 430->418 444 409599-4095c8 call 4ea420 call 435270 431->444 445 4095cb-4095e1 call 4ea420 431->445 436 4093c3-4093cd 433->436 437 4093cf-4093dc 433->437 434->418 436->418 439 4093ea-4093f4 437->439 440 4093de-4093e8 437->440 439->424 443 4093f6-4093ff 439->443 440->418 443->418 444->445 450 4096e2 445->450 451 4095e7-4095ed 445->451 455 4096e6-4096f0 450->455 454 4095f0-4096ce GetModuleHandleA GetProcAddress WSASend 451->454 456 4096d4-4096dc 454->456 457 40975f-409763 454->457 458 4096f2-4096fe 455->458 459 40971e-40973d 455->459 456->450 456->454 457->455 460 409700-40970e 458->460 461 409714-40971b call 4338f3 458->461 462 40976f-409796 459->462 463 40973f-40974b 459->463 460->461 466 409797-4097fe call 438c70 call 402df0 * 2 460->466 461->459 464 409765-40976c call 4338f3 463->464 465 40974d-40975b 463->465 464->462 465->466 468 40975d 465->468 468->464
                                              APIs
                                              • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,0054D15C,00000000,75CA23A0,-00589880), ref: 004096A6
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004096B4
                                              • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0054D15C,00000000,75CA23A0,-00589880), ref: 004096C9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: AddressHandleModuleProcSend
                                              • String ID: Ws2_32.dll
                                              • API String ID: 2819740048-3093949381
                                              • Opcode ID: d946741ea927b9b060335f299eec8efad25939578b4ebaaa967d5c79e73c84d4
                                              • Instruction ID: 188670ed5cfc709ed037a390f66f33add7af100e18449b0941b00ad524943a05
                                              • Opcode Fuzzy Hash: d946741ea927b9b060335f299eec8efad25939578b4ebaaa967d5c79e73c84d4
                                              • Instruction Fuzzy Hash: 7C02CE70D04298DEDF25CFA4C8907ADBBB0EF59304F24429EE4456B2C6D7781D86CB96

                                              Control-flow Graph

                                              APIs
                                              • setsockopt.WS2_32(00000334,0000FFFF,00001006,?,00000008), ref: 004C7BA6
                                              • recv.WS2_32(?,00000004,00000002), ref: 004C7BC1
                                              • WSAGetLastError.WS2_32 ref: 004C7BC5
                                              • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 004C7C43
                                              • recv.WS2_32(00000000,0000000C,00000008), ref: 004C7C64
                                              • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?), ref: 004C7D00
                                              • recv.WS2_32(00000000,?,00000008), ref: 004C7D1B
                                                • Part of subcall function 004C8590: WSAStartup.WS2_32 ref: 004C85BA
                                                • Part of subcall function 004C8590: getaddrinfo.WS2_32(?,?,?,00589328), ref: 004C863C
                                                • Part of subcall function 004C8590: socket.WS2_32(?,?,?), ref: 004C865D
                                                • Part of subcall function 004C8590: connect.WS2_32(00000000,00559BFC,?), ref: 004C8671
                                                • Part of subcall function 004C8590: closesocket.WS2_32(00000000), ref: 004C867D
                                                • Part of subcall function 004C8590: freeaddrinfo.WS2_32(?,?,?,?,00589328,?,?), ref: 004C868A
                                                • Part of subcall function 004C8590: WSACleanup.WS2_32 ref: 004C8690
                                              • recv.WS2_32(?,00000004,00000008), ref: 004C7E23
                                              • __Xtime_get_ticks.LIBCPMT ref: 004C7E2A
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004C7E38
                                              • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 004C7EB1
                                              • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 004C7EB9
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: recv$Sleepsetsockopt$CleanupErrorLastStartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectfreeaddrinfogetaddrinfosocket
                                              • String ID:
                                              • API String ID: 4125349891-0
                                              • Opcode ID: ec38b987ed86a79d9045c84e3f8f5dfa89c2ee10f11fa2c7c1563f7a863ad202
                                              • Instruction ID: b3d54dcccad81d83ab75f13ba9899d4b50e1d8608cabcccfb3508871926cac68
                                              • Opcode Fuzzy Hash: ec38b987ed86a79d9045c84e3f8f5dfa89c2ee10f11fa2c7c1563f7a863ad202
                                              • Instruction Fuzzy Hash: 9EB1AC71D043089BEB10DBA8CC49BAEBBB1BB54314F24025EE815BB2D2D7785D88DF95

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 0044298C: CreateFileW.KERNELBASE(?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 004429A9
                                              • GetLastError.KERNEL32 ref: 00442DE7
                                              • __dosmaperr.LIBCMT ref: 00442DEE
                                              • GetFileType.KERNELBASE(00000000), ref: 00442DFA
                                              • GetLastError.KERNEL32 ref: 00442E04
                                              • __dosmaperr.LIBCMT ref: 00442E0D
                                              • CloseHandle.KERNEL32(00000000), ref: 00442E2D
                                              • CloseHandle.KERNEL32(?), ref: 00442F7A
                                              • GetLastError.KERNEL32 ref: 00442FAC
                                              • __dosmaperr.LIBCMT ref: 00442FB3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                              • String ID: H
                                              • API String ID: 4237864984-2852464175
                                              • Opcode ID: 899e8745e59b9231842c25977fdcfb02482e73fc2f27b2205138a63271f33108
                                              • Instruction ID: 5150a9c177428a163fa7fb1c8ad58043a10a64c5935946436f9da82f6cbe0861
                                              • Opcode Fuzzy Hash: 899e8745e59b9231842c25977fdcfb02482e73fc2f27b2205138a63271f33108
                                              • Instruction Fuzzy Hash: 4EA15832A101149FEF19AF68DC917AE3BB1AB06314F58014EF801EF3A1CB799C56DB59

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 247 448910-448920 248 448922-448935 call 4416ec call 4416ff 247->248 249 44893a-44893c 247->249 266 448c94 248->266 251 448942-448948 249->251 252 448c7c-448c89 call 4416ec call 4416ff 249->252 251->252 255 44894e-448977 251->255 271 448c8f call 438c60 252->271 255->252 256 44897d-448986 255->256 259 4489a0-4489a2 256->259 260 448988-44899b call 4416ec call 4416ff 256->260 264 448c78-448c7a 259->264 265 4489a8-4489ac 259->265 260->271 268 448c97-448c9a 264->268 265->264 270 4489b2-4489b6 265->270 266->268 270->260 274 4489b8-4489cf 270->274 271->266 276 448a04-448a0a 274->276 277 4489d1-4489d4 274->277 278 448a0c-448a13 276->278 279 4489de-4489f5 call 4416ec call 4416ff call 438c60 276->279 280 4489d6-4489dc 277->280 281 4489fa-448a02 277->281 283 448a15 278->283 284 448a17-448a35 call 44b094 call 44b01a * 2 278->284 310 448baf 279->310 280->279 280->281 282 448a77-448a96 281->282 286 448b52-448b5b call 453be3 282->286 287 448a9c-448aa8 282->287 283->284 320 448a37-448a4d call 4416ff call 4416ec 284->320 321 448a52-448a75 call 4425fd 284->321 299 448bcc 286->299 300 448b5d-448b6f 286->300 287->286 291 448aae-448ab0 287->291 291->286 296 448ab6-448ad7 291->296 296->286 301 448ad9-448aef 296->301 303 448bd0-448be6 ReadFile 299->303 300->299 305 448b71-448b80 GetConsoleMode 300->305 301->286 306 448af1-448af3 301->306 308 448c44-448c4f GetLastError 303->308 309 448be8-448bee 303->309 305->299 311 448b82-448b86 305->311 306->286 312 448af5-448b18 306->312 314 448c51-448c63 call 4416ff call 4416ec 308->314 315 448c68-448c6b 308->315 309->308 316 448bf0 309->316 318 448bb2-448bbc call 44b01a 310->318 311->303 317 448b88-448ba0 ReadConsoleW 311->317 312->286 319 448b1a-448b30 312->319 314->310 327 448c71-448c73 315->327 328 448ba8-448bae call 4416a5 315->328 323 448bf3-448c05 316->323 325 448bc1-448bca 317->325 326 448ba2 GetLastError 317->326 318->268 319->286 330 448b32-448b34 319->330 320->310 321->282 323->318 334 448c07-448c0b 323->334 325->323 326->328 327->318 328->310 330->286 338 448b36-448b4d 330->338 341 448c24-448c31 334->341 342 448c0d-448c1d call 448622 334->342 338->286 347 448c33 call 448779 341->347 348 448c3d-448c42 call 448468 341->348 353 448c20-448c22 342->353 354 448c38-448c3b 347->354 348->354 353->318 354->353
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID: 0-3907804496
                                              • Opcode ID: ad97f608cc39225161418e158f426655df091140c642edc2e343545997d5bee3
                                              • Instruction ID: d4d7462daa34083545f9d93f0c5ebf53bf58a01a885379ada905c47cec286c1a
                                              • Opcode Fuzzy Hash: ad97f608cc39225161418e158f426655df091140c642edc2e343545997d5bee3
                                              • Instruction Fuzzy Hash: E2B1F4B0A00245AFFB11DF99C881BAE7BB1FF55304F14015EE414AB392CB78AD81CB69

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 355 4c8590-4c85c2 WSAStartup 356 4c85c8-4c85f2 call 4ea420 * 2 355->356 357 4c8696-4c869f 355->357 362 4c85fe-4c8644 getaddrinfo 356->362 363 4c85f4-4c85f8 356->363 364 4c8646-4c864c 362->364 365 4c8690 WSACleanup 362->365 363->357 363->362 366 4c864e 364->366 367 4c86a4-4c86ae freeaddrinfo 364->367 365->357 368 4c8654-4c8668 socket 366->368 367->365 369 4c86b0-4c86b8 367->369 368->365 370 4c866a-4c867a connect 368->370 371 4c867c-4c8684 closesocket 370->371 372 4c86a0 370->372 371->368 373 4c8686-4c868a freeaddrinfo 371->373 372->367 373->365
                                              APIs
                                              • WSAStartup.WS2_32 ref: 004C85BA
                                              • getaddrinfo.WS2_32(?,?,?,00589328), ref: 004C863C
                                              • socket.WS2_32(?,?,?), ref: 004C865D
                                              • connect.WS2_32(00000000,00559BFC,?), ref: 004C8671
                                              • closesocket.WS2_32(00000000), ref: 004C867D
                                              • freeaddrinfo.WS2_32(?,?,?,?,00589328,?,?), ref: 004C868A
                                              • WSACleanup.WS2_32 ref: 004C8690
                                              • freeaddrinfo.WS2_32(?,?,?,?,00589328,?,?), ref: 004C86A5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: freeaddrinfo$CleanupStartupclosesocketconnectgetaddrinfosocket
                                              • String ID:
                                              • API String ID: 58224237-0
                                              • Opcode ID: 52d29ec15fbf37ccd53ab56e21f2e3f1d11727fcf2b6a4206c2cbc59116a4c78
                                              • Instruction ID: ffa07009e3086412046aa5b15573dbd5c691e56a3beb11943292ef2f0f62f1de
                                              • Opcode Fuzzy Hash: 52d29ec15fbf37ccd53ab56e21f2e3f1d11727fcf2b6a4206c2cbc59116a4c78
                                              • Instruction Fuzzy Hash: 9531C1726043009BD7208F25DC48B2BB7E5FB94729F114B1EF9A4922E0D7759C089AA7

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 478 4e6ca0-4e6cd5 call 432b99 481 4e6d4d-4e6d4f call 432534 478->481 482 4e6cd7-4e6ce1 478->482 484 4e6d54-4e6d65 call 432534 481->484 482->484 485 4e6ce3-4e6ce8 482->485 487 4e6cea-4e6cef 485->487 488 4e6d25 485->488 490 4e6cf0-4e6cf5 487->490 491 4e6d27-4e6d4c call 432baa 488->491 490->490 492 4e6cf7-4e6cf9 490->492 492->488 494 4e6cfb-4e6d05 GetFileAttributesA 492->494 496 4e6d07-4e6d10 GetLastError 494->496 497 4e6d21-4e6d23 494->497 496->497 498 4e6d12-4e6d15 496->498 497->491 498->497 499 4e6d17-4e6d1a 498->499 499->497 500 4e6d1c-4e6d1f 499->500 500->488 500->497
                                              APIs
                                              • GetFileAttributesA.KERNELBASE(?,?,00000006,00000005,00000005,?), ref: 004E6CFC
                                              • GetLastError.KERNEL32(?,?,00000006,00000005,00000005,?), ref: 004E6D07
                                              • std::_Throw_Cpp_error.LIBCPMT ref: 004E6D4F
                                              • std::_Throw_Cpp_error.LIBCPMT ref: 004E6D60
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Cpp_errorThrow_std::_$AttributesErrorFileLast
                                              • String ID:
                                              • API String ID: 995686243-0
                                              • Opcode ID: 3120929ec45ee0086a62fe527d0d8f49284849e7ce8a43a234ec1e7741655826
                                              • Instruction ID: 241e2f942859b358e1133ab4bf22632851a161ac9c5554c12c2f2fb0b7350d8e
                                              • Opcode Fuzzy Hash: 3120929ec45ee0086a62fe527d0d8f49284849e7ce8a43a234ec1e7741655826
                                              • Instruction Fuzzy Hash: DF11CE71A0028496DB205F6A5C08F6A7F60EB22772F64031BD8359B3D4DB3948058759

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 501 4e57f0-4e5897 call 4359b0 GetWindowsDirectoryA 504 4e589d-4e592c 501->504 505 4e5cd4-4e5ce8 501->505 506 4e5930-4e5935 504->506 506->506 507 4e5937-4e59df call 403040 506->507 510 4e59e6-4e59eb 507->510 510->510 511 4e59ed-4e5a1d call 403040 510->511 514 4e5a24-4e5a29 511->514 514->514 515 4e5a2b-4e5a62 call 403040 call 4e64d0 514->515 520 4e5b78-4e5ba3 GetVolumeInformationA 515->520 521 4e5a68-4e5aff call 41ab20 515->521 522 4e5c7f-4e5c98 call 4185d0 520->522 523 4e5ba9-4e5c64 call 4359b0 call 403440 520->523 530 4e5b69-4e5b73 call 402df0 521->530 531 4e5b01-4e5b07 521->531 532 4e5c9a-4e5ca6 522->532 533 4e5cc2-4e5cd0 522->533 547 4e5c67-4e5c6c 523->547 530->520 536 4e5b09-4e5b15 531->536 537 4e5b35-4e5b66 531->537 540 4e5cb8-4e5cbf call 4338f3 532->540 541 4e5ca8-4e5cb6 532->541 533->505 538 4e5b2b-4e5b32 call 4338f3 536->538 539 4e5b17-4e5b25 536->539 537->530 538->537 539->538 543 4e5ce9 call 438c70 539->543 540->533 541->540 545 4e5cee-4e5cf3 call 438c70 541->545 543->545 547->547 552 4e5c6e-4e5c7a call 416130 547->552 552->522
                                              APIs
                                              • GetWindowsDirectoryA.KERNEL32(?,00000104,?,00000000,00000000), ref: 004E588F
                                              • GetVolumeInformationA.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 004E5B9B
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: DirectoryInformationVolumeWindows
                                              • String ID:
                                              • API String ID: 3487004747-0
                                              • Opcode ID: fc5381cf05f833142fa4c84e4c587fec84fffd8f0e7b5473644403141e6b9742
                                              • Instruction ID: 009fea26e280c08ebde66711631a2368a09a7ac58c7b38572a32fddf838a6e16
                                              • Opcode Fuzzy Hash: fc5381cf05f833142fa4c84e4c587fec84fffd8f0e7b5473644403141e6b9742
                                              • Instruction Fuzzy Hash: 81F157B0D002499BDB14CFA8C9957EEBBB1FF08304F24425EE545BB381DB756A84CBA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 555 448dff-448e13 call 44e940 558 448e15-448e17 555->558 559 448e19-448e21 555->559 560 448e67-448e87 call 44e8af 558->560 561 448e23-448e2a 559->561 562 448e2c-448e2f 559->562 572 448e99 560->572 573 448e89-448e97 call 4416c8 560->573 561->562 564 448e37-448e4b call 44e940 * 2 561->564 565 448e31-448e35 562->565 566 448e4d-448e5d call 44e940 FindCloseChangeNotification 562->566 564->558 564->566 565->564 565->566 566->558 575 448e5f-448e65 GetLastError 566->575 577 448e9b-448e9e 572->577 573->577 575->560
                                              APIs
                                              • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00448CE6,00000000,CF830579,0057A178,0000000C,00448DA2,0043D07D,?), ref: 00448E55
                                              • GetLastError.KERNEL32(?,00448CE6,00000000,CF830579,0057A178,0000000C,00448DA2,0043D07D,?), ref: 00448E5F
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ChangeCloseErrorFindLastNotification
                                              • String ID:
                                              • API String ID: 1687624791-0
                                              • Opcode ID: 1fe827fdfe079599b9b1dab25e2b646f0beb01ea40d46a72429d261cc15a62e7
                                              • Instruction ID: bfed174018f4c3fae0b74bea86efe9ace0911028d3bee9629bfc5162a0057b67
                                              • Opcode Fuzzy Hash: 1fe827fdfe079599b9b1dab25e2b646f0beb01ea40d46a72429d261cc15a62e7
                                              • Instruction Fuzzy Hash: 6E1125336042102AF6252236A84677F67499B82738F39061FF918CB2D2DF689C81825D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 580 44251c-442534 call 44e940 583 442536-44253d 580->583 584 44254a-442560 SetFilePointerEx 580->584 585 442544-442548 583->585 586 442575-44257f 584->586 587 442562-442573 GetLastError call 4416c8 584->587 588 44259b-44259e 585->588 586->585 590 442581-442596 586->590 587->585 590->588
                                              APIs
                                              • SetFilePointerEx.KERNELBASE(00000000,00000000,00579E30,00432B5E,00000002,00432B5E,00000000,?,?,?,00442626,00000000,?,00432B5E,00000002,00579E30), ref: 00442558
