Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1Gvue8ItW8.exe

Overview

General Information

Sample name:1Gvue8ItW8.exe
renamed because original name is a hash value
Original sample name:fe70eb0688b5c73484c90d5ac6f0fc19.exe
Analysis ID:1465835
MD5:fe70eb0688b5c73484c90d5ac6f0fc19
SHA1:2dd1e471d617369e56bfcc99856655ed8dd23b96
SHA256:694bc44ca9827716a989fef8d775bd817d4eab31d510a77f96dee09955bf054d
Tags:32exetrojan
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE / OLE file has an invalid certificate
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 1Gvue8ItW8.exe (PID: 7436 cmdline: "C:\Users\user\Desktop\1Gvue8ItW8.exe" MD5: FE70EB0688B5C73484C90D5AC6F0FC19)
    • RegAsm.exe (PID: 7460 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • WerFault.exe (PID: 7548 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7436 -s 268 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["richardflorespoew.shop", "strwawrunnygjwu.shop", "justifycanddidatewd.shop", "raiseboltskdlwpow.shop", "falseaudiencekd.shop", "pleasurenarrowsdla.shop", "feighminoritsjda.shop", "marathonbeedksow.shop", "backcreammykiel.shop"], "Build id": "LPnhqo--@SEFYALUV"}
SourceRuleDescriptionAuthorStrings
decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    Timestamp:07/02/24-06:41:01.250933
    SID:2053682
    Source Port:58922
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:07/02/24-06:41:01.324781
    SID:2053674
    Source Port:64289
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:07/02/24-06:41:01.355477
    SID:2053670
    Source Port:59976
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:07/02/24-06:41:01.298095
    SID:2053678
    Source Port:59335
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:07/02/24-06:41:01.309411
    SID:2053676
    Source Port:53223
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:07/02/24-06:41:01.238010
    SID:2053812
    Source Port:53429
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:07/02/24-06:41:01.337871
    SID:2053672
    Source Port:64375
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:07/02/24-06:41:01.366350
    SID:2053668
    Source Port:60066
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:07/02/24-06:41:01.285893
    SID:2053680
    Source Port:60118
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: https://feighminoritsjda.shop/Avira URL Cloud: Label: malware
    Source: marathonbeedksow.shopAvira URL Cloud: Label: malware
    Source: https://richardflorespoew.shop/apiAvira URL Cloud: Label: malware
    Source: https://marathonbeedksow.shop/Avira URL Cloud: Label: malware
    Source: feighminoritsjda.shopAvira URL Cloud: Label: malware
    Source: https://feighminoritsjda.shop/%Avira URL Cloud: Label: malware
    Source: https://strwawrunnygjwu.shop/apiAvira URL Cloud: Label: malware
    Source: backcreammykiel.shopAvira URL Cloud: Label: malware
    Source: https://justifycanddidatewd.shop/apiAvira URL Cloud: Label: malware
    Source: https://raiseboltskdlwpow.shop/apiAvira URL Cloud: Label: malware
    Source: 0.2.1Gvue8ItW8.exe.b90000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["richardflorespoew.shop", "strwawrunnygjwu.shop", "justifycanddidatewd.shop", "raiseboltskdlwpow.shop", "falseaudiencekd.shop", "pleasurenarrowsdla.shop", "feighminoritsjda.shop", "marathonbeedksow.shop", "backcreammykiel.shop"], "Build id": "LPnhqo--@SEFYALUV"}
    Source: 1Gvue8ItW8.exeReversingLabs: Detection: 73%
    Source: 1Gvue8ItW8.exeVirustotal: Detection: 59%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: 1Gvue8ItW8.exeJoe Sandbox ML: detected
    Source: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString decryptor: richardflorespoew.shop
    Source: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString decryptor: strwawrunnygjwu.shop
    Source: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString decryptor: justifycanddidatewd.shop
    Source: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString decryptor: raiseboltskdlwpow.shop
    Source: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString decryptor: falseaudiencekd.shop
    Source: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString decryptor: pleasurenarrowsdla.shop
    Source: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString decryptor: feighminoritsjda.shop
    Source: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString decryptor: marathonbeedksow.shop
    Source: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString decryptor: backcreammykiel.shop
    Source: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString decryptor: lid=%s&j=%s&ver=4.0
    Source: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString decryptor: TeslaBrowser/5.5
    Source: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString decryptor: - Screen Resoluton:
    Source: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString decryptor: - Physical Installed Memory:
    Source: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString decryptor: Workgroup: -
    Source: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString decryptor: LPnhqo--@SEFYALUV
    Source: 1Gvue8ItW8.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 1Gvue8ItW8.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_00BAF66C FindFirstFileExW,0_2_00BAF66C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 22D223F1h1_2_0043878E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+04h]1_2_004389A3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+00000888h]1_2_0041E274
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [esi], ax1_2_00420210
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax1_2_0041F2E1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then lea eax, dword ptr [edi+04h]1_2_00421288
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then push esi1_2_00416556
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx1_2_0043857C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+04h]1_2_0041C530
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]1_2_004165D4
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+28h]1_2_004275B6
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]1_2_00403630
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [ecx], 00000000h1_2_004146A5
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edi, ebx1_2_00437740
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov esi, dword ptr [esp+60h]1_2_004177BA
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+60h]1_2_004177BA
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+00000238h]1_2_004138FD
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax1_2_00439899
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]1_2_00424920
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then inc ebx1_2_004159F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 11081610h1_2_0041FA7A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp]1_2_00422AD1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, eax1_2_0041CB1E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+00000238h]1_2_00410B28
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, edi1_2_00424BC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al1_2_00426C18
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+00000148h]1_2_00413C3A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 11081610h1_2_00415E0B
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx1_2_00415E18
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]1_2_0041FE30
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]1_2_0040CEC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], 0000002Bh1_2_00425F08
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al1_2_00426FB0

    Networking

    barindex
    Source: TrafficSnort IDS: 2053812 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (backcreammykiel .shop) 192.168.2.4:53429 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2053682 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (marathonbeedksow .shop) 192.168.2.4:58922 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2053680 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (feighminoritsjda .shop) 192.168.2.4:60118 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2053678 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (pleasurenarrowsdla .shop) 192.168.2.4:59335 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2053676 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (falseaudiencekd .shop) 192.168.2.4:53223 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2053674 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (raiseboltskdlwpow .shop) 192.168.2.4:64289 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2053672 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (justifycanddidatewd .shop) 192.168.2.4:64375 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2053670 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (strwawrunnygjwu .shop) 192.168.2.4:59976 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2053668 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (richardflorespoew .shop) 192.168.2.4:60066 -> 1.1.1.1:53
    Source: Malware configuration extractorURLs: richardflorespoew.shop
    Source: Malware configuration extractorURLs: strwawrunnygjwu.shop
    Source: Malware configuration extractorURLs: justifycanddidatewd.shop
    Source: Malware configuration extractorURLs: raiseboltskdlwpow.shop
    Source: Malware configuration extractorURLs: falseaudiencekd.shop
    Source: Malware configuration extractorURLs: pleasurenarrowsdla.shop
    Source: Malware configuration extractorURLs: feighminoritsjda.shop
    Source: Malware configuration extractorURLs: marathonbeedksow.shop
    Source: Malware configuration extractorURLs: backcreammykiel.shop
    Source: unknownDNS traffic detected: query: feighminoritsjda.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: justifycanddidatewd.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: falseaudiencekd.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: pleasurenarrowsdla.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: richardflorespoew.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: backcreammykiel.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: marathonbeedksow.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: strwawrunnygjwu.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: raiseboltskdlwpow.shop replaycode: Name error (3)
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: backcreammykiel.shop
    Source: global trafficDNS traffic detected: DNS query: marathonbeedksow.shop
    Source: global trafficDNS traffic detected: DNS query: feighminoritsjda.shop
    Source: global trafficDNS traffic detected: DNS query: pleasurenarrowsdla.shop
    Source: global trafficDNS traffic detected: DNS query: falseaudiencekd.shop
    Source: global trafficDNS traffic detected: DNS query: raiseboltskdlwpow.shop
    Source: global trafficDNS traffic detected: DNS query: justifycanddidatewd.shop
    Source: global trafficDNS traffic detected: DNS query: strwawrunnygjwu.shop
    Source: global trafficDNS traffic detected: DNS query: richardflorespoew.shop
    Source: 1Gvue8ItW8.exeString found in binary or memory: http://aia.entrust.net/ts1-chain256.cer01
    Source: 1Gvue8ItW8.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
    Source: 1Gvue8ItW8.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: 1Gvue8ItW8.exeString found in binary or memory: http://crl.entrust.net/2048ca.crl0
    Source: 1Gvue8ItW8.exeString found in binary or memory: http://crl.entrust.net/ts1ca.crl0
    Source: 1Gvue8ItW8.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
    Source: 1Gvue8ItW8.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: 1Gvue8ItW8.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
    Source: 1Gvue8ItW8.exeString found in binary or memory: http://ocsp.digicert.com0
    Source: 1Gvue8ItW8.exeString found in binary or memory: http://ocsp.digicert.com0A
    Source: 1Gvue8ItW8.exeString found in binary or memory: http://ocsp.entrust.net02
    Source: 1Gvue8ItW8.exeString found in binary or memory: http://ocsp.entrust.net03
    Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
    Source: 1Gvue8ItW8.exeString found in binary or memory: http://www.digicert.com/CPS0
    Source: 1Gvue8ItW8.exeString found in binary or memory: http://www.entrust.net/rpa03
    Source: RegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://falseaudiencekd.shop/
    Source: RegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://feighminoritsjda.shop/
    Source: RegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://feighminoritsjda.shop/%
    Source: RegAsm.exe, 00000001.00000002.1660995734.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://justifycanddidatewd.shop/%
    Source: RegAsm.exe, 00000001.00000002.1660995734.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://justifycanddidatewd.shop/api
    Source: RegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://marathonbeedksow.shop/
    Source: RegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raiseboltskdlwpow.shop/
    Source: RegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raiseboltskdlwpow.shop/api
    Source: RegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raiseboltskdlwpow.shop/apib
    Source: RegAsm.exe, 00000001.00000002.1660995734.0000000000B3D000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://richardflorespoew.shop/
    Source: RegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://richardflorespoew.shop/:W=
    Source: RegAsm.exe, 00000001.00000002.1660995734.0000000000B3D000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1660995734.0000000000B53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://richardflorespoew.shop/api
    Source: RegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strwawrunnygjwu.shop/
    Source: RegAsm.exe, 00000001.00000002.1660995734.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strwawrunnygjwu.shop/api
    Source: 1Gvue8ItW8.exeString found in binary or memory: https://www.entrust.net/rpa0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042EAD0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,1_2_0042EAD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042EAD0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,1_2_0042EAD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042F61A GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,1_2_0042F61A
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_00BA18800_2_00BA1880
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_00BAD2CE0_2_00BAD2CE
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_00B97A000_2_00B97A00
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_00BB1CA00_2_00BB1CA0
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_00BA95A90_2_00BA95A9
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_00BB3DC60_2_00BB3DC6
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_00BA464E0_2_00BA464E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0043A0901_2_0043A090
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0043C0B01_2_0043C0B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004202101_2_00420210
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041F2E11_2_0041F2E1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004212881_2_00421288
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004083401_2_00408340
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0043A3101_2_0043A310
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042D33A1_2_0042D33A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042B3F91_2_0042B3F9
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004044501_2_00404450
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004344001_2_00434400
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004295001_2_00429500
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0043A5C01_2_0043A5C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004165D41_2_004165D4
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004225E31_2_004225E3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004066301_2_00406630
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041D6F01_2_0041D6F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042D73D1_2_0042D73D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004108101_2_00410810
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042B8B31_2_0042B8B3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004209471_2_00420947
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004279731_2_00427973
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042792E1_2_0042792E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004039E01_2_004039E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004279861_2_00427986
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0043A9901_2_0043A990
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004059941_2_00405994
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041CB1E1_2_0041CB1E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00420BC01_2_00420BC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00424BC01_2_00424BC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00422CD61_2_00422CD6
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0043BD901_2_0043BD90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00404E301_2_00404E30
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00401F401_2_00401F40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00423F2F1_2_00423F2F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00436FA01_2_00436FA0
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: String function: 00B9CC80 appears 49 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00408D40 appears 48 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004109A0 appears 198 times
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7436 -s 268
    Source: 1Gvue8ItW8.exeStatic PE information: invalid certificate
    Source: 1Gvue8ItW8.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal100.troj.evad.winEXE@4/5@9/0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042B0B2 CoCreateInstance,1_2_0042B0B2
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7436
    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\0409bcb2-feca-49d1-9075-fa1d0b4d516dJump to behavior
    Source: 1Gvue8ItW8.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 1Gvue8ItW8.exeReversingLabs: Detection: 73%
    Source: 1Gvue8ItW8.exeVirustotal: Detection: 59%
    Source: unknownProcess created: C:\Users\user\Desktop\1Gvue8ItW8.exe "C:\Users\user\Desktop\1Gvue8ItW8.exe"
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7436 -s 268
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
    Source: 1Gvue8ItW8.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: 1Gvue8ItW8.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: 1Gvue8ItW8.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: 1Gvue8ItW8.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: 1Gvue8ItW8.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: 1Gvue8ItW8.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: 1Gvue8ItW8.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: 1Gvue8ItW8.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: 1Gvue8ItW8.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: 1Gvue8ItW8.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: 1Gvue8ItW8.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: 1Gvue8ItW8.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: 1Gvue8ItW8.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_00B9C56A push ecx; ret 0_2_00B9C57D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00442101 push 0000007Bh; retf 1_2_00442103
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004422EE push cs; retf 1_2_004422EF
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0043F35B pushad ; iretd 1_2_0043F369
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00442386 push ebp; iretd 1_2_00442387
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004426F6 push esp; iretd 1_2_004426E1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004426F6 push es; retf 1_2_00442709
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00441689 push D379FC65h; retf 1_2_0044168E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00442692 push esp; iretd 1_2_004426E1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0044173B push 6E8C8D5Fh; ret 1_2_00441745
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeAPI coverage: 9.3 %
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7500Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_00BAF66C FindFirstFileExW,0_2_00BAF66C
    Source: Amcache.hve.4.drBinary or memory string: VMware
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: RegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllc
    Source: Amcache.hve.4.drBinary or memory string: vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.4.drBinary or memory string: VMware20,1
    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeProcess queried: DebugPortJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00438320 LdrInitializeThunk,1_2_00438320
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_00BA0943 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BA0943
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_00BA6C75 mov ecx, dword ptr fs:[00000030h]0_2_00BA6C75
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_00BADFC5 mov eax, dword ptr fs:[00000030h]0_2_00BADFC5
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_00BB2DB5 GetProcessHeap,0_2_00BB2DB5
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_00BA0943 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BA0943
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_00B9CA5E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B9CA5E
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_00B9CBBA SetUnhandledExceptionFilter,0_2_00B9CBBA
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_00B9CCF3 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00B9CCF3

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_009D018D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_009D018D
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: 1Gvue8ItW8.exe, 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: richardflorespoew.shop
    Source: 1Gvue8ItW8.exe, 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: strwawrunnygjwu.shop
    Source: 1Gvue8ItW8.exe, 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: justifycanddidatewd.shop
    Source: 1Gvue8ItW8.exe, 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: raiseboltskdlwpow.shop
    Source: 1Gvue8ItW8.exe, 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: falseaudiencekd.shop
    Source: 1Gvue8ItW8.exe, 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: pleasurenarrowsdla.shop
    Source: 1Gvue8ItW8.exe, 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: feighminoritsjda.shop
    Source: 1Gvue8ItW8.exe, 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: marathonbeedksow.shop
    Source: 1Gvue8ItW8.exe, 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: backcreammykiel.shop
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43D000Jump to behavior
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 440000Jump to behavior
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 452000Jump to behavior
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 87B008Jump to behavior
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_00B9C745 cpuid 0_2_00B9C745
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: GetLocaleInfoW,0_2_00BB2855
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: EnumSystemLocalesW,0_2_00BAA198
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00BB21EF
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00BB297E
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: GetLocaleInfoW,0_2_00BB2A84
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: GetLocaleInfoW,0_2_00BB23EA
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00BB2B53
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: EnumSystemLocalesW,0_2_00BB2491
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: EnumSystemLocalesW,0_2_00BB24DC
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: EnumSystemLocalesW,0_2_00BB2577
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: GetLocaleInfoW,0_2_00BAA6BE
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00BB2602
    Source: C:\Users\user\Desktop\1Gvue8ItW8.exeCode function: 0_2_00B9C954 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00B9C954
    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    PowerShell
    1
    DLL Side-Loading
    411
    Process Injection
    2
    Virtualization/Sandbox Evasion
    OS Credential Dumping1
    System Time Discovery
    Remote Services1
    Screen Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    411
    Process Injection
    LSASS Memory41
    Security Software Discovery
    Remote Desktop Protocol1
    Archive Collected Data
    1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
    Deobfuscate/Decode Files or Information
    Security Account Manager2
    Virtualization/Sandbox Evasion
    SMB/Windows Admin Shares2
    Clipboard Data
    11
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
    Obfuscated Files or Information
    NTDS1
    File and Directory Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA Secrets22
    System Information Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    1Gvue8ItW8.exe74%ReversingLabsWin32.Spyware.Lummastealer
    1Gvue8ItW8.exe59%VirustotalBrowse
    1Gvue8ItW8.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://ocsp.entrust.net030%URL Reputationsafe
    http://upx.sf.net0%URL Reputationsafe
    http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
    justifycanddidatewd.shop0%Avira URL Cloudsafe
    https://raiseboltskdlwpow.shop/apib0%Avira URL Cloudsafe
    https://feighminoritsjda.shop/100%Avira URL Cloudmalware
    http://ocsp.entrust.net020%Avira URL Cloudsafe
    http://www.entrust.net/rpa030%Avira URL Cloudsafe
    pleasurenarrowsdla.shop0%Avira URL Cloudsafe
    marathonbeedksow.shop100%Avira URL Cloudmalware
    richardflorespoew.shop0%Avira URL Cloudsafe
    http://aia.entrust.net/ts1-chain256.cer010%Avira URL Cloudsafe
    https://raiseboltskdlwpow.shop/0%Avira URL Cloudsafe
    falseaudiencekd.shop0%Avira URL Cloudsafe
    https://justifycanddidatewd.shop/%0%Avira URL Cloudsafe
    https://richardflorespoew.shop/api100%Avira URL Cloudmalware
    https://strwawrunnygjwu.shop/0%Avira URL Cloudsafe
    https://marathonbeedksow.shop/100%Avira URL Cloudmalware
    feighminoritsjda.shop100%Avira URL Cloudmalware
    https://feighminoritsjda.shop/%100%Avira URL Cloudmalware
    strwawrunnygjwu.shop0%Avira URL Cloudsafe
    https://richardflorespoew.shop/0%Avira URL Cloudsafe
    https://strwawrunnygjwu.shop/api100%Avira URL Cloudmalware
    raiseboltskdlwpow.shop0%Avira URL Cloudsafe
    http://crl.entrust.net/ts1ca.crl00%Avira URL Cloudsafe
    backcreammykiel.shop100%Avira URL Cloudmalware
    https://justifycanddidatewd.shop/api100%Avira URL Cloudmalware
    https://richardflorespoew.shop/:W=0%Avira URL Cloudsafe
    https://www.entrust.net/rpa00%Avira URL Cloudsafe
    https://falseaudiencekd.shop/0%Avira URL Cloudsafe
    https://raiseboltskdlwpow.shop/api100%Avira URL Cloudmalware
    NameIPActiveMaliciousAntivirus DetectionReputation
    justifycanddidatewd.shop
    unknown
    unknowntrue
      unknown
      richardflorespoew.shop
      unknown
      unknowntrue
        unknown
        strwawrunnygjwu.shop
        unknown
        unknowntrue
          unknown
          falseaudiencekd.shop
          unknown
          unknowntrue
            unknown
            raiseboltskdlwpow.shop
            unknown
            unknowntrue
              unknown
              backcreammykiel.shop
              unknown
              unknowntrue
                unknown
                marathonbeedksow.shop
                unknown
                unknowntrue
                  unknown
                  feighminoritsjda.shop
                  unknown
                  unknowntrue
                    unknown
                    pleasurenarrowsdla.shop
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      justifycanddidatewd.shoptrue
                      • Avira URL Cloud: safe
                      unknown
                      marathonbeedksow.shoptrue
                      • Avira URL Cloud: malware
                      unknown
                      pleasurenarrowsdla.shoptrue
                      • Avira URL Cloud: safe
                      unknown
                      richardflorespoew.shoptrue
                      • Avira URL Cloud: safe
                      unknown
                      falseaudiencekd.shoptrue
                      • Avira URL Cloud: safe
                      unknown
                      feighminoritsjda.shoptrue
                      • Avira URL Cloud: malware
                      unknown
                      strwawrunnygjwu.shoptrue
                      • Avira URL Cloud: safe
                      unknown
                      raiseboltskdlwpow.shoptrue
                      • Avira URL Cloud: safe
                      unknown
                      backcreammykiel.shoptrue
                      • Avira URL Cloud: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://raiseboltskdlwpow.shop/apibRegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://feighminoritsjda.shop/RegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://ocsp.entrust.net031Gvue8ItW8.exefalse
                      • URL Reputation: safe
                      unknown
                      http://ocsp.entrust.net021Gvue8ItW8.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.entrust.net/rpa031Gvue8ItW8.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      http://aia.entrust.net/ts1-chain256.cer011Gvue8ItW8.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      http://upx.sf.netAmcache.hve.4.drfalse
                      • URL Reputation: safe
                      unknown
                      https://raiseboltskdlwpow.shop/RegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://justifycanddidatewd.shop/%RegAsm.exe, 00000001.00000002.1660995734.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://richardflorespoew.shop/apiRegAsm.exe, 00000001.00000002.1660995734.0000000000B3D000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1660995734.0000000000B53000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://strwawrunnygjwu.shop/RegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://marathonbeedksow.shop/RegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://feighminoritsjda.shop/%RegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://richardflorespoew.shop/RegAsm.exe, 00000001.00000002.1660995734.0000000000B3D000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://strwawrunnygjwu.shop/apiRegAsm.exe, 00000001.00000002.1660995734.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://crl.entrust.net/ts1ca.crl01Gvue8ItW8.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      https://justifycanddidatewd.shop/apiRegAsm.exe, 00000001.00000002.1660995734.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://richardflorespoew.shop/:W=RegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.entrust.net/2048ca.crl01Gvue8ItW8.exefalse
                      • URL Reputation: safe
                      unknown
                      https://www.entrust.net/rpa01Gvue8ItW8.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      https://falseaudiencekd.shop/RegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://raiseboltskdlwpow.shop/apiRegAsm.exe, 00000001.00000002.1660995734.0000000000B0A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      No contacted IP infos
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1465835
                      Start date and time:2024-07-02 06:40:09 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 4m 22s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:9
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:1Gvue8ItW8.exe
                      renamed because original name is a hash value
                      Original Sample Name:fe70eb0688b5c73484c90d5ac6f0fc19.exe
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@4/5@9/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 95%
                      • Number of executed functions: 17
                      • Number of non-executed functions: 96
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 52.168.117.173
                      • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      TimeTypeDescription
                      00:41:00API Interceptor1x Sleep call for process: RegAsm.exe modified
                      00:41:13API Interceptor1x Sleep call for process: WerFault.exe modified
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.6472544734601396
                      Encrypted:false
                      SSDEEP:96:qUFfEqaspqnqvesDqwhqA1yDfRgBQXIDcQvc6QcEVcw3cE/Mqdqm+HbHg/5hZAXz:79CspeZT0BU/YjhzuiFjZ24IO8n
                      MD5:8FABC5C5010ED1FFD30521BAC5485686
                      SHA1:B5F039D5D23F80C2DA6C60A603C8F19159E1E445
                      SHA-256:7A495B5F09DBBB812146ECC3EA4F8B48B6D54410B7467202D6668BD5C412A345
                      SHA-512:C8A89FEDE8E33B6E0A7AA8C5D5B6946B41B2144433758EB46D604B56E38BEFA6F5CE5B8DD0F488A3BA3AB2CFBD70A1C0E08EFF423F72DDFC6AEE3C668AF47F08
                      Malicious:true
                      Reputation:low
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.4.3.6.8.8.6.0.3.1.2.6.7.0.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.4.3.6.8.8.6.0.6.8.7.6.6.6.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.a.a.9.5.d.b.8.-.f.1.9.0.-.4.1.a.7.-.b.5.9.6.-.b.1.8.f.c.1.c.3.b.6.6.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.c.1.d.d.e.0.2.-.7.b.c.7.-.4.e.d.b.-.8.1.0.d.-.f.8.5.9.7.9.2.5.9.6.9.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.1.G.v.u.e.8.I.t.W.8...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.0.c.-.0.0.0.1.-.0.0.1.4.-.4.8.f.3.-.6.0.0.9.3.a.c.c.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.b.6.3.9.1.1.2.6.9.7.4.a.1.b.e.0.2.a.c.b.f.3.3.a.e.7.8.0.d.d.5.0.0.0.0.f.f.f.f.!.0.0.0.0.2.d.d.1.e.4.7.1.d.6.1.7.3.6.9.e.5.6.b.f.c.c.9.9.8.5.6.6.5.5.e.d.8.d.d.2.3.b.9.6.!.1.G.v.u.e.8.I.t.W.8...e.x.e.....T.a.r.g.e.t.A.p.p.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Tue Jul 2 04:41:00 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):49250
                      Entropy (8bit):1.601952085694189
                      Encrypted:false
                      SSDEEP:192:vLWOjYZKrVAmkDyhLsKQGsA8Rfz3TH/8FLuWK29a8h:DhcZAAmkMLsLG8LTcLuhEv
                      MD5:0979DE0B94F78CE389E0C1CBD3B23997
                      SHA1:FDCC43979D8B9AB67D42D7E6A88E190F59C5BC06
                      SHA-256:8912AA708D951794F2881B3BD166712812DABBE772F0266B945D199916516EAE
                      SHA-512:BC2D4253EFE15105E8A088FC77121E112182FC0EB66840B6BB655D63A38D9DCAA67BD57B8418DDB5D2BF469843142BBDBF601DF64A5AF25D73745EFDAB39B6C0
                      Malicious:false
                      Reputation:low
                      Preview:MDMP..a..... .........f........................d...........................T.......8...........T...........................`...........L...............................................................................eJ..............GenuineIntel............T.............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8302
                      Entropy (8bit):3.6937116651571333
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJ1t6X7oY6Y9DSU511gmfVJDtprj89b6VsfIMem:R6lXJv6LoY6YZSU5ngmfVJDE6ufIc
                      MD5:73C6B53E55830C9D6A76410C34E2B35B
                      SHA1:C38FE91D7E2393763E6DC2AB5690CABF5721BBA6
                      SHA-256:5AFA8D6F1C4F35EB50A01D828F50D888319E397764BA834203F5002A80751DC4
                      SHA-512:478EDE1137572DF8AB8D4162B2CE8C9180D0DCCDDB280305E55162A5B162856D25ADC219695987AF3D9759035FE4261FE5E0C81CB86CC0731DD57ED093B39E21
                      Malicious:false
                      Reputation:low
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.3.6.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4585
                      Entropy (8bit):4.45616596130131
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsfJg77aI9KdWpW8VYq0Ym8M4JetiFI+q8Z8XDYUdd:uIjfBI7Is7VVBJep4OYUdd
                      MD5:A9B03C0AE355F25CF30E15337876E1CB
                      SHA1:C5F8141630310BDA711F77419E9BA5C3263E9B59
                      SHA-256:BA1F7D0E8BB2A8A84918A05DEE01C0245223667702229B2AA1F4420E70946F5A
                      SHA-512:6BA96D6F6B28F1B4BEE77F17CC1CEA63C9DD31B8BEF0B51715402A5D305CA10D94588642E80DF26D5795D7B60AD1850DF8217A48AE85F02DA3451A5C4191EDB1
                      Malicious:false
                      Reputation:low
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="392863" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:MS Windows registry file, NT/2000 or above
                      Category:dropped
                      Size (bytes):1835008
                      Entropy (8bit):4.465454833572974
                      Encrypted:false
                      SSDEEP:6144:3IXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNVdwBCswSbt:4XD94+WlLZMM6YFHj+t
                      MD5:55B958130979EAF7BDBDF92CF39D0D66
                      SHA1:24D562C92E286CB6AB2C2A3291262D8C8FF0C668
                      SHA-256:A51DCF5D5E4830585DA5AD95A2F90B44E6E81E73AFC15C244CB42D7879226ADB
                      SHA-512:4B9E927648B45A4501BBFE79AF4B7EB1D39EF3718471293554BB593B46F096D881DFA08196BBFDEBF8A5E4388615EB5A78ED8902752266065029382A0158F498
                      Malicious:false
                      Reputation:low
                      Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm*...:................................................................................................................................................................................................................................................................................................................................................Y.=........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.628794944649711
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:1Gvue8ItW8.exe
                      File size:552'488 bytes
                      MD5:fe70eb0688b5c73484c90d5ac6f0fc19
                      SHA1:2dd1e471d617369e56bfcc99856655ed8dd23b96
                      SHA256:694bc44ca9827716a989fef8d775bd817d4eab31d510a77f96dee09955bf054d
                      SHA512:9b8516894ec06c54456612ef7f8d7c3f1f2f11fd56d2a3e9cd8587f31c761c0efb4ada9d0d48ffd314532fa3f0daf1777ca5232f5b89b230cc4fb17ace408454
                      SSDEEP:12288:rTxrdC4vcMwARLIkzjLA2K9wiNOvPOVPQp8FGwSV8zt4Iy9qHEO:HPCfHa0wq6mPQySVO2Iy9At
                      TLSH:31C4E11075C18076D5A305330AE4DBB66E3DF9604B615DCFA3941F7E8F302D2AB3AA96
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........\.j...j...j..R....j..R.../j..R....j..C....j..R....j...j...j..C....j..C....j..r....j..r.c..j..r....j..Rich.j..........PE..L..
                      Icon Hash:90cececece8e8eb0
                      Entrypoint:0x40c1e6
                      Entrypoint Section:.text
                      Digitally signed:true
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x66705B34 [Mon Jun 17 15:50:12 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:6d2bc796d2349b15e473ed3f5470c136
                      Signature Valid:false
                      Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                      Signature Validation Error:The digital signature of the object did not verify
                      Error Number:-2146869232
                      Not Before, Not After
                      • 13/01/2023 00:00:00 16/01/2026 23:59:59
                      Subject Chain
                      • CN=NVIDIA Corporation, OU=2-J, O=NVIDIA Corporation, L=Santa Clara, S=California, C=US
                      Version:3
                      Thumbprint MD5:5F1B6B6C408DB2B4D60BAA489E9A0E5A
                      Thumbprint SHA-1:15F760D82C79D22446CC7D4806540BF632B1E104
                      Thumbprint SHA-256:28AF76241322F210DA473D9569EFF6F27124C4CA9F43933DA547E8D068B0A95D
                      Serial:0997C56CAA59055394D9A9CDB8BEEB56
                      Instruction
                      call 00007F595501A2DBh
                      jmp 00007F5955019999h
                      push ebp
                      mov ebp, esp
                      jmp 00007F5955019B2Fh
                      push dword ptr [ebp+08h]
                      call 00007F5955025E93h
                      pop ecx
                      test eax, eax
                      je 00007F5955019B31h
                      push dword ptr [ebp+08h]
                      call 00007F5955022CEAh
                      pop ecx
                      test eax, eax
                      je 00007F5955019B08h
                      pop ebp
                      ret
                      cmp dword ptr [ebp+08h], FFFFFFFFh
                      je 00007F595501A5D0h
                      jmp 00007F5955017A94h
                      push ebp
                      mov ebp, esp
                      push dword ptr [ebp+08h]
                      call 00007F595501A5DCh
                      pop ecx
                      pop ebp
                      ret
                      jmp 00007F595501A5D4h
                      push ebp
                      mov ebp, esp
                      mov eax, dword ptr [ebp+08h]
                      push esi
                      mov ecx, dword ptr [eax+3Ch]
                      add ecx, eax
                      movzx eax, word ptr [ecx+14h]
                      lea edx, dword ptr [ecx+18h]
                      add edx, eax
                      movzx eax, word ptr [ecx+06h]
                      imul esi, eax, 28h
                      add esi, edx
                      cmp edx, esi
                      je 00007F5955019B3Bh
                      mov ecx, dword ptr [ebp+0Ch]
                      cmp ecx, dword ptr [edx+0Ch]
                      jc 00007F5955019B2Ch
                      mov eax, dword ptr [edx+08h]
                      add eax, dword ptr [edx+0Ch]
                      cmp ecx, eax
                      jc 00007F5955019B2Eh
                      add edx, 28h
                      cmp edx, esi
                      jne 00007F5955019B0Ch
                      xor eax, eax
                      pop esi
                      pop ebp
                      ret
                      mov eax, edx
                      jmp 00007F5955019B1Bh
                      push esi
                      call 00007F595501A58Fh
                      test eax, eax
                      je 00007F5955019B42h
                      mov eax, dword ptr fs:[00000018h]
                      mov esi, 00483730h
                      mov edx, dword ptr [eax+04h]
                      jmp 00007F5955019B26h
                      cmp edx, eax
                      je 00007F5955019B32h
                      xor eax, eax
                      mov ecx, edx
                      lock cmpxchg dword ptr [esi], ecx
                      test eax, eax
                      jne 00007F5955019B12h
                      xor al, al
                      pop esi
                      ret
                      mov al, 01h
                      pop esi
                      ret
                      push ebp
                      mov ebp, esp
                      cmp dword ptr [ebp+00h], 00000000h
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x345540x28.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x850000x1e0.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x848000x2628
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x860000x2278.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x31ab80x1c.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x31b000x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x319f80x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x290000x168.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x27cd20x27e003d86e11aca45fd75da860af6147a4d53False0.5593345905172413data6.6394300411668IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x290000xbdba0xbe003997197f4b3e5331dc35d69835b455a8False0.41720805921052634data5.016603150146324IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x350000x4f2440x4e200102a6a450ebad67120f6b7d60824325eFalse0.9819875data7.988228551613357IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x850000x1e00x200b8d21ff7b0411c01c391d7037524e407False0.52734375data4.7122981932940915IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x860000x22780x24009e825894a0ce8ec3d015bfd41cde4fb3False0.7376302083333334data6.453522958282726IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_MANIFEST0x850600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                      DLLImport
                      KERNEL32.dllWriteConsoleW, HeapSize, CreateFileW, CloseHandle, WaitForSingleObject, CreateThread, VirtualAlloc, RaiseException, InitOnceBeginInitialize, InitOnceComplete, GetCurrentThreadId, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, WakeAllConditionVariable, SleepConditionVariableSRW, WideCharToMultiByte, GetLastError, FreeLibraryWhenCallbackReturns, CreateThreadpoolWork, SubmitThreadpoolWork, CloseThreadpoolWork, GetModuleHandleExW, IsProcessorFeaturePresent, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, QueryPerformanceCounter, EncodePointer, DecodePointer, MultiByteToWideChar, LCMapStringEx, GetSystemTimeAsFileTime, GetModuleHandleW, GetProcAddress, GetStringTypeW, GetCPInfo, GetCurrentProcessId, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetCurrentProcess, TerminateProcess, GetProcessHeap, RtlUnwind, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetCommandLineA, GetCommandLineW, HeapAlloc, HeapFree, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, GetFileSizeEx, SetFilePointerEx, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      07/02/24-06:41:01.250933UDP2053682ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (marathonbeedksow .shop)5892253192.168.2.41.1.1.1
                      07/02/24-06:41:01.324781UDP2053674ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (raiseboltskdlwpow .shop)6428953192.168.2.41.1.1.1
                      07/02/24-06:41:01.355477UDP2053670ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (strwawrunnygjwu .shop)5997653192.168.2.41.1.1.1
                      07/02/24-06:41:01.298095UDP2053678ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (pleasurenarrowsdla .shop)5933553192.168.2.41.1.1.1
                      07/02/24-06:41:01.309411UDP2053676ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (falseaudiencekd .shop)5322353192.168.2.41.1.1.1
                      07/02/24-06:41:01.238010UDP2053812ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (backcreammykiel .shop)5342953192.168.2.41.1.1.1
                      07/02/24-06:41:01.337871UDP2053672ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (justifycanddidatewd .shop)6437553192.168.2.41.1.1.1
                      07/02/24-06:41:01.366350UDP2053668ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (richardflorespoew .shop)6006653192.168.2.41.1.1.1
                      07/02/24-06:41:01.285893UDP2053680ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (feighminoritsjda .shop)6011853192.168.2.41.1.1.1
                      TimestampSource PortDest PortSource IPDest IP
                      Jul 2, 2024 06:41:01.238009930 CEST5342953192.168.2.41.1.1.1
                      Jul 2, 2024 06:41:01.249537945 CEST53534291.1.1.1192.168.2.4
                      Jul 2, 2024 06:41:01.250932932 CEST5892253192.168.2.41.1.1.1
                      Jul 2, 2024 06:41:01.259865999 CEST53589221.1.1.1192.168.2.4
                      Jul 2, 2024 06:41:01.285892963 CEST6011853192.168.2.41.1.1.1
                      Jul 2, 2024 06:41:01.296669006 CEST53601181.1.1.1192.168.2.4
                      Jul 2, 2024 06:41:01.298094988 CEST5933553192.168.2.41.1.1.1
                      Jul 2, 2024 06:41:01.307109118 CEST53593351.1.1.1192.168.2.4
                      Jul 2, 2024 06:41:01.309411049 CEST5322353192.168.2.41.1.1.1
                      Jul 2, 2024 06:41:01.320616961 CEST53532231.1.1.1192.168.2.4
                      Jul 2, 2024 06:41:01.324780941 CEST6428953192.168.2.41.1.1.1
                      Jul 2, 2024 06:41:01.336265087 CEST53642891.1.1.1192.168.2.4
                      Jul 2, 2024 06:41:01.337871075 CEST6437553192.168.2.41.1.1.1
                      Jul 2, 2024 06:41:01.347536087 CEST53643751.1.1.1192.168.2.4
                      Jul 2, 2024 06:41:01.355477095 CEST5997653192.168.2.41.1.1.1
                      Jul 2, 2024 06:41:01.364279985 CEST53599761.1.1.1192.168.2.4
                      Jul 2, 2024 06:41:01.366349936 CEST6006653192.168.2.41.1.1.1
                      Jul 2, 2024 06:41:01.375494957 CEST53600661.1.1.1192.168.2.4
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Jul 2, 2024 06:41:01.238009930 CEST192.168.2.41.1.1.10xb23cStandard query (0)backcreammykiel.shopA (IP address)IN (0x0001)false
                      Jul 2, 2024 06:41:01.250932932 CEST192.168.2.41.1.1.10x4dc7Standard query (0)marathonbeedksow.shopA (IP address)IN (0x0001)false
                      Jul 2, 2024 06:41:01.285892963 CEST192.168.2.41.1.1.10xa455Standard query (0)feighminoritsjda.shopA (IP address)IN (0x0001)false
                      Jul 2, 2024 06:41:01.298094988 CEST192.168.2.41.1.1.10x767fStandard query (0)pleasurenarrowsdla.shopA (IP address)IN (0x0001)false
                      Jul 2, 2024 06:41:01.309411049 CEST192.168.2.41.1.1.10xc173Standard query (0)falseaudiencekd.shopA (IP address)IN (0x0001)false
                      Jul 2, 2024 06:41:01.324780941 CEST192.168.2.41.1.1.10xbbb8Standard query (0)raiseboltskdlwpow.shopA (IP address)IN (0x0001)false
                      Jul 2, 2024 06:41:01.337871075 CEST192.168.2.41.1.1.10xab75Standard query (0)justifycanddidatewd.shopA (IP address)IN (0x0001)false
                      Jul 2, 2024 06:41:01.355477095 CEST192.168.2.41.1.1.10x65c2Standard query (0)strwawrunnygjwu.shopA (IP address)IN (0x0001)false
                      Jul 2, 2024 06:41:01.366349936 CEST192.168.2.41.1.1.10xcc5dStandard query (0)richardflorespoew.shopA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Jul 2, 2024 06:41:01.249537945 CEST1.1.1.1192.168.2.40xb23cName error (3)backcreammykiel.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 2, 2024 06:41:01.259865999 CEST1.1.1.1192.168.2.40x4dc7Name error (3)marathonbeedksow.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 2, 2024 06:41:01.296669006 CEST1.1.1.1192.168.2.40xa455Name error (3)feighminoritsjda.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 2, 2024 06:41:01.307109118 CEST1.1.1.1192.168.2.40x767fName error (3)pleasurenarrowsdla.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 2, 2024 06:41:01.320616961 CEST1.1.1.1192.168.2.40xc173Name error (3)falseaudiencekd.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 2, 2024 06:41:01.336265087 CEST1.1.1.1192.168.2.40xbbb8Name error (3)raiseboltskdlwpow.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 2, 2024 06:41:01.347536087 CEST1.1.1.1192.168.2.40xab75Name error (3)justifycanddidatewd.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 2, 2024 06:41:01.364279985 CEST1.1.1.1192.168.2.40x65c2Name error (3)strwawrunnygjwu.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 2, 2024 06:41:01.375494957 CEST1.1.1.1192.168.2.40xcc5dName error (3)richardflorespoew.shopnonenoneA (IP address)IN (0x0001)false