                                              • GetLastError.KERNEL32(00432B5E,?,?,?,00442626,00000000,?,00432B5E,00000002,00579E30,00000000,00432B5E,00000000,00579E30,0000000C,0043D61E), ref: 00442565
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ErrorFileLastPointer
                                              • String ID:
                                              • API String ID: 2976181284-0
                                              • Opcode ID: 0df1753fdbe4f7a704092f8361e7cfb0c7cc0fcadc70f8748e4d2d33b1623b65
                                              • Instruction ID: bcffdd1dd92d970d4fbe8e398a8ab980657c5c2bf717c74f1f656664416c076e
                                              • Opcode Fuzzy Hash: 0df1753fdbe4f7a704092f8361e7cfb0c7cc0fcadc70f8748e4d2d33b1623b65
                                              • Instruction Fuzzy Hash: 9B012632610615BFDF158F69DC1699E3B29EB84334F240209F8019B2E1E6B5ED429BA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 592 4c77f0-4c784a call 4ea420 call 4163b0 call 409280 598 4c784f-4c7854 592->598 599 4c7856-4c785d 598->599 600 4c7872-4c7881 598->600 599->600 601 4c785f 599->601 602 4c7865-4c7870 Sleep 601->602 602->600 602->602
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID: 168
                                              • API String ID: 3472027048-2079752030
                                              • Opcode ID: fa5cc8b1cfc8c31c07ce7df3b4dee737137f6f3af81e37c80995ee834774c82f
                                              • Instruction ID: 1f7e8826813b3d2380bd617aa3bbe7adeb215e0cc6f29ab4b1c79d6fe0be74c1
                                              • Opcode Fuzzy Hash: fa5cc8b1cfc8c31c07ce7df3b4dee737137f6f3af81e37c80995ee834774c82f
                                              • Instruction Fuzzy Hash: 7601F731E08284AFE721AB599C0AB6B7BE5E741B24F08028EF951273D1CBB91804C7D2

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 603 438e02-438e0f 604 438e11-438e34 call 438be3 603->604 605 438e39-438e4d call 44a1e9 603->605 610 438fa0-438fa2 604->610 611 438e52-438e5b call 4425df 605->611 612 438e4f 605->612 614 438e60-438e6f 611->614 612->611 615 438e71 614->615 616 438e7f-438e88 614->616 617 438e77-438e79 615->617 618 438f49-438f4e 615->618 619 438e8a-438e97 616->619 620 438e9c-438ed0 616->620 617->616 617->618 621 438f9e-438f9f 618->621 622 438f9c 619->622 623 438ed2-438edc 620->623 624 438f2d-438f39 620->624 621->610 622->621 627 438f03-438f0f 623->627 628 438ede-438eea 623->628 625 438f50-438f53 624->625 626 438f3b-438f42 624->626 630 438f56-438f5e 625->630 626->618 627->625 629 438f11-438f2b call 439319 627->629 628->627 631 438eec-438efe call 43916e 628->631 629->630 634 438f60-438f66 630->634 635 438f9a 630->635 631->621 638 438f68-438f7c call 438fa3 634->638 639 438f7e-438f82 634->639 635->622 638->621 640 438f95-438f97 639->640 641 438f84-438f92 call 458660 639->641 640->635 641->640
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9f659cc8a9a49272dc5a8b65b091f37dbf03ca88fa3bd65ce108d20efe530995
                                              • Instruction ID: 9663080612542d3e5f9b84a36c3ecf1ef98ea00319430370267f097460dfd66c
                                              • Opcode Fuzzy Hash: 9f659cc8a9a49272dc5a8b65b091f37dbf03ca88fa3bd65ce108d20efe530995
                                              • Instruction Fuzzy Hash: 2651C670A00204AFDF14DF59C881AAABBA2EF8D328F24915EF8089B352D775DD41CB55

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 646 4e7330-4e741a call 41ae80 call 439820 651 4e741c-4e7452 call 43d5f6 call 4393ab call 43d5f6 646->651 652 4e7491-4e74b2 call 402df0 646->652 661 4e7454-4e745b 651->661 662 4e7465-4e746c call 418dc0 651->662 664 4e745f-4e7463 661->664 665 4e745d 661->665 666 4e7471 662->666 667 4e7474-4e747a 664->667 665->664 666->667 668 4e747e-4e7489 call 44209f call 43d0a8 667->668 669 4e747c 667->669 673 4e748e 668->673 669->668 673->652
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: __fread_nolock
                                              • String ID:
                                              • API String ID: 2638373210-0
                                              • Opcode ID: 95c2e167186eeb3e7dc9ada3aaf4bef30febac36b32543f012d33ef2061f0272
                                              • Instruction ID: 0e53ea78c72a938f7fb02060282791f61ff368934c38134d11baa5cff418869a
                                              • Opcode Fuzzy Hash: 95c2e167186eeb3e7dc9ada3aaf4bef30febac36b32543f012d33ef2061f0272
                                              • Instruction Fuzzy Hash: BE5159B0D00248DBCB14DF99C981AEEBBB4EF48714F24416DE8047B381D7799E41CBA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 674 44ac7f-44aca5 call 44aa55 677 44aca7-44acb9 call 442cb3 674->677 678 44acfe-44ad01 674->678 680 44acbe-44acc3 677->680 680->678 681 44acc5-44acfd 680->681
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: __wsopen_s
                                              • String ID:
                                              • API String ID: 3347428461-0
                                              • Opcode ID: 8ff9ba0f0c894046871fc86ec0e9a1d79c4c84a1d92275a4dcbeaa53a6bd2b85
                                              • Instruction ID: f3143862af3a299983658f939e96efeb3759b05c7c18c303aa6d1d81ce31e1ed
                                              • Opcode Fuzzy Hash: 8ff9ba0f0c894046871fc86ec0e9a1d79c4c84a1d92275a4dcbeaa53a6bd2b85
                                              • Instruction Fuzzy Hash: 92112A71A0420AAFDF05DF58E94199F7BF5EF48304F04405AF809EB351D670DA25CB69
                                              APIs
                                              • SetupDiGetClassDevsA.SETUPAPI(0055D560,00000000,00000000), ref: 004E5D47
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ClassDevsSetup
                                              • String ID:
                                              • API String ID: 2330331845-0
                                              • Opcode ID: 3d8916a0f3a5560b99d21513aef90176b581373bb7b6b0032725707bac5390a9
                                              • Instruction ID: 3af1858aaf6aa964ebdd9f4359c5c99147492c850a3065a18f0c0dee6211d041
                                              • Opcode Fuzzy Hash: 3d8916a0f3a5560b99d21513aef90176b581373bb7b6b0032725707bac5390a9
                                              • Instruction Fuzzy Hash: A0110EB1D04B449BE3208F28DD0A757BBF0EB00B28F10471EE850573C1E3BA6A4887E2
                                              APIs
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 0040331F
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Concurrency::cancel_current_task
                                              • String ID:
                                              • API String ID: 118556049-0
                                              • Opcode ID: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                              • Instruction ID: ac639495c118a2832fc09027b5ebf4fad0cef292c7be368858978faeea3118d5
                                              • Opcode Fuzzy Hash: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                              • Instruction Fuzzy Hash: 63F024321001009BCB246F61D4565EAB7ECDF28366B50083FFC8DD7292EB3EDA408788
                                              APIs
                                              • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00434B3F,?,?,75CA23A0,?,?,00403522,?,?), ref: 0044B0C6
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: AllocateHeap
                                              • String ID:
                                              • API String ID: 1279760036-0
                                              • Opcode ID: c639ae0624eff34eb8e57d07392fb4ffc7a0b3e65f726cef66c68c9318aea675
                                              • Instruction ID: 07eaf642519ac51a5bd3283dd2addbb445c80e248ae9cef49388ffb333b33e8c
                                              • Opcode Fuzzy Hash: c639ae0624eff34eb8e57d07392fb4ffc7a0b3e65f726cef66c68c9318aea675
                                              • Instruction Fuzzy Hash: 99E022322006206BFF313AA69C14B5B764CEF413A3F190227EC25A62D1DB3CCC0092EE
                                              APIs
                                              • CreateFileW.KERNELBASE(?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 004429A9
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: CreateFile
                                              • String ID:
                                              • API String ID: 823142352-0
                                              • Opcode ID: 9c728ddfee9c54fb3e95c04c245e6250a3a2534adf7d99ecf6cfd652071d74be
                                              • Instruction ID: d272b26d39d4c1a932e1863db2ccc44a4dabdf9078851b65b676bd57bd2e36c0
                                              • Opcode Fuzzy Hash: 9c728ddfee9c54fb3e95c04c245e6250a3a2534adf7d99ecf6cfd652071d74be
                                              • Instruction Fuzzy Hash: 7DD06C3200020DBBDF128F84DC06EDA3BAAFB48754F014000BA1856120C736E861EB90
                                              APIs
                                              • FindFirstFileA.KERNEL32(00000000,?), ref: 004E010B
                                              • CreateDirectoryA.KERNEL32(00000000,00000000,0000002E,0000002F,?,?,?,?,00565B0C,00000001,0000002E,0000002F,?,0055B49C,3"A,0055B49C), ref: 004E03DB
                                              • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 004E0556
                                              • FindNextFileA.KERNEL32(00000000,?), ref: 004E056C
                                              • FindClose.KERNEL32(00000000), ref: 004E057C
                                              • GetLastError.KERNEL32 ref: 004E0582
                                              • GetLastError.KERNEL32 ref: 004E05A0
                                                • Part of subcall function 004E71E0: GetCurrentProcess.KERNEL32(?), ref: 004E71EF
                                                • Part of subcall function 004E71E0: IsWow64Process.KERNEL32(00000000), ref: 004E71F6
                                                • Part of subcall function 0044196B: GetSystemTimeAsFileTime.KERNEL32(?), ref: 00441980
                                                • Part of subcall function 0044196B: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0044199F
                                              • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,?,00000000,?,?), ref: 004E0D31
                                              • RegQueryValueExA.ADVAPI32(00000000,?,00000000,00020019,?,00000400), ref: 004E0DFD
                                              • RegCloseKey.ADVAPI32(00000000), ref: 004E0E32
                                              • GetCurrentHwProfileA.ADVAPI32(?), ref: 004E0FCA
                                              • GetModuleHandleExA.KERNEL32(00000004,Function_000E5FC0,00000000), ref: 004E14CB
                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 004E14E3
                                              • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,?,?), ref: 004E1E96
                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,00020019,?,?), ref: 004E1F62
                                              • RegCloseKey.ADVAPI32(?), ref: 004E21E1
                                              • GetComputerNameA.KERNEL32(?,00000104), ref: 004E2215
                                              • GetUserNameA.ADVAPI32(?,00000104), ref: 004E23B3
                                              • GetDesktopWindow.USER32 ref: 004E2456
                                              • GetWindowRect.USER32(00000000,?), ref: 004E2464
                                              • GetUserDefaultLocaleName.KERNEL32(?,00000200), ref: 004E25CF
                                              • GetKeyboardLayoutList.USER32(00000000,00000000), ref: 004E2A95
                                              • LocalAlloc.KERNEL32(00000040), ref: 004E2AA7
                                              • GetKeyboardLayoutList.USER32(?,00000000), ref: 004E2AC2
                                              • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 004E2AED
                                              • LocalFree.KERNEL32(?), ref: 004E2CB0
                                              • GetLocalTime.KERNEL32(?), ref: 004E2CC7
                                              • GetSystemTime.KERNEL32(?), ref: 004E2EDD
                                              • GetTimeZoneInformation.KERNEL32(?), ref: 004E2F00
                                              • TzSpecificLocalTimeToSystemTime.KERNEL32(?,?,?), ref: 004E2F25
                                              • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,00020019,00000000), ref: 004E333F
                                              • RegQueryValueExA.ADVAPI32(00000000,?,00000000,00020019,?,00000400), ref: 004E3491
                                              • RegCloseKey.ADVAPI32(00000000), ref: 004E3542
                                              • GetSystemInfo.KERNEL32(?), ref: 004E356A
                                              • GlobalMemoryStatusEx.KERNEL32(00000040), ref: 004E361D
                                              • EnumDisplayDevicesA.USER32(00000000,00000000,?,00000001), ref: 004E3731
                                              • EnumDisplayDevicesA.USER32(00000000,00000001,?,00000001), ref: 004E3B14
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 004E3C53
                                              • Process32First.KERNEL32(00000000,00000128), ref: 004E3C6B
                                              • Process32Next.KERNEL32(00000000,00000128), ref: 004E3C81
                                              • Process32Next.KERNEL32(00000000,?), ref: 004E3D53
                                              • CloseHandle.KERNEL32(00000000), ref: 004E3D62
                                              • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,00020019,?), ref: 004E40D6
                                              • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,?,00000000,00000000,00000000,00000000), ref: 004E410D
                                              • wsprintfA.USER32 ref: 004E41F0
                                              • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,00020019,?), ref: 004E4213
                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,000F003F,?,00000400), ref: 004E4312
                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,000F003F,?,00000400), ref: 004E4409
                                              • RegCloseKey.ADVAPI32(?), ref: 004E44E5
                                              • RegCloseKey.ADVAPI32(00000000), ref: 004E4500
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: CloseTime$FileOpenQueryValue$LocalNameSystem$EnumFindNextProcess32$CreateCurrentDevicesDisplayErrorFirstHandleInfoKeyboardLastLayoutListLocaleModuleProcessUserWindow$AllocComputerCopyDefaultDesktopDirectoryFreeGlobalInformationMemoryProfileRectSnapshotSpecificStatusToolhelp32Unothrow_t@std@@@Wow64Zone__ehfuncinfo$??2@wsprintf
                                              • String ID: 2.0$3"A$;Yb.$default24_2
                                              • API String ID: 3185416054-1980780263
                                              • Opcode ID: d0af5a0cb8ecae2268df48b861a61db0f84c987e998769c91adf604f708e9bf9
                                              • Instruction ID: 762722eee12899a3fad9018c2ab51fc1fd94b4ba954c9d0aaa9e31c72487c533
                                              • Opcode Fuzzy Hash: d0af5a0cb8ecae2268df48b861a61db0f84c987e998769c91adf604f708e9bf9
                                              • Instruction Fuzzy Hash: BFB3EFB4D0426D8BDB25CF99C981AEEBBB1FF48300F1041AAD949B7351DB345A81CFA5
                                              APIs
                                              • std::_Throw_Cpp_error.LIBCPMT ref: 004E6BE7
                                              • std::_Throw_Cpp_error.LIBCPMT ref: 004E6BF8
                                              • CreateDirectoryA.KERNEL32(?,00000000,00000005,?), ref: 004E6C55
                                              • std::_Throw_Cpp_error.LIBCPMT ref: 004E6C84
                                              • std::_Throw_Cpp_error.LIBCPMT ref: 004E6C95
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Cpp_errorThrow_std::_$CreateDirectory
                                              • String ID: \*.*
                                              • API String ID: 2715195259-1173974218
                                              • Opcode ID: ecc08acd5409bd2d2f2bd3c22b3b6aa0d6264b67c78a209e8d4e4319e9b1ebb3
                                              • Instruction ID: b2be1bc9108cd25bcd87be18baf4e69fd7455a47ff8891d9a14199d40660ba90
                                              • Opcode Fuzzy Hash: ecc08acd5409bd2d2f2bd3c22b3b6aa0d6264b67c78a209e8d4e4319e9b1ebb3
                                              • Instruction Fuzzy Hash: 7AE10470C00388DFDB10DFA9C9487EEBBB0FF25315F20425AE454AB292D7746A49DB65
                                              APIs
                                              • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000040,?,00000000), ref: 004CF2F1
                                              • WriteProcessMemory.KERNEL32(00000000,00000000,004C81DD,?,00000000), ref: 004CF30D
                                              • WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 004CF342
                                              • VirtualAllocEx.KERNEL32(?,00000000,00001000,00003000,00000040), ref: 004CF36B
                                              • WriteProcessMemory.KERNEL32(?,00000000,?,00000218,00000000,?,?,?,00589328), ref: 004CF50F