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:00:40:59
                      Start date:02/07/2024
                      Path:C:\Users\user\Desktop\1Gvue8ItW8.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\1Gvue8ItW8.exe"
                      Imagebase:0xb90000
                      File size:552'488 bytes
                      MD5 hash:FE70EB0688B5C73484C90D5AC6F0FC19
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:1
                      Start time:00:40:59
                      Start date:02/07/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Imagebase:0x6c0000
                      File size:65'440 bytes
                      MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:4
                      Start time:00:41:00
                      Start date:02/07/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7436 -s 268
                      Imagebase:0x420000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:3.3%
                        Dynamic/Decrypted Code Coverage:0.3%
                        Signature Coverage:4.1%
                        Total number of Nodes:2000
                        Total number of Limit Nodes:29
                        execution_graph 18887 bb00bd 18888 bb00f8 18887->18888 18889 bb00c6 18887->18889 18893 ba8fdb 18889->18893 18894 ba8fec 18893->18894 18895 ba8fe6 18893->18895 18915 ba8ff2 18894->18915 18946 baa67c 18894->18946 18941 baa63d 18895->18941 18903 ba901e 18905 baa67c __dosmaperr 6 API calls 18903->18905 18904 ba9033 18906 baa67c __dosmaperr 6 API calls 18904->18906 18907 ba902a 18905->18907 18908 ba903f 18906->18908 18958 ba9c4c 18907->18958 18909 ba9052 18908->18909 18910 ba9043 18908->18910 18964 ba8d4e 18909->18964 18913 baa67c __dosmaperr 6 API calls 18910->18913 18913->18907 18917 ba8ff7 18915->18917 18969 ba0d70 18915->18969 18916 ba9c4c ___free_lconv_mon 14 API calls 18916->18917 18918 bafec8 18917->18918 19410 bb001d 18918->19410 18923 baff0b 18923->18888 18926 baff32 19437 bb0118 18926->19437 18927 baff24 18928 ba9c4c ___free_lconv_mon 14 API calls 18927->18928 18928->18923 18931 baff6a 18932 ba0d5d __dosmaperr 14 API calls 18931->18932 18933 baff6f 18932->18933 18934 ba9c4c ___free_lconv_mon 14 API calls 18933->18934 18934->18923 18935 baff85 18937 ba9c4c ___free_lconv_mon 14 API calls 18935->18937 18939 baffb1 18935->18939 18936 ba9c4c ___free_lconv_mon 14 API calls 18936->18923 18937->18939 18940 bafffa 18939->18940 19448 bafb3a 18939->19448 18940->18936 18980 baa42c 18941->18980 18944 baa662 18944->18894 18945 baa674 TlsGetValue 18947 baa42c std::_Lockit::_Lockit 5 API calls 18946->18947 18948 baa698 18947->18948 18949 ba9006 18948->18949 18950 baa6b6 TlsSetValue 18948->18950 18949->18915 18951 ba9bef 18949->18951 18956 ba9bfc __dosmaperr 18951->18956 18952 ba9c3c 18998 ba0d5d 18952->18998 18953 ba9c27 RtlAllocateHeap 18955 ba9016 18953->18955 18953->18956 18955->18903 18955->18904 18956->18952 18956->18953 18995 ba856b 18956->18995 18959 ba9c57 RtlFreeHeap 18958->18959 18960 ba9c81 18958->18960 18959->18960 18961 ba9c6c GetLastError 18959->18961 18960->18915 18962 ba9c79 __dosmaperr 18961->18962 18963 ba0d5d __dosmaperr 12 API calls 18962->18963 18963->18960 19035 ba8be2 18964->19035 19177 ba9d54 18969->19177 18973 ba0d8a IsProcessorFeaturePresent 18977 ba0d96 18973->18977 18974 ba0da9 19213 ba6d46 18974->19213 18976 ba0d80 18976->18973 18976->18974 19207 ba0943 18977->19207 18981 baa45a 18980->18981 18984 baa456 18980->18984 18981->18984 18987 baa361 18981->18987 18984->18944 18984->18945 18985 baa474 GetProcAddress 18985->18984 18986 baa484 std::_Lockit::_Lockit 18985->18986 18986->18984 18989 baa372 ___vcrt_FlsFree 18987->18989 18988 baa408 18988->18984 18988->18985 18989->18988 18990 baa390 LoadLibraryExW 18989->18990 18994 baa3de LoadLibraryExW 18989->18994 18991 baa3ab GetLastError 18990->18991 18992 baa40f 18990->18992 18991->18989 18992->18988 18993 baa421 FreeLibrary 18992->18993 18993->18988 18994->18989 18994->18992 19001 ba8598 18995->19001 19012 ba9071 GetLastError 18998->19012 19000 ba0d62 19000->18955 19002 ba85a4 __FrameHandler3::FrameUnwindToState 19001->19002 19007 ba5359 EnterCriticalSection 19002->19007 19004 ba85af 19008 ba85eb 19004->19008 19007->19004 19011 ba53a1 LeaveCriticalSection 19008->19011 19010 ba8576 19010->18956 19011->19010 19013 ba9087 19012->19013 19016 ba908d 19012->19016 19015 baa63d __dosmaperr 6 API calls 19013->19015 19014 baa67c __dosmaperr 6 API calls 19017 ba90a9 19014->19017 19015->19016 19016->19014 19032 ba9091 SetLastError 19016->19032 19019 ba9bef __dosmaperr 12 API calls 19017->19019 19017->19032 19020 ba90be 19019->19020 19021 ba90c6 19020->19021 19022 ba90d7 19020->19022 19023 baa67c __dosmaperr 6 API calls 19021->19023 19024 baa67c __dosmaperr 6 API calls 19022->19024 19025 ba90d4 19023->19025 19026 ba90e3 19024->19026 19029 ba9c4c ___free_lconv_mon 12 API calls 19025->19029 19027 ba90fe 19026->19027 19028 ba90e7 19026->19028 19030 ba8d4e __dosmaperr 12 API calls 19027->19030 19031 baa67c __dosmaperr 6 API calls 19028->19031 19029->19032 19033 ba9109 19030->19033 19031->19025 19032->19000 19034 ba9c4c ___free_lconv_mon 12 API calls 19033->19034 19034->19032 19036 ba8bee __FrameHandler3::FrameUnwindToState 19035->19036 19049 ba5359 EnterCriticalSection 19036->19049 19038 ba8bf8 19050 ba8c28 19038->19050 19041 ba8cf4 19042 ba8d00 __FrameHandler3::FrameUnwindToState 19041->19042 19054 ba5359 EnterCriticalSection 19042->19054 19044 ba8d0a 19055 ba8ed5 19044->19055 19046 ba8d22 19059 ba8d42 19046->19059 19049->19038 19053 ba53a1 LeaveCriticalSection 19050->19053 19052 ba8c16 19052->19041 19053->19052 19054->19044 19056 ba8f0b __Getctype 19055->19056 19057 ba8ee4 __Getctype 19055->19057 19056->19046 19057->19056 19062 bb17d6 19057->19062 19176 ba53a1 LeaveCriticalSection 19059->19176 19061 ba8d30 19061->18916 19067 bb17ec 19062->19067 19086 bb1856 19062->19086 19064 ba9c4c ___free_lconv_mon 14 API calls 19066 bb1878 19064->19066 19065 bb181f 19068 bb1841 19065->19068 19073 ba9c4c ___free_lconv_mon 14 API calls 19065->19073 19069 ba9c4c ___free_lconv_mon 14 API calls 19066->19069 19067->19065 19071 ba9c4c ___free_lconv_mon 14 API calls 19067->19071 19067->19086 19070 ba9c4c ___free_lconv_mon 14 API calls 19068->19070 19072 bb188b 19069->19072 19075 bb184b 19070->19075 19077 bb1814 19071->19077 19074 ba9c4c ___free_lconv_mon 14 API calls 19072->19074 19079 bb1836 19073->19079 19080 bb1899 19074->19080 19081 ba9c4c ___free_lconv_mon 14 API calls 19075->19081 19076 bb1912 19082 ba9c4c ___free_lconv_mon 14 API calls 19076->19082 19090 bb0a8c 19077->19090 19078 bb18b2 19078->19076 19089 ba9c4c 14 API calls ___free_lconv_mon 19078->19089 19118 bb0f40 19079->19118 19085 ba9c4c ___free_lconv_mon 14 API calls 19080->19085 19081->19086 19087 bb1918 19082->19087 19088 bb18a4 19085->19088 19086->19064 19086->19088 19087->19056 19130 bb1947 19088->19130 19089->19078 19091 bb0a9d 19090->19091 19117 bb0b86 19090->19117 19092 bb0aae 19091->19092 19094 ba9c4c ___free_lconv_mon 14 API calls 19091->19094 19093 bb0ac0 19092->19093 19095 ba9c4c ___free_lconv_mon 14 API calls 19092->19095 19096 bb0ad2 19093->19096 19097 ba9c4c ___free_lconv_mon 14 API calls 19093->19097 19094->19092 19095->19093 19098 bb0ae4 19096->19098 19099 ba9c4c ___free_lconv_mon 14 API calls 19096->19099 19097->19096 19100 bb0af6 19098->19100 19102 ba9c4c ___free_lconv_mon 14 API calls 19098->19102 19099->19098 19102->19100 19117->19065 19119 bb0f4d 19118->19119 19129 bb0fa5 19118->19129 19120 bb0f5d 19119->19120 19121 ba9c4c ___free_lconv_mon 14 API calls 19119->19121 19122 bb0f6f 19120->19122 19123 ba9c4c ___free_lconv_mon 14 API calls 19120->19123 19121->19120 19124 ba9c4c ___free_lconv_mon 14 API calls 19122->19124 19125 bb0f81 19122->19125 19123->19122 19124->19125 19126 ba9c4c ___free_lconv_mon 14 API calls 19125->19126 19127 bb0f93 19125->19127 19126->19127 19127->19129 19129->19068 19131 bb1954 19130->19131 19135 bb1973 19130->19135 19131->19135 19136 bb145b 19131->19136 19134 ba9c4c ___free_lconv_mon 14 API calls 19134->19135 19135->19078 19137 bb1539 19136->19137 19138 bb146c 19136->19138 19137->19134 19172 bb11ba 19138->19172 19141 bb11ba __Getctype 14 API calls 19142 bb147f 19141->19142 19173 bb11cc 19172->19173 19174 bb11db 19173->19174 19175 ba9c4c ___free_lconv_mon 14 API calls 19173->19175 19174->19141 19175->19173 19176->19061 19216 ba9c86 19177->19216 19180 ba9d99 19181 ba9da5 __FrameHandler3::FrameUnwindToState 19180->19181 19182 ba9071 __dosmaperr 14 API calls 19181->19182 19184 ba9dcc __CreateFrameInfo 19181->19184 19187 ba9dd2 __CreateFrameInfo 19181->19187 19182->19184 19183 ba9e19 19185 ba0d5d __dosmaperr 14 API calls 19183->19185 19184->19183 19184->19187 19189 ba9e03 19184->19189 19186 ba9e1e 19185->19186 19227 ba0b3f 19186->19227 19191 ba9e45 19187->19191 19230 ba5359 EnterCriticalSection 19187->19230 19189->18976 19193 ba9f78 19191->19193 19194 ba9e87 19191->19194 19204 ba9eb6 19191->19204 19195 ba9f83 19193->19195 19262 ba53a1 LeaveCriticalSection 19193->19262 19194->19204 19231 ba8f20 GetLastError 19194->19231 19198 ba6d46 __CreateFrameInfo 23 API calls 19195->19198 19200 ba9f8b 19198->19200 19202 ba8f20 _unexpected 41 API calls 19205 ba9f0b 19202->19205 19203 ba8f20 _unexpected 41 API calls 19203->19204 19258 ba9f25 19204->19258 19205->19189 19206 ba8f20 _unexpected 41 API calls 19205->19206 19206->19189 19208 ba095f __fread_nolock __CreateFrameInfo 19207->19208 19209 ba098b IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 19208->19209 19211 ba0a5c __CreateFrameInfo 19209->19211 19327 b9c539 19211->19327 19212 ba0a7a 19212->18974 19335 ba6b6a 19213->19335 19217 ba9c92 __FrameHandler3::FrameUnwindToState 19216->19217 19222 ba5359 EnterCriticalSection 19217->19222 19219 ba9ca0 19223 ba9cde 19219->19223 19222->19219 19226 ba53a1 LeaveCriticalSection 19223->19226 19225 ba0d75 19225->18976 19225->19180 19226->19225 19263 ba0a8b 19227->19263 19230->19191 19232 ba8f36 19231->19232 19236 ba8f3c 19231->19236 19234 baa63d __dosmaperr 6 API calls 19232->19234 19233 baa67c __dosmaperr 6 API calls 19235 ba8f58 19233->19235 19234->19236 19238 ba9bef __dosmaperr 14 API calls 19235->19238 19255 ba8f40 SetLastError 19235->19255 19236->19233 19236->19255 19239 ba8f6d 19238->19239 19242 ba8f86 19239->19242 19243 ba8f75 19239->19243 19240 ba8fd0 19240->19203 19241 ba8fd5 19244 ba0d70 __purecall 39 API calls 19241->19244 19246 baa67c __dosmaperr 6 API calls 19242->19246 19245 baa67c __dosmaperr 6 API calls 19243->19245 19247 ba8fda 19244->19247 19248 ba8f83 19245->19248 19249 ba8f92 19246->19249 19252 ba9c4c ___free_lconv_mon 14 API calls 19248->19252 19250 ba8fad 19249->19250 19251 ba8f96 19249->19251 19253 ba8d4e __dosmaperr 14 API calls 19250->19253 19254 baa67c __dosmaperr 6 API calls 19251->19254 19252->19255 19256 ba8fb8 19253->19256 19254->19248 19255->19240 19255->19241 19257 ba9c4c ___free_lconv_mon 14 API calls 19256->19257 19257->19255 19259 ba9f2b 19258->19259 19260 ba9efc 19258->19260 19326 ba53a1 LeaveCriticalSection 19259->19326 19260->19189 19260->19202 19260->19205 19262->19195 19264 ba0a9d __fread_nolock 19263->19264 19269 ba0ac2 19264->19269 19266 ba0ab5 19280 ba087b 19266->19280 19270 ba0ad2 19269->19270 19272 ba0ad9 19269->19272 19286 ba08e0 GetLastError 19270->19286 19276 ba0ae7 19272->19276 19290 ba08b7 19272->19290 19274 ba0b0e 19274->19276 19293 ba0b6c IsProcessorFeaturePresent 19274->19293 19276->19266 19277 ba0b3e 19278 ba0a8b __fread_nolock 41 API calls 19277->19278 19279 ba0b4b 19278->19279 19279->19266 19281 ba0887 19280->19281 19282 ba089e 19281->19282 19319 ba0926 19281->19319 19284 ba0926 __fread_nolock 41 API calls 19282->19284 19285 ba08b1 19282->19285 19284->19285 19285->19189 19287 ba08f9 19286->19287 19297 ba9122 19287->19297 19291 ba08db 19290->19291 19292 ba08c2 GetLastError SetLastError 19290->19292 19291->19274 19292->19274 19294 ba0b78 19293->19294 19295 ba0943 __CreateFrameInfo 8 API calls 19294->19295 19296 ba0b8d GetCurrentProcess TerminateProcess 19295->19296 19296->19277 19298 ba913b 19297->19298 19299 ba9135 19297->19299 19301 baa67c __dosmaperr 6 API calls 19298->19301 19303 ba0911 SetLastError 19298->19303 19300 baa63d __dosmaperr 6 API calls 19299->19300 19300->19298 19302 ba9155 19301->19302 19302->19303 19304 ba9bef __dosmaperr 14 API calls 19302->19304 19303->19272 19305 ba9165 19304->19305 19306 ba916d 19305->19306 19307 ba9182 19305->19307 19308 baa67c __dosmaperr 6 API calls 19306->19308 19309 baa67c __dosmaperr 6 API calls 19307->19309 19310 ba9179 19308->19310 19311 ba918e 19309->19311 19314 ba9c4c ___free_lconv_mon 14 API calls 19310->19314 19312 ba9192 19311->19312 19313 ba91a1 19311->19313 19315 baa67c __dosmaperr 6 API calls 19312->19315 19316 ba8d4e __dosmaperr 14 API calls 19313->19316 19314->19303 19315->19310 19317 ba91ac 19316->19317 19318 ba9c4c ___free_lconv_mon 14 API calls 19317->19318 19318->19303 19320 ba0939 19319->19320 19321 ba0930 19319->19321 19320->19282 19322 ba08e0 __fread_nolock 16 API calls 19321->19322 19323 ba0935 19322->19323 19323->19320 19324 ba0d70 __purecall 41 API calls 19323->19324 19325 ba0942 19324->19325 19326->19260 19328 b9c541 19327->19328 19329 b9c542 IsProcessorFeaturePresent 19327->19329 19328->19212 19331 b9cd30 19329->19331 19334 b9ccf3 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 19331->19334 19333 b9ce13 19333->19212 19334->19333 19336 ba6b97 19335->19336 19344 ba6ba8 19335->19344 19346 ba6c32 GetModuleHandleW 19336->19346 19341 ba0db3 19353 ba6a32 19344->19353 19347 ba6b9c 19346->19347 19347->19344 19348 ba6c97 GetModuleHandleExW 19347->19348 19349 ba6cd6 GetProcAddress 19348->19349 19352 ba6cea 19348->19352 19349->19352 19350 ba6cfd FreeLibrary 19351 ba6d06 19350->19351 19351->19344 19352->19350 19352->19351 19354 ba6a3e __FrameHandler3::FrameUnwindToState 19353->19354 19368 ba5359 EnterCriticalSection 19354->19368 19356 ba6a48 19369 ba6a7f 19356->19369 19358 ba6a55 19373 ba6a73 19358->19373 19361 ba6c01 19398 ba6c75 19361->19398 19364 ba6c1f 19366 ba6c97 __CreateFrameInfo 3 API calls 19364->19366 19365 ba6c0f GetCurrentProcess TerminateProcess 19365->19364 19367 ba6c27 ExitProcess 19366->19367 19368->19356 19370 ba6a8b __FrameHandler3::FrameUnwindToState 19369->19370 19371 ba6af2 __CreateFrameInfo 19370->19371 19376 ba889c 19370->19376 19371->19358 19397 ba53a1 LeaveCriticalSection 19373->19397 19375 ba6a61 19375->19341 19375->19361 19377 ba88a8 __EH_prolog3 19376->19377 19380 ba85f4 19377->19380 19379 ba88cf Concurrency::details::_ContextCallback::_CallInContext 19379->19371 19381 ba8600 __FrameHandler3::FrameUnwindToState 19380->19381 19388 ba5359 EnterCriticalSection 19381->19388 19383 ba860e 19389 ba87ac 19383->19389 19388->19383 19390 ba87cb 19389->19390 19391 ba861b 19389->19391 19390->19391 19392 ba9c4c ___free_lconv_mon 14 API calls 19390->19392 19393 ba8643 19391->19393 19392->19391 19396 ba53a1 LeaveCriticalSection 19393->19396 19395 ba862c 19395->19379 19396->19395 19397->19375 19403 badfc5 GetPEB 19398->19403 19401 ba6c7f GetPEB 19402 ba6c0b 19401->19402 19402->19364 19402->19365 19404 badfdf 19403->19404 19406 ba6c7a 19403->19406 19407 baa4af 19404->19407 19406->19401 19406->19402 19408 baa42c std::_Lockit::_Lockit 5 API calls 19407->19408 19409 baa4cb 19408->19409 19409->19406 19411 bb0029 __FrameHandler3::FrameUnwindToState 19410->19411 19417 bb0043 19411->19417 19456 ba5359 EnterCriticalSection 19411->19456 19413 bb0053 19419 ba9c4c ___free_lconv_mon 14 API calls 19413->19419 19420 bb007f 19413->19420 19414 bafef2 19421 bafc48 19414->19421 19416 ba0d70 __purecall 41 API calls 19418 bb00bc 19416->19418 19417->19414 19417->19416 19419->19420 19457 bb009c 19420->19457 19461 ba17fd 19421->19461 19424 bafc7b 19426 bafc80 GetACP 19424->19426 19427 bafc92 19424->19427 19425 bafc69 GetOEMCP 19425->19427 19426->19427 19427->18923 19428 bad17b 19427->19428 19429 bad1b9 19428->19429 19430 bad189 19428->19430 19432 ba0d5d __dosmaperr 14 API calls 19429->19432 19431 bad1a4 HeapAlloc 19430->19431 19435 bad18d __dosmaperr 19430->19435 19433 bad1b7 19431->19433 19431->19435 19434 bad1be 19432->19434 19433->19434 19434->18926 19434->18927 19435->19429 19435->19431 19436 ba856b std::_Facet_Register 2 API calls 19435->19436 19436->19435 19438 bafc48 43 API calls 19437->19438 19439 bb0138 19438->19439 19441 bb0175 IsValidCodePage 19439->19441 19445 bb01b1 __fread_nolock 19439->19445 19440 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 19442 baff5f 19440->19442 19443 bb0187 19441->19443 19441->19445 19442->18931 19442->18935 19444 bb01b6 GetCPInfo 19443->19444 19447 bb0190 __fread_nolock 19443->19447 19444->19445 19444->19447 19445->19440 19504 bafd1c 19447->19504 19449 bafb46 __FrameHandler3::FrameUnwindToState 19448->19449 19594 ba5359 EnterCriticalSection 19449->19594 19451 bafb50 19595 bafb87 19451->19595 19456->19413 19460 ba53a1 LeaveCriticalSection 19457->19460 19459 bb00a3 19459->19417 19460->19459 19462 ba181b 19461->19462 19468 ba1814 19461->19468 19463 ba8f20 _unexpected 41 API calls 19462->19463 19462->19468 19464 ba183c 19463->19464 19469 baa0c2 19464->19469 19468->19424 19468->19425 19470 ba1852 19469->19470 19471 baa0d5 19469->19471 19473 baa120 19470->19473 19471->19470 19477 bb1a22 19471->19477 19474 baa133 19473->19474 19476 baa148 19473->19476 19474->19476 19499 bb0105 19474->19499 19476->19468 19478 bb1a2e __FrameHandler3::FrameUnwindToState 19477->19478 19479 ba8f20 _unexpected 41 API calls 19478->19479 19480 bb1a37 19479->19480 19487 bb1a7d 19480->19487 19490 ba5359 EnterCriticalSection 19480->19490 19482 bb1a55 19491 bb1aa3 19482->19491 19487->19470 19488 ba0d70 __purecall 41 API calls 19489 bb1aa2 19488->19489 19490->19482 19492 bb1ab1 __Getctype 19491->19492 19494 bb1a66 19491->19494 19493 bb17d6 __Getctype 14 API calls 19492->19493 19492->19494 19493->19494 19495 bb1a82 19494->19495 19498 ba53a1 LeaveCriticalSection 19495->19498 19497 bb1a79 19497->19487 19497->19488 19498->19497 19500 ba8f20 _unexpected 41 API calls 19499->19500 19501 bb010a 19500->19501 19502 bb001d std::_Locinfo::_Locinfo_dtor 41 API calls 19501->19502 19503 bb0115 19502->19503 19503->19476 19505 bafd44 GetCPInfo 19504->19505 19506 bafe0d 19504->19506 19505->19506 19512 bafd5c 19505->19512 19507 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 19506->19507 19510 bafec6 19507->19510 19510->19445 19515 baeb84 19512->19515 19516 ba17fd std::_Locinfo::_Locinfo_dtor 41 API calls 19515->19516 19517 baeba4 19516->19517 19535 baef91 19517->19535 19519 baec68 19522 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 19519->19522 19520 baec60 19538 b9bee7 19520->19538 19521 baebd1 19521->19519 19521->19520 19524 bad17b __fread_nolock 15 API calls 19521->19524 19526 baebf6 __fread_nolock __alloca_probe_16 19521->19526 19525 baec8b 19522->19525 19524->19526 19530 baee7b 19525->19530 19526->19520 19527 baef91 __fread_nolock MultiByteToWideChar 19526->19527 19528 baec41 19527->19528 19528->19520 19529 baec4c GetStringTypeW 19528->19529 19529->19520 19531 ba17fd std::_Locinfo::_Locinfo_dtor 41 API calls 19530->19531 19536 baefa2 MultiByteToWideChar 19535->19536 19536->19521 19539 b9bf02 19538->19539 19540 b9bef1 19538->19540 19539->19519 19540->19539 19542 ba0ca5 19540->19542 19543 ba9c4c ___free_lconv_mon 14 API calls 19542->19543 19594->19451 19605 ba1d08 19595->19605 19597 bafba9 19598 ba1d08 __fread_nolock 41 API calls 19597->19598 19600 bafbc8 19598->19600 19599 bafb5d 19602 bafb7b 19599->19602 19600->19599 19601 ba9c4c ___free_lconv_mon 14 API calls 19600->19601 19601->19599 19619 ba53a1 LeaveCriticalSection 19602->19619 19606 ba1d19 19605->19606 19610 ba1d15 _Yarn 19605->19610 19607 ba1d20 19606->19607 19611 ba1d33 __fread_nolock 19606->19611 19608 ba0d5d __dosmaperr 14 API calls 19607->19608 19609 ba1d25 19608->19609 19612 ba0b3f __fread_nolock 41 API calls 19609->19612 19610->19597 19611->19610 19613 ba1d61 19611->19613 19615 ba1d6a 19611->19615 19612->19610 19614 ba0d5d __dosmaperr 14 API calls 19613->19614 19616 ba1d66 19614->19616 19615->19610 19617 ba0d5d __dosmaperr 14 API calls 19615->19617 19618 ba0b3f __fread_nolock 41 API calls 19616->19618 19617->19616 19618->19610 21238 b96caa 21239 b96cb4 21238->21239 21240 b96ccc 21239->21240 21248 b971c0 21239->21248 21244 b96ce3 21240->21244 21262 b96490 21240->21262 21246 b96490 106 API calls 21244->21246 21247 b96cef 21246->21247 21249 b971d8 21248->21249 21268 b9ab65 21249->21268 21251 b96cc1 21252 b94bf0 21251->21252 21253 b930b0 43 API calls 21252->21253 21254 b94c08 21253->21254 21255 b9c1f0 std::_Facet_Register 16 API calls 21254->21255 21257 b94c0f 21255->21257 21256 b94c5d 21259 b94cd6 std::ios_base::_Ios_base_dtor 21256->21259 21260 ba0b4f std::_Throw_Cpp_error 41 API calls 21256->21260 21257->21256 21258 b930b0 43 API calls 21257->21258 21258->21256 21259->21240 21261 b94cf0 21260->21261 21263 b96498 21262->21263 21314 b99150 21263->21314 21265 b964ba 21267 b95320 104 API calls 21265->21267 21266 b964cc 21266->21244 21267->21266 21276 b9dc68 21268->21276 21270 b9abeb 21271 ba53cf _Yarn 15 API calls 21270->21271 21275 b9abe7 shared_ptr 21271->21275 21273 b9abde 21279 b9a638 21273->21279 21275->21251 21282 b9f52c 21276->21282 21278 b9ab8f 21278->21270 21278->21273 21278->21275 21280 ba53cf _Yarn 15 API calls 21279->21280 21281 b9a681 shared_ptr 21280->21281 21281->21275 21295 b9f53a 21282->21295 21284 b9f531 21284->21278 21285 ba9d54 __CreateFrameInfo 2 API calls 21284->21285 21286 ba0d75 21285->21286 21287 ba0d80 21286->21287 21288 ba9d99 __CreateFrameInfo 41 API calls 21286->21288 21289 ba0d8a IsProcessorFeaturePresent 21287->21289 21294 ba0da9 21287->21294 21288->21287 21291 ba0d96 21289->21291 21290 ba6d46 __CreateFrameInfo 23 API calls 21292 ba0db3 21290->21292 21293 ba0943 __CreateFrameInfo 8 API calls 21291->21293 21293->21294 21294->21290 21296 b9f543 21295->21296 21297 b9f546 GetLastError 21295->21297 21296->21284 21309 ba06f3 21297->21309 21300 b9f5c0 SetLastError 21300->21284 21301 ba072e ___vcrt_FlsSetValue 6 API calls 21302 b9f574 __Getctype 21301->21302 21303 b9f59c 21302->21303 21305 ba072e ___vcrt_FlsSetValue 6 API calls 21302->21305 21308 b9f57a 21302->21308 21304 ba072e ___vcrt_FlsSetValue 6 API calls 21303->21304 21306 b9f5b0 21303->21306 21304->21306 21305->21303 21307 ba0ca5 ___vcrt_freefls@4 14 API calls 21306->21307 21307->21308 21308->21300 21310 ba0592 ___vcrt_FlsFree 5 API calls 21309->21310 21311 ba070d 21310->21311 21312 b9f55b 21311->21312 21313 ba0725 TlsGetValue 21311->21313 21312->21300 21312->21301 21312->21308 21313->21312 21323 b9ac50 21314->21323 21318 b991a2 21319 b991bc 21318->21319 21322 b991d0 21318->21322 21353 ba2cc0 21318->21353 21319->21322 21359 ba2521 21319->21359 21322->21265 21324 b9ac6b __InternalCxxFrameHandler 21323->21324 21325 b9ac81 21323->21325 21328 b9cfc0 std::_Throw_Cpp_error RaiseException 21324->21328 21326 b9acf2 RaiseException 21325->21326 21330 b9ad14 21325->21330 21333 b9acd2 __alloca_probe_16 21325->21333 21327 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 21326->21327 21329 b9915a 21327->21329 21328->21325 21329->21322 21334 b953a0 21329->21334 21331 ba0d70 __purecall 41 API calls 21330->21331 21332 b9ad19 21331->21332 21333->21326 21335 b953bb 21334->21335 21336 b95460 21334->21336 21335->21336 21342 b953c5 21335->21342 21337 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 21336->21337 21338 b9546e 21337->21338 21338->21318 21339 b9544d 21340 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 21339->21340 21341 b9545c 21340->21341 21341->21318 21342->21339 21343 b95412 21342->21343 21344 b953f7 21342->21344 21346 b95435 21343->21346 21348 ba2fc2 69 API calls 21343->21348 21344->21339 21345 b953fc 21344->21345 21347 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 21345->21347 21349 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 21346->21349 21350 b9540e 21347->21350 21351 b9542e 21348->21351 21352 b95449 21349->21352 21350->21318 21351->21339 21351->21346 21352->21318 21354 ba2cd3 __fread_nolock 21353->21354 21373 ba2a5f 21354->21373 21357 ba087b __fread_nolock 41 API calls 21358 ba2cf5 21357->21358 21358->21319 21360 ba252c 21359->21360 21361 ba2541 21359->21361 21364 ba0d5d __dosmaperr 14 API calls 21360->21364 21362 ba2549 21361->21362 21363 ba255e 21361->21363 21365 ba0d5d __dosmaperr 14 API calls 21362->21365 21408 bac183 21363->21408 21367 ba2531 21364->21367 21368 ba254e 21365->21368 21369 ba0b3f __fread_nolock 41 API calls 21367->21369 21371 ba0b3f __fread_nolock 41 API calls 21368->21371 21370 ba253c 21369->21370 21370->21322 21372 ba2559 21371->21372 21372->21322 21375 ba2a6b __FrameHandler3::FrameUnwindToState 21373->21375 21374 ba2a71 21377 ba0ac2 __fread_nolock 41 API calls 21374->21377 21375->21374 21376 ba2aa5 21375->21376 21384 ba1ef3 EnterCriticalSection 21376->21384 21380 ba2a8c 21377->21380 21379 ba2ab1 21385 ba2bd4 21379->21385 21380->21357 21382 ba2ac8 21394 ba2af1 21382->21394 21384->21379 21386 ba2bfa 21385->21386 21387 ba2be7 21385->21387 21397 ba2afb 21386->21397 21387->21382 21389 ba2c1d 21390 ba22ad ___scrt_uninitialize_crt 66 API calls 21389->21390 21393 ba2cab 21389->21393 21391 ba2c4b 21390->21391 21392 bacfdc ___scrt_uninitialize_crt 43 API calls 21391->21392 21392->21393 21393->21382 21407 ba1f07 LeaveCriticalSection 21394->21407 21396 ba2af9 21396->21380 21398 ba2b64 21397->21398 21399 ba2b0c 21397->21399 21398->21389 21399->21398 21401 bacf9c 21399->21401 21402 bacfb0 __fread_nolock 21401->21402 21403 bacebb __fread_nolock 43 API calls 21402->21403 21404 bacfc5 21403->21404 21405 ba087b __fread_nolock 41 API calls 21404->21405 21406 bacfd4 21405->21406 21406->21398 21407->21396 21409 bac197 __fread_nolock 21408->21409 21414 babb97 21409->21414 21412 ba087b __fread_nolock 41 API calls 21413 bac1b1 21412->21413 21413->21372 21415 babba3 __FrameHandler3::FrameUnwindToState 21414->21415 21416 babbaa 21415->21416 21417 babbcd 21415->21417 21418 ba0ac2 __fread_nolock 41 API calls 21416->21418 21425 ba1ef3 EnterCriticalSection 21417->21425 21420 babbc3 21418->21420 21420->21412 21421 babbdb 21426 babc26 21421->21426 21423 babbea 21439 babc1c 21423->21439 21425->21421 21427 babc5d 21426->21427 21428 babc35 21426->21428 21430 baabf2 __fread_nolock 41 API calls 21427->21430 21429 ba0ac2 __fread_nolock 41 API calls 