                                              • WriteProcessMemory.KERNEL32(?,00000218,004CF5E0,-00000010,00000000,?,?,?,00589328), ref: 004CF531
                                              • CreateRemoteThread.KERNEL32(?,00000000,00000000,00000218,00000000,00000000,00000000), ref: 004CF544
                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,00589328), ref: 004CF54D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite$AllocVirtual$CreateObjectRemoteSingleThreadWait
                                              • String ID: %s|%s$168
                                              • API String ID: 2137838514-1703702481
                                              • Opcode ID: b88fb1ed2ebfd2a655c4879da0ce9de7ec8f2c0603ef1b71525654192dd42d6d
                                              • Instruction ID: 2ab717f03d3c912496b66fb944616d360f792c6fe5d042a247d22025e7d5b78f
                                              • Opcode Fuzzy Hash: b88fb1ed2ebfd2a655c4879da0ce9de7ec8f2c0603ef1b71525654192dd42d6d
                                              • Instruction Fuzzy Hash: 36B16BB1D002089FDB14CFA4CC95BAEBBB5FF18300F10426DE905BB291D774A984DBA5
                                              APIs
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004EE20C
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004EE300
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004EE3F4
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004EE4E8
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004EE5DC
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004EE65C
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004EE750
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004EE844
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004EE938
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004EEA2C
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: AddressProc
                                              • String ID:
                                              • API String ID: 190572456-0
                                              • Opcode ID: fba17449efcc4fd35a5932faffef4f0bd4510b269c308ba7fc037d24948359eb
                                              • Instruction ID: d080ee8d53740b572b5d589773f2606012d6cd0ef2a87b1da31b43526306bc13
                                              • Opcode Fuzzy Hash: fba17449efcc4fd35a5932faffef4f0bd4510b269c308ba7fc037d24948359eb
                                              • Instruction Fuzzy Hash: 336233B8D0525CEB8B04CFA8D5819DDFBB1BF58310F24919AE855BB351E7306A82EF44
                                              APIs
                                              • GetFileAttributesExW.KERNEL32(?,00000000,?,?,00000000,00000000), ref: 004320BA
                                              • GetLastError.KERNEL32(?,00000000,00000000), ref: 004320C4
                                              • FindFirstFileW.KERNEL32(?,?,?,00000000,00000000), ref: 004320DB
                                              • GetLastError.KERNEL32(?,00000000,00000000), ref: 004320E6
                                              • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 004320F2
                                              • ___std_fs_open_handle@16.LIBCPMT ref: 004321AB
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ErrorFileFindLast$AttributesCloseFirst___std_fs_open_handle@16
                                              • String ID:
                                              • API String ID: 2340820627-0
                                              • Opcode ID: 399e9fa649e6a34084e5cc74f8c51f104b45a1f2b4104aba3408bb700d2d57cc
                                              • Instruction ID: 7e0e21ba57e1066c6160095fdf5a0f96b949db91fc8e8bea8e80148e62c7c079
                                              • Opcode Fuzzy Hash: 399e9fa649e6a34084e5cc74f8c51f104b45a1f2b4104aba3408bb700d2d57cc
                                              • Instruction Fuzzy Hash: D971D275A007199FCB24CF28CE84BABB3B8BF09310F145296E954E3390D7B49E85CB95
                                              APIs
                                              • LoadLibraryA.KERNEL32(?), ref: 00409D32
                                              • GetProcAddress.KERNEL32(?), ref: 00409E3D
                                              • GetProcAddress.KERNEL32(?), ref: 00409F36
                                              • GetProcAddress.KERNEL32(?), ref: 00409FBB
                                              • GetProcAddress.KERNEL32(?), ref: 0040A055
                                              • GetProcAddress.KERNEL32(?), ref: 0040A0EF
                                              • GetProcAddress.KERNEL32(?), ref: 0040A189
                                              • GetProcAddress.KERNEL32(?), ref: 0040A223
                                              • FreeLibrary.KERNEL32 ref: 0040A27B
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: AddressProc$Library$FreeLoad
                                              • String ID:
                                              • API String ID: 2449869053-0
                                              • Opcode ID: 52f01a4dfbcb3f59218750f5f3945a65c16e243dd72f162a9732142b51316fa4
                                              • Instruction ID: 056e7afbc769c29073d59368404efc94fb89f274a412975777f329f96bf9ec8f
                                              • Opcode Fuzzy Hash: 52f01a4dfbcb3f59218750f5f3945a65c16e243dd72f162a9732142b51316fa4
                                              • Instruction Fuzzy Hash: 372286B8D05218EBCB15CF98D981AEDBBB1FF58310F2081AAD849B7350D7345A85EF45
                                              APIs
                                                • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                                                • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                                              • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 004535D7
                                              • IsValidCodePage.KERNEL32(00000000), ref: 00453615
                                              • IsValidLocale.KERNEL32(?,00000001), ref: 00453628
                                              • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00453670
                                              • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 0045368B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                              • String ID: *V
                                              • API String ID: 415426439-2897881622
                                              • Opcode ID: bb3ee8500ca9cacc625c50b97d6e48ff5c53ad3e39c4a6c01d9da358df15b7ae
                                              • Instruction ID: 4a54d826d8e8e5dc964d84ffa3ac1e49b68ae0fe58eca9cd8e7cd24ca5604c7d
                                              • Opcode Fuzzy Hash: bb3ee8500ca9cacc625c50b97d6e48ff5c53ad3e39c4a6c01d9da358df15b7ae
                                              • Instruction Fuzzy Hash: 4E517471A00209AFDB20DFA5CC41ABF77B8AF05743F14446AED01E7252EB74DA48DB65
                                              APIs
                                              • GetLastError.KERNEL32 ref: 00545061
                                              • GetVersionExA.KERNEL32(?), ref: 00545085
                                              • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 005450B7
                                              • LocalFree.KERNEL32(?), ref: 005450CE
                                              • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00545106
                                                • Part of subcall function 00545B50: AreFileApisANSI.KERNEL32(00000000,00000000,?,?,?,005448A5), ref: 00545B5C
                                                • Part of subcall function 00545B50: MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,?,?,?,005448A5), ref: 00545B71
                                                • Part of subcall function 00545B50: MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 00545B97
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ByteCharFormatMessageMultiWide$ApisErrorFileFreeLastLocalVersion
                                              • String ID: OsError 0x%x (%u)
                                              • API String ID: 807219750-2664311388
                                              • Opcode ID: 0d4010ca04ec75710d5123f11d165840ae7251f1f65bebee6710aad968807722
                                              • Instruction ID: 40d3e820988b70ea56f320253a2c5dfb69695040fa1f8efb038979f2cda04def
                                              • Opcode Fuzzy Hash: 0d4010ca04ec75710d5123f11d165840ae7251f1f65bebee6710aad968807722
                                              • Instruction Fuzzy Hash: 9621A476A00308BBDB20AB719C4AFDE7FB8FB55795F1000A5F909E3291E7709E05D661
                                              APIs
                                                • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                                                • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                                              • GetACP.KERNEL32(?,?,?,?,?,?,00447300,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00452C19
                                              • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00447300,?,?,?,00000055,?,-00000050,?,?), ref: 00452C50
                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00452DB3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ErrorLast$CodeInfoLocalePageValid
                                              • String ID: *V$utf8
                                              • API String ID: 607553120-210452255
                                              • Opcode ID: 95727e6ef7b94787d777f99e21165c393144e5509e4be2ad3f52f8295ffa9360
                                              • Instruction ID: 742b11dcb7ff0b0bfa38c284345f0d68b4d7ce619a9ba0daefdf44cafbbca61f
                                              • Opcode Fuzzy Hash: 95727e6ef7b94787d777f99e21165c393144e5509e4be2ad3f52f8295ffa9360
                                              • Instruction Fuzzy Hash: F071FA32600602A6D725AF75CD45B6B73A8EF16705F10042FFD05D7283EBF8E94C9699
                                              APIs
                                              • GetLocaleInfoW.KERNEL32(?,2000000B,00453605,00000002,00000000,?,?,?,00453605,?,00000000), ref: 0045338C
                                              • GetLocaleInfoW.KERNEL32(?,20001004,00453605,00000002,00000000,?,?,?,00453605,?,00000000), ref: 004533B5
                                              • GetACP.KERNEL32(?,?,00453605,?,00000000), ref: 004533CA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: InfoLocale
                                              • String ID: ACP$OCP
                                              • API String ID: 2299586839-711371036
                                              • Opcode ID: b900ca414d4c4be95a8c6f041d08249478f894891a183a2f82a4edaf5765dc51
                                              • Instruction ID: 0023b8279c9b3e3643c8ce07df61025d6c2b7e12d2ffc4f7461f6cfcb2a1a3ae
                                              • Opcode Fuzzy Hash: b900ca414d4c4be95a8c6f041d08249478f894891a183a2f82a4edaf5765dc51
                                              • Instruction Fuzzy Hash: 8021C432600100A7DB308F54C900A9BB3A6AF50FD3B568466EC06D7312EF36EF49D358
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                              • Instruction ID: 01dad5c531b3804b6668612822d9feb5b6f7af541a2af8c3bc89036eeee974e8
                                              • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                              • Instruction Fuzzy Hash: DA023A71E002199BDF14CFA9D9C06AEFBB1FF48314F24926AE919B7380D735A9418B94
                                              APIs
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0048F19C
                                              • Process32First.KERNEL32(00000000,?), ref: 0048F1C2
                                              • Process32Next.KERNEL32(00000000,00000128), ref: 0048F211
                                              • CloseHandle.KERNEL32(00000000), ref: 0048F227
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                              • String ID:
                                              • API String ID: 420147892-0
                                              • Opcode ID: 0d951179c317006dddf831d143819256e2710197f3f27043bc004d2e793115e6
                                              • Instruction ID: fbe0c60eb3c239f6b217fe84070aebb3c7b1e9daf40031a0165cf74cf1030098
                                              • Opcode Fuzzy Hash: 0d951179c317006dddf831d143819256e2710197f3f27043bc004d2e793115e6
                                              • Instruction Fuzzy Hash: ADD1BF71D002098BDB14DFA8C9857EEFBF5EF44304F24456AD805A7381E779AE88CBA5
                                              APIs
                                              • FindFirstFileA.KERNEL32(00000000,00565EFC,00565EFC,00000002,?,00000001), ref: 0049396F
                                              • FindNextFileA.KERNEL32(00000000,00000010), ref: 00493ACF
                                              • GetLastError.KERNEL32 ref: 00493ADD
                                              • FindClose.KERNEL32(00000000), ref: 00493AED
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Find$File$CloseErrorFirstLastNext
                                              • String ID:
                                              • API String ID: 819619735-0
                                              • Opcode ID: 5c5bfb243b718b9e397d986a5abe0b9450da5460a2542200edb8a3b95439bd0e
                                              • Instruction ID: 59bca9142b2f43e85d8f64eb9617364e40f7e337b3faf31c9dfe380ec3e76daa
                                              • Opcode Fuzzy Hash: 5c5bfb243b718b9e397d986a5abe0b9450da5460a2542200edb8a3b95439bd0e
                                              • Instruction Fuzzy Hash: 817124719002448BCF10CF64C8957FEBFB5AB56305F1442AAE441AB382D77A9F89CB64
                                              APIs
                                              • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00434190
                                              • IsDebuggerPresent.KERNEL32 ref: 0043425C
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00434275
                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 0043427F
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                              • String ID:
                                              • API String ID: 254469556-0
                                              • Opcode ID: 5e995d56bca3090024ce11201d33d294d56103379e56bdf134d89c0665374a9e
                                              • Instruction ID: cc34265599f2dec34f964c3269ec222ae3e40e25564db7ad72de3f36d20b351d
                                              • Opcode Fuzzy Hash: 5e995d56bca3090024ce11201d33d294d56103379e56bdf134d89c0665374a9e
                                              • Instruction Fuzzy Hash: BB31F6B5D053189BDB20EFA5D9497CDBBB8AF08304F1041AAE40CAB250EB759A84CF59
                                              APIs
                                              • GetSystemTime.KERNEL32(?), ref: 005449CA
                                              • GetCurrentProcessId.KERNEL32 ref: 005449E5
                                              • GetTickCount.KERNEL32 ref: 005449FA
                                              • QueryPerformanceCounter.KERNEL32(?), ref: 00544A11
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                              • String ID:
                                              • API String ID: 4122616988-0
                                              • Opcode ID: 2761748a9af697217c0ec141a17cdb9775b7d53fbeab25e478c1a4390fc4254b
                                              • Instruction ID: a8b0bf13f8b3a5775aebc3e00f45f95b893848271c39c3c1d8b2d1e40acf56c4
                                              • Opcode Fuzzy Hash: 2761748a9af697217c0ec141a17cdb9775b7d53fbeab25e478c1a4390fc4254b
                                              • Instruction Fuzzy Hash: 8A110432A007298BDB118FA9DC885EAFBF9FF49225B404536EC49D7215D631A481CBE0
                                              APIs
                                              • VirtualQuery.KERNEL32(?,?,0000001C), ref: 004580E9
                                              • GetSystemInfo.KERNEL32(?), ref: 00458104
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: InfoQuerySystemVirtual
                                              • String ID: D
                                              • API String ID: 401686933-2746444292
                                              • Opcode ID: 53f2c066bf0a3f036097ffc709ce78bf8807582e756120d0ec3c2933d4a49f04
                                              • Instruction ID: 15e633f26279e9839b0c5b245ad8314628d4ede9c042647a00b0634ca8b556b4
                                              • Opcode Fuzzy Hash: 53f2c066bf0a3f036097ffc709ce78bf8807582e756120d0ec3c2933d4a49f04
                                              • Instruction Fuzzy Hash: 7201F7336005096BDB24DE29DC05BDE7BBAAFD4325F0CC125ED59E7291EE38D90A8790
                                              APIs
                                              • GetLocaleInfoEx.KERNEL32(!x-sys-default-locale,20000001,00000000,00000002,?,?,00403E16), ref: 00431DA8
                                              • FormatMessageA.KERNEL32(00001300,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00403E16), ref: 00431DCF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: FormatInfoLocaleMessage
                                              • String ID: !x-sys-default-locale
                                              • API String ID: 4235545615-2729719199
                                              • Opcode ID: fcdca3659bb1d2a61432e1cd2d8e2713532a4f3d4bfe03f6844bae0cf60f700d