21428->21429 21438 babc50 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21429->21438 21431 babc66 21430->21431 21442 bacf7e 21431->21442 21434 babd10 21445 babf87 21434->21445 21436 babd27 21436->21438 21457 babdc7 21436->21457 21438->21423 21464 ba1f07 LeaveCriticalSection 21439->21464 21441 babc24 21441->21420 21443 bacd95 45 API calls 21442->21443 21444 babc84 21443->21444 21444->21434 21444->21436 21444->21438 21446 babf96 ___scrt_uninitialize_crt 21445->21446 21447 baabf2 __fread_nolock 41 API calls 21446->21447 21448 babfb2 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21447->21448 21451 bacf7e 45 API calls 21448->21451 21456 babfbe 21448->21456 21449 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 21450 bac130 21449->21450 21450->21438 21452 bac012 21451->21452 21453 bac044 ReadFile 21452->21453 21452->21456 21453->21456 21456->21449 21458 baabf2 __fread_nolock 41 API calls 21457->21458 21459 babdda 21458->21459 21460 bacf7e 45 API calls 21459->21460 21462 babe22 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21459->21462 21461 babe75 21460->21461 21461->21462 21463 bacf7e 45 API calls 21461->21463 21462->21438 21463->21462 21464->21441 21235 ba0ca5 21236 ba9c4c ___free_lconv_mon 14 API calls 21235->21236 21237 ba0cbd 21236->21237 21807 b944d0 21810 b93870 21807->21810 21809 b944d8 std::ios_base::_Ios_base_dtor 21811 b9387f 21810->21811 21813 b938ac std::ios_base::_Ios_base_dtor 21811->21813 21814 b970e0 21811->21814 21813->21809 21815 b970f0 21814->21815 21819 b97123 21814->21819 21816 b953a0 69 API calls 21815->21816 21817 b97114 21816->21817 21820 ba2040 21817->21820 21819->21813 21821 ba2053 __fread_nolock 21820->21821 21826 ba1f1b 21821->21826 21823 ba205f 21824 ba087b __fread_nolock 41 API calls 21823->21824 21825 ba206b 21824->21825 21825->21819 21827 ba1f27 __FrameHandler3::FrameUnwindToState 21826->21827 21828 ba1f31 21827->21828 21829 ba1f54 21827->21829 21830 ba0ac2 __fread_nolock 41 API calls 21828->21830 21831 ba1f4c 21829->21831 21837 ba1ef3 EnterCriticalSection 21829->21837 21830->21831 21831->21823 21833 ba1f72 21838 ba1fb2 21833->21838 21835 ba1f7f 21852 ba1faa 21835->21852 21837->21833 21839 ba1fbf 21838->21839 21840 ba1fe2 21838->21840 21841 ba0ac2 __fread_nolock 41 API calls 21839->21841 21842 ba1fda 21840->21842 21843 ba22ad ___scrt_uninitialize_crt 66 API calls 21840->21843 21841->21842 21842->21835 21844 ba1ffa 21843->21844 21855 baa9c0 21844->21855 21847 baabf2 __fread_nolock 41 API calls 21848 ba200e 21847->21848 21859 baacaa 21848->21859 21851 ba9c4c ___free_lconv_mon 14 API calls 21851->21842 21901 ba1f07 LeaveCriticalSection 21852->21901 21854 ba1fb0 21854->21831 21856 ba2002 21855->21856 21857 baa9d7 21855->21857 21856->21847 21857->21856 21858 ba9c4c ___free_lconv_mon 14 API calls 21857->21858 21858->21856 21860 baacd3 21859->21860 21865 ba2015 21859->21865 21861 baad22 21860->21861 21863 baacfa 21860->21863 21862 ba0ac2 __fread_nolock 41 API calls 21861->21862 21862->21865 21866 baac19 21863->21866 21865->21842 21865->21851 21867 baac25 __FrameHandler3::FrameUnwindToState 21866->21867 21874 bb0935 EnterCriticalSection 21867->21874 21869 baac33 21870 baac64 21869->21870 21875 baad4d 21869->21875 21888 baac9e 21870->21888 21874->21869 21876 bb0a0c __fread_nolock 41 API calls 21875->21876 21878 baad5d 21876->21878 21877 baad63 21891 bb097b 21877->21891 21878->21877 21879 baad95 21878->21879 21881 bb0a0c __fread_nolock 41 API calls 21878->21881 21879->21877 21882 bb0a0c __fread_nolock 41 API calls 21879->21882 21883 baad8c 21881->21883 21884 baada1 CloseHandle 21882->21884 21885 bb0a0c __fread_nolock 41 API calls 21883->21885 21884->21877 21886 baadad GetLastError 21884->21886 21885->21879 21886->21877 21887 baadbb __fread_nolock 21887->21870 21900 bb0958 LeaveCriticalSection 21888->21900 21890 baac87 21890->21865 21892 bb098a 21891->21892 21893 bb09f1 21891->21893 21892->21893 21899 bb09b4 21892->21899 21894 ba0d5d __dosmaperr 14 API calls 21893->21894 21895 bb09f6 21894->21895 21896 ba0d4a __dosmaperr 14 API calls 21895->21896 21897 bb09e1 21896->21897 21897->21887 21898 bb09db SetStdHandle 21898->21897 21899->21897 21899->21898 21900->21890 21901->21854 19620 b964c0 19623 b95320 19620->19623 19621 b964cc 19624 b9532b 19623->19624 19625 b95330 Concurrency::details::_ContextCallback::_CallInContext 19623->19625 19629 b98e80 CreateThread WaitForSingleObject CloseHandle 19624->19629 19625->19621 19630 b9cfc0 19625->19630 19627 b9a1c8 19629->19625 19633 b99470 19629->19633 19631 b9d007 RaiseException 19630->19631 19632 b9cfda 19630->19632 19631->19627 19632->19631 19655 b91900 19633->19655 19635 b9949e 19669 b9c1f0 19635->19669 19637 b994da 19677 b93e40 19637->19677 19656 b91910 19655->19656 19657 b91933 19655->19657 19659 b9194a 19656->19659 19660 b91917 19656->19660 19658 b91944 19657->19658 19661 b9c1f0 std::_Facet_Register 16 API calls 19657->19661 19658->19635 19732 b96a90 19659->19732 19663 b9c1f0 std::_Facet_Register 16 API calls 19660->19663 19664 b9193d 19661->19664 19665 b9191d 19663->19665 19664->19635 19666 ba0b4f std::_Throw_Cpp_error 41 API calls 19665->19666 19667 b91926 19665->19667 19668 b91954 19666->19668 19667->19635 19672 b9c1f5 19669->19672 19671 b9c20f 19671->19637 19672->19671 19673 ba856b std::_Facet_Register 2 API calls 19672->19673 19674 b9c211 std::_Facet_Register 19672->19674 19736 ba53cf 19672->19736 19673->19672 19675 b9cfc0 std::_Throw_Cpp_error RaiseException 19674->19675 19676 b9cce1 19675->19676 19745 b93710 19677->19745 19679 b93e7e 19680 b93ea7 19679->19680 19750 b92490 19679->19750 19682 b93f93 19680->19682 19684 b93f58 19680->19684 19781 b934b0 19682->19781 19683 b93f6b 19690 b920c0 19683->19690 19684->19683 19777 b960f0 19684->19777 19691 b920e0 19690->19691 20064 b922d0 19691->20064 19695 b920ea 20093 b98fd0 19695->20093 19696 b983a0 43 API calls 19697 b92125 VirtualAlloc 19696->19697 19698 b973c0 19697->19698 19699 b9c1f0 std::_Facet_Register 16 API calls 19698->19699 19700 b973df std::ios_base::_Ios_base_dtor 19699->19700 19702 b975c3 19700->19702 19703 b974a3 19700->19703 20161 b919f0 19700->20161 19733 b96a9b std::_Facet_Register 19732->19733 19734 b9cfc0 std::_Throw_Cpp_error RaiseException 19733->19734 19735 b96aaa 19734->19735 19737 bad17b 19736->19737 19738 bad1b9 19737->19738 19739 bad1a4 HeapAlloc 19737->19739 19743 bad18d __dosmaperr 19737->19743 19740 ba0d5d __dosmaperr 14 API calls 19738->19740 19741 bad1b7 19739->19741 19739->19743 19742 bad1be 19740->19742 19741->19742 19742->19672 19743->19738 19743->19739 19744 ba856b std::_Facet_Register 2 API calls 19743->19744 19744->19743 19746 b93727 19745->19746 19747 b9373b 19746->19747 19795 b983a0 19746->19795 19747->19679 19807 b9a01b 19750->19807 19753 b9a01b std::_Lockit::_Lockit 7 API calls 19755 b924c4 19753->19755 19754 b925ed 19756 b9a073 std::_Lockit::~_Lockit 2 API calls 19754->19756 19813 b9a073 19755->19813 19757 b92606 19756->19757 19757->19680 19758 b924e5 19758->19754 19760 b9254a 19758->19760 19761 b92535 19758->19761 19763 b9c1f0 std::_Facet_Register 16 API calls 19760->19763 19762 b9a073 std::_Lockit::~_Lockit 2 API calls 19761->19762 19764 b92540 19762->19764 19766 b92551 19763->19766 19764->19680 19765 b925c4 19767 b925e7 19765->19767 19829 b939f0 19765->19829 19766->19765 19769 b9a01b std::_Lockit::_Lockit 7 API calls 19766->19769 19844 b9b1e4 19767->19844 19771 b92581 19769->19771 19772 b925b9 19771->19772 19773 b92610 19771->19773 19820 b9b314 19772->19820 19847 b9a209 19773->19847 19778 b96153 19777->19778 19779 b9612e 19777->19779 19778->19683 19779->19778 20008 b993d0 19779->20008 19782 b934f0 19781->19782 19782->19782 20020 b91960 19782->20020 19796 b983e1 19795->19796 19800 b93757 19795->19800 19797 b93710 43 API calls 19796->19797 19799 b983ea 19797->19799 19798 b98462 19798->19800 19801 b960f0 43 API calls 19798->19801 19799->19798 19802 b9849c 19799->19802 19800->19679 19801->19800 19803 b934b0 43 API calls 19802->19803 19804 b984ce 19803->19804 19805 b9cfc0 std::_Throw_Cpp_error RaiseException 19804->19805 19806 b984dc 19805->19806 19808 b9a02a 19807->19808 19809 b9a031 19807->19809 19852 ba53b8 19808->19852 19811 b924a7 19809->19811 19857 b9bbea EnterCriticalSection 19809->19857 19811->19753 19811->19758 19814 b9a07d 19813->19814 19815 ba53c6 19813->19815 19816 b9a090 19814->19816 19906 b9bbf8 LeaveCriticalSection 19814->19906 19907 ba53a1 LeaveCriticalSection 19815->19907 19816->19758 19819 ba53cd 19819->19758 19908 ba562f 19820->19908 19984 b9b35f 19829->19984 19832 b93a09 19834 b93a20 19832->19834 19835 ba0ca5 ___vcrt_freefls@4 14 API calls 19832->19835 19833 ba0ca5 ___vcrt_freefls@4 14 API calls 19833->19832 19836 b93a37 19834->19836 19837 ba0ca5 ___vcrt_freefls@4 14 API calls 19834->19837 19835->19834 19838 b93a4e 19836->19838 19839 ba0ca5 ___vcrt_freefls@4 14 API calls 19836->19839 19837->19836 19840 ba0ca5 ___vcrt_freefls@4 14 API calls 19838->19840 19841 b93a65 19838->19841 19839->19838 19840->19841 19842 ba0ca5 ___vcrt_freefls@4 14 API calls 19841->19842 19843 b93a7c 19841->19843 19842->19843 19845 b9c1f0 std::_Facet_Register 16 API calls 19844->19845 19846 b9b1ef 19845->19846 19846->19754 19988 b936d0 19847->19988 19850 b9cfc0 std::_Throw_Cpp_error RaiseException 19851 b9261a 19850->19851 19858 baa894 19852->19858 19857->19811 19879 baa243 19858->19879 19880 baa42c std::_Lockit::_Lockit 5 API calls 19879->19880 19881 baa259 19880->19881 19882 baa25d 19881->19882 19883 baa42c std::_Lockit::_Lockit 5 API calls 19882->19883 19884 baa273 19883->19884 19885 baa277 19884->19885 19886 baa42c std::_Lockit::_Lockit 5 API calls 19885->19886 19887 baa28d 19886->19887 19888 baa291 19887->19888 19889 baa42c std::_Lockit::_Lockit 5 API calls 19888->19889 19890 baa2a7 19889->19890 19891 baa2ab 19890->19891 19892 baa42c std::_Lockit::_Lockit 5 API calls 19891->19892 19893 baa2c1 19892->19893 19894 baa2c5 19893->19894 19895 baa42c std::_Lockit::_Lockit 5 API calls 19894->19895 19896 baa2db 19895->19896 19897 baa2df 19896->19897 19906->19816 19907->19819 19909 baa894 std::_Lockit::_Lockit 5 API calls 19908->19909 19910 ba563c 19909->19910 19919 ba53da 19910->19919 19920 ba53e6 __FrameHandler3::FrameUnwindToState 19919->19920 19927 ba5359 EnterCriticalSection 19920->19927 19922 ba53f4 19928 ba5435 19922->19928 19927->19922 19953 ba5594 19928->19953 19954 ba55ae 19953->19954 19955 ba55a0 19953->19955 19957 bae4ed std::_Locinfo::_Locinfo_dtor 43 API calls 19954->19957 19956 ba783f std::_Locinfo::_Locinfo_dtor 66 API calls 19955->19956 19958 ba55aa 19956->19958 19959 ba55c5 19957->19959 19985 b9b36b 19984->19985 19986 b939f9 19984->19986 19987 ba562f std::_Locinfo::_Locinfo_dtor 69 API calls 19985->19987 19986->19832 19986->19833 19987->19986 19991 b9cf3e 19988->19991 19992 b9cf4b 19991->19992 19998 b936fe 19991->19998 19993 ba53cf _Yarn 15 API calls 19992->19993 19992->19998 19994 b9cf68 19993->19994 19995 b9cf78 19994->19995 19999 ba8ad2 19994->19999 19996 ba0ca5 ___vcrt_freefls@4 14 API calls 19995->19996 19996->19998 19998->19850 20000 ba8ae0 19999->20000 20001 ba8aee 19999->20001 20000->20001 20006 ba8b06 20000->20006 20002 ba0d5d __dosmaperr 14 API calls 20001->20002 20003 ba8af6 20002->20003 20004 ba0b3f __fread_nolock 41 API calls 20003->20004 20005 ba8b00 20004->20005 20005->19995 20006->20005 20007 ba0d5d __dosmaperr 14 API calls 20006->20007 20007->20003 20011 b97060 20008->20011 20012 b9707d 20011->20012 20013 b97074 20011->20013 20012->19778 20014 b9cfc0 std::_Throw_Cpp_error RaiseException 20013->20014 20015 b9708c 20013->20015 20014->20015 20016 b934b0 43 API calls 20015->20016 20017 b970c3 20016->20017 20018 b9cfc0 std::_Throw_Cpp_error RaiseException 20017->20018 20019 b970d2 20018->20019 20021 b919e9 20020->20021 20023 b96d00 20021->20023 20053 b9a1c9 20023->20053 20058 b9a109 20053->20058 20056 b9cfc0 std::_Throw_Cpp_error RaiseException 20057 b9a1e8 20056->20057 20061 b933f0 20058->20061 20062 b9cf3e std::bad_exception::bad_exception 42 API calls 20061->20062 20063 b9341e 20062->20063 20063->20056 20065 b9a01b std::_Lockit::_Lockit 7 API calls 20064->20065 20066 b922ea 20065->20066 20067 b9a01b std::_Lockit::_Lockit 7 API calls 20066->20067 20071 b92325 20066->20071 20068 b92304 20067->20068 20073 b9a073 std::_Lockit::~_Lockit 2 API calls 20068->20073 20069 b92454 20070 b9a073 std::_Lockit::~_Lockit 2 API calls 20069->20070 20072 b9246d 20070->20072 20071->20069 20074 b92372 20071->20074 20075 b92387 20071->20075 20072->19695 20073->20071 20076 b9a073 std::_Lockit::~_Lockit 2 API calls 20074->20076 20077 b9c1f0 std::_Facet_Register 16 API calls 20075->20077 20078 b9237d 20076->20078 20080 b9238e 20077->20080 20078->19695 20079 b9242a 20081 b9244e 20079->20081 20083 b939f0 69 API calls 20079->20083 20080->20079 20082 b9a01b std::_Lockit::_Lockit 7 API calls 20080->20082 20084 b9b1e4 std::_Facet_Register 16 API calls 20081->20084 20085 b923c2 20082->20085 20083->20081 20084->20069 20086 b92408 20085->20086 20087 b92477 20085->20087 20088 b9b314 std::_Locinfo::_Locinfo_ctor 70 API calls 20086->20088 20089 b9a209 43 API calls 20087->20089 20090 b92413 20088->20090 20091 b92481 20089->20091 20104 b9b429 20090->20104 20094 b93710 43 API calls 20093->20094 20095 b9900e 20094->20095 20096 b99098 20095->20096 20098 b990d3 20095->20098 20097 b9211e 20096->20097 20099 b960f0 43 API calls 20096->20099 20097->19696 20100 b934b0 43 API calls 20098->20100 20099->20097 20101 b99105 20100->20101 20102 b9cfc0 std::_Throw_Cpp_error RaiseException 20101->20102 20103 b99113 20102->20103 20116 ba57a4 20104->20116 20106 b9b432 __Getctype 20117 ba8f20 _unexpected 41 API calls 20116->20117 20118 ba57af 20117->20118 20119 baa0c2 __Getctype 41 API calls 20118->20119 20120 ba57bf 20119->20120 20120->20106 20238 b98c30 20239 b98c4b 20238->20239 20240 b98c60 20238->20240 20241 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20239->20241 20242 b98c9d 20240->20242 20245 b98c76 20240->20245 20244 b98c5a 20241->20244 20243 b98da5 20242->20243 20248 b98cf9 20242->20248 20249 b98ccc 20242->20249 20246 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20243->20246 20247 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20245->20247 20250 b98db6 20246->20250 20251 b98c97 20247->20251 20255 b98d60 20248->20255 20258 b98d2e 20248->20258 20268 ba26d6 20249->20268 20254 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20257 b98cf3 20254->20257 20256 b98d7f 20255->20256 20277 ba2fc2 20255->20277 20260 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20256->20260 20258->20243 20261 b98d33 20258->20261 20263 b98d9f 20260->20263 20274 b91ff0 20261->20274 20266 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20267 b98d5a 20266->20267 20269 ba26e9 __fread_nolock 20268->20269 20283 ba257c 20269->20283 20271 ba26f8 20272 ba087b __fread_nolock 41 API calls 20271->20272 20273 b98cd8 20272->20273 20273->20254 20275 ba26d6 43 API calls 20274->20275 20276 b91fff 20275->20276 20276->20266 20278 ba2fd5 __fread_nolock 20277->20278 20309 ba2da1 20278->20309 20280 ba2fea 20281 ba087b __fread_nolock 41 API calls 20280->20281 20282 b98d78 20281->20282 20282->20243 20282->20256 20284 ba2588 __FrameHandler3::FrameUnwindToState 20283->20284 20285 ba2591 20284->20285 20286 ba25b5 20284->20286 20288 ba0ac2 __fread_nolock 41 API calls 20285->20288 20297 ba1ef3 EnterCriticalSection 20286->20297 20296 ba25aa 20288->20296 20289 ba25be 20290 ba2669 20289->20290 20298 baabf2 20289->20298 20305 ba26a1 20290->20305 20293 ba2638 20295 ba0ac2 __fread_nolock 41 API calls 20293->20295 20294 ba25d7 20294->20290 20294->20293 20295->20296 20296->20271 20297->20289 20299 baabfe 20298->20299 20300 baac13 20298->20300 20301 ba0d5d __dosmaperr 14 API calls 20299->20301 20300->20294 20302 baac03 20301->20302 20303 ba0b3f __fread_nolock 41 API calls 20302->20303 20304 baac0e 20303->20304 20304->20294 20308 ba1f07 LeaveCriticalSection 20305->20308 20307 ba26a7 20307->20296 20308->20307 20310 ba2dd7 20309->20310 20311 ba2daf 20309->20311 20310->20280 20311->20310 20312 ba2dde 20311->20312 20313 ba2dbc 20311->20313 20317 ba2cfa 20312->20317 20314 ba0ac2 __fread_nolock 41 API calls 20313->20314 20314->20310 20318 ba2d06 __FrameHandler3::FrameUnwindToState 20317->20318 20325 ba1ef3 EnterCriticalSection 20318->20325 20320 ba2d14 20326 ba2d55 20320->20326 20325->20320 20336 bad035 20326->20336 20333 ba2d49 20488 ba1f07 LeaveCriticalSection 20333->20488 20335 ba2d32 20335->20280 20356 bacffa 20336->20356 20338 ba2d6d 20343 ba2e18 20338->20343 20339 bad046 20339->20338 20340 bad17b __fread_nolock 15 API calls 20339->20340 20341 bad0a0 20340->20341 20342 ba9c4c ___free_lconv_mon 14 API calls 20341->20342 20342->20338 20346 ba2e2a 20343->20346 20347 ba2d8b 20343->20347 20344 ba2e38 20345 ba0ac2 __fread_nolock 41 API calls 20344->20345 20345->20347 20346->20344 20346->20347 20350 ba2e6e _Yarn 20346->20350 20352 bad0e1 20347->20352 20349 baabf2 __fread_nolock 41 API calls 20349->20350 20350->20347 20350->20349 20371 ba22ad 20350->20371 20377 bab6f5 20350->20377 20353 bad0ec 20352->20353 20354 ba2d21 20352->20354 20353->20354 20355 ba22ad ___scrt_uninitialize_crt 66 API calls 20353->20355 20354->20333 20355->20354 20357 bad006 20356->20357 20358 baabf2 __fread_nolock 41 API calls 20357->20358 20361 bad027 20357->20361 20359 bad021 20358->20359 20362 bb3a4f 20359->20362 20361->20339 20363 bb3a69 20362->20363 20364 bb3a5c 20362->20364 20367 bb3a75 20363->20367 20368 ba0d5d __dosmaperr 14 API calls 20363->20368 20365 ba0d5d __dosmaperr 14 API calls 20364->20365 20366 bb3a61 20365->20366 20366->20361 20367->20361 20369 bb3a96 20368->20369 20370 ba0b3f __fread_nolock 41 API calls 20369->20370 20370->20366 20372 ba22ed 20371->20372 20373 ba22c6 20371->20373 20372->20350 20373->20372 20374 baabf2 __fread_nolock 41 API calls 20373->20374 20375 ba22e2 20374->20375 20376 bab6f5 ___scrt_uninitialize_crt 66 API calls 20375->20376 20376->20372 20379 bab701 __FrameHandler3::FrameUnwindToState 20377->20379 20378 bab709 20378->20350 20379->20378 20380 bab7c5 20379->20380 20382 bab756 20379->20382 20381 ba0ac2 __fread_nolock 41 API calls 20380->20381 20381->20378 20388 bb0935 EnterCriticalSection 20382->20388 20384 bab75c 20385 bab779 20384->20385 20389 bab7fd 20384->20389 20415 bab7bd 20385->20415 20388->20384 20390 bab822 20389->20390 20412 bab845 __fread_nolock 20389->20412 20391 bab826 20390->20391 20393 bab884 20390->20393 20392 ba0ac2 __fread_nolock 41 API calls 20391->20392 20392->20412 20394 bab89b 20393->20394 20418 bacfdc 20393->20418 20421 bab381 20394->20421 20398 bab8eb 20400 bab94e WriteFile 20398->20400 20401 bab8ff 20398->20401 20399 bab8ab 20402 bab8b2 20399->20402 20403 bab8d5 20399->20403 20404 bab970 GetLastError 20400->20404 20400->20412 20406 bab93c 20401->20406 20407 bab907 20401->20407 20402->20412 20428 bab319 20402->20428 20433 baaf47 GetConsoleOutputCP 20403->20433 20404->20412 20461 bab3ff 20406->20461 20409 bab92a 20407->20409 20410 bab90c 20407->20410 20453 bab5c3 20409->20453 20410->20412 20446 bab4da 20410->20446 20412->20385 20487 bb0958 LeaveCriticalSection 20415->20487 20417 bab7c3 20417->20378 20468 bacebb 20418->20468 20420 bacff5 20420->20394 20422 bb3a4f __fread_nolock 41 API calls 20421->20422 20424 bab393 20422->20424 20423 bab3f4 20423->20398 20423->20399 20424->20423 20425 bab3c1 20424->20425 20426 ba1690 std::_Locinfo::_Locinfo_dtor 41 API calls 20424->20426 20425->20423 20427 bab3db GetConsoleMode 20425->20427 20426->20425 20427->20423 20431 bab33b 20428->20431 20432 bab370 20428->20432 20429 bb3c1c 5 API calls ___scrt_uninitialize_crt 20429->20431 20430 bab372 GetLastError 20430->20432 20431->20429 20431->20430 20431->20432 20432->20412 20434 baafb9 20433->20434 20442 baafc0 _Yarn 20433->20442 20435 ba1690 std::_Locinfo::_Locinfo_dtor 41 API calls 20434->20435 20435->20442 20438 bade7d 42 API calls ___scrt_uninitialize_crt 20438->20442 20439 bb3b14 5 API calls std::_Locinfo::_Locinfo_dtor 20439->20442 20440 bab27d 20440->20440 20441 baf00d std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 20441->20442 20442->20438 20442->20439 20442->20440 20442->20441 20443 bab1f8 WriteFile 20442->20443 20445 bab238 WriteFile 20442->20445 20443->20442 20445->20442 20465 bab40e ___scrt_uninitialize_crt 20461->20465 20474 bb0a0c 20468->20474 20470 bacecd 20471 bacee9 SetFilePointerEx 20470->20471 20473 baced5 __fread_nolock 20470->20473 20472 bacf01 GetLastError 20471->20472 20471->20473 20472->20473 20473->20420 20475 bb0a19 20474->20475 20476 bb0a2e 20474->20476 20477 ba0d4a __dosmaperr 14 API calls 20475->20477 20479 ba0d4a __dosmaperr 14 API calls 20476->20479 20481 bb0a53 20476->20481 20478 bb0a1e 20477->20478 20480 ba0d5d __dosmaperr 14 API calls 20478->20480 20482 bb0a5e 20479->20482 20483 bb0a26 20480->20483 20481->20470 20484 ba0d5d __dosmaperr 14 API calls 20482->20484 20483->20470 20485 bb0a66 20484->20485 20486 ba0b3f __fread_nolock 41 API calls 20485->20486 20486->20483 20487->20417 20488->20335 24239 b99a10 24240 b99a21 _Yarn 24239->24240 24241 b99a27 _Yarn 24240->24241 24242 b99b84 24240->24242 24245 ba28f0 24240->24245 24242->24241 24244 ba28f0 __fread_nolock 55 API calls 24242->24244 24244->24241 24248 ba290d 24245->24248 24249 ba2919 __FrameHandler3::FrameUnwindToState 24248->24249 24250 ba2963 24249->24250 24255 ba292c __fread_nolock 24249->24255 24260 ba2908 24249->24260 24261 ba1ef3 EnterCriticalSection 24250->24261 24252 ba296d 24262 ba270a 24252->24262 24253 ba0d5d __dosmaperr 14 API calls 24256 ba2946 24253->24256 24255->24253 24257 ba0b3f __fread_nolock 41 API calls 24256->24257 24257->24260 24260->24240 24261->24252 24266 ba271b __fread_nolock 24262->24266 24274 ba2737 24262->24274 24263 ba2727 24264 ba0d5d __dosmaperr 14 API calls 24263->24264 24265 ba272c 24264->24265 24267 ba0b3f __fread_nolock 41 API calls 24265->24267 24266->24263 24271 ba2779 __fread_nolock 24266->24271 24266->24274 24267->24274 24268 ba28a0 __fread_nolock 24272 ba0d5d __dosmaperr 14 API calls 24268->24272 24269 baabf2 __fread_nolock 41 API calls 24269->24271 24270 ba1d08 __fread_nolock 41 API calls 24270->24271 24271->24268 24271->24269 24271->24270 24273 bac9f6 __fread_nolock 53 API calls 24271->24273 24271->24274 24272->24265 24273->24271 24275 ba29a2 24274->24275 24278 ba1f07 LeaveCriticalSection 24275->24278 24277 ba29a8 24277->24260 24278->24277 22339 b97860 22340 b9788a 22339->22340 22347 b99fc0 22340->22347 22344 b97911 22345 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 22344->22345 22346 b97927 22345->22346 22348 b99fd8 22347->22348 22369 ba4e69 22348->22369 22351 b95ca0 22352 b95cce 22351->22352 22353 b922d0 73 API calls 22352->22353 22354 b95d28 22353->22354 22694 b92a20 22354->22694 22356 b95d52 22357 b92620 73 API calls 22356->22357 22358 b95d8e 22357->22358 22363 b95e21 std::ios_base::_Ios_base_dtor 22358->22363 22702 b986d0 22358->22702 22360 b96012 std::ios_base::_Ios_base_dtor 22361 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 22360->22361 22364 b9602d 22361->22364 22362 b96031 22365 ba0b4f std::_Throw_Cpp_error 41 API calls 22362->22365 22363->22360 22363->22362 22364->22344 22366 b96036 22365->22366 22367 b9604d 22366->22367 22730 ba1ef3 EnterCriticalSection 22366->22730 22367->22344 22370 ba4e7d __fread_nolock 22369->22370 22375 ba34db 22370->22375 22373 ba087b __fread_nolock 41 API calls 22374 b978ee 22373->22374 22374->22351 22376 ba350a 22375->22376 22377 ba34e7 22375->22377 22379 ba3531 22376->22379 22383 ba3367 22376->22383 22378 ba0ac2 __fread_nolock 41 API calls 22377->22378 22380 ba3502 22378->22380 22379->22380 22381 ba0ac2 __fread_nolock 41 API calls 22379->22381 22380->22373 22381->22380 22384 ba3393 22383->22384 22385 ba33b6 22383->22385 22386 ba0ac2 __fread_nolock 41 API calls 22384->22386 22385->22384 22390 ba33be 22385->22390 22387 ba33ab 22386->22387 22388 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 22387->22388 22389 ba34d9 22388->22389 22389->22379 22394 ba4210 22390->22394 22411 ba4dd1 22394->22411 22396 ba343f 22408 ba4061 22396->22408 22397 ba4237 22398 ba0ac2 __fread_nolock 41 API calls 22397->22398 22398->22396 22401 ba1690 std::_Locinfo::_Locinfo_dtor 41 API calls 22403 ba4229 std::_Locinfo::_Locinfo_dtor 22401->22403 22403->22396 22403->22397 22403->22401 22404 ba4478 22403->22404 22415 ba4198 22403->22415 22418 ba44f0 22403->22418 22452 ba464e 22403->22452 22405 ba0ac2 __fread_nolock 41 API calls 22404->22405 22406 ba4494 22405->22406 22407 ba0ac2 __fread_nolock 41 API calls 22406->22407 22407->22396 22409 ba9c4c ___free_lconv_mon 14 API calls 22408->22409 22410 ba4071 22409->22410 22410->22387 22412 ba4df5 22411->22412 22413 ba4ddc 22411->22413 22412->22403 22414 ba0ac2 __fread_nolock 41 API calls 22413->22414 22414->22412 22481 ba3644 22415->22481 22417 ba41d3 22417->22403 22419 ba450e 22418->22419 22420 ba44f7 22418->22420 22421 ba0ac2 __fread_nolock 41 API calls 22419->22421 22422 ba454d 22419->22422 22420->22422 22423 ba46e6 22420->22423 22424 ba4675 22420->22424 22425 ba4542 22421->22425 22422->22403 22426 ba46eb 22423->22426 22427 ba4739 22423->22427 22428 ba467b 22424->22428 22429 ba4713 22424->22429 22425->22403 22430 ba472d 22426->22430 22431 ba46ed 22426->22431 22427->22429 22436 ba46b8 22427->22436 22450 ba469d 22427->22450 22428->22436 22440 ba4681 22428->22440 22510 ba39ee 22429->22510 22527 ba4d4a 22430->22527 22434 ba46f2 22431->22434 22435 ba468f 22431->22435 22434->22429 22439 ba46f7 22434->22439 22435->22450 22451 ba46b1 22435->22451 22517 ba4a8a 22435->22517 22436->22451 22491 ba3b6b 22436->22491 22438 ba46cd 22438->22451 22498 ba4c14 22438->22498 22442 ba470a 22439->22442 22443 ba46fc 22439->22443 22440->22435 22440->22438 22440->22450 22506 ba4ca9 22442->22506 22443->22451 22502 ba4d2d 22443->22502 22445 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 22448 ba49da 22445->22448 22448->22403 22450->22451 22530 badd13 22450->22530 22451->22445 22453 ba46e6 22452->22453 22454 ba4675 22452->22454 22455 ba46eb 22453->22455 22456 ba4739 22453->22456 22457 ba467b 22454->22457 22458 ba4713 22454->22458 22459 ba472d 22455->22459 22460 ba46ed 22455->22460 22456->22458 22465 ba46b8 22456->22465 22479 ba469d 22456->22479 22457->22465 22469 ba4681 22457->22469 22461 ba39ee 42 API calls 22458->22461 22464 ba4d4a 42 API calls 22459->22464 22462 ba46f2 22460->22462 22463 ba468f 22460->22463 22461->22479 22462->22458 22467 ba46f7 22462->22467 22466 ba4a8a 44 API calls 22463->22466 22463->22479 22480 ba46b1 22463->22480 22464->22479 22472 ba3b6b 42 API calls 22465->22472 22465->22480 22466->22479 22470 ba470a 22467->22470 22471 ba46fc 22467->22471 22468 ba46cd 22475 ba4c14 43 API calls 22468->22475 22468->22480 22469->22463 22469->22468 22469->22479 22474 ba4ca9 41 API calls 22470->22474 22476 ba4d2d 42 API calls 22471->22476 22471->22480 22472->22479 22473 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 22477 ba49da 22473->22477 22474->22479 22475->22479 22476->22479 22477->22403 22478 badd13 43 API calls 22478->22479 22479->22478 22479->22480 22480->22473 22482 ba16eb std::_Locinfo::_Locinfo_dtor 41 API calls 22481->22482 22484 ba3656 22482->22484 22483 ba366b 22485 ba0ac2 __fread_nolock 41 API calls 22483->22485 22484->22483 22487 ba369e 22484->22487 22490 ba3686 std::_Locinfo::_Locinfo_dtor 22484->22490 22485->22490 22486 ba3735 22488 ba1636 41 API calls 22486->22488 22487->22486 22489 ba1636 41 API calls 22487->22489 22488->22490 22489->22486 22490->22417 22492 ba3b7f 22491->22492 22493 ba3bc8 22492->22493 22494 ba3ba1 22492->22494 22497 ba3bbe 22493->22497 22540 ba3592 22493->22540 22495 ba0ac2 __fread_nolock 41 API calls 22494->22495 22495->22497 22497->22450 22499 ba4c2f 22498->22499 22500 ba4c66 22499->22500 22501 badd13 43 API calls 22499->22501 22500->22450 22501->22500 22503 ba4d39 22502->22503 22554 ba3871 22503->22554 22505 ba4d49 22505->22450 22509 ba4cbe 22506->22509 22507 ba0ac2 __fread_nolock 41 API calls 22508 ba4cdf 22507->22508 22508->22450 22509->22507 22509->22508 22511 ba3a02 22510->22511 22512 ba3a24 22511->22512 22514 ba3a4b 22511->22514 22513 ba0ac2 __fread_nolock 41 API calls 22512->22513 22516 ba3a41 22513->22516 22515 ba3592 15 API calls 22514->22515 22514->22516 22515->22516 22516->22450 22518 ba4aa4 22517->22518 22519 ba3592 15 API calls 22518->22519 22520 ba4ae5 22519->22520 22561 badb92 22520->22561 22523 ba1690 std::_Locinfo::_Locinfo_dtor 41 API calls 22524 ba4b93 22523->22524 22525 ba1690 std::_Locinfo::_Locinfo_dtor 41 API calls 22524->22525 22526 ba4bc6 22524->22526 22525->22526 22526->22450 22526->22526 22528 ba3b6b 42 API calls 22527->22528 22529 ba4d5f 22528->22529 22529->22450 22531 badd28 22530->22531 22532 ba1690 std::_Locinfo::_Locinfo_dtor 41 API calls 22531->22532 22533 badd69 22531->22533 22537 badd2c __fread_nolock std::_Locinfo::_Locinfo_dtor 22531->22537 22539 badd55 __fread_nolock 22531->22539 22532->22533 22535 baf00d std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 22533->22535 22533->22537 22533->22539 22534 ba0ac2 __fread_nolock 41 API calls 22534->22537 22536 bade24 22535->22536 22536->22537 22538 bade3a GetLastError 22536->22538 22537->22450 22538->22537 22538->22539 22539->22534 22539->22537 22541 ba35b9 22540->22541 22542 ba35a7 22540->22542 22541->22542 22543 bad17b __fread_nolock 15 API calls 22541->22543 22542->22497 22544 ba35dd 22543->22544 22545 ba35f0 22544->22545 22546 ba35e5 22544->22546 22551 ba407b 22545->22551 22547 ba9c4c ___free_lconv_mon 14 API calls 22546->22547 22547->22542 22550 ba9c4c ___free_lconv_mon 14 API calls 22550->22542 22552 ba9c4c ___free_lconv_mon 14 API calls 22551->22552 22553 ba35fb 22552->22553 22553->22550 22555 ba3885 22554->22555 22556 ba38ce 22555->22556 22557 ba38a7 22555->22557 22559 ba3592 15 API calls 22556->22559 22560 ba38c4 22556->22560 22558 ba0ac2 __fread_nolock 41 API calls 22557->22558 22558->22560 22559->22560 22560->22505 22562 badbc7 22561->22562 22563 badba3 22561->22563 22562->22563 22565 badbfa 22562->22565 22564 ba0ac2 __fread_nolock 41 API calls 22563->22564 22574 ba4b6f 22564->22574 22566 badc62 22565->22566 22567 badc33 22565->22567 22568 badc8b 22566->22568 22569 badc90 22566->22569 22580 bada36 22567->22580 22571 badcb8 22568->22571 22572 badcf2 22568->22572 22588 bad2ce 22569->22588 22575 badcd8 22571->22575 22576 badcbd 22571->22576 22615 bad5fa 22572->22615 22574->22523 22574->22524 22608 bad7e3 22575->22608 22598 bad967 22576->22598 22581 bada4c 22580->22581 22582 bada57 22580->22582 22581->22574 22583 ba8ad2 std::bad_exception::bad_exception 41 API calls 22582->22583 22584 badab2 22583->22584 22585 badabc 22584->22585 22586 ba0b6c __Getctype 11 API calls 22584->22586 22585->22574 22587 badaca 22586->22587 22589 bad2e1 22588->22589 22590 bad312 22589->22590 22591 bad2f0 22589->22591 22593 bad32c 22590->22593 22595 bad381 22590->22595 22592 ba0ac2 __fread_nolock 41 API calls 22591->22592 22597 bad308 __alldvrm __fread_nolock _strrchr 22592->22597 22594 bad5fa 43 API calls 22593->22594 22594->22597 22596 ba1690 std::_Locinfo::_Locinfo_dtor 41 API calls 22595->22596 22595->22597 22596->22597 22597->22574 22622 bb3dc6 22598->22622 22609 bb3dc6 43 API calls 22608->22609 22610 bad812 22609->22610 22611 bb3ccc 41 API calls 22610->22611 22612 bad853 22611->22612 22613 bad879 41 API calls 22612->22613 22614 bad85a 22612->22614 22613->22614 22614->22574 22616 bb3dc6 43 API calls 22615->22616 22617 bad624 22616->22617 22618 bb3ccc 41 API calls 22617->22618 22619 bad672 22618->22619 22620 bad679 22619->22620 22621 bad69e 41 API calls 22619->22621 22620->22574 22621->22620 22623 bb3dfa 22622->22623 22624 ba8a73 41 API calls 22623->22624 22626 bb3e63 22624->22626 22625 bb3e8f 22627 ba8ad2 std::bad_exception::bad_exception 41 API calls 22625->22627 22626->22625 22628 bb3f1f 22626->22628 22630 bb3efc 22626->22630 22631 bb3ebc 22626->22631 22629 bb3eec 22627->22629 22634 bb6d00 21 API calls 22628->22634 22632 bb52f2 22629->22632 22638 bb3ef7 22629->22638 22633 ba8ad2 std::bad_exception::bad_exception 41 API calls 22630->22633 22631->22625 22631->22628 22635 ba0b6c __Getctype 11 API calls 22632->22635 22633->22629 22636 bb3fa5 22634->22636 22639 bb6e10 __floor_pentium4 21 API calls 22636->22639 22640 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 22638->22640 22642 bb3faf 22639->22642 22695 b92ac9 22694->22695 22699 b92a48 22694->22699 22696 b96d00 std::_Throw_Cpp_error 43 API calls 22695->22696 22698 b92ace 22696->22698 22697 b92a4d __fread_nolock 22697->22356 22699->22697 22700 b91900 std::_Throw_Cpp_error 43 API calls 22699->22700 22701 b92a9f __fread_nolock 22700->22701 22701->22356 22703 b9886e 22702->22703 22704 b986e7 22702->22704 22706 b96d00 std::_Throw_Cpp_error 43 API calls 22703->22706 22704->22703 22705 b98747 22704->22705 22707 b986fb _Yarn __fread_nolock 22704->22707 22708 b91900 std::_Throw_Cpp_error 43 API calls 22705->22708 22724 b98792 _Yarn __fread_nolock 22706->22724 22707->22358 22708->22724 22709 ba0b4f std::_Throw_Cpp_error 41 API calls 22710 b9887d 22709->22710 22711 b9ad49 12 API calls 22710->22711 22712 b988c1 22711->22712 22713 b989ba 22712->22713 22714 b988cc 22712->22714 22717 b9b050 std::_Throw_Cpp_error 43 API calls 22713->22717 22715 b988d9 22714->22715 22716 b989c1 22714->22716 22719 b9890e 22715->22719 22720 b988e0 22715->22720 22718 b9b050 std::_Throw_Cpp_error 43 API calls 22716->22718 22717->22716 22721 b989cf 22718->22721 22723 b9ad5a ReleaseSRWLockExclusive 22719->22723 22722 b9ad5a ReleaseSRWLockExclusive 22720->22722 22725 b988e5 22722->22725 22726 b9891a 22723->22726 22724->22709 22729 b98817 std::ios_base::_Ios_base_dtor _Yarn __fread_nolock 22724->22729 22725->22358 22727 b9892b 22726->22727 22731 b96180 22726->22731 22727->22358 22729->22358 22730->22367 22732 b961c6 22731->22732 22733 b9c1f0 std::_Facet_Register 16 API calls 22732->22733 22734 b961d4 22733->22734 22739 b955b0 22734->22739 22740 b9ad49 12 API calls 22739->22740 22741 b955c7 22740->22741 20489 b9c064 20490 b9c070 __FrameHandler3::FrameUnwindToState 20489->20490 20516 b9c2a9 20490->20516 20492 b9c077 20493 b9c1d0 20492->20493 20503 b9c0a1 ___scrt_is_nonwritable_in_current_image __CreateFrameInfo ___scrt_release_startup_lock 20492->20503 20552 b9ca5e IsProcessorFeaturePresent 20493->20552 20495 b9c1d7 20556 ba6d82 20495->20556 20498 ba6d46 __CreateFrameInfo 23 API calls 20499 b9c1e5 20498->20499 20500 b9c0c0 20501 b9c141 20529 ba69c0 20501->20529 20503->20500 20503->20501 20504 b9c13a 20503->20504 20524 ba6d5c 20504->20524 20506 b9c147 20533 b99f20 20506->20533 20511 b9c16c 20512 b9c175 20511->20512 20543 ba6d37 20511->20543 20546 b9c41a 20512->20546 20517 b9c2b2 20516->20517 20559 b9c745 IsProcessorFeaturePresent 20517->20559 20521 b9c2c3 20522 b9c2c7 20521->20522 20569 b9f4bd 20521->20569 20522->20492 20525 ba6d72 std::_Lockit::_Lockit 20524->20525 20528 ba4ef6 __FrameHandler3::FrameUnwindToState 20524->20528 20525->20501 20526 ba8f20 _unexpected 41 API calls 20526->20528 20527 ba0d70 __purecall 41 API calls 20527->20528 20528->20524 20528->20526 20528->20527 20530 ba69c9 20529->20530 20531 ba69ce 20529->20531 20629 ba671a 20530->20629 20531->20506 20534 b9c1f0 std::_Facet_Register 16 API calls 20533->20534 20535 b99f35 20534->20535 20539 b99f48 20535->20539 20715 b91550 20535->20715 20540 b99f78 20539->20540 20721 b96ad0 20539->20721 20541 b9cb78 GetModuleHandleW 20540->20541 20542 b9c168 20541->20542 20542->20495 20542->20511 20544 ba6b6a __CreateFrameInfo 23 API calls 20543->20544 20545 ba6d42 20544->20545 20545->20512 20547 b9c426 20546->20547 20548 b9c17e 20547->20548 21096 ba8a43 20547->21096 20548->20500 20550 b9c434 20551 b9f4bd ___scrt_uninitialize_crt 7 API calls 20550->20551 20551->20548 20553 b9ca74 __fread_nolock __CreateFrameInfo 20552->20553 20554 b9cb1f IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 20553->20554 20555 b9cb63 __CreateFrameInfo 20554->20555 20555->20495 20557 ba6b6a __CreateFrameInfo 23 API calls 20556->20557 20558 b9c1dd 20557->20558 20558->20498 20560 b9c2be 20559->20560 20561 b9f49e 20560->20561 20575 ba0527 20561->20575 20565 b9f4ba 20565->20521 20566 b9f4af 20566->20565 20589 ba0563 20566->20589 20568 b9f4a7 20568->20521 20570 b9f4d0 20569->20570 20571 b9f4c6 20569->20571 20570->20522 20572 b9f636 ___vcrt_uninitialize_ptd 6 API calls 20571->20572 20573 b9f4cb 20572->20573 20574 ba0563 ___vcrt_uninitialize_locks DeleteCriticalSection 20573->20574 20574->20570 20577 ba0530 20575->20577 20578 ba0559 20577->20578 20579 b9f4a3 20577->20579 20593 ba076c 20577->20593 20580 ba0563 ___vcrt_uninitialize_locks DeleteCriticalSection 20578->20580 20579->20568 20581 b9f603 20579->20581 20580->20579 20610 ba067d 20581->20610 20584 b9f618 20584->20566 20587 b9f633 20587->20566 20590 ba058d 20589->20590 20591 ba056e 20589->20591 20590->20568 20592 ba0578 DeleteCriticalSection 20591->20592 20592->20590 20592->20592 20598 ba0592 20593->20598 20596 ba07a4 InitializeCriticalSectionAndSpinCount 20597 ba078f 20596->20597 20597->20577 20599 ba05af 20598->20599 20602 ba05b3 20598->20602 20599->20596 20599->20597 20600 ba061b GetProcAddress 20600->20599 20602->20599 20602->20600 20603 ba060c 20602->20603 20605 ba0632 LoadLibraryExW 20602->20605 20603->20600 20604 ba0614 FreeLibrary 20603->20604 20604->20600 20606 ba0679 20605->20606 20607 ba0649 GetLastError 20605->20607 20606->20602 20607->20606 20608 ba0654 ___vcrt_FlsFree 20607->20608 20608->20606 20609 ba066a LoadLibraryExW 20608->20609 20609->20602 20611 ba0592 ___vcrt_FlsFree 5 API calls 20610->20611 20612 ba0697 20611->20612 20613 ba06b0 TlsAlloc 20612->20613 20614 b9f60d 20612->20614 20614->20584 20615 ba072e 20614->20615 20616 ba0592 ___vcrt_FlsFree 5 API calls 20615->20616 20617 ba0748 20616->20617 20618 ba0763 TlsSetValue 20617->20618 20619 b9f626 20617->20619 20618->20619 20619->20587 20620 b9f636 20619->20620 20621 b9f640 20620->20621 20623 b9f646 20620->20623 20624 ba06b8 20621->20624 20623->20584 20625 ba0592 ___vcrt_FlsFree 5 API calls 20624->20625 20626 ba06d2 20625->20626 20627 ba06ea TlsFree 20626->20627 20628 ba06de 20626->20628 20627->20628 20628->20623 20630 ba6723 20629->20630 20631 ba6739 20629->20631 20630->20631 20635 ba6746 20630->20635 20631->20531 20633 ba6730 20633->20631 20652 ba68b1 20633->20652 20636 ba674f 20635->20636 20637 ba6752 20635->20637 20636->20633 20660 bb00bd 20637->20660 20642 ba676f 20687 ba67a0 20642->20687 20643 ba6763 20644 ba9c4c ___free_lconv_mon 14 API calls 20643->20644 20646 ba6769 20644->20646 20646->20633 20648 ba9c4c ___free_lconv_mon 14 API calls 20649 ba6793 20648->20649 20650 ba9c4c ___free_lconv_mon 14 API calls 20649->20650 20651 ba6799 20650->20651 20651->20633 20653 ba6922 20652->20653 20655 ba68c0 20652->20655 20653->20631 20654 baf00d WideCharToMultiByte std::_Locinfo::_Locinfo_dtor 20654->20655 20655->20653 20655->20654 20656 ba9bef __dosmaperr 14 API calls 20655->20656 20658 ba6926 20655->20658 20659 ba9c4c ___free_lconv_mon 14 API calls 20655->20659 20656->20655 20657 ba9c4c ___free_lconv_mon 14 API calls 20657->20653 20658->20657 20659->20655 20661 ba6758 20660->20661 20662 bb00c6 20660->20662 20666 bb03bf GetEnvironmentStringsW 20661->20666 20663 ba8fdb 41 API calls 20662->20663 20664 bb00e9 20663->20664 20665 bafec8 52 API calls 20664->20665 20665->20661 20667 bb03d7 20666->20667 20680 ba675d 20666->20680 20668 baf00d std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 20667->20668 20669 bb03f4 20668->20669 20670 bb0409 20669->20670 20671 bb03fe FreeEnvironmentStringsW 20669->20671 20672 bad17b __fread_nolock 15 API calls 20670->20672 20671->20680 20673 bb0410 20672->20673 20674 bb0429 20673->20674 20675 bb0418 20673->20675 20677 baf00d std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 20674->20677 20676 ba9c4c ___free_lconv_mon 14 API calls 20675->20676 20678 bb041d FreeEnvironmentStringsW 20676->20678 20679 bb0439 20677->20679 20678->20680 20681 bb0448 20679->20681 20682 bb0440 20679->20682 20680->20642 20680->20643 20683 ba9c4c ___free_lconv_mon 14 API calls 20681->20683 20684 ba9c4c ___free_lconv_mon 14 API calls 20682->20684 20685 bb0446 FreeEnvironmentStringsW 20683->20685 20684->20685 20685->20680 20688 ba67b5 20687->20688 20689 ba9bef __dosmaperr 14 API calls 20688->20689 20690 ba67dc 20689->20690 20691 ba67e4 20690->20691 20697 ba67ee 20690->20697 20692 ba9c4c ___free_lconv_mon 14 API calls 20691->20692 20693 ba6776 20692->20693 20693->20648 20694 ba684b 20695 ba9c4c ___free_lconv_mon 14 API calls 20694->20695 20695->20693 20696 ba9bef __dosmaperr 14 API calls 20696->20697 20697->20694 20697->20696 20698 ba685a 20697->20698 20700 ba8ad2 std::bad_exception::bad_exception 41 API calls 20697->20700 20702 ba6875 20697->20702 20704 ba9c4c ___free_lconv_mon 14 API calls 20697->20704 20709 ba6882 20698->20709 20700->20697 20705 ba0b6c __Getctype 11 API calls 20702->20705 20703 ba9c4c ___free_lconv_mon 14 API calls 20706 ba6867 20703->20706 20704->20697 20707 ba6881 20705->20707 20708 ba9c4c ___free_lconv_mon 14 API calls 20706->20708 20708->20693 20710 ba6860 20709->20710 20711 ba688f 20709->20711 20710->20703 20712 ba68a6 20711->20712 20714 ba9c4c ___free_lconv_mon 14 API calls 20711->20714 20713 ba9c4c ___free_lconv_mon 14 API calls 20712->20713 20713->20710 20714->20711 20716 b91562 20715->20716 20728 b98500 InitOnceBeginInitialize 20716->20728 20718 b91586 20738 b92020 20718->20738 21092 b935b0 20721->21092 20724 b9cfc0 std::_Throw_Cpp_error RaiseException 20725 b96aee 20724->20725 20727 b96afd 20725->20727 21095 ba1f07 LeaveCriticalSection 20725->21095 20729 b9851b 20728->20729 20730 b98547 20728->20730 20732 b9853e 20729->20732 20749 b93ff0 20729->20749 20731 ba0d70 __purecall 41 API calls 20730->20731 20734 b9854c 20731->20734 20732->20718 20757 b92140 20734->20757 20737 b9856c 20737->20718 20838 b93d00 20738->20838 20740 b92059 20741 b92084 std::ios_base::_Ios_base_dtor 20740->20741 20744 b920b1 20740->20744 20846 b912d0 20741->20846 20746 ba0b4f std::_Throw_Cpp_error 41 API calls 20744->20746 20748 b920b6 20746->20748 20750 b94017 20749->20750 20756 b9400c InitOnceComplete 20749->20756 20784 b9c4d5 AcquireSRWLockExclusive 20750->20784 20752 b94021 20752->20756 20789 b9c46f 20752->20789 20756->20732 20756->20734 20758 b9a01b std::_Lockit::_Lockit 7 API calls 20757->20758 20759 b92157 20758->20759 20760 b9a01b std::_Lockit::_Lockit 7 API calls 20759->20760 20764 b92195 20759->20764 20761 b92174 20760->20761 20765 b9a073 std::_Lockit::~_Lockit 2 API calls 20761->20765 20762 b9a073 std::_Lockit::~_Lockit 2 API calls 20763 b922b6 20762->20763 20763->20737 20766 b921fa 20764->20766 20767 b921e5 20764->20767 20777 b9229d 20764->20777 20765->20764 20769 b9c1f0 std::_Facet_Register 16 API calls 20766->20769 20768 b9a073 std::_Lockit::~_Lockit 2 API calls 20767->20768 20770 b921f0 20768->20770 20772 b92201 20769->20772 20770->20737 20771 b92274 20773 b92297 20771->20773 20776 b939f0 69 API calls 20771->20776 20772->20771 20775 b9a01b std::_Lockit::_Lockit 7 API calls 20772->20775 20774 b9b1e4 std::_Facet_Register 16 API calls 20773->20774 20774->20777 20778 b92231 20775->20778 20776->20773 20777->20762 20779 b92269 20778->20779 20780 b922c0 20778->20780 20782 b9b314 std::_Locinfo::_Locinfo_ctor 70 API calls 20779->20782 20781 b9a209 43 API calls 20780->20781 20783 b922ca 20781->20783 20782->20771 20785 b9c4e9 20784->20785 20786 b9c4ee ReleaseSRWLockExclusive 20785->20786 20793 b9c524 SleepConditionVariableSRW 20785->20793 20786->20752 20794 b9c442 20789->20794 20792 b9c484 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 20792->20756 20793->20785 20795 b9c458 20794->20795 20796 b9c451 20794->20796 20803 ba8903 20795->20803 20800 ba8886 20796->20800 20799 b94037 20799->20792 20801 ba8903 44 API calls 20800->20801 20802 ba8898 20801->20802 20802->20799 20806 ba864f 20803->20806 20807 ba865b __FrameHandler3::FrameUnwindToState 20806->20807 20814 ba5359 EnterCriticalSection 20807->20814 20809 ba8669 20815 ba86aa 20809->20815 20814->20809 20816 ba86c5 20815->20816 20817 ba8738 std::_Lockit::_Lockit 20815->20817 20816->20817 20840 b93da9 _Yarn 20838->20840 20844 b93d13 20838->20844 20839 b93e26 20841 ba0b4f std::_Throw_Cpp_error 41 API calls 20839->20841 20840->20740 20843 b93e30 20841->20843 20844->20839 20844->20840 20845 b93d81 std::ios_base::_Ios_base_dtor 20844->20845 20869 b948b0 20845->20869 20847 b9130b 20846->20847 20884 b94e50 20847->20884 20850 b91367 20852 b93d00 43 API calls 20850->20852 20870 b948c0 20869->20870 20871 b94926 20869->20871 20872 b948f9 20870->20872 20873 b948cb 20870->20873 20874 b96a90 std::_Throw_Cpp_error RaiseException 20871->20874 20876 b94915 20872->20876 20879 b9c1f0 std::_Facet_Register 16 API calls 20872->20879 20873->20871 20875 b948d2 20873->20875 20877 b948d8 20874->20877 20878 b9c1f0 std::_Facet_Register 16 API calls 20875->20878 20876->20840 20880 ba0b4f std::_Throw_Cpp_error 41 API calls 20877->20880 20883 b948e1 20877->20883 20878->20877 20881 b94903 20879->20881 20882 b94930 20880->20882 20881->20840 20883->20840 20885 b94e61 20884->20885 20886 b9c1f0 std::_Facet_Register 16 API calls 20885->20886 20888 b94e83 20886->20888 20887 b9133e 20887->20850 20892 b930b0 20887->20892 20888->20887 20889 b9c1f0 std::_Facet_Register 16 API calls 20888->20889 20890 b94fb3 20889->20890 20905 b96330 20890->20905 20893 b930e0 20892->20893 20896 b930f1 _Yarn 20892->20896 20896->20850 21093 b9cf3e std::bad_exception::bad_exception 42 API calls 21092->21093 21094 b935de 21093->21094 21094->20724 21095->20727 21097 ba8a4e 21096->21097 21098 ba8a60 ___scrt_uninitialize_crt 21096->21098 21099 ba8a5c 21097->21099 21101 ba237b 21097->21101 21098->20550 21099->20550 21104 ba2208 21101->21104 21107 ba20fc 21104->21107 21108 ba2108 __FrameHandler3::FrameUnwindToState 21107->21108 21115 ba5359 EnterCriticalSection 21108->21115 21110 ba2112 ___scrt_uninitialize_crt 21111 ba217e 21110->21111 21116 ba2070 21110->21116 21124 ba219c 21111->21124 21115->21110 21117 ba207c __FrameHandler3::FrameUnwindToState 21116->21117 21127 ba1ef3 EnterCriticalSection 21117->21127 21120 ba2086 ___scrt_uninitialize_crt 21176 ba53a1 LeaveCriticalSection 21124->21176 21126 ba218a 21126->21099 21127->21120 21176->21126 18880 9d018d 18884 9d01c5 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 18880->18884 18882 9d03a2 WriteProcessMemory 18883 9d03e7 18882->18883 18885 9d03ec WriteProcessMemory 18883->18885 18886 9d0429 WriteProcessMemory Wow64SetThreadContext ResumeThread 18883->18886 18884->18882 18885->18883 23483 b995e0 23484 b99630 23483->23484 23485 b99600 23483->23485 23487 b99636 23484->23487 23492 b99672 23484->23492 23493 b99695 23484->23493 23485->23484 23486 b9960c 23485->23486 23488 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 23486->23488 23489 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 23487->23489 23490 b9962c 23488->23490 23491 b99647 23489->23491 23514 ba2415 23492->23514 23494 ba2415 43 API calls 23493->23494 23512 b996b9 std::ios_base::_Ios_base_dtor _Yarn 23494->23512 23496 b99678 23496->23487 23497 b99680 23496->23497 23498 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 23497->23498 23499 b99691 23498->23499 23500 b9993a 23506 b96d00 std::_Throw_Cpp_error 43 API calls 23500->23506 23501 b9c539 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 23503 b99931 23501->23503 23502 b99886 23504 b998b9 std::ios_base::_Ios_base_dtor 23502->23504 23505 b99935 23502->23505 23504->23501 23507 ba0b4f std::_Throw_Cpp_error 41 API calls 23505->23507 23508 b9993f 23506->23508 23507->23500 23509 b91900 std::_Throw_Cpp_error 43 API calls 23509->23512 23511 ba2415 43 API calls 23511->23512 23512->23500 23512->23502 23512->23505 23512->23509 23512->23511 23513 b998d3 23512->23513 23513->23502 23534 ba32f4 23513->23534 23515 ba2421 __FrameHandler3::FrameUnwindToState 23514->23515 23516 ba242b 23515->23516 23517 ba2443 23515->23517 23518 ba0d5d __dosmaperr 14 API calls 23516->23518 23547 ba1ef3 EnterCriticalSection 23517->23547 23520 ba2430 23518->23520 23522 ba0b3f __fread_nolock 41 API calls 23520->23522 23521 ba244d 23523 ba24e9 23521->23523 23524 baabf2 __fread_nolock 41 API calls 23521->23524 23533 ba243b 23522->23533 23548 ba23d9 23523->23548 23529 ba246a 23524->23529 23526 ba24ef 23555 ba2519 23526->23555 23528 ba24c1 23530 ba0d5d __dosmaperr 14 API calls 23528->23530 23529->23523 23529->23528 23531 ba24c6 23530->23531 23532 ba0b3f __fread_nolock 41 API calls 23531->23532 23532->23533 23533->23496 23535 ba3300 __FrameHandler3::FrameUnwindToState 23534->23535 23536 ba331c 23535->23536 23537 ba3307 23535->23537 23559 ba1ef3 EnterCriticalSection 23536->23559 23539 ba0d5d __dosmaperr 14 API calls 23537->23539 23541 ba330c 23539->23541 23540 ba3326 23560 ba31fb 23540->23560 23542 ba0b3f __fread_nolock 41 API calls 23541->23542 23546 ba3317 23542->23546 23546->23513 23547->23521 23549 ba23e5 23548->23549 23552 ba23fa __fread_nolock 23548->23552 23550 ba0d5d __dosmaperr 14 API calls 23549->23550 23551 ba23ea 23550->23551 23553 ba0b3f __fread_nolock 41 API calls 23551->23553 23552->23526 23554 ba23f5 23553->23554 23554->23526 23558 ba1f07 LeaveCriticalSection 23555->23558 23557 ba251f 23557->23533 23558->23557 23559->23540 23561 ba3213 23560->23561 23563 ba3283 23560->23563 23562 baabf2 __fread_nolock 41 API calls 23561->23562 23567 ba3219 23562->23567 23564 bad11f 14 API calls 23563->23564 23565 ba327b 23563->23565 23564->23565 23571 ba335f 23565->23571 23566 ba326b 23568 ba0d5d __dosmaperr 14 API calls 23566->23568 23567->23563 23567->23566 23569 ba3270 23568->23569 23570 ba0b3f __fread_nolock 41 API calls 23569->23570 23570->23565 23574 ba1f07 LeaveCriticalSection 23571->23574 23573 ba3365 23573->23546 23574->23573 21177 bac1c4 21178 baabf2 __fread_nolock 41 API calls 21177->21178 21181 bac1d1 21178->21181 21179 bac1dd 21180 bac229 21180->21179 21183 bac28b 21180->21183 21184 bacffa 41 API calls 21180->21184 21181->21179 21181->21180 21194 bac38c 21181->21194 21202 bac2ba 21183->21202 21186 bac27e 21184->21186 21186->21183 21189 bad11f 21186->21189 21190 ba9bef __dosmaperr 14 API calls 21189->21190 21191 bad13c 21190->21191 21192 ba9c4c ___free_lconv_mon 14 API calls 21191->21192 21193 bad146 21192->21193 21193->21183 21195 bac3a2 21194->21195 21196 bac3a6 21194->21196 21195->21180 21197 bb0a0c __fread_nolock 41 API calls 21196->21197 21201 bac3f5 21196->21201 21198 bac3c7 21197->21198 21199 bac3cf SetFilePointerEx 21198->21199 21198->21201 21200 bac3e6 GetFileSizeEx 21199->21200 21199->21201 21200->21201 21201->21180 21203 baabf2 __fread_nolock 41 API calls 21202->21203 21204 bac2c9 21203->21204 21205 bac36f 21204->21205 21206 bac2dc 21204->21206 21207 bab6f5 ___scrt_uninitialize_crt 66 API calls 21205->21207 21208 bac2f9 21206->21208 21211 bac320 21206->21211 21210 bac29c 21207->21210 21209 bab6f5 ___scrt_uninitialize_crt 66 API calls 21208->21209 21209->21210 21211->21210 21213 bacf3e 21211->21213 21214 bacf52 __fread_nolock 21213->21214 21219 bacd95 21214->21219 21217 ba087b __fread_nolock 41 API calls 21218 bacf76 21217->21218 21218->21210 21221 bacda1 __FrameHandler3::FrameUnwindToState 21219->21221 21220 bace7f 21222 ba0ac2 __fread_nolock 41 API calls 21220->21222 21221->21220 21223 bacdfd 21221->21223 21229 bacda9 21221->21229 21222->21229 21230 bb0935 EnterCriticalSection 21223->21230 21225 bace03 21226 bace28 21225->21226 21227 bacebb __fread_nolock 43 API calls 21225->21227 21231 bace77 21226->21231 21227->21226 21229->21217 21230->21225 21234 bb0958 LeaveCriticalSection 21231->21234 21233 bace7d 21233->21229 21234->21233 25073 b99370 25075 b9937f 25073->25075 25074 b993ba 25075->25074 25080 ba31c1 25075->25080 25078 b95a40 41 API calls 25079 b993b4 25078->25079 25081 ba31d4 __fread_nolock 25080->25081 25086 ba30f8 25081->25086 25083 ba31e9 25084 ba087b __fread_nolock 41 API calls 25083->25084 25085 b993a1 25084->25085 25085->25074 25085->25078 25087 ba310a 25086->25087 25088 ba312d 25086->25088 25089 ba0ac2 __fread_nolock 41 API calls 25087->25089 25088->25087 25091 ba3154 25088->25091 25090 ba3125 25089->25090 25090->25083 25094 ba2ffd 25091->25094 25095 ba3009 __FrameHandler3::FrameUnwindToState 25094->25095 25102 ba1ef3 EnterCriticalSection 25095->25102 25097 ba3017 25103 ba3058 25097->25103 25099 ba3024 25112 ba304c 25099->25112 25102->25097 25104 ba22ad ___scrt_uninitialize_crt 66 API calls 25103->25104 25105 ba3073 25104->25105 25106 baa9c0 14 API calls 25105->25106 25107 ba307d 25106->25107 25108 ba9bef __dosmaperr 14 API calls 25107->25108 25111 ba3098 25107->25111 25109 ba30bc 25108->25109 25110 ba9c4c ___free_lconv_mon 14 API calls 25109->25110 25110->25111 25111->25099 25115 ba1f07 LeaveCriticalSection 25112->25115 25114 ba3035 25114->25083 25115->25114