                                              • Instruction ID: 5533b84c20dc3ebd942ff18ae9bc369b32e0f46532b4feac63eb50df4c9c1bd4
                                              • Opcode Fuzzy Hash: fcdca3659bb1d2a61432e1cd2d8e2713532a4f3d4bfe03f6844bae0cf60f700d
                                              • Instruction Fuzzy Hash: 05F03076210104BFEB189B94DC1ADEB7ABCEB0A395F00411ABA02D6150E2B0AE0097B5
                                              APIs
                                              • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 004C6B57
                                              • LocalFree.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,00000000,005599AF,000000FF,?,?,00000005), ref: 004C6B86
                                              • LocalFree.KERNEL32(?,?), ref: 004C6C82
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: FreeLocal$CryptDataUnprotect
                                              • String ID:
                                              • API String ID: 2835072361-0
                                              • Opcode ID: d7d82cbe380403d495b2fd6a7e2a6d2e7fbb054e7ac70c00a231221df97a0296
                                              • Instruction ID: 90b6470924ea9a925c498959a8113d32d71e754cc84c5268c76d6fdb8e080973
                                              • Opcode Fuzzy Hash: d7d82cbe380403d495b2fd6a7e2a6d2e7fbb054e7ac70c00a231221df97a0296
                                              • Instruction Fuzzy Hash: A271A171C002489BDB00DFA8C945BEEFBB4EF14314F14826EE855B3391EB786A45DBA5
                                              APIs
                                                • Part of subcall function 00544B20: GetVersionExA.KERNEL32(?), ref: 00544B51
                                                • Part of subcall function 00544B20: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000), ref: 00544B76
                                                • Part of subcall function 00544B20: GetFullPathNameW.KERNEL32(00000000,00000003,00000000,00000000), ref: 00544B96
                                                • Part of subcall function 00545330: GetVersionExA.KERNEL32(?), ref: 00545356
                                                • Part of subcall function 00545D90: GetVersionExA.KERNEL32(?), ref: 00545DB4
                                              • GetDiskFreeSpaceW.KERNEL32(00000000,?,00000200,?,?), ref: 00544AC9
                                              • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?), ref: 00544AF6
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Version$DiskFreeFullNamePathSpace
                                              • String ID:
                                              • API String ID: 4112908208-0
                                              • Opcode ID: becd6c03501c24d27a43ccdd940953d2523818c8f4bbaac0c2ad00c18d494839
                                              • Instruction ID: f10753ebb869b3640b9ac64d1dc3f7217fc16a68dafdf90303c08a5a8463592c
                                              • Opcode Fuzzy Hash: becd6c03501c24d27a43ccdd940953d2523818c8f4bbaac0c2ad00c18d494839
                                              • Instruction Fuzzy Hash: 0C21257A980108ABDB21DB699844BFB7BBDFF00308F1400A6E941D7101FB31CE46CBA5
                                              APIs
                                              • GetTimeZoneInformation.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0044D575,00000000,00000000,00000000), ref: 0044D434
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: InformationTimeZone
                                              • String ID:
                                              • API String ID: 565725191-0
                                              • Opcode ID: 86e5d885c4d35228b47254165b32bc93c4fcf0139348273eeba2c017ff9bca0a
                                              • Instruction ID: 995cd6d02630714d132d55606a96056be67725e06db18ab92a0eb750c7361116
                                              • Opcode Fuzzy Hash: 86e5d885c4d35228b47254165b32bc93c4fcf0139348273eeba2c017ff9bca0a
                                              • Instruction Fuzzy Hash: C1C12472D00215ABEB20AF659C42ABF7BB9EF04714F54405BFD05EB291EB389E41C798
                                              APIs
                                              • GetModuleHandleA.KERNEL32(?,771AE010,?), ref: 004E92A0
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004E92B0
                                              • GetModuleHandleA.KERNEL32(?), ref: 004E93C8
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004E93D2
                                              • OpenProcess.KERNEL32(00000040,00000000,?), ref: 004E93DE
                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000000), ref: 004E944D
                                              • CloseHandle.KERNEL32(00000000), ref: 004E9480
                                              • CloseHandle.KERNEL32(00000000), ref: 004E94A6
                                              • CloseHandle.KERNEL32(00000000), ref: 004E94C6
                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,?), ref: 004E9668
                                              • ResetEvent.KERNEL32(00000000), ref: 004E9671
                                              • CreateThread.KERNEL32(00000000,00000000,004E97A0,?,00000000,00000000), ref: 004E9695
                                              • WaitForSingleObject.KERNEL32(00000000,00000064), ref: 004E96A1
                                              • RtlUnicodeStringToAnsiString.NTDLL(?,?,00000001), ref: 004E96E7
                                              • CloseHandle.KERNEL32(00000000), ref: 004E9728
                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000001), ref: 004E9734
                                              • CloseHandle.KERNEL32(00000000), ref: 004E9753
                                              • TerminateThread.KERNEL32(14D846FE,00000000), ref: 004E9781
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Handle$Close$Process$AddressCreateCurrentEventModuleProcStringThread$AnsiObjectOpenResetSingleTerminateUnicodeWait
                                              • String ID: File
                                              • API String ID: 3681783469-749574446
                                              • Opcode ID: 5519d313cc11df224254bb5c2ddb9f42228914f8febfa83a914f2ab3983c68cb
                                              • Instruction ID: b9b0c17e31d3cfe0bbc2e9151a178c1e78e3251af3666c5291f23336d4f8ce8a
                                              • Opcode Fuzzy Hash: 5519d313cc11df224254bb5c2ddb9f42228914f8febfa83a914f2ab3983c68cb
                                              • Instruction Fuzzy Hash: 6322D2B4D042599FDB24CF99D981BEEBBB4BF08310F104199E909B7390E7746A81CFA5
                                              APIs
                                              • CopyFileA.KERNEL32(?,?,00000000), ref: 004D6A20
                                                • Part of subcall function 004D6BA0: GetLastError.KERNEL32(?,00000000), ref: 004D6BD3
                                                • Part of subcall function 004D6BA0: RmStartSession.RSTRTMGR(?,00000000,?), ref: 004D6C50
                                                • Part of subcall function 004D6BA0: RmRegisterResources.RSTRTMGR(?,00000001,?,00000000,00000000,00000000,00000000,?), ref: 004D6C91
                                                • Part of subcall function 004D6BA0: RmGetList.RSTRTMGR(?,00000000,?,?,?), ref: 004D6CB9
                                              • std::_Throw_Cpp_error.LIBCPMT ref: 004D6B84
                                              • std::_Throw_Cpp_error.LIBCPMT ref: 004D6B95
                                              • RmShutdown.RSTRTMGR(?,00000001,00000000), ref: 004D6CDA
                                              • RmEndSession.RSTRTMGR(?), ref: 004D6CF7
                                              • SetLastError.KERNEL32(00000000), ref: 004D6CFE
                                              • CopyFileA.KERNEL32(?,?,00000000), ref: 004D6D25
                                              • GetLastError.KERNEL32(?,?,00000000), ref: 004D6D33
                                              • CopyFileA.KERNEL32(?,?,00000000), ref: 004D6D47
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: CopyErrorFileLast$Cpp_errorSessionThrow_std::_$ListRegisterResourcesShutdownStart
                                              • String ID:
                                              • API String ID: 3293558552-0
                                              • Opcode ID: 34269084e38b8db14bed7b99909fd434936ce292801c6578ad0428061b37c9c8
                                              • Instruction ID: 506ad45c425b60783e5a35b13f18b7e09e4e0bf61d875f697530398146ac6994
                                              • Opcode Fuzzy Hash: 34269084e38b8db14bed7b99909fd434936ce292801c6578ad0428061b37c9c8
                                              • Instruction Fuzzy Hash: 0102BCB1C00249DBCB10DFA4C955BEEBBB5FF14314F14426AE805B7381EB786A49CBA5
                                              APIs
                                              • CharNextA.USER32 ref: 004EEA65
                                              • CharNextA.USER32 ref: 004EEA85
                                              • CharNextA.USER32 ref: 004EEAA5
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004EEAD6
                                              • lstrlenA.KERNEL32(?,00000000,00000000,00000003,00000000), ref: 004EEB52
                                              • GetProcessHeap.KERNEL32(00000008,?,00000000,00000000,00000003,00000000), ref: 004EEB6E
                                              • HeapAlloc.KERNEL32(00000000), ref: 004EEB71
                                              • lstrcpynA.KERNEL32(00000000,?,?), ref: 004EEB7E
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004EEBA9
                                              • HeapFree.KERNEL32(00000000), ref: 004EEBAC
                                              Strings
                                              • Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36, xrefs: 004EEB8E
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Heap$CharNext$Process$AllocFreeUnothrow_t@std@@@__ehfuncinfo$??2@lstrcpynlstrlen
                                              • String ID: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36
                                              • API String ID: 2305228968-2732702261
                                              • Opcode ID: 423986ca5e1177f672ef3d58246459128f5a16203a5f76b509fb2a383bcfa813
                                              • Instruction ID: 66e08b66e62082d9c79a605ab5b022e87f42821b87c70d6f65fc34b32a61c15c
                                              • Opcode Fuzzy Hash: 423986ca5e1177f672ef3d58246459128f5a16203a5f76b509fb2a383bcfa813
                                              • Instruction Fuzzy Hash: F1414976D003449FCF10CFAB9C80AAABBB5FF69302B08016BEA05B7351E7755D059B64
                                              APIs
                                              • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,0045734F), ref: 004579FC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: DecodePointer
                                              • String ID: `-@$acos$asin$exp$log$log10$pow$sqrt
                                              • API String ID: 3527080286-3628989360
                                              • Opcode ID: 4c17630f5161de399ffce6b570c60365a2c89c55b52a7f760b39540bf94f5387
                                              • Instruction ID: bbf143f63b3841ec77cfacb8c6df481a799db6acf17f433172942b25d65e7ef2
                                              • Opcode Fuzzy Hash: 4c17630f5161de399ffce6b570c60365a2c89c55b52a7f760b39540bf94f5387
                                              • Instruction Fuzzy Hash: 1651B370808A0ACBCF109F58F84C1BEBFB1FB05309F154166D851A7266C7799A2DCB4D
                                              APIs
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 0041A09D
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 0041A0BF
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 0041A0E7
                                              • __Getctype.LIBCPMT ref: 0041A1C5
                                              • std::_Facet_Register.LIBCPMT ref: 0041A1F9
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 0041A223
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                              • String ID: PD@$PG@$E@
                                              • API String ID: 1102183713-4120405683
                                              • Opcode ID: 495f4126c8959cda1dad90c343e93fba20469dde2e2043d742b69906c970156d
                                              • Instruction ID: b372b58ab1bb25eec4b44a09b7f8f3aef2cc67a410616163416d5e42c3dffe19
                                              • Opcode Fuzzy Hash: 495f4126c8959cda1dad90c343e93fba20469dde2e2043d742b69906c970156d
                                              • Instruction Fuzzy Hash: 6E51BAB0D01245DFCB11CF98C9457AEBBF0FB14714F14825ED855AB391DB78AA88CB92
                                              APIs
                                              • LocalAlloc.KERNEL32(00000040,0000001C), ref: 004E5E2B
                                              • SetupDiEnumDeviceInfo.SETUPAPI(00000000,00000000,00000000), ref: 004E5E3E
                                              • LocalAlloc.KERNEL32(00000040,0000001C), ref: 004E5E73
                                              • SetupDiEnumDeviceInterfaces.SETUPAPI(?,00000000,0055D560,00000000,00000000), ref: 004E5E91
                                              • GetModuleHandleExA.KERNEL32(00000004,004E5FC0,?), ref: 004E5FD6
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: AllocDeviceEnumLocalSetup$HandleInfoInterfacesModule
                                              • String ID:
                                              • API String ID: 2253831631-0
                                              • Opcode ID: fadfa1ac60673d3e458d1915a7e98f7ba4584b72fe7d50eb1e1fd26e6b005db2
                                              • Instruction ID: 9ece1d8e53d7ac8d60b2bb6ddbf2ef81f89b1d867ae8a09947e2396971ddc2c4
                                              • Opcode Fuzzy Hash: fadfa1ac60673d3e458d1915a7e98f7ba4584b72fe7d50eb1e1fd26e6b005db2
                                              • Instruction Fuzzy Hash: AB61BCB1900349AFEB10CFA5CD09BAEBFB5FF14305F24025AE90067291D3B96A44DBA5
                                              APIs
                                              • GetLastError.KERNEL32(?,00000000), ref: 004D6BD3
                                              • RmStartSession.RSTRTMGR(?,00000000,?), ref: 004D6C50
                                              • RmRegisterResources.RSTRTMGR(?,00000001,?,00000000,00000000,00000000,00000000,?), ref: 004D6C91
                                              • RmGetList.RSTRTMGR(?,00000000,?,?,?), ref: 004D6CB9
                                              • RmShutdown.RSTRTMGR(?,00000001,00000000), ref: 004D6CDA
                                              • RmEndSession.RSTRTMGR(?), ref: 004D6CF7
                                              • SetLastError.KERNEL32(00000000), ref: 004D6CFE
                                              • CopyFileA.KERNEL32(?,?,00000000), ref: 004D6D25
                                              • GetLastError.KERNEL32(?,?,00000000), ref: 004D6D33
                                              • CopyFileA.KERNEL32(?,?,00000000), ref: 004D6D47
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ErrorLast$CopyFileSession$ListRegisterResourcesShutdownStart
                                              • String ID:
                                              • API String ID: 304452573-0
                                              • Opcode ID: f2e0f649d8c451cb188e662d2111ed80fd4b92e16dc5a70a42fc26eb44908162
                                              • Instruction ID: cca443e56f4e81c83c2dc89493b37bcb85ee1d7da0cfa031959f485395bd6110
                                              • Opcode Fuzzy Hash: f2e0f649d8c451cb188e662d2111ed80fd4b92e16dc5a70a42fc26eb44908162
                                              • Instruction Fuzzy Hash: 6051C172D01219ABCB21CF94DC55BEEBBB8EB04320F10026AE804B3390D7396E05CBA4
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwind
                                              • String ID: PU$csm$csm$csm
                                              • API String ID: 944608866-2352073648
                                              • Opcode ID: bfdbdb9048f87fb98bf27686f7ec8788dee97e91e92dadc6c49aef564bf08e9e
                                              • Instruction ID: 3ab07074fa5cec17866f911e521d745307128fc3ecc03719d0b843171535b798
                                              • Opcode Fuzzy Hash: bfdbdb9048f87fb98bf27686f7ec8788dee97e91e92dadc6c49aef564bf08e9e
                                              • Instruction Fuzzy Hash: 2DB18EB1808209DFDF25EFA5C8819AEBB75FF18314F14615BE8406B302D739EA51CB99
                                              APIs
                                              • RegGetValueA.ADVAPI32(80000002,?,?,0001FFFF,00000001,?,00000104,?,?,?), ref: 004E4A70
                                              • GetComputerNameExA.KERNEL32(00000002,?,00000104,?,?,?,?,?,?), ref: 004E4ADC
                                              • LsaOpenPolicy.ADVAPI32(00000000,00587684,00000001,?), ref: 004E4B35
                                              • LsaQueryInformationPolicy.ADVAPI32(?,0000000C,?), ref: 004E4B48
                                              • LsaFreeMemory.ADVAPI32(?), ref: 004E4B76
                                              • LsaClose.ADVAPI32(?), ref: 004E4B7F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Policy$CloseComputerFreeInformationMemoryNameOpenQueryValue
                                              • String ID: %wZ$;Yb.