                        Control-flow Graph

                        APIs
                        • CreateProcessA.KERNELBASE(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,009D00FF,009D00EF), ref: 009D02FC
                        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 009D030F
                        • Wow64GetThreadContext.KERNEL32(000000F0,00000000), ref: 009D032D
                        • ReadProcessMemory.KERNELBASE(000000F4,?,009D0143,00000004,00000000), ref: 009D0351
                        • VirtualAllocEx.KERNELBASE(000000F4,?,?,00003000,00000040), ref: 009D037C
                        • WriteProcessMemory.KERNELBASE(000000F4,00000000,?,?,00000000,?), ref: 009D03D4
                        • WriteProcessMemory.KERNELBASE(000000F4,00400000,?,?,00000000,?,00000028), ref: 009D041F
                        • WriteProcessMemory.KERNELBASE(000000F4,-00000008,?,00000004,00000000), ref: 009D045D
                        • Wow64SetThreadContext.KERNEL32(000000F0,00B60000), ref: 009D0499
                        • ResumeThread.KERNELBASE(000000F0), ref: 009D04A8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792839089.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_9d0000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                        • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$CreateProcessA$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                        • API String ID: 2687962208-1257834847
                        • Opcode ID: 6ed679946abb4a161c9f75f6101290084365813039212a6bd0c7882d8dd446c2
                        • Instruction ID: 45c187fb517586fa1566c82a763f7e56e73b5f56ccc57b7aa2b6590a47f9117e
                        • Opcode Fuzzy Hash: 6ed679946abb4a161c9f75f6101290084365813039212a6bd0c7882d8dd446c2
                        • Instruction Fuzzy Hash: EAB1F67264024AAFDB60CF68CC80BDA77A9FF88714F158525EA0CEB341D774FA418B94