                                              • API String ID: 762890658-2876608990
                                              • Opcode ID: 1f6fa3f1279af543b2d0416b495f84695c810df1c81b970ccc0f6ebddc05bc25
                                              • Instruction ID: db120a3af714b361d6db134a28a940fef9e0d4b71911d12d67c4190411436b99
                                              • Opcode Fuzzy Hash: 1f6fa3f1279af543b2d0416b495f84695c810df1c81b970ccc0f6ebddc05bc25
                                              • Instruction Fuzzy Hash: 1EE101B4D0425A8FDB14CF98C985BEEBBB4BF08304F2041AAE949B7341D7745A85CFA5
                                              APIs
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 0041D28A
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 0041D2AC
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 0041D2D4
                                              • __Getcoll.LIBCPMT ref: 0041D39F
                                              • std::_Facet_Register.LIBCPMT ref: 0041D3E4
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 0041D40E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetcollRegister
                                              • String ID: @A$PD@
                                              • API String ID: 1184649410-3602166583
                                              • Opcode ID: 0bf225a75eb93bfa089e9f157e46b85744d7a7315d20ca7401f03ce5cc574cac
                                              • Instruction ID: c0da35fc40401e56e1a2e1b6a9e91288cb6dff343535c30909133d457a6d594b
                                              • Opcode Fuzzy Hash: 0bf225a75eb93bfa089e9f157e46b85744d7a7315d20ca7401f03ce5cc574cac
                                              • Instruction Fuzzy Hash: DD51BAB1C01209DFDB01DF99C9447AEBBF0FF55318F24805AE8156B381C779AA49CB92
                                              APIs
                                              • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 004335DE
                                              • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 004335EC
                                              • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 004335FD
                                              • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 0043360E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: AddressProc$HandleModule
                                              • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                              • API String ID: 667068680-1247241052
                                              • Opcode ID: fa32ac99bed3163b7218575a0872144807cc5232e4a06349f6b146d66b29aa24
                                              • Instruction ID: 4ac6349005adf47651da35ec4b9228104ef97a4851d7f02e7f823555ada55313
                                              • Opcode Fuzzy Hash: fa32ac99bed3163b7218575a0872144807cc5232e4a06349f6b146d66b29aa24
                                              • Instruction Fuzzy Hash: ACE0B672951310ABC7249BB0BC2D9663EB8FA296637404056FC02E21A0EBB05949ABB4
                                              APIs
                                                • Part of subcall function 00545330: GetVersionExA.KERNEL32(?), ref: 00545356
                                              • GetVersionExA.KERNEL32(?), ref: 00544D33
                                              • DeleteFileW.KERNEL32(00000000), ref: 00544D52
                                              • GetFileAttributesW.KERNEL32(00000000), ref: 00544D59
                                              • GetLastError.KERNEL32 ref: 00544D66
                                              • Sleep.KERNEL32(00000064), ref: 00544D7C
                                              • DeleteFileA.KERNEL32(00000000), ref: 00544D85
                                              • GetFileAttributesA.KERNEL32(00000000), ref: 00544D8C
                                              • GetLastError.KERNEL32 ref: 00544D99
                                              • Sleep.KERNEL32(00000064), ref: 00544DAF
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: File$AttributesDeleteErrorLastSleepVersion
                                              • String ID:
                                              • API String ID: 1421123951-0
                                              • Opcode ID: 644f3411c4d85681ded29085f2f8665f8d90dbdf3f2b9961fa3a9f7b4629f182
                                              • Instruction ID: e8ec0c6fce3b273d326ef0f9b2b3730986ab63f4275b785bb0a08d323dc610f1
                                              • Opcode Fuzzy Hash: 644f3411c4d85681ded29085f2f8665f8d90dbdf3f2b9961fa3a9f7b4629f182
                                              • Instruction Fuzzy Hash: 6221DB32D403149FCB20AB74AC8D6FD7BB4FB69339F100655E91AD31A0EA304985AB52
                                              APIs
                                              • _ValidateLocalCookies.LIBCMT ref: 00437307
                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 0043730F
                                              • _ValidateLocalCookies.LIBCMT ref: 00437398
                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 004373C3
                                              • _ValidateLocalCookies.LIBCMT ref: 00437418
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                              • String ID: `-@$csm
                                              • API String ID: 1170836740-3738301566
                                              • Opcode ID: a837c65dc98bc53f7a591b5dada66322cfdf011b0ab20b220170fbbfaeea83fd
                                              • Instruction ID: bde692452db8eba3752ab90a3e7788ac0719a0bf92b2230e47b89eff8dfd02fd
                                              • Opcode Fuzzy Hash: a837c65dc98bc53f7a591b5dada66322cfdf011b0ab20b220170fbbfaeea83fd
                                              • Instruction Fuzzy Hash: B041F8709042099FCF20DF59C885A9FBBA4BF08328F14905BFC54AB392D739E905DB95
                                              APIs
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 0041C45A
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 0041C47C
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 0041C4A4
                                              • std::_Facet_Register.LIBCPMT ref: 0041C59A
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 0041C5C4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                              • String ID: E@$PD@
                                              • API String ID: 459529453-4103272508
                                              • Opcode ID: fb94b052f71f665722219136562a8730e5ed9d67761b2a33bc821d4977d05291
                                              • Instruction ID: e4bc83ced0ac359faa997fd18d4eeb760fe14de2594101695cc0fd15b6690fbc
                                              • Opcode Fuzzy Hash: fb94b052f71f665722219136562a8730e5ed9d67761b2a33bc821d4977d05291
                                              • Instruction Fuzzy Hash: C351EFB0900255EFDB11CF58C991BAEBBF0FB10314F24415EE846AB381D7B9AA45CB95
                                              APIs
                                              • InternetSetOptionA.WININET(00000000,00000006,?,00000004), ref: 004EDF20
                                              • GetLastError.KERNEL32 ref: 004EE015
                                              • InternetQueryOptionA.WININET(00000000,0000001F,80000000,?), ref: 004EE040
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: InternetOption$ErrorLastQuery
                                              • String ID:
                                              • API String ID: 3980908186-0
                                              • Opcode ID: a1ac1e88c949714abb61e8a63101dbc767da60d4252146e236756bc9d4aa2743
                                              • Instruction ID: 9490229386b8f910ac67b310a4b2a15fa60c532261df57d9535cab47ed46c7f4
                                              • Opcode Fuzzy Hash: a1ac1e88c949714abb61e8a63101dbc767da60d4252146e236756bc9d4aa2743
                                              • Instruction Fuzzy Hash: B951BE75D40319ABEB20CF95DC8ABEEBBB4EB08B11F14415AEE11BB380D7745A05CB94
                                              APIs
                                              • LockFile.KERNEL32(00000000,40000000,00000000,00000001,00000000), ref: 005455C3
                                              • Sleep.KERNEL32(00000001), ref: 005455D1
                                              • GetLastError.KERNEL32 ref: 005455E8
                                              • UnlockFile.KERNEL32(00000000,40000000,00000000,?,00000000), ref: 00545633
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: File$ErrorLastLockSleepUnlock
                                              • String ID:
                                              • API String ID: 3015003838-0
                                              • Opcode ID: fe5b5dd74c13ed604590905c3a68f9743d06f085f038e564466f01a9403e7b73
                                              • Instruction ID: 85acfabea7dd4ab1116a46d77ec5fdacabbf57290cd153e1b380d28a3a3316b2
                                              • Opcode Fuzzy Hash: fe5b5dd74c13ed604590905c3a68f9743d06f085f038e564466f01a9403e7b73
                                              • Instruction Fuzzy Hash: 9741D431B01B14ABDB308F24DD957EEBB66FB54729F618125ED08AB392E7719C408BD0
                                              APIs
                                              • CharNextA.USER32 ref: 004EDB55
                                              • CharNextA.USER32 ref: 004EDB6C
                                              • CharNextA.USER32 ref: 004EDB85
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004EDBB6
                                              • lstrlenA.KERNEL32(?,00000000,00000000,00000003,00000000), ref: 004EDC32
                                              • GetProcessHeap.KERNEL32(00000008,?,00000000,00000000,00000003,00000000), ref: 004EDC48
                                              • HeapAlloc.KERNEL32(00000000), ref: 004EDC4F
                                              • lstrcpynA.KERNEL32(00000000,?,?), ref: 004EDC5C
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: CharNext$Heap$AllocProcessUnothrow_t@std@@@__ehfuncinfo$??2@lstrcpynlstrlen
                                              • String ID:
                                              • API String ID: 1659885099-0
                                              • Opcode ID: 5902d60186420a28bcfe0593f279e262339d39e86a68ea558966eb630272322d
                                              • Instruction ID: 9156e0b6da00d8c97823f7767c754a9362769a51dfd7e715744df6f0419fd9af
                                              • Opcode Fuzzy Hash: 5902d60186420a28bcfe0593f279e262339d39e86a68ea558966eb630272322d
                                              • Instruction Fuzzy Hash: 9C416A35D007849FCB208F6E9C806AABBF9EF69312B150197E845F7311E7B49C45DB58
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: _strrchr
                                              • String ID:
                                              • API String ID: 3213747228-0
                                              • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                              • Instruction ID: d7b9d7273cbfac5d15a556f8c8651b9033d93685d5a38535419dded3191b9e75
                                              • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                              • Instruction Fuzzy Hash: D5B14672D006559FEB158F24CC81BEBBBA5EF59310F2441ABE904AB382D778D901C7E9
                                              APIs
                                              • GetLastError.KERNEL32 ref: 005447EB
                                              • GetVersionExA.KERNEL32(?), ref: 00544810
                                              • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00544843
                                              • LocalFree.KERNEL32(?), ref: 0054485A
                                              • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00544893
                                                • Part of subcall function 00545B50: AreFileApisANSI.KERNEL32(00000000,00000000,?,?,?,005448A5), ref: 00545B5C
                                                • Part of subcall function 00545B50: MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,?,?,?,005448A5), ref: 00545B71
                                                • Part of subcall function 00545B50: MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 00545B97
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ByteCharFormatMessageMultiWide$ApisErrorFileFreeLastLocalVersion
                                              • String ID: OsError 0x%x (%u)
                                              • API String ID: 807219750-2664311388
                                              • Opcode ID: dd207c85fc94544383a517e30f756156e384ee2b8bcde9e9a95a45159a38d464
                                              • Instruction ID: 0c2bef24f6b7c7166f87ec92302cb7117f3d967c30a7bda74ece9fcd541a0daa
                                              • Opcode Fuzzy Hash: dd207c85fc94544383a517e30f756156e384ee2b8bcde9e9a95a45159a38d464
                                              • Instruction Fuzzy Hash: 0D21C832A40208BBEB209F71DC4AFEE7F78FF94755F1000A9F909A2191E7709A05DB61
                                              APIs
                                              • FreeLibrary.KERNEL32(00000000,?,0044B48D,?,?,00000000,00000001,?,?,0044B6B7,00000022,FlsSetValue,00561B88,00561B90,00000001), ref: 0044B43F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: FreeLibrary
                                              • String ID: api-ms-$ext-ms-
                                              • API String ID: 3664257935-537541572
                                              • Opcode ID: 033630484f002e070c94113c7b6ef7f262f68e90d70309fdd043a749aa00ed93
                                              • Instruction ID: e3d7dbf8d3e43151f67a2d3675c4fcd7809fc0c9af6198dcb17880ded4e1cd5b
                                              • Opcode Fuzzy Hash: 033630484f002e070c94113c7b6ef7f262f68e90d70309fdd043a749aa00ed93
                                              • Instruction Fuzzy Hash: A2212B36A01220A7E7319F619C45A6B7768EB51761F140112FC06A7392D734ED05D6D9
                                              APIs
                                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,0045809E,00458247), ref: 0045803A
                                              • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00458050
                                              • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00458065
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: AddressProc$HandleModule
                                              • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                              • API String ID: 667068680-1718035505
                                              • Opcode ID: b8fd12eac23ddbaee97a23d952f9025b2fd48530103b998c3f924386a52c0e98
                                              • Instruction ID: 9d8da08feb674b7e1defcd418174b7d342a7e101b9a5f06a55684ee540db6b02
                                              • Opcode Fuzzy Hash: b8fd12eac23ddbaee97a23d952f9025b2fd48530103b998c3f924386a52c0e98
                                              • Instruction Fuzzy Hash: C6F0A4316807129B5B715E755C9827736DCAA11B53716003EDF01F32E2FE18CC4EA795
                                              APIs
                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,B2E69B1B,?,?,00000000,00551365,000000FF,?,0044360F,?,?,004435E3,00000016), ref: 00443668
                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044367A
                                              • FreeLibrary.KERNEL32(00000000,?,00000000,00551365,000000FF,?,0044360F,?,?,004435E3,00000016), ref: 0044369C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: AddressFreeHandleLibraryModuleProc
                                              • String ID: CorExitProcess$`-@$mscoree.dll
                                              • API String ID: 4061214504-3731901874
                                              • Opcode ID: 66c557226bdf84cfe892202a4e2d9d598a1facfa92736b92f61228ad13b2a6bb
                                              • Instruction ID: 11f561727bfec435161e86ab51d2faaed74d5e09c0b89d0474703e999051cdf2
                                              • Opcode Fuzzy Hash: 66c557226bdf84cfe892202a4e2d9d598a1facfa92736b92f61228ad13b2a6bb
                                              • Instruction Fuzzy Hash: 5601A232A44715AFDB219F44DC19BAFBBB8FB14B52F014526E812E27E0DB749A04CA94
                                              APIs
                                              • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,0045618C,00000000,00000000,?,00000001,?,?,?,?,00000001,?), ref: 00455F62
                                              • __freea.LIBCMT ref: 004560F7
                                              • __freea.LIBCMT ref: 004560FD
                                              • __freea.LIBCMT ref: 00456133
                                              • __freea.LIBCMT ref: 00456139
                                              • __freea.LIBCMT ref: 00456149
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: __freea$Info
                                              • String ID:
                                              • API String ID: 541289543-0
                                              • Opcode ID: 409b469f1d6330a2b3e11b37da4d380b72fd609d37741f34fbee2c455fea7f6f
                                              • Instruction ID: 72db6a5fbbb72ca24a21522075f010f93cbc1b36e5ad4b1d6eb8cbe60aa301df
                                              • Opcode Fuzzy Hash: 409b469f1d6330a2b3e11b37da4d380b72fd609d37741f34fbee2c455fea7f6f
                                              • Instruction Fuzzy Hash: D1711572900A05ABDF209F648C51BBFB7B69F49316F66015BED04A7383E63CDC098799
                                              APIs
                                              • GetCPInfo.KERNEL32(?,?,?,?,?), ref: 004333F4
                                              • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00433480
                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 004334EB
                                              • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00433507
                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043356A
                                              • CompareStringEx.KERNEL32(?,?,00000000,?,00000000,?,00000000,00000000,00000000), ref: 00433587
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide$CompareInfoString
                                              • String ID:
                                              • API String ID: 2984826149-0
                                              • Opcode ID: 4a3eeb56bd7ee9fe1909d18e68262bb2fe5fda54b12eb40b7425b1e554b148b6
                                              • Instruction ID: 4b04ae3b393bc6533ba77a97e4ab0e5e3051f7f3fd8f9b1f1052972f8d3aefbf
                                              • Opcode Fuzzy Hash: 4a3eeb56bd7ee9fe1909d18e68262bb2fe5fda54b12eb40b7425b1e554b148b6
                                              • Instruction Fuzzy Hash: 8871C272D00215ABEF219F64CC45BEF7BB5AF1D726F14205BE850A7291D73C9E048BA8
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 004330F2
                                              • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 0043315D
                                              • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0043317A
                                              • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004331B9
                                              • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00433218
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 0043323B
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiStringWide