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 23 baec8d-baeca6 24 baeca8-baecb8 call ba5cd1 23->24 25 baecbc-baecc1 23->25 24->25 31 baecba 24->31 27 baecc3-baeccd 25->27 28 baecd0-baecf6 call baef91 25->28 27->28 33 baee69-baee7a call b9c539 28->33 34 baecfc-baed07 28->34 31->25 36 baee5c 34->36 37 baed0d-baed12 34->37 41 baee5e 36->41 39 baed27-baed32 call bad17b 37->39 40 baed14-baed1d call b9c630 37->40 48 baed3d-baed41 39->48 49 baed34 39->49 40->48 51 baed1f-baed25 40->51 42 baee60-baee67 call b9bee7 41->42 42->33 48->41 53 baed47-baed5e call baef91 48->53 52 baed3a 49->52 51->52 52->48 53->41 56 baed64-baed76 call baa7fb 53->56 58 baed7b-baed7f 56->58 59 baed9a-baed9c 58->59 60 baed81-baed89 58->60 59->41 61 baed8b-baed90 60->61 62 baedc3-baedcf 60->62 65 baee42-baee44 61->65 66 baed96-baed98 61->66 63 baee4e 62->63 64 baedd1-baedd3 62->64 69 baee50-baee57 call b9bee7 63->69 67 baede8-baedf3 call bad17b 64->67 68 baedd5-baedde call b9c630 64->68 65->42 66->59 70 baeda1-baedbb call baa7fb 66->70 67->69 81 baedf5 67->81 68->69 80 baede0-baede6 68->80 69->59 70->65 79 baedc1 70->79 79->59 82 baedfb-baee00 80->82 81->82 82->69 83 baee02-baee1a call baa7fb 82->83 83->69 86 baee1c-baee23 83->86 87 baee46-baee4c 86->87 88 baee25-baee26 86->88 89 baee27-baee39 call baf00d 87->89 88->89 89->69 92 baee3b-baee41 call b9bee7 89->92 92->65
                        APIs
                        • __alloca_probe_16.LIBCMT ref: 00BAED14
                        • __alloca_probe_16.LIBCMT ref: 00BAEDD5
                        • __freea.LIBCMT ref: 00BAEE3C
                          • Part of subcall function 00BAD17B: HeapAlloc.KERNEL32(00000000,?,?,?,00B9C20A,?,?,00B9193D,?,?,00B9949E,?,?), ref: 00BAD1AD
                        • __freea.LIBCMT ref: 00BAEE51
                        • __freea.LIBCMT ref: 00BAEE61
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: __freea$__alloca_probe_16$AllocHeap
                        • String ID:
                        • API String ID: 1096550386-0
                        • Opcode ID: 4e301a6740b954828f5a60157603395ee8ddeff425138098c5bf031a20c1c888
                        • Instruction ID: af0ba572b67e57b67180bca6423c7a2ba840ce3138f50afb268fb70cc7b332ad
                        • Opcode Fuzzy Hash: 4e301a6740b954828f5a60157603395ee8ddeff425138098c5bf031a20c1c888
                        • Instruction Fuzzy Hash: C5518E72608206AFEF219F64CC81EBB3AE9EF46750F1505B8FD29D7150E731DD508660

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 95 b98e80-b98ea9 CreateThread WaitForSingleObject CloseHandle
                        APIs
                        • CreateThread.KERNELBASE(00000000,00000000,Function_00009470,00000000,00000000,00000000), ref: 00B98E90
                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00B98E9B
                        • CloseHandle.KERNEL32(00000000), ref: 00B98EA2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: CloseCreateHandleObjectSingleThreadWait
                        • String ID:
                        • API String ID: 51348343-0
                        • Opcode ID: 9033bde07684bbf24e85fc48c6a2eb39ff5163fa653539d547776ddf6bc18ad2
                        • Instruction ID: 66456dcfd59b299c75a4e89e86b413bef7acdf72372f9aa77cbbff7741dec6ed
                        • Opcode Fuzzy Hash: 9033bde07684bbf24e85fc48c6a2eb39ff5163fa653539d547776ddf6bc18ad2
                        • Instruction Fuzzy Hash: F5D01231285230BBFA7137247C0FF993A549B06B31F600340F721BA2F04ED0240185BD

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 96 bb0118-bb0140 call bafc48 99 bb0308-bb0309 call bafcb9 96->99 100 bb0146-bb014c 96->100 103 bb030e-bb0310 99->103 101 bb014f-bb0155 100->101 104 bb015b-bb0167 101->104 105 bb0257-bb0276 call b9d960 101->105 106 bb0311-bb031f call b9c539 103->106 104->101 107 bb0169-bb016f 104->107 115 bb0279-bb027e 105->115 110 bb024f-bb0252 107->110 111 bb0175-bb0181 IsValidCodePage 107->111 110->106 111->110 114 bb0187-bb018e 111->114 118 bb0190-bb019c 114->118 119 bb01b6-bb01c3 GetCPInfo 114->119 116 bb02bb-bb02c5 115->116 117 bb0280-bb0285 115->117 116->115 122 bb02c7-bb02f1 call bafc0a 116->122 120 bb02b8 117->120 121 bb0287-bb028f 117->121 123 bb01a0-bb01ac call bafd1c 118->123 124 bb0243-bb0249 119->124 125 bb01c5-bb01e4 call b9d960 119->125 120->116 126 bb0291-bb0294 121->126 127 bb02b0-bb02b6 121->127 136 bb02f2-bb0301 122->136 133 bb01b1 123->133 124->99 124->110 125->123 137 bb01e6-bb01ed 125->137 131 bb0296-bb029c 126->131 127->117 127->120 131->127 135 bb029e-bb02ae 131->135 133->103 135->127 135->131 136->136 140 bb0303 136->140 138 bb0219-bb021c 137->138 139 bb01ef-bb01f4 137->139 142 bb0221-bb0228 138->142 139->138 141 bb01f6-bb01fe 139->141 140->99 143 bb0211-bb0217 141->143 144 bb0200-bb0207 141->144 142->142 145 bb022a-bb023e call bafc0a 142->145 143->138 143->139 146 bb0208-bb020f 144->146 145->123 146->143 146->146
                        APIs
                          • Part of subcall function 00BAFC48: GetOEMCP.KERNEL32(00000000,?,?,00000000,?), ref: 00BAFC73
                        • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,00BAFF5F,?,00000000,?,00000000,?), ref: 00BB0179
                        • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,00BAFF5F,?,00000000,?,00000000,?), ref: 00BB01BB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: CodeInfoPageValid
                        • String ID:
                        • API String ID: 546120528-0
                        • Opcode ID: 168b3d967a5f7e2414e5f77322474c28b193038d00d2a08cf03b8ccb7180bc85
                        • Instruction ID: b646b6a262915324c0801688fd3dd7357872f57f74e13e1b108c4b03d19fbeb6
                        • Opcode Fuzzy Hash: 168b3d967a5f7e2414e5f77322474c28b193038d00d2a08cf03b8ccb7180bc85
                        • Instruction Fuzzy Hash: 5E515570A103459FDB25EFB5C8896FFBBF4EF45300F1480AED18697252E6B49949CB80

                        Control-flow Graph

                        APIs
                        • VirtualAlloc.KERNELBASE(00000000,000004AC,00001000,00000040,?), ref: 00B9951E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID: MZx
                        • API String ID: 4275171209-2575928145
                        • Opcode ID: 4bbbd7cad2e43b0383db912d2c2cdac0976232ca6c0efaebcfad7514cc383766
                        • Instruction ID: 7cc498fe81e09d20284f4374125046e781564525f7fcb68da9bf560ebb1d2bec
                        • Opcode Fuzzy Hash: 4bbbd7cad2e43b0383db912d2c2cdac0976232ca6c0efaebcfad7514cc383766
                        • Instruction Fuzzy Hash: F5412571D002149BDF11EB78DC45BEEB7F4EF19310F1402B9F904A7282EB75AA808764

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 187 baa7fb-baa80a call baa32d 190 baa80c-baa831 LCMapStringEx 187->190 191 baa833-baa84d call baa858 LCMapStringW 187->191 195 baa853-baa855 190->195 191->195
                        APIs
                        • LCMapStringEx.KERNELBASE(?,00BAED7B,?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 00BAA82F
                        • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00BAED7B,?,?,00000000,?,00000000), ref: 00BAA84D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: String
                        • String ID:
                        • API String ID: 2568140703-0
                        • Opcode ID: 4243d38941234fa2eff74080e91ce1e31cfbd835d93f34b2871cf81e76120115
                        • Instruction ID: 96225d78fa25b713fb22b42c69268822cafe496051bc6d093f3e7925d21cdf76
                        • Opcode Fuzzy Hash: 4243d38941234fa2eff74080e91ce1e31cfbd835d93f34b2871cf81e76120115
                        • Instruction Fuzzy Hash: FFF07A3240411ABBCF126F90EC09DDE3FA6EF593A0F058165FE1825020CB36C972EBA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 196 ba9c4c-ba9c55 197 ba9c57-ba9c6a RtlFreeHeap 196->197 198 ba9c84-ba9c85 196->198 197->198 199 ba9c6c-ba9c83 GetLastError call ba0cc0 call ba0d5d 197->199 199->198
                        APIs
                        • RtlFreeHeap.NTDLL(00000000,00000000,?,00BB11D3,?,00000000,?,?,00BB1474,?,00000007,?,?,00BB196D,?,?), ref: 00BA9C62
                        • GetLastError.KERNEL32(?,?,00BB11D3,?,00000000,?,?,00BB1474,?,00000007,?,?,00BB196D,?,?), ref: 00BA9C6D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 485612231-0
                        • Opcode ID: 04566f70082bfa0172ff5b78d4365e788e9db077037ed1e426d07d53c7ae1533
                        • Instruction ID: 69194037f0b1179367fca0499ea847e05a304dcf3fabd52c754319b189dd770a
                        • Opcode Fuzzy Hash: 04566f70082bfa0172ff5b78d4365e788e9db077037ed1e426d07d53c7ae1533
                        • Instruction Fuzzy Hash: 38E01232104614FBCB113FB5ED09B993BE8EB42765F5081A0FB0C97171EE749950DBA4

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 204 bafd1c-bafd3e 205 bafe57-bafe7d 204->205 206 bafd44-bafd56 GetCPInfo 204->206 208 bafe82-bafe87 205->208 206->205 207 bafd5c-bafd63 206->207 209 bafd65-bafd6f 207->209 210 bafe89-bafe8f 208->210 211 bafe91-bafe97 208->211 209->209 214 bafd71-bafd84 209->214 215 bafe9f-bafea1 210->215 212 bafe99-bafe9c 211->212 213 bafea3 211->213 212->215 216 bafea5-bafeb7 213->216 217 bafda5-bafda7 214->217 215->216 216->208 218 bafeb9-bafec7 call b9c539 216->218 219 bafda9-bafde0 call baeb84 call baee7b 217->219 220 bafd86-bafd8d 217->220 230 bafde5-bafe1a call baee7b 219->230 222 bafd9c-bafd9e 220->222 226 bafd8f-bafd91 222->226 227 bafda0-bafda3 222->227 226->227 229 bafd93-bafd9b 226->229 227->217 229->222 233 bafe1c-bafe26 230->233 234 bafe28-bafe32 233->234 235 bafe34-bafe36 233->235 236 bafe46-bafe53 234->236 237 bafe38-bafe42 235->237 238 bafe44 235->238 236->233 239 bafe55 236->239 237->236 238->236 239->218
                        APIs
                        • GetCPInfo.KERNEL32(E8458D00,?,00BAFF6B,00BAFF5F,00000000), ref: 00BAFD4E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: Info
                        • String ID:
                        • API String ID: 1807457897-0
                        • Opcode ID: 7f02b2d260c413c769b020684d4970d0d036efc268d0cb2b52306bfe13419e9a
                        • Instruction ID: ba78a22f04250b85783725f2126a1329cc32178bb1258278bba189d7817416ee
                        • Opcode Fuzzy Hash: 7f02b2d260c413c769b020684d4970d0d036efc268d0cb2b52306bfe13419e9a
                        • Instruction Fuzzy Hash: 675147B19082599ADB228E68CD84AFA7BF8EB57304F2405FDE59AC7152C3319D468B20