                                              • String ID:
                                              • API String ID: 2829165498-0
                                              • Opcode ID: 5f4a82ba7d014fa06e8216ae2bfd85b34b40225c1761d69da73e76adef6768e6
                                              • Instruction ID: 2e7ff44e5bd3fd254f9cef1b25620d319a510a0ee994d159d64b8617f2502457
                                              • Opcode Fuzzy Hash: 5f4a82ba7d014fa06e8216ae2bfd85b34b40225c1761d69da73e76adef6768e6
                                              • Instruction Fuzzy Hash: 5E51E172500206ABEF205F65CC45FAB7BB9EF48B46F24456AF910D6250D738CE00DB68
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: __freea
                                              • String ID: 9WD$a/p$am/pm
                                              • API String ID: 240046367-3195321850
                                              • Opcode ID: 993a7c91ebcf40b0d6cc240ac8cd178338771267cd0baed5445ca37e2b719f32
                                              • Instruction ID: eb6553218dede8ec3b22f7d8591de804fd90c34fa4c0505c2e4821a80c18f7d5
                                              • Opcode Fuzzy Hash: 993a7c91ebcf40b0d6cc240ac8cd178338771267cd0baed5445ca37e2b719f32
                                              • Instruction Fuzzy Hash: 6BC1EC31900A06EBEF249F68C895ABFB7B1FF05700F55404BE805AB356D3789D42CB9A
                                              APIs
                                              • RmStartSession.RSTRTMGR(?,00000000,?), ref: 004D6DDE
                                              • RmRegisterResources.RSTRTMGR(?,00000001,?,00000000,00000000,00000000,00000000,?), ref: 004D6E20
                                              • RmGetList.RSTRTMGR(?,?,?,?,?), ref: 004D6E48
                                              • RmShutdown.RSTRTMGR(?,00000001,00000000), ref: 004D6E69
                                              • RmEndSession.RSTRTMGR(?), ref: 004D6E9C
                                              • SetLastError.KERNEL32(00000000), ref: 004D6EA3
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Session$ErrorLastListRegisterResourcesShutdownStart
                                              • String ID:
                                              • API String ID: 3915309458-0
                                              • Opcode ID: 35964b7dd5ed9eaca30dcc906b780c94db694ea61ce3b36c4f9fa18b6ac6bce6
                                              • Instruction ID: 29e6430877ba3f7b480c4ad8311182fb53b3682ab34aef7614a715581ba20f86
                                              • Opcode Fuzzy Hash: 35964b7dd5ed9eaca30dcc906b780c94db694ea61ce3b36c4f9fa18b6ac6bce6
                                              • Instruction Fuzzy Hash: 42316076C01219AFDB21DF94CC55BEFBBB8EF18310F01422AF911A3290DB795A448BE1
                                              APIs
                                              • GetLastError.KERNEL32(?,?,0043744F,0043599C,00434361), ref: 00437466
                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00437474
                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043748D
                                              • SetLastError.KERNEL32(00000000,0043744F,0043599C,00434361), ref: 004374DF
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ErrorLastValue___vcrt_
                                              • String ID:
                                              • API String ID: 3852720340-0
                                              • Opcode ID: 1f7d8f03dc5d5ed9cbe3f3a50d497af2707fd42e27fe0bf67e220eaf0f6c3ecd
                                              • Instruction ID: 2a60fb784f2f832ea5b73717e43a0c16eb42b58da7a2c3196cfaa8111b53b8ed
                                              • Opcode Fuzzy Hash: 1f7d8f03dc5d5ed9cbe3f3a50d497af2707fd42e27fe0bf67e220eaf0f6c3ecd
                                              • Instruction Fuzzy Hash: F401F57210C7116EE63027756C8A6172B84DB693BAF30633FF894512F1FE195C04628C
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: AdjustPointer
                                              • String ID: `-@
                                              • API String ID: 1740715915-3781167437
                                              • Opcode ID: 9c49ec1216cd10a1b8dcded1df3eff29d3c2c71fb51b80305b9040516556d7e1
                                              • Instruction ID: 05bfd451ac5aa057a102673f7c5ee37241370c5a2d72e881bccf1d550ae62a18
                                              • Opcode Fuzzy Hash: 9c49ec1216cd10a1b8dcded1df3eff29d3c2c71fb51b80305b9040516556d7e1
                                              • Instruction Fuzzy Hash: CE5125F1608A02AFDB388F19C852BBB77A5EF08324F14542FE881472A1D739EC50CB58
                                              APIs
                                              • GetVersionExA.KERNEL32(?,?), ref: 00545190
                                              • GetTempPathW.KERNEL32(000000E6,?,?), ref: 005451B9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: PathTempVersion
                                              • String ID: %s\etilqs_$>
                                              • API String ID: 261301950-2315843240
                                              • Opcode ID: ce0a7f2363ab7b7d7abc17a902d21cc4fb793d200454f9d166eb27a7e0bd6095
                                              • Instruction ID: d7a7f50afb807603cb5ab0f28f8cfab7bdc2795ddb654ce58a8a7a184e52c6c9
                                              • Opcode Fuzzy Hash: ce0a7f2363ab7b7d7abc17a902d21cc4fb793d200454f9d166eb27a7e0bd6095
                                              • Instruction Fuzzy Hash: 8D516B31D086989FE722CB798C457FABFA4BF16308F4809D6D58492083E6B48F85D761
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00432730
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 0043273B
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 004327A9
                                                • Part of subcall function 0043288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 004328A4
                                              • std::locale::_Setgloballocale.LIBCPMT ref: 00432756
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                              • String ID: `-@
                                              • API String ID: 677527491-3781167437
                                              • Opcode ID: 8a5613631ec3d916f95b396eb7cc43f12c5d676d84142dd5ef1a29976cc47206
                                              • Instruction ID: 335728d06f8999c9367bb6f0cb93ad347570f0e44e9dcbef2930aaa8ccdcd417
                                              • Opcode Fuzzy Hash: 8a5613631ec3d916f95b396eb7cc43f12c5d676d84142dd5ef1a29976cc47206
                                              • Instruction Fuzzy Hash: 9D01FC35A006109BC70AFB20CC5157D7BB0FF98790F44250EE81163391CFB8AE06DB89
                                              APIs
                                              • GetVersionExA.KERNEL32(?), ref: 00544EA3
                                              • CreateFileW.KERNEL32(00000000,C0000000,00000003,00000000,7FFFFFFD,00000000,00000000), ref: 00544ED3
                                              • CreateFileA.KERNEL32(00000000,C0000000,00000003,00000000,7FFFFFFD,00000000,00000000), ref: 00544EDB
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: CreateFile$Version
                                              • String ID:
                                              • API String ID: 1715692615-0
                                              • Opcode ID: e626251a24768bde3cf7646f34f6a4eca0d0342c2a8e3f24f44f168cd5caa3e2
                                              • Instruction ID: 79d633e4ecdcec58b4cab98b7c2eef95a221f739213a781545a85cef4e7b8ca8
                                              • Opcode Fuzzy Hash: e626251a24768bde3cf7646f34f6a4eca0d0342c2a8e3f24f44f168cd5caa3e2
                                              • Instruction Fuzzy Hash: 9961BC75604302AFD720CF24D845BAABBE8FF84318F04492DF999C6291E735C959CB92
                                              APIs
                                              • GetModuleHandleA.KERNEL32(?,771AE010,?), ref: 004E9BEE
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004E9BF9
                                              • GetProcessHeap.KERNEL32 ref: 004E9C04
                                              • HeapAlloc.KERNEL32(00000000,00000000,00010000), ref: 004E9C1E
                                              • HeapAlloc.KERNEL32(?,00000000,00010000), ref: 004E9C57
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Heap$Alloc$AddressHandleModuleProcProcess
                                              • String ID:
                                              • API String ID: 349456774-0
                                              • Opcode ID: 13763fb7ed65d7034848c90db75977a8d0748b960893ffa14e62b2712247cb23
                                              • Instruction ID: d3ba1316c3404c5ffc03a5be9701c45b2826e37c75856fc641be7cc60fa5c5e8
                                              • Opcode Fuzzy Hash: 13763fb7ed65d7034848c90db75977a8d0748b960893ffa14e62b2712247cb23
                                              • Instruction Fuzzy Hash: CF81F0B5D04229ABDB14CF9AD884AAEFBB4FF48311F10856AE924B7350E7746A01CF54
                                              APIs
                                              • GetCurrentThreadId.KERNEL32 ref: 00432BDC
                                              • AcquireSRWLockExclusive.KERNEL32(00000008), ref: 00432BFB
                                              • AcquireSRWLockExclusive.KERNEL32(00000008,00000000), ref: 00432C29
                                              • TryAcquireSRWLockExclusive.KERNEL32(00000008,00000000), ref: 00432C84
                                              • TryAcquireSRWLockExclusive.KERNEL32(00000008,00000000), ref: 00432C9B
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: AcquireExclusiveLock$CurrentThread
                                              • String ID:
                                              • API String ID: 66001078-0
                                              • Opcode ID: 8f089e7040faa662b45679f060ee1b8a0f0adfff173fd46cb89089840a213128
                                              • Instruction ID: ee0d2db44a198d3d02c1eb3b1b0ff5a364ec90963e300245c4d31640e9e12550
                                              • Opcode Fuzzy Hash: 8f089e7040faa662b45679f060ee1b8a0f0adfff173fd46cb89089840a213128
                                              • Instruction Fuzzy Hash: B2415931900A0ADFCB20DF65CA8096EB3B4FF0C311F20692BD446D7650D7B8E986DB69
                                              APIs
                                                • Part of subcall function 00545330: GetVersionExA.KERNEL32(?), ref: 00545356
                                              • GetVersionExA.KERNEL32(?), ref: 00544B51
                                              • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000), ref: 00544B76
                                              • GetFullPathNameW.KERNEL32(00000000,00000003,00000000,00000000), ref: 00544B96
                                              • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00544BAF
                                              • GetFullPathNameA.KERNEL32(00000000,00000003,00000000,00000000), ref: 00544BE1
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: FullNamePath$Version
                                              • String ID:
                                              • API String ID: 495861893-0
                                              • Opcode ID: def506589b02ed86a2d83c6155d8a90f1111383d037ff91711d2ded9672cc6f4
                                              • Instruction ID: d9a042031f5a76925af0b002eaae0799fce7b88889afc6fe8005c9c8c5fb2dd0
                                              • Opcode Fuzzy Hash: def506589b02ed86a2d83c6155d8a90f1111383d037ff91711d2ded9672cc6f4
                                              • Instruction Fuzzy Hash: 55213FB25406146BEB206F719C86FEF3B68EF51309F000078F90956252EA38DD49C7A6
                                              APIs
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0048F4E3
                                              • Process32First.KERNEL32(00000000,?), ref: 0048F506
                                              • Process32Next.KERNEL32(00000000,00000128), ref: 0048F551
                                              • CloseHandle.KERNEL32(00000000), ref: 0048F55C
                                              • CloseHandle.KERNEL32(00000000), ref: 0048F572
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: CloseHandleProcess32$CreateFirstNextSnapshotToolhelp32
                                              • String ID:
                                              • API String ID: 1789362936-0
                                              • Opcode ID: 6029d90057008e46b8e5c5277aed6df356708134237ca5f417d9c8706b6c6cea
                                              • Instruction ID: bc177564cbddbd99672fb84a339279b73cca850227e520494dfef4c47b8580b0
                                              • Opcode Fuzzy Hash: 6029d90057008e46b8e5c5277aed6df356708134237ca5f417d9c8706b6c6cea
                                              • Instruction Fuzzy Hash: 6411E6326001146BD7306F34AC986BFB7B9EB19325F1405BAE848C3352E7268C4E8765
                                              APIs
                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 00406587
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ___std_exception_destroy
                                              • String ID: )@$", "$: "
                                              • API String ID: 4194217158-2520320562
                                              • Opcode ID: 8a991d6cc43cc05af2141aeae52dd0db046d74c20a293c61a820b5870d9df492
                                              • Instruction ID: 193815703dc37f45cda184aa0d75e7307a57ae547af4f9c577389d6cf834964f
                                              • Opcode Fuzzy Hash: 8a991d6cc43cc05af2141aeae52dd0db046d74c20a293c61a820b5870d9df492
                                              • Instruction Fuzzy Hash: 85D1E370D00205DFCB14DFA8C945AAEBBF5FF44304F10462EE456A7381DB78AA55CB99
                                              APIs
                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 0040750C
                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 00407522
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ___std_exception_destroy
                                              • String ID: )@$[json.exception.
                                              • API String ID: 4194217158-3378332251
                                              • Opcode ID: 74f1ced649a80f54c74698f2e3f1ef80366f2fbaef409b1663f26043a5eac72a
                                              • Instruction ID: d1fd1ad00dbeab1566b73d8112c34bc80c76f551163e59ed82d928a5322bc1a2
                                              • Opcode Fuzzy Hash: 74f1ced649a80f54c74698f2e3f1ef80366f2fbaef409b1663f26043a5eac72a
                                              • Instruction Fuzzy Hash: 8C51CFB1C046489BD710DFA8C905B9EBBB4FF15318F14426EE850A73C2E7B86A44C7A5
                                              APIs
                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 00407CAC
                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 00407CC2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ___std_exception_destroy
                                              • String ID: )@$p|@
                                              • API String ID: 4194217158-2759249158
                                              • Opcode ID: fbc67c62691b4d29c16fb41b2f6209782dee4ae52023c44201ea77ed1986cddc
                                              • Instruction ID: 2d5fa3d367423be86db8b91485125f203ee18fb15550ca5d49c40f7a3d1822d9
                                              • Opcode Fuzzy Hash: fbc67c62691b4d29c16fb41b2f6209782dee4ae52023c44201ea77ed1986cddc
                                              • Instruction Fuzzy Hash: 0051D3B1C052489BDB00DF98D9457DEFBF4EF19318F10426EE814A7381E7B96A44C7A5
                                              APIs
                                              • EncodePointer.KERNEL32(00000000,?), ref: 00437B90
                                              • CatchIt.LIBVCRUNTIME ref: 00437C76
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: CatchEncodePointer
                                              • String ID: MOC$RCC
                                              • API String ID: 1435073870-2084237596
                                              • Opcode ID: 2197aaef782f375f8d87615206ae6fe603a672c81450030c01d2018f2b0bfa53
                                              • Instruction ID: 1ed06b6d49ca92b7e67ab75acb14d1b1cdaab090b09ce00a5d54d3623121de76
                                              • Opcode Fuzzy Hash: 2197aaef782f375f8d87615206ae6fe603a672c81450030c01d2018f2b0bfa53
                                              • Instruction Fuzzy Hash: C1416AB1900209AFDF25DF94CD81AEEBBB5FF4C304F14A05AF944A7251D339A950DB54
                                              APIs
                                              • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0040499F
                                                • Part of subcall function 004351FB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,75CA23A0,?,00431D09,?,005799D8,75CA23A0,?,75CA23A0,-00589880), ref: 0043525B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                                              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                              • API String ID: 1903096808-1866435925
                                              • Opcode ID: 5e8fcf04681b5496c91e096f1d273a5343178b8940b0c322b64de4dd1df32f3c
                                              • Instruction ID: 99c94d1e80f512c720ba00148ae48faeb0acee82eabb402b7e5943aa58dcc262
                                              • Opcode Fuzzy Hash: 5e8fcf04681b5496c91e096f1d273a5343178b8940b0c322b64de4dd1df32f3c
                                              • Instruction Fuzzy Hash: AC119CF2844644ABCB10DF688C03BAB37C8E744715F04463EFE58972C1EB399800C79A
                                              APIs
                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00438538,00000000,?,00588904,?,?,?,004386DB,00000004,InitializeCriticalSectionEx,0055F640,InitializeCriticalSectionEx), ref: 00438594
                                              • GetLastError.KERNEL32(?,00438538,00000000,?,00588904,?,?,?,004386DB,00000004,InitializeCriticalSectionEx,0055F640,InitializeCriticalSectionEx,00000000,?,00438322), ref: 0043859E
                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 004385C6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: LibraryLoad$ErrorLast
                                              • String ID: api-ms-
                                              • API String ID: 3177248105-2084034818
                                              • Opcode ID: c947551068fc5aa78d1c4ecff25818d243fe134ebcecfa929017a310edce328a
                                              • Instruction ID: c90ef5146fc35b23aa789d7ef59479731dd43e4d0f257fa83e9710a47c69997d
                                              • Opcode Fuzzy Hash: c947551068fc5aa78d1c4ecff25818d243fe134ebcecfa929017a310edce328a
                                              • Instruction Fuzzy Hash: 51E0D871280308B7EF301F60DC06B1A7F65AB10B41F100035F90CA85F0EB65E954A959
                                              APIs
                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 00425787
                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 0042579E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ___std_exception_destroy
                                              • String ID: )@$l
                                              • API String ID: 4194217158-531593656
                                              • Opcode ID: a4528b05e6746526d62e84ebb445939fb61f2aaef993a3223180bb5120b50cba
                                              • Instruction ID: 43fda41a344adde0c0e2112745b19999f63c5ee1cff445b37cb15900c05139ed
                                              • Opcode Fuzzy Hash: a4528b05e6746526d62e84ebb445939fb61f2aaef993a3223180bb5120b50cba
                                              • Instruction Fuzzy Hash: BAF0F9A0C052C8DEDB01CBA8C9557CDBFB56F15308F14409AD444A7282E7B96B0CD763
                                              APIs
                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 00425680
                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 00425697
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ___std_exception_destroy
                                              • String ID: )@$x
                                              • API String ID: 4194217158-91598277
                                              • Opcode ID: 6c5c37cb81e8ac0a1486ed869cf1e333a176143b923977886202bd8eddd9186c
                                              • Instruction ID: 10c3b930f4cf49af9ee2bef6b48737f2413326e6bf4895110f1bc2a9c90c91f1
                                              • Opcode Fuzzy Hash: 6c5c37cb81e8ac0a1486ed869cf1e333a176143b923977886202bd8eddd9186c
                                              • Instruction Fuzzy Hash: 28F0DAA1C09288E9DF41DBE4C5087CDBFB56F15309F24409AD848A7242E7B8670CD767
                                              APIs
                                              • GetConsoleOutputCP.KERNEL32(B2E69B1B,00000000,00000000,?), ref: 00448F02
                                                • Part of subcall function 0044EC55: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0044A862,?,00000000,-00000008), ref: 0044ECB6
                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00449154
                                              • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0044919A
                                              • GetLastError.KERNEL32 ref: 0044923D
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                              • String ID:
                                              • API String ID: 2112829910-0
                                              • Opcode ID: d46c0870a8277536d77cd1fa32924c999241811f2f15ebdbc3735bbe4b8907ba
                                              • Instruction ID: b6f9ea87837ca93654473fd2bae4ec290e60b55bc3ade45d2d9d29a5185f0d60
                                              • Opcode Fuzzy Hash: d46c0870a8277536d77cd1fa32924c999241811f2f15ebdbc3735bbe4b8907ba
                                              • Instruction Fuzzy Hash: 70D1BC75D00249AFDF14CFA8C880AAEBBB5FF09304F28456AE856EB351D734AD45CB54
                                              APIs
                                              • GetModuleHandleA.KERNEL32(?), ref: 004E98CE
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004E98DA
                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,?), ref: 004E9A55
                                              • SetEvent.KERNEL32(00000000), ref: 004E9A5C
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Event$AddressCreateHandleModuleProc
                                              • String ID:
                                              • API String ID: 2341598627-0
                                              • Opcode ID: d8f616207016ccd70649815b0a46d34ccb6368db7b539dbf58b9823ea8322156
                                              • Instruction ID: 94e94f94aa147367d366308f7bbda68d1ba073eefd2343970e9372381d670d86
                                              • Opcode Fuzzy Hash: d8f616207016ccd70649815b0a46d34ccb6368db7b539dbf58b9823ea8322156
                                              • Instruction Fuzzy Hash: 88819AB490C3829FC304CF59C48195AFBE5AFA8390F10891EF89587361E775D989CF96
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c28dd970ee9f985723d01587f791f28dc943c9d51e1efde8fb113aa15fde7f1a
                                              • Instruction ID: 3ce7a0f6481a0f72d6256d3f2a6e49e06ee9a16ea2b7f0bfddf77237ab23de3e
                                              • Opcode Fuzzy Hash: c28dd970ee9f985723d01587f791f28dc943c9d51e1efde8fb113aa15fde7f1a
                                              • Instruction Fuzzy Hash: 8F412872A40744AFF7149F39C841B5ABBA9EB48B11F10812FF051EB381D779EA408788
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 004E562F
                                              • MultiByteToWideChar.KERNEL32(0000000F,00000000,?,000000FF,00000000,0000000F), ref: 004E5664
                                              • WideCharToMultiByte.KERNEL32(000004E3,00000000,00000000,000000FF,00000000,00000000,00000000,00000000), ref: 004E568B
                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000), ref: 004E56B9
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide
                                              • String ID:
                                              • API String ID: 626452242-0
                                              • Opcode ID: 667af2e2a61abff60a43f7d208c8c753e65e9722df59284470c0eff5b9583b61
                                              • Instruction ID: 1f69569aec08140b5ab3c0a9b620ac8cfa37dccc0484cb5d57b15f637e29afd9
                                              • Opcode Fuzzy Hash: 667af2e2a61abff60a43f7d208c8c753e65e9722df59284470c0eff5b9583b61
                                              • Instruction Fuzzy Hash: ED41E271900345ABEF218F75CC09FAE7BB4AF45715F10025AF414BB2D1D7B99A04CBA9
                                              APIs
                                                • Part of subcall function 0044EC55: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0044A862,?,00000000,-00000008), ref: 0044ECB6
                                              • GetLastError.KERNEL32 ref: 0044FA50
                                              • __dosmaperr.LIBCMT ref: 0044FA57
                                              • GetLastError.KERNEL32(?,?,?,?), ref: 0044FA91
                                              • __dosmaperr.LIBCMT ref: 0044FA98
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                              • String ID:
                                              • API String ID: 1913693674-0
                                              • Opcode ID: f69f264f3a3445fa5257163de56fc3005cb7e945df64431326a0965baf165f71
                                              • Instruction ID: 175cdc1e371479ca6662e8932d27d2c7f0366fb1f46f3a828fcae8f7a9953d28
                                              • Opcode Fuzzy Hash: f69f264f3a3445fa5257163de56fc3005cb7e945df64431326a0965baf165f71
                                              • Instruction Fuzzy Hash: 4A21D731A00605AFFB20EF66D88086BB7A9EF54368715843FF81DA7250D738EC598B59
                                              APIs
                                              • GetVersionExA.KERNEL32(?), ref: 00545356
                                                • Part of subcall function 00545D20: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,?,?,?,?,00545385), ref: 00545D36
                                              • AreFileApisANSI.KERNEL32 ref: 00545392
                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,00000000,00000000,00000000), ref: 005453AB
                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000), ref: 005453D1
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide$ApisFileVersion
                                              • String ID:
                                              • API String ID: 928063719-0
                                              • Opcode ID: cddb1f359b989beb9fa67faf323006f07cde4dd9abd9fb615a423bdc0bd7c05d
                                              • Instruction ID: ee91a8a6a0c0fee7022a5c8999e7185e4bdf2e494df521b14be47994331aebc0
                                              • Opcode Fuzzy Hash: cddb1f359b989beb9fa67faf323006f07cde4dd9abd9fb615a423bdc0bd7c05d
                                              • Instruction Fuzzy Hash: 22113F72E407142BE7305F786C8AFAF37ACEB55769F100265F909E62C1FAB44D489391
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b057469d9bc5f69e0f8b611fad5c821e03d6bc773c10b2b7f28a1d317aa21b2f
                                              • Instruction ID: b5fe3350cd15eea0aaf87c65c2f18f4f52b92c45156554196b4f926f22b003f4
                                              • Opcode Fuzzy Hash: b057469d9bc5f69e0f8b611fad5c821e03d6bc773c10b2b7f28a1d317aa21b2f
                                              • Instruction Fuzzy Hash: 6621F6F1200205AFFB20AF76CC8186BB7A9FF4076A710C51BF95987250DB39EE518769
                                              APIs
                                              • SetFilePointer.KERNEL32(00000000,00000000,?,00000000), ref: 00545949
                                              • GetLastError.KERNEL32 ref: 00545956
                                              • WriteFile.KERNEL32(00000000,?,?,00000000,00000000), ref: 0054598E
                                              • GetLastError.KERNEL32 ref: 005459BF
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ErrorFileLast$PointerWrite
                                              • String ID:
                                              • API String ID: 2977825765-0
                                              • Opcode ID: 1950966d951f8c867560627456bbde13738b7accb01c1cd70c58ef6c62dd0c24
                                              • Instruction ID: 582698eb55b2eaae6c7c0c5214501257d254c964c7943da035f428691071258d
                                              • Opcode Fuzzy Hash: 1950966d951f8c867560627456bbde13738b7accb01c1cd70c58ef6c62dd0c24
                                              • Instruction Fuzzy Hash: 0E219F33600609EBDB208FA8D884BDABBB8FB44375F144166ED18D7281E631DD04DBA0
                                              APIs
                                              • GetEnvironmentStringsW.KERNEL32 ref: 00450995
                                                • Part of subcall function 0044EC55: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0044A862,?,00000000,-00000008), ref: 0044ECB6
                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004509CD
                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004509ED
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                              • String ID:
                                              • API String ID: 158306478-0
                                              • Opcode ID: 6d6291e591b22f65296549b970deff617d17af2824fd288565b185fb0bbaad7e
                                              • Instruction ID: 05a916c6faf25a0682dab3744c632e1b74caa3fe19fc9bf69ed868d66b577761
                                              • Opcode Fuzzy Hash: 6d6291e591b22f65296549b970deff617d17af2824fd288565b185fb0bbaad7e
                                              • Instruction Fuzzy Hash: EB112BF6901719BF77216BB35C89CBF696CEE6839B710002AF801D1243FB29CD0591B9
                                              APIs
                                              • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 005459FF
                                              • GetLastError.KERNEL32 ref: 00545A0A
                                              • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00545A32
                                              • GetLastError.KERNEL32 ref: 00545A3C
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ErrorFileLast$PointerRead
                                              • String ID:
                                              • API String ID: 2170121939-0
                                              • Opcode ID: 540eb84cac6ede58d3537ff1f38c1a90d22693d8cdf9cf0c6dadd44eecfb50f4
                                              • Instruction ID: 6ceb55c3a65a62e15609471827d2f6869488a49b85fb46b58a4ba310ad65ed5c
                                              • Opcode Fuzzy Hash: 540eb84cac6ede58d3537ff1f38c1a90d22693d8cdf9cf0c6dadd44eecfb50f4
                                              • Instruction Fuzzy Hash: 6D119172600209ABCB108FA9EC45BDABBA8FF14375F004266FD1CC72A0E771D8609BD1
                                              APIs
                                              • GetVersionExA.KERNEL32(?,00000000,?), ref: 00545797
                                              • LockFileEx.KERNEL32(?,00000001,00000000,000001FE,00000000,?,00000000,?), ref: 005457DB
                                              • LockFile.KERNEL32(?,?,00000000,00000001,00000000,00000000,?), ref: 00545818
                                              • GetLastError.KERNEL32 ref: 00545824
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: FileLock$ErrorLastVersion
                                              • String ID:
                                              • API String ID: 1561719237-0
                                              • Opcode ID: 47948f3ac46128f688e1d1758b7c43b77088cf2001bc0b658931b0abdcadf5d0
                                              • Instruction ID: 771d51dfa285cbb2dd74062f629081d2be7cfc554bc2a81a6f00ae30f739e82a
                                              • Opcode Fuzzy Hash: 47948f3ac46128f688e1d1758b7c43b77088cf2001bc0b658931b0abdcadf5d0
                                              • Instruction Fuzzy Hash: DB110171A00715EFF7208B64DC0ABAABBB5FF14314F004165F909E72D0EBB49D448B90
                                              APIs
                                              • WideCharToMultiByte.KERNEL32(?,00000400,?,?,?,?,00000000,00000000), ref: 00431F29
                                              • GetLastError.KERNEL32 ref: 00431F35
                                              • WideCharToMultiByte.KERNEL32(?,00000000,?,?,?,?,00000000,00000000), ref: 00431F5B
                                              • GetLastError.KERNEL32 ref: 00431F67
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ByteCharErrorLastMultiWide
                                              • String ID:
                                              • API String ID: 203985260-0
                                              • Opcode ID: 35e7bea43bf35a340b569ac256c958a5570a5f93565d5de543f4fdf7da8372b1
                                              • Instruction ID: 5e8341cea1a57eda6e9d4b8ca3b7a39c6f892c49641055c0ca5066718be154a8
                                              • Opcode Fuzzy Hash: 35e7bea43bf35a340b569ac256c958a5570a5f93565d5de543f4fdf7da8372b1
                                              • Instruction Fuzzy Hash: C901FF36600255BBCF221FA1DC08D9B3E36EBD97A1F104015FE1556230C7318866E7B5
                                              APIs
                                              • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 005458DF
                                              • GetLastError.KERNEL32 ref: 005458EA
                                              • SetEndOfFile.KERNEL32(?), ref: 005458F7
                                              • GetLastError.KERNEL32 ref: 00545901
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ErrorFileLast$Pointer
                                              • String ID:
                                              • API String ID: 1697706070-0
                                              • Opcode ID: 99ed1c69f56f5325abe80c91d58b6415e30b45006e4dec00d143e7c5daf9e1c0
                                              • Instruction ID: 8fd75b374af1164205c64c99f3da373fde227693c6e20ab0659c9ae24c58912b
                                              • Opcode Fuzzy Hash: 99ed1c69f56f5325abe80c91d58b6415e30b45006e4dec00d143e7c5daf9e1c0
                                              • Instruction Fuzzy Hash: BFF03032514708EFDB209FA4EC05AAA7BB8FB15735F104656F82DC62A0E731D924AB91
                                              APIs
                                              • WriteConsoleW.KERNEL32(00000000,00000000,0043D547,00000000,00000000,?,00453DCE,00000000,00000001,?,?,?,00449291,?,00000000,00000000), ref: 00456D49
                                              • GetLastError.KERNEL32(?,00453DCE,00000000,00000001,?,?,?,00449291,?,00000000,00000000,?,?,?,0044986B,00000000), ref: 00456D55
                                                • Part of subcall function 00456D1B: CloseHandle.KERNEL32(FFFFFFFE,00456D65,?,00453DCE,00000000,00000001,?,?,?,00449291,?,00000000,00000000,?,?), ref: 00456D2B
                                              • ___initconout.LIBCMT ref: 00456D65
                                                • Part of subcall function 00456CDD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00456D0C,00453DBB,?,?,00449291,?,00000000,00000000,?), ref: 00456CF0
                                              • WriteConsoleW.KERNEL32(00000000,00000000,0043D547,00000000,?,00453DCE,00000000,00000001,?,?,?,00449291,?,00000000,00000000,?), ref: 00456D7A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                              • String ID:
                                              • API String ID: 2744216297-0
                                              • Opcode ID: 6d252f6c85546040703605b5d122fbb434f3c9b6b34be8e7cd3f73b3df330617
                                              • Instruction ID: b582005f90f2c4d159ccd48a3422ceca8e6e351b7b3b67145bbef734a6de3f3c
                                              • Opcode Fuzzy Hash: 6d252f6c85546040703605b5d122fbb434f3c9b6b34be8e7cd3f73b3df330617
                                              • Instruction Fuzzy Hash: F4F01C37500518BBCF221FD1DC18A8A3F76EB583A2B814415FE0D96231D6328928EB94
                                              APIs
                                              • GetCurrentThreadId.KERNEL32 ref: 00481BC4
                                              • GetCurrentProcessId.KERNEL32 ref: 00481BCC
                                              • SetEvent.KERNEL32 ref: 00481BE9
                                              • WaitForSingleObject.KERNEL32(000000FF), ref: 00481BF7
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Current$EventObjectProcessSingleThreadWait
                                              • String ID:
                                              • API String ID: 977356572-0
                                              • Opcode ID: 145f1463f0330e510467377b19718f6381c7c9cc9e72a15fcc7b338b6b78320b
                                              • Instruction ID: 43167ce624a0f5263368e741b5dc2b465bdabedb5219c12b94d6a200efc4dfb2
                                              • Opcode Fuzzy Hash: 145f1463f0330e510467377b19718f6381c7c9cc9e72a15fcc7b338b6b78320b
                                              • Instruction Fuzzy Hash: 3FE01A72004315DFD7109F64EC1C855BBB5FB293227148221F9099B3B0E6318989EBA5
                                              APIs
                                              • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,?,?,?,?,?,00000004,00000000), ref: 004091C8
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004091D3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: AddressHandleModuleProc
                                              • String ID: Ws2_32.dll
                                              • API String ID: 1646373207-3093949381
                                              • Opcode ID: ea9167e3bcfed1d29222b40259f4286497e10de2dd63420951b2f22a9489b711
                                              • Instruction ID: cb5ead6240095672237fdab8273f91d80b82b8d73d4ae51f565ea22395c8577a
                                              • Opcode Fuzzy Hash: ea9167e3bcfed1d29222b40259f4286497e10de2dd63420951b2f22a9489b711
                                              • Instruction Fuzzy Hash: E7C16A70E01214DFCB24CFA8C84579EBBB0BF08714F24859EE955AB392D779AD01CB95
                                              APIs
                                              • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 00406CF0
                                              • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 00406D3E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ___std_fs_directory_iterator_advance@8
                                              • String ID: .
                                              • API String ID: 2610647541-248832578
                                              • Opcode ID: 8de97e0557b89d418490575b2115c1d7852bdd46763aabdbcc61db0957447ddc
                                              • Instruction ID: 06e113195c9c995bb1126ed1958f592d786724859c69b2563011d6ef3baaff07
                                              • Opcode Fuzzy Hash: 8de97e0557b89d418490575b2115c1d7852bdd46763aabdbcc61db0957447ddc
                                              • Instruction Fuzzy Hash: 6A91D071A00625ABCB34DF18C4846AAB7B4FF05324F01026AE856A77D0D739FDA5CBD9
                                              APIs
                                              • ___std_exception_copy.LIBVCRUNTIME ref: 00403819
                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 004038F0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ___std_exception_copy___std_exception_destroy
                                              • String ID: )@
                                              • API String ID: 2970364248-4120265097
                                              • Opcode ID: ed1ac0f14267c2b8626e9d784d9228836504f476972db074cc70cf608e0aac1a
                                              • Instruction ID: 269ef50febfdc4b1c22cf7239a576f40f0b19685bcb009e1facc48eb6157c32a
                                              • Opcode Fuzzy Hash: ed1ac0f14267c2b8626e9d784d9228836504f476972db074cc70cf608e0aac1a
                                              • Instruction Fuzzy Hash: DD6169B1C00248DBDB10DF98C945B9EFFB5FF19324F14825EE814AB282D7B95A44CBA5
                                              APIs
                                              • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0040499F
                                                • Part of subcall function 004351FB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,75CA23A0,?,00431D09,?,005799D8,75CA23A0,?,75CA23A0,-00589880), ref: 0043525B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                                              • String ID: ios_base::badbit set$ios_base::failbit set
                                              • API String ID: 1903096808-1240500531
                                              • Opcode ID: 037fbcf792b1db2df9f4c70af3e1ac54ab8959b344865e02de195616cc3e88a6
                                              • Instruction ID: 59789774a96eacd1a5b8f49c51d8e497543063f0a2ed12b155596828dbf76f3a
                                              • Opcode Fuzzy Hash: 037fbcf792b1db2df9f4c70af3e1ac54ab8959b344865e02de195616cc3e88a6
                                              • Instruction Fuzzy Hash: E84124B2C00244ABCB04DF68C845BAEBBB8FB49710F14826EF554A73C1D7795A00CBA5
                                              APIs
                                              • SetEndOfFile.KERNEL32(00000000,?,00000000,?,?,?,?,?,!,D,0044EA1C,?,?,!,D,?,00000000,?), ref: 0044EB7A
                                              • GetLastError.KERNEL32(?,?,?,?,!,D,0044EA1C,?,?,!,D,?,00000000,?), ref: 0044EB84
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ErrorFileLast
                                              • String ID: !,D
                                              • API String ID: 734332943-2387483618
                                              • Opcode ID: 6a1e7ac7384b4bb6329048eea8c26e09b822db16cd26105a02b1221d47aee58a
                                              • Instruction ID: 1e1ef3cad634bc89b09ed5b2214d0c7337f84d15d2fc9132cafc43e0310a1cdb
                                              • Opcode Fuzzy Hash: 6a1e7ac7384b4bb6329048eea8c26e09b822db16cd26105a02b1221d47aee58a
                                              • Instruction Fuzzy Hash: FB511971900685AAFB14CF67CC85B9E7B70FF04328F14021BF516A2281D779E891DBA9
                                              APIs
                                              • std::_Throw_Cpp_error.LIBCPMT ref: 004D676A
                                              • std::_Throw_Cpp_error.LIBCPMT ref: 004D677B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Cpp_errorThrow_std::_
                                              • String ID: UaJ
                                              • API String ID: 2134207285-2144978721
                                              • Opcode ID: 71bc9411bda081ba2c6ca070473d6e11764a2e135bc835127b003db35da83e39
                                              • Instruction ID: 177bb7d1701b8dda1f5a90c4ee3be826f8175b366ab48e47effb054e9b4aa952
                                              • Opcode Fuzzy Hash: 71bc9411bda081ba2c6ca070473d6e11764a2e135bc835127b003db35da83e39
                                              • Instruction Fuzzy Hash: 6441F2B1E002058BC720DF68995136EBBA1BB94314F19072FE815673D1EB79EA04C795
                                              APIs
                                              • GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 004E6290
                                              • GdipGetImageEncoders.GDIPLUS(00000000,00000000,00000000), ref: 004E62BD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: EncodersGdipImage$Size
                                              • String ID: image/png
                                              • API String ID: 864223233-2966254431
                                              • Opcode ID: e7fc661bbe40e167e968ce4b4834ac07952c6a2874a5ff204e6fe5eb7edf3d15
                                              • Instruction ID: e08145eb1897d221235e8b13ede795c589c6d842b6ab703e07584c42203d8d4f
                                              • Opcode Fuzzy Hash: e7fc661bbe40e167e968ce4b4834ac07952c6a2874a5ff204e6fe5eb7edf3d15
                                              • Instruction Fuzzy Hash: 99216D72E00104ABDB10AFA6DC816AFB7B8FF34395F1201F6ED05A7351E7369A44C295
                                              APIs
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 00404061
                                              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 004040C4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                              • String ID: bad locale name
                                              • API String ID: 3988782225-1405518554
                                              • Opcode ID: 0039d2d2ea2786ef81fe116e8b864d57793cf36a19fa060d6cb0c255b1586cee
                                              • Instruction ID: 65c2995a4cce64452fc0e082f9126f7f9302ed92d60cad1113ce5137d9e79936
                                              • Opcode Fuzzy Hash: 0039d2d2ea2786ef81fe116e8b864d57793cf36a19fa060d6cb0c255b1586cee
                                              • Instruction Fuzzy Hash: DB112670805B84EED321CF69C50474BBFF0AF25714F10868DD09597781D3B9A604CB95
                                              APIs
                                              • ___std_exception_copy.LIBVCRUNTIME ref: 004165C9
                                              • ___std_exception_copy.LIBVCRUNTIME ref: 004165FC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ___std_exception_copy
                                              • String ID: )@
                                              • API String ID: 2659868963-4120265097
                                              • Opcode ID: ec459901e9a8c12f2536e06f4ce64afd8286d8aca2aa337d2d7da09c98386d96
                                              • Instruction ID: 79ebb971947c26e29da123751e765caa72f3f100f47198c89106861aa63fe252
                                              • Opcode Fuzzy Hash: ec459901e9a8c12f2536e06f4ce64afd8286d8aca2aa337d2d7da09c98386d96
                                              • Instruction Fuzzy Hash: F0112EB6910649EBCB11CF99C980B86FBF8FF09724F10876AE82497641E774A5448BA0
                                              APIs
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 004327C2
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 0043281E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                              • String ID: `-@
                                              • API String ID: 593203224-3781167437
                                              • Opcode ID: 0fa848a44c73a6aeeb21660fd2b14f5aaf999c273a66810f0e0171f36124b769
                                              • Instruction ID: 083d3c1e84ca2e980ab4dd45ca0d837cc41164b3fcfcb6a28aec5d987169874b
                                              • Opcode Fuzzy Hash: 0fa848a44c73a6aeeb21660fd2b14f5aaf999c273a66810f0e0171f36124b769
                                              • Instruction Fuzzy Hash: 2A019231600214AFCB15EB19C995E5E77B8EF88754F05409AE8019B3A1DFB0EE44CB60
                                              APIs
                                              • GdipCloneImage.GDIPLUS(?,00000000,?,?,?,000000FF), ref: 00404C4C
                                              • GdipAlloc.GDIPLUS(00000010,?,?,?,000000FF), ref: 00404C5B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Gdip$AllocCloneImage
                                              • String ID: `K@
                                              • API String ID: 3021075589-3536307564
                                              • Opcode ID: 6e910720078c30621a47b6eca49d96a116425349966641e16d2adddba9b4a4fa
                                              • Instruction ID: 8747f557437175caeb58756454adc5b6b8cc0decca9fbbd4afccec21ee9e9ac9
                                              • Opcode Fuzzy Hash: 6e910720078c30621a47b6eca49d96a116425349966641e16d2adddba9b4a4fa
                                              • Instruction Fuzzy Hash: C0112DB1905749DFDB10CF98D904BAABBF8FB48720F10866AE829D37D0D7749900CB91
                                              APIs
                                              • GdipDisposeImage.GDIPLUS(FFFFFFFF,?,?,?,0054C48D,000000FF), ref: 00404CDF
                                              • GdipFree.GDIPLUS(?,?,?,?,0054C48D,000000FF), ref: 00404CF1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Gdip$DisposeFreeImage
                                              • String ID: `K@
                                              • API String ID: 1950503971-3536307564
                                              • Opcode ID: 3316c4455565ac62ed6a26cea9d7150bfba2d0e3f41cbf1825aecc5a329bdf6e
                                              • Instruction ID: 7ba4187510c4fdb2f2599f15a6424d96657f10c150e71c31b65947a42bc49c9a
                                              • Opcode Fuzzy Hash: 3316c4455565ac62ed6a26cea9d7150bfba2d0e3f41cbf1825aecc5a329bdf6e
                                              • Instruction Fuzzy Hash: 7201F472A00614ABC720CF48ED01B99BBA8FB19B21F00472FFC11A37C0C7B919108BD5
                                              APIs
                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 00407ACC
                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 00407AE2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ___std_exception_destroy
                                              • String ID: )@
                                              • API String ID: 4194217158-4120265097
                                              • Opcode ID: 93267da127a396356cd2fdbad952cd532b26063f3bf799b654b12ef89a692989
                                              • Instruction ID: 39a61349d826cdb48b27ae0f58ab52f56d337699a51a428b07672872488508ae
                                              • Opcode Fuzzy Hash: 93267da127a396356cd2fdbad952cd532b26063f3bf799b654b12ef89a692989
                                              • Instruction Fuzzy Hash: FE01A2B2C04744ABC711DF98CD0178DFFF8EB09715F10466BE814A3380E3B8660487A5
                                              APIs
                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 00407CAC
                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 00407CC2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ___std_exception_destroy
                                              • String ID: )@
                                              • API String ID: 4194217158-4120265097
                                              • Opcode ID: cad3be967c840cba8baab123a4240524b2ea9f27ee00b0363261d2d3a2957baf
                                              • Instruction ID: b31235e20b660ddbb30c99c001b11998604f696d918c6d2dbba64f62e05318ed
                                              • Opcode Fuzzy Hash: cad3be967c840cba8baab123a4240524b2ea9f27ee00b0363261d2d3a2957baf
                                              • Instruction Fuzzy Hash: 3F0162B2C44748ABC711DF98DD01B89FFF8EB09715F10466BE814A3781E3B9AA0487A5
                                              APIs
                                              • GdipDisposeImage.GDIPLUS(?,?,?,Function_0014BFE0,000000FF), ref: 00404B84
                                              • GdipFree.GDIPLUS(?,?,?,Function_0014BFE0,000000FF), ref: 00404B96
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Gdip$DisposeFreeImage
                                              • String ID: `K@
                                              • API String ID: 1950503971-3536307564
                                              • Opcode ID: 62ee0daa599b9b00a0c4ce88fb3d390fe4e594f946ea023ffe489846956dd575
                                              • Instruction ID: bd97fcbd8bdc5b644a2ca526311264c36a05ae446e09af96bb23667ce14d71f1
                                              • Opcode Fuzzy Hash: 62ee0daa599b9b00a0c4ce88fb3d390fe4e594f946ea023ffe489846956dd575
                                              • Instruction Fuzzy Hash: ADF0F672A44654ABD3218F08DC02F95B7E8FB19B10F00466BFC01A3780D7BA68108AD9
                                              APIs
                                              • CompareStringW.KERNEL32(00000000,00000000,00000000,00000000,?,-00000008,?,-00000008,?,?,00456130,?,?,-00000008,?,-00000008), ref: 0044B57F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: CompareString
                                              • String ID: 0aE$`-@
                                              • API String ID: 1825529933-1472567772
                                              • Opcode ID: d0df0ea43047c73f5029be752bfe14cefc264b458c3f39c7a470d4df90d53397
                                              • Instruction ID: e44343d96fe236ab9219cb5f9cc943518e3960d7194e1eed57cc779ab2011060
                                              • Opcode Fuzzy Hash: d0df0ea43047c73f5029be752bfe14cefc264b458c3f39c7a470d4df90d53397
                                              • Instruction Fuzzy Hash: CDF0B83200021ABBCF126F90EC08ADE3F26EB483A4F058011FA1825130C736C972AB95
                                              APIs
                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 0040758C
                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 004075A2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ___std_exception_destroy
                                              • String ID: )@
                                              • API String ID: 4194217158-4120265097
                                              • Opcode ID: c858c6ed78de8a3b5ee1cba1accddd2d2891f2392b50b006f97d08456e2954ad
                                              • Instruction ID: 78ccdeb9fbba2d16b6cd524d5c99d9dbf264c3e6aa85c375e1d072593ce1236d
                                              • Opcode Fuzzy Hash: c858c6ed78de8a3b5ee1cba1accddd2d2891f2392b50b006f97d08456e2954ad
                                              • Instruction Fuzzy Hash: 12F01DB2805748EFC721DF98D901789FFF8FB09728F50466AE865A3780E77466048BA5
                                              APIs
                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 00407A5C
                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 00407A72
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ___std_exception_destroy
                                              • String ID: )@
                                              • API String ID: 4194217158-4120265097
                                              • Opcode ID: 9ee8fa866bcea9d2c14fc14309fcadf8facde4318e0e6bb098ed358a1a235593
                                              • Instruction ID: 96290d15a7b89a27e7413382239de33ac52fdad5c525fa7f0e86a9c1871ea130
                                              • Opcode Fuzzy Hash: 9ee8fa866bcea9d2c14fc14309fcadf8facde4318e0e6bb098ed358a1a235593
                                              • Instruction Fuzzy Hash: 68F012B1805744DFC711DF98C90178DFFF8FB05728F50466AE855A3780E7B5660487A5
                                              APIs
                                              • GetSystemTimePreciseAsFileTime.KERNEL32(?,00433077,?,?,?,?,004C7E2F), ref: 00433655
                                              • GetSystemTimeAsFileTime.KERNEL32(?,B2E69B1B,00000000,?,00551382,000000FF,?,00433077,?,?,?,?,004C7E2F), ref: 00433659
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Time$FileSystem$Precise
                                              • String ID: `-@
                                              • API String ID: 743729956-3781167437
                                              • Opcode ID: a70e229828252f114f3dcb939b169fb3f53d7191ad82fa45b454faadf805d98c
                                              • Instruction ID: 3e04e591088ee8cc2650925c1d28f2227fba881fd4e87dc1a7d03300bd93dc66
                                              • Opcode Fuzzy Hash: a70e229828252f114f3dcb939b169fb3f53d7191ad82fa45b454faadf805d98c
                                              • Instruction Fuzzy Hash: 73F0A032904A54EFCB118F44DC11B59BBA8F708B21F004626EC12A3790DB34A9049F94
                                              APIs
                                              • InitializeCriticalSectionAndSpinCount.KERNEL32(00000016,00000001,004389D2,00000001,00000016,00438BE1,?,?,?,?,?,00000000), ref: 0044B834
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: CountCriticalInitializeSectionSpin
                                              • String ID: InitializeCriticalSectionEx$`-@
                                              • API String ID: 2593887523-3269949891
                                              • Opcode ID: 1f2253b5c78e33ee57fe7f30907939316c5faef6f9275bf3e632fad4f43c2f0e
                                              • Instruction ID: 5bcc12c1b0658f8dc7434a33690804c70bb56e7eadbb0958c8ec10a8e9d05d13
                                              • Opcode Fuzzy Hash: 1f2253b5c78e33ee57fe7f30907939316c5faef6f9275bf3e632fad4f43c2f0e
                                              • Instruction Fuzzy Hash: BDE09236581318BBCB212F92DC06DAE7F25EB24BA2F048022FD1956161C7768821BBD9
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                              Similarity
                                              • API ID: Alloc
                                              • String ID: FlsAlloc$`-@
                                              • API String ID: 2773662609-4156633630
                                              • Opcode ID: cb3d3b1705c4ad86f1f38207f7089225cebdf7df6536ef5bae3d846ce8807c5c
                                              • Instruction ID: f97a85a86a778de88566526de1fe8fa57bb386988dde2a496b9568b12ff0cd72
                                              • Opcode Fuzzy Hash: cb3d3b1705c4ad86f1f38207f7089225cebdf7df6536ef5bae3d846ce8807c5c
                                              • Instruction Fuzzy Hash: DAE0CD3258031477961036916C16DAA7D14D750BA3F050033F904522619A95891066DF