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 240 ba9bef-ba9bfa 241 ba9c08-ba9c0e 240->241 242 ba9bfc-ba9c06 240->242 244 ba9c10-ba9c11 241->244 245 ba9c27-ba9c38 RtlAllocateHeap 241->245 242->241 243 ba9c3c-ba9c47 call ba0d5d 242->243 249 ba9c49-ba9c4b 243->249 244->245 246 ba9c3a 245->246 247 ba9c13-ba9c1a call ba8520 245->247 246->249 247->243 253 ba9c1c-ba9c25 call ba856b 247->253 253->243 253->245
                        APIs
                        • RtlAllocateHeap.NTDLL(00000008,?,?,?,00BA90BE,00000001,00000364,?,00000002,000000FF,?,?,00BA0D62,00BAD1BE,?), ref: 00BA9C30
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: d25fc64caed33d0646a91b7fc0f8161a5662655e900e5411229125d3d35380a6
                        • Instruction ID: df937d43fcc3d28ec3c5ed958f29b1253e83755d1db252823b66e2946922ce0c
                        • Opcode Fuzzy Hash: d25fc64caed33d0646a91b7fc0f8161a5662655e900e5411229125d3d35380a6
                        • Instruction Fuzzy Hash: D4F0B43164D92566DB216B258C45B9B77C8EB53B70F1881A1AC189A091FE30E80166A0
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: __floor_pentium4
                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                        • API String ID: 4168288129-2761157908
                        • Opcode ID: 2514053b633b8aa31e1d0535e6e6be5254609d91e224ec5ad4af270aea42fc29
                        • Instruction ID: ea48f4cc579d942b70cbf8c6f019f22206510d30099efeff6adf57ec6b8bb3c6
                        • Opcode Fuzzy Hash: 2514053b633b8aa31e1d0535e6e6be5254609d91e224ec5ad4af270aea42fc29
                        • Instruction Fuzzy Hash: F6D21771E086288FDB65CE28DD807EAB7F5FB44305F1445EAD44EA7241DBB8AE818F41
                        APIs
                        • GetLocaleInfoW.KERNEL32(?,2000000B,00BB2C9C,00000002,00000000,?,?,?,00BB2C9C,?,00000000), ref: 00BB2A17
                        • GetLocaleInfoW.KERNEL32(?,20001004,00BB2C9C,00000002,00000000,?,?,?,00BB2C9C,?,00000000), ref: 00BB2A40
                        • GetACP.KERNEL32(?,?,00BB2C9C,?,00000000), ref: 00BB2A55
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: InfoLocale
                        • String ID: ACP$OCP
                        • API String ID: 2299586839-711371036
                        • Opcode ID: 546c87b96726edd282c2784d95810a83dc9763a8773949d3077181ef2c24bd48
                        • Instruction ID: d3ec66a13512fb873546f9558811f9c0e52956c06006c16f93c96953c1bb4441
                        • Opcode Fuzzy Hash: 546c87b96726edd282c2784d95810a83dc9763a8773949d3077181ef2c24bd48
                        • Instruction Fuzzy Hash: 7D21FC62A00100ABEB318F24C801AF773E6EB54B50B1688F0E94AD7218EBF2DE41D360
                        APIs
                          • Part of subcall function 00BA8F20: GetLastError.KERNEL32(?,00000008,00BA9F60), ref: 00BA8F24
                          • Part of subcall function 00BA8F20: SetLastError.KERNEL32(00000000,00000001,00000002,000000FF), ref: 00BA8FC6
                        • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00BB2C5F
                        • IsValidCodePage.KERNEL32(00000000), ref: 00BB2CA8
                        • IsValidLocale.KERNEL32(?,00000001), ref: 00BB2CB7
                        • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00BB2CFF
                        • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00BB2D1E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                        • String ID:
                        • API String ID: 415426439-0
                        • Opcode ID: 0b78b3c490b6b3e93b7d87145809853139ba656b9e6671f96c1e589ef25c1911
                        • Instruction ID: 651594ab725911b6c844297fd8d76a0d9a9af5633ea8380aa5a905cfe80a55c4
                        • Opcode Fuzzy Hash: 0b78b3c490b6b3e93b7d87145809853139ba656b9e6671f96c1e589ef25c1911
                        • Instruction Fuzzy Hash: F3514071A00605AFDF10DFA5DC85AFE7BF8EF18700F1445A9A911E71A1EBF0D9408B61
                        APIs
                          • Part of subcall function 00BA8F20: GetLastError.KERNEL32(?,00000008,00BA9F60), ref: 00BA8F24
                          • Part of subcall function 00BA8F20: SetLastError.KERNEL32(00000000,00000001,00000002,000000FF), ref: 00BA8FC6
                        • GetACP.KERNEL32(?,?,?,?,?,?,00BA75B4,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00BB22B0
                        • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00BA75B4,?,?,?,00000055,?,-00000050,?,?), ref: 00BB22DB
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00BB243E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: ErrorLast$CodeInfoLocalePageValid
                        • String ID: utf8
                        • API String ID: 607553120-905460609
                        • Opcode ID: fc060a5c27a30312cf4e241478b805efe29a0462f17d61e241b28a6431d17942
                        • Instruction ID: a9cdcd1cf95003bf0c4668ba3f80dc836ec8b81d2adee15024455f6f7b8fbf63
                        • Opcode Fuzzy Hash: fc060a5c27a30312cf4e241478b805efe29a0462f17d61e241b28a6431d17942
                        • Instruction Fuzzy Hash: E771E571A00206ABEB24AB74CC86BFA73E8EF59740F1444A9F905DB181FBF4E9408765
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: _strrchr
                        • String ID:
                        • API String ID: 3213747228-0
                        • Opcode ID: af5af7e577b4181119ea57b5f8589b4cd2dab420a335f791aa1a2a725df60e81
                        • Instruction ID: d091107b57e73694d0f2a3ab11983cb3cf1d840c20dee1b474bf6ebebc7242ec
                        • Opcode Fuzzy Hash: af5af7e577b4181119ea57b5f8589b4cd2dab420a335f791aa1a2a725df60e81
                        • Instruction Fuzzy Hash: 20B13672D082559FDF158F68C881BFEBBE5EF5A304F1481EAE806AB741D6349D01CBA1
                        APIs
                        • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00B9CA6A
                        • IsDebuggerPresent.KERNEL32 ref: 00B9CB36
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00B9CB4F
                        • UnhandledExceptionFilter.KERNEL32(?), ref: 00B9CB59
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                        • String ID:
                        • API String ID: 254469556-0
                        • Opcode ID: 1e96cc761437b0560afdbd851c2e020037b75eaebabf0f966e467c026e7f31fd
                        • Instruction ID: 9ee2f189c7a87bea24b0673aa14205a822555676229475ed26ed624ecedb892e
                        • Opcode Fuzzy Hash: 1e96cc761437b0560afdbd851c2e020037b75eaebabf0f966e467c026e7f31fd
                        • Instruction Fuzzy Hash: E831E475D012189BDF20EFA5D9897CDBBB8AF08300F5041EAE50CAB250EB719A84CF45
                        APIs
                          • Part of subcall function 00BA8F20: GetLastError.KERNEL32(?,00000008,00BA9F60), ref: 00BA8F24
                          • Part of subcall function 00BA8F20: SetLastError.KERNEL32(00000000,00000001,00000002,000000FF), ref: 00BA8FC6
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00BB2656
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00BB26A0
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00BB2766
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: InfoLocale$ErrorLast
                        • String ID:
                        • API String ID: 661929714-0
                        • Opcode ID: a8e270cf526f4c90d97ebfd6cd80c89aed62257c0f924616dc717f832c65fc61
                        • Instruction ID: c95aa48376a2f2c9032b00c4875119e92b76eae3e95d0ba178edaf350e08fccd
                        • Opcode Fuzzy Hash: a8e270cf526f4c90d97ebfd6cd80c89aed62257c0f924616dc717f832c65fc61
                        • Instruction Fuzzy Hash: 30615971A042179FEB289F29CC82BFAB7E8EF14300F1041E9E905D6585EBB4DD81DB94
                        APIs
                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000001), ref: 00BA0A3B
                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000001), ref: 00BA0A45
                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000001), ref: 00BA0A52
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                        • String ID:
                        • API String ID: 3906539128-0
                        • Opcode ID: 8d4e3d272ddaaafd8a56b0e40c42c69a7f9cc582c014a94f5804f667434ab941
                        • Instruction ID: 5ba275575be40ed6ff53609049033f16ef63d736f418d94de1470025861569b0
                        • Opcode Fuzzy Hash: 8d4e3d272ddaaafd8a56b0e40c42c69a7f9cc582c014a94f5804f667434ab941
                        • Instruction Fuzzy Hash: 603192749112189BCB21EF65D98978DBBF8BF18310F5041EAE51CA7251EB709F858F44
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: af6ae3fd9483a391f05e8f627912ce56f86d589dfd76ba79aad035c388c53a6b
                        • Instruction ID: b4d5a540640ff3620461dcb6e3d4217623399e3001985c28d95b3a4531275f4c
                        • Opcode Fuzzy Hash: af6ae3fd9483a391f05e8f627912ce56f86d589dfd76ba79aad035c388c53a6b
                        • Instruction Fuzzy Hash: 58F12C71E052199FDF14CF6DC880AADB7F1EF89324F1586A9E815AB390E730AD05CB94
                        APIs
                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000000), ref: 00BA97D6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: ExceptionRaise
                        • String ID:
                        • API String ID: 3997070919-0
                        • Opcode ID: 4b13fd7eacb78ec65e2fc50d71992c019d676bf75c33b1694e7ebf95633c3543
                        • Instruction ID: 1957f805f4c5750cbea992b71316c7702522220a19677220f9bfe79309067a17
                        • Opcode Fuzzy Hash: 4b13fd7eacb78ec65e2fc50d71992c019d676bf75c33b1694e7ebf95633c3543
                        • Instruction Fuzzy Hash: 86B15A35624608DFDB19CF28C486B657BE0FF46364F258698E89ACF2A1C735ED81DB40
                        APIs
                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00B9C75B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: FeaturePresentProcessor
                        • String ID:
                        • API String ID: 2325560087-0
                        • Opcode ID: ff4e21ae3e0196d739bb8beab7663ffe729e32e470ef115cb08f0e0c01a62266
                        • Instruction ID: 5e3aeb0dc0ab22023ee3fb00f5cbf8d0f63047131cb2ea1145b64f2cefa6d763
                        • Opcode Fuzzy Hash: ff4e21ae3e0196d739bb8beab7663ffe729e32e470ef115cb08f0e0c01a62266
                        • Instruction Fuzzy Hash: 895147B1A00645CBEB19CF59D9867AEBBF0FB49358F14C5AAD405EB290D3749E01CFA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c2b15bd5ec7a740bd85ea4a33a7312636155f7c7886b53dc2ae9b0305431c9be
                        • Instruction ID: a0d5697b863b5dc835ed39cfab8f18c35e9b7c0a5e7cebf1536c08e393810d97
                        • Opcode Fuzzy Hash: c2b15bd5ec7a740bd85ea4a33a7312636155f7c7886b53dc2ae9b0305431c9be
                        • Instruction Fuzzy Hash: A7417275808219AFDF209FB9CC89AFABBF9EB46304F1442E9E458D3211DA359E458F10
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0
                        • API String ID: 0-4108050209
                        • Opcode ID: a09506f314829c4894c3238bc7ecc2bb3346f162d1671b72ecaffef87c49290e
                        • Instruction ID: 2549591ddfaf58ab3ece0c652dbc87c2d6c780a57e9d6d393b724346396309dd
                        • Opcode Fuzzy Hash: a09506f314829c4894c3238bc7ecc2bb3346f162d1671b72ecaffef87c49290e
                        • Instruction Fuzzy Hash: 58C1BF74A086868FCB24CF68C4806ABB7F1FFC7310F2446E9D4969B691C7B4AD49CB51
                        APIs
                          • Part of subcall function 00BA8F20: GetLastError.KERNEL32(?,00000008,00BA9F60), ref: 00BA8F24
                          • Part of subcall function 00BA8F20: SetLastError.KERNEL32(00000000,00000001,00000002,000000FF), ref: 00BA8FC6
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00BB28A9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: ErrorLast$InfoLocale
                        • String ID:
                        • API String ID: 3736152602-0
                        • Opcode ID: d55729d56d51791eadfdd87faa614ef92172a9513b642e59df80cbc28700d1c1
                        • Instruction ID: 14652f8eba9d2d2fc17e7b27a0a6666f57a9503eca9dbc96cfdb36941e289791
                        • Opcode Fuzzy Hash: d55729d56d51791eadfdd87faa614ef92172a9513b642e59df80cbc28700d1c1
                        • Instruction Fuzzy Hash: E0217F72A0420AAFEB289B25DC42AFA73E8EF45314F1040BAF905D6145EAB5ED448650
                        APIs
                          • Part of subcall function 00BA8F20: GetLastError.KERNEL32(?,00000008,00BA9F60), ref: 00BA8F24
                          • Part of subcall function 00BA8F20: SetLastError.KERNEL32(00000000,00000001,00000002,000000FF), ref: 00BA8FC6
                        • EnumSystemLocalesW.KERNEL32(00BB2602,00000001,00000000,?,-00000050,?,00BB2C33,00000000,?,?,?,00000055,?), ref: 00BB254E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: ErrorLast$EnumLocalesSystem
                        • String ID:
                        • API String ID: 2417226690-0
                        • Opcode ID: 7f95f00f113003e0a19a97dcab17ca63845cdfbde0a40220ca05f32e916698ed
                        • Instruction ID: 3c593afe451876414a22f9bd9fbe12312c89cc8e717b07c1653bfb326ac39da1
                        • Opcode Fuzzy Hash: 7f95f00f113003e0a19a97dcab17ca63845cdfbde0a40220ca05f32e916698ed
                        • Instruction Fuzzy Hash: 5C1108376007059FDB289F39D8A16BAB7D2FF94358B14446CE98787B40E7B1B942D740
                        APIs
                          • Part of subcall function 00BA8F20: GetLastError.KERNEL32(?,00000008,00BA9F60), ref: 00BA8F24
                          • Part of subcall function 00BA8F20: SetLastError.KERNEL32(00000000,00000001,00000002,000000FF), ref: 00BA8FC6
                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00BB281E,00000000,00000000,?), ref: 00BB2AB0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: ErrorLast$InfoLocale
                        • String ID:
                        • API String ID: 3736152602-0
                        • Opcode ID: bcc621bfccc93eb99509ea9eef45d2cab837a852583896e28040a8923be19a9e
                        • Instruction ID: 0d5f02ef2afaf7d1406515736b564491549d0f953cb30904732b7220353f8088
                        • Opcode Fuzzy Hash: bcc621bfccc93eb99509ea9eef45d2cab837a852583896e28040a8923be19a9e
                        • Instruction Fuzzy Hash: 8BF0A9326005127BDB3467248C45AFB77D8EB40758F2544A5ED06A3580EAB5FE42C590
                        APIs
                          • Part of subcall function 00BA8F20: GetLastError.KERNEL32(?,00000008,00BA9F60), ref: 00BA8F24
                          • Part of subcall function 00BA8F20: SetLastError.KERNEL32(00000000,00000001,00000002,000000FF), ref: 00BA8FC6
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00BB243E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: ErrorLast$InfoLocale
                        • String ID: utf8
                        • API String ID: 3736152602-905460609
                        • Opcode ID: b8356529b4fc1cd8dd70c71521592a2f27b9c4236e626a4aaea4685dd8319332
                        • Instruction ID: 463b4c0451564ef08295e07e9ab59064ac944f80f56d4062e1047b43b02ecc82
                        • Opcode Fuzzy Hash: b8356529b4fc1cd8dd70c71521592a2f27b9c4236e626a4aaea4685dd8319332
                        • Instruction Fuzzy Hash: 1AF0A433A14106ABDB14AB24DC4AAFA73E8DB49354F1541B9B606DB281EE74AD058790
                        APIs
                          • Part of subcall function 00BA8F20: GetLastError.KERNEL32(?,00000008,00BA9F60), ref: 00BA8F24
                          • Part of subcall function 00BA8F20: SetLastError.KERNEL32(00000000,00000001,00000002,000000FF), ref: 00BA8FC6
                        • EnumSystemLocalesW.KERNEL32(00BB2855,00000001,?,?,-00000050,?,00BB2BF7,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 00BB25C1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: ErrorLast$EnumLocalesSystem
                        • String ID:
                        • API String ID: 2417226690-0
                        • Opcode ID: b5d09a88f76ec002083494c700eb8b36bd5448836b2e96be0d5d88538b52d230
                        • Instruction ID: 844af3fafc4ba9220350a1c3c7acc8f3eb419bc01ed40ef130c35bf580f186ba
                        • Opcode Fuzzy Hash: b5d09a88f76ec002083494c700eb8b36bd5448836b2e96be0d5d88538b52d230
                        • Instruction Fuzzy Hash: 3AF0F0362003046FDB245F39DC96ABA7BD5FF84768F0584ACFE458BA90DAF1AC42C650
                        APIs
                          • Part of subcall function 00BA5359: EnterCriticalSection.KERNEL32(?,?,00BA85AF,00000000,00BC4230,0000000C,00BA8576,?,?,00BA9C22,?,?,00BA90BE,00000001,00000364,?), ref: 00BA5368
                        • EnumSystemLocalesW.KERNEL32(00BAA18B,00000001,00BC4398,0000000C,00BAA5BA,00000000), ref: 00BAA1D0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: CriticalEnterEnumLocalesSectionSystem
                        • String ID:
                        • API String ID: 1272433827-0
                        • Opcode ID: 7bb5e897a534db4c5abb42fa8ab714f33e5cdedb37f15506fe3f9ee556196db5
                        • Instruction ID: 5e3587a90d3f30c1faf90c3e0473851cab5d7fa662fa6e08c0beb67194e028e3
                        • Opcode Fuzzy Hash: 7bb5e897a534db4c5abb42fa8ab714f33e5cdedb37f15506fe3f9ee556196db5
                        • Instruction Fuzzy Hash: D9F04F72A14204EFDB00DF98E842B9D7BF0FB46725F0081AAF411E72A0C7B54A01CB95
                        APIs
                          • Part of subcall function 00BA8F20: GetLastError.KERNEL32(?,00000008,00BA9F60), ref: 00BA8F24
                          • Part of subcall function 00BA8F20: SetLastError.KERNEL32(00000000,00000001,00000002,000000FF), ref: 00BA8FC6
                        • EnumSystemLocalesW.KERNEL32(00BB23EA,00000001,?,?,?,00BB2C55,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00BB24C8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: ErrorLast$EnumLocalesSystem
                        • String ID:
                        • API String ID: 2417226690-0
                        • Opcode ID: 0d0694a9f611e1f49ee0a8d9c8612283759d4b37f55f59f90e7dfbefb1b0ff99
                        • Instruction ID: f8da5a4475ecb267c4d2ac7eb185c9ebc6105056823e1a3ec87ce13bc8a8f389
                        • Opcode Fuzzy Hash: 0d0694a9f611e1f49ee0a8d9c8612283759d4b37f55f59f90e7dfbefb1b0ff99
                        • Instruction Fuzzy Hash: 16F0E5363002056BDB14AF39D8556BA7FD4EFC2764B064098FB058B690D6B59843C7A0
                        APIs
                        • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00BA811A,?,20001004,00000000,00000002,?,?,00BA771C), ref: 00BAA6F2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: InfoLocale
                        • String ID:
                        • API String ID: 2299586839-0
                        • Opcode ID: 47c47f9a8a7dd4acd79b59d8d852e175d9e19dedb8eeef76a858752df14c0806
                        • Instruction ID: bf1fc34da10cae4acb5a9fdc9e9c716254bc1d35be75a958c3860d068b701035
                        • Opcode Fuzzy Hash: 47c47f9a8a7dd4acd79b59d8d852e175d9e19dedb8eeef76a858752df14c0806
                        • Instruction Fuzzy Hash: 5AE04F31544219BBCF122F64DC09AEE3F59EF45761F044091FD0566120CB728D61EAA6
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(Function_0000CBC6,00B9C057), ref: 00B9CBBF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: a7604ec4b3d391624764f4aa35cc2c575f8136baa38b2699af73fa9a615e5053
                        • Instruction ID: edffd012f1695595bb5f459a7a7133054636de4c73a25f136fd7f6e57c36ab0e
                        • Opcode Fuzzy Hash: a7604ec4b3d391624764f4aa35cc2c575f8136baa38b2699af73fa9a615e5053
                        • Instruction Fuzzy Hash:
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: HeapProcess
                        • String ID:
                        • API String ID: 54951025-0
                        • Opcode ID: 5a9af41208e3b647d08f23fffce6811d6e85421160be14c1d088381eb088d0d4
                        • Instruction ID: e87ad94f9dceb3ec16b5b0c92319d1dff7043cce5e0c425c7e244767b77a7abc
                        • Opcode Fuzzy Hash: 5a9af41208e3b647d08f23fffce6811d6e85421160be14c1d088381eb088d0d4
                        • Instruction Fuzzy Hash: FFA01130202202CB83808F30AA0838C3AAAAA0AB80B088028A80CC2030EA308080AA02
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d68d157ed3f23d2e7f712cb80350cb65e748a041e233389d36e2ce437137fa02
                        • Instruction ID: da001a919bedc117ce7d9b6f9347d57b7f59bdcd20a62a736f531ff9b9819bff
                        • Opcode Fuzzy Hash: d68d157ed3f23d2e7f712cb80350cb65e748a041e233389d36e2ce437137fa02
                        • Instruction Fuzzy Hash: A4D1AE729187409FCB14DF28C841A2FBBE5FFC9344F054AADF985A7211EB30E9448B92
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: ErrorLastProcess$CurrentFeatureInfoLocalePresentProcessorTerminate
                        • String ID:
                        • API String ID: 3471368781-0
                        • Opcode ID: 42b7fa85c6344ce83373d20aab8300f1e43932c152fddb5b788e9f2871902126
                        • Instruction ID: bbe9081eb2db3d49288bd7199bfb05ce63f9322835c527076666a67bc34ad402
                        • Opcode Fuzzy Hash: 42b7fa85c6344ce83373d20aab8300f1e43932c152fddb5b788e9f2871902126
                        • Instruction Fuzzy Hash: 97B117755007029BDB349F29CCA2AF7B3E8EF45308F9449ADEA47C6580EBB5E945CB10
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 64790d26a2dc6237abb0fb2d2b8c559971759db760470901cd63eb1399a2f77a
                        • Instruction ID: 04da8b237a030443b997c1ce2ddaac54fc1036bb81e90139c76524c0559d59b6
                        • Opcode Fuzzy Hash: 64790d26a2dc6237abb0fb2d2b8c559971759db760470901cd63eb1399a2f77a
                        • Instruction Fuzzy Hash: A7E08C32915228EFCB14DB8DC944D8AF3ECEB4AB50B11009AF502D3200CA70DE00C7D0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 91ce65965f677a269b1c60671c8da158d5b00d0bbadb482b9f42c654bd54b25c
                        • Instruction ID: e15933e91b374665055a825c9ccdadbda085a11f376a03163b500c8c921ea892
                        • Opcode Fuzzy Hash: 91ce65965f677a269b1c60671c8da158d5b00d0bbadb482b9f42c654bd54b25c
                        • Instruction Fuzzy Hash: 5DC08C750049804ACF29CA1082713A933E4E793792F8808CCC4430BBC2E51EAC82D640
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00B922E5
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00B922FF
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00B92320
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00B92378
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00B923BD
                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00B9240E
                        • __Getctype.LIBCPMT ref: 00B92425
                        • std::_Facet_Register.LIBCPMT ref: 00B9244F
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00B92468
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeLocinfo::_Locinfo_ctorRegister
                        • String ID: ($j$bad locale name
                        • API String ID: 2236780835-2769417048
                        • Opcode ID: 69cddbba7e37e9342aee78433fff38bd3c1ab820f606d2433b4d01ab81e47ca5
                        • Instruction ID: b357816b487b258d9522b0b39d4d8af8ba587fdcef3a8ded9182584b7c9d543c
                        • Opcode Fuzzy Hash: 69cddbba7e37e9342aee78433fff38bd3c1ab820f606d2433b4d01ab81e47ca5
                        • Instruction Fuzzy Hash: 2D41F331908390AFCB11DF14D880BAABBE0FF91714F1585ACE8859B362D735E945CBD2
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00B92152
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00B9216F
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00B92190
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00B921EB
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00B9222C
                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00B9226F
                        • std::_Facet_Register.LIBCPMT ref: 00B92298
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00B922B1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Locinfo::_Locinfo_ctorRegister
                        • String ID: bad locale name
                        • API String ID: 3126792616-1405518554
                        • Opcode ID: 3dfdabef3e895de65311e2561544725de807202aae20ada7542d32358d57fea8
                        • Instruction ID: 340145446c0a891ec6dbcb505d776b8c0479f9e74c64df077c5d73c86c048f08
                        • Opcode Fuzzy Hash: 3dfdabef3e895de65311e2561544725de807202aae20ada7542d32358d57fea8
                        • Instruction Fuzzy Hash: 9A41AD72904350AFCB11DF18D880A9ABBE0FF95710F1584BDE989A7361DB31EE05CB92
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00B924A2
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00B924BF
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00B924E0
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00B9253B
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00B9257C
                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00B925BF
                        • std::_Facet_Register.LIBCPMT ref: 00B925E8
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00B92601
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Locinfo::_Locinfo_ctorRegister
                        • String ID: bad locale name
                        • API String ID: 3126792616-1405518554
                        • Opcode ID: a8a502ae7aeb1ca1cb1105661979990a316f48a217ab76f403310452d0968294
                        • Instruction ID: b597bb2a68c8e67c416bdd4a11de83f3693b087cb96d269913a77608297abdcb
                        • Opcode Fuzzy Hash: a8a502ae7aeb1ca1cb1105661979990a316f48a217ab76f403310452d0968294
                        • Instruction Fuzzy Hash: 4E41AD71908340AFCB10DF18D890A9ABBE4FB95710F1688ADE88997361D731EE45CB92
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00B958C1
                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00B95908
                        • Concurrency::cancel_current_task.LIBCPMT ref: 00B959CA
                        • Concurrency::cancel_current_task.LIBCPMT ref: 00B959CF
                        • Concurrency::cancel_current_task.LIBCPMT ref: 00B959D4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: Concurrency::cancel_current_task$std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                        • String ID: bad locale name$false$true
                        • API String ID: 164343898-1062449267
                        • Opcode ID: a1cf1cc62b3e6a9ab114f5b1ca013f0ebc2e1b4d1deb2e4e5d3442a51189b422
                        • Instruction ID: f71f8d416bf96d10124cc7d43a6dec614e5647d77fc18b7d6c093e5ea825b8a5
                        • Opcode Fuzzy Hash: a1cf1cc62b3e6a9ab114f5b1ca013f0ebc2e1b4d1deb2e4e5d3442a51189b422
                        • Instruction Fuzzy Hash: 384102705493409FDB20EF68888179ABBE4FF85710F4449BEF5889B342E7B0D905CBA2
                        APIs
                        • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00B9BF0B
                        • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 00B9BF19
                        • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00B9BF2A
                        • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 00B9BF3B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: AddressProc$HandleModule
                        • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                        • API String ID: 667068680-1247241052
                        • Opcode ID: 676e815e005e2461f53649c76ebc81d5842c03ef2077e99d186edaaaf86fcbc6
                        • Instruction ID: 4954899c2eebf486b6b756b745ab314e4c9578141a4209f8a3916cede9bda776
                        • Opcode Fuzzy Hash: 676e815e005e2461f53649c76ebc81d5842c03ef2077e99d186edaaaf86fcbc6
                        • Instruction Fuzzy Hash: 83E0B671A95260BF8B20AFB0AC49ADA3EA4BA5A6113408652B501D32B4EAF046408B61
                        APIs
                        • type_info::operator==.LIBVCRUNTIME ref: 00B9F9C7
                        • ___TypeMatch.LIBVCRUNTIME ref: 00B9FAD5
                        • _UnwindNestedFrames.LIBCMT ref: 00B9FC27
                        • CallUnexpected.LIBVCRUNTIME ref: 00B9FC42
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                        • String ID: csm$csm$csm
                        • API String ID: 2751267872-393685449
                        • Opcode ID: 40ddbdb3c391d248ce8b7a4684fd7c3eb0e015b8c653cb73d1e7504e94a067d8
                        • Instruction ID: 64efbc99c08c9326fa91bc081f39bd44ce1f771fe6d5ae70d88f3395f3a6ff55
                        • Opcode Fuzzy Hash: 40ddbdb3c391d248ce8b7a4684fd7c3eb0e015b8c653cb73d1e7504e94a067d8
                        • Instruction Fuzzy Hash: 2FB1477180020AAFCF19DFA4D991ABEBBF5FF14324F1441BAE815AB212D731DA51CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID: 0-3907804496
                        • Opcode ID: 8ea82962b1fd3e4ad16b4035ed532e2b0592bfa1da98ea10e141e43a01666e88
                        • Instruction ID: 785678d144abc897182e2fc6539a3c60f735b2512660f8ad8f4783d965401af8
                        • Opcode Fuzzy Hash: 8ea82962b1fd3e4ad16b4035ed532e2b0592bfa1da98ea10e141e43a01666e88
                        • Instruction Fuzzy Hash: 16B1F571A08249AFDB15DF98C980BAD7FF1EF47314F1481E4E858AB292D7719D42CBA0
                        APIs
                        • GetCPInfo.KERNEL32(0069FD48,0069FD48,?,7FFFFFFF,?,00BB748F,0069FD48,0069FD48,?,0069FD48,?,?,?,?,0069FD48,?), ref: 00BB7265
                        • __alloca_probe_16.LIBCMT ref: 00BB7320
                        • __alloca_probe_16.LIBCMT ref: 00BB73AF
                        • __freea.LIBCMT ref: 00BB73FA
                        • __freea.LIBCMT ref: 00BB7400
                        • __freea.LIBCMT ref: 00BB7436
                        • __freea.LIBCMT ref: 00BB743C
                        • __freea.LIBCMT ref: 00BB744C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: __freea$__alloca_probe_16$Info
                        • String ID:
                        • API String ID: 127012223-0
                        • Opcode ID: 7b5d1971e63cf992710cdceb84e5d0e6a99cb0148bdb61ef4113fcc8406be057
                        • Instruction ID: 18e6f38d627e5916df9e53edae9b30539955dbc9f18f3140f8b518a64d677203
                        • Opcode Fuzzy Hash: 7b5d1971e63cf992710cdceb84e5d0e6a99cb0148bdb61ef4113fcc8406be057
                        • Instruction Fuzzy Hash: DA71B1729882055FDF219AA48C82FFE7BE9DF86310F2500D9F945A7281EFB5D801C7A5
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 00B9BD64
                        • __alloca_probe_16.LIBCMT ref: 00B9BD90
                        • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 00B9BDCF
                        • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00B9BDEC
                        • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00B9BE2B
                        • __alloca_probe_16.LIBCMT ref: 00B9BE48
                        • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00B9BE8A
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00B9BEAD
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: ByteCharMultiStringWide$__alloca_probe_16
                        • String ID:
                        • API String ID: 2040435927-0
                        • Opcode ID: 68b9fa7dc612a14bff198c96ec886f16945b441a9fa1cf71519df873e3567f2f
                        • Instruction ID: 55c01e36017043020829064ddc4119562f778f3037fe63b47ed6bbe490397d98
                        • Opcode Fuzzy Hash: 68b9fa7dc612a14bff198c96ec886f16945b441a9fa1cf71519df873e3567f2f
                        • Instruction Fuzzy Hash: 1051BC7250061AAFEF209F61ED85FEB7BE9EF45750F1149B5FA0096190D7748C00CB60
                        APIs
                        • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,0C3C7A9A,?,00BAA46E,?,?,?,00000000), ref: 00BAA422
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID: api-ms-$ext-ms-
                        • API String ID: 3664257935-537541572
                        • Opcode ID: 9f4b58deeb5c1023cb4720677682f9a50b8707e6131688c7f52f0fd484cee149
                        • Instruction ID: 857400cce833d72df0207c86529bb11183ff759ab04b5bb12e7d330e3bd6ff36
                        • Opcode Fuzzy Hash: 9f4b58deeb5c1023cb4720677682f9a50b8707e6131688c7f52f0fd484cee149
                        • Instruction Fuzzy Hash: D221E732A05251ABCB21AB249C84AAE77E8DF47760F1442A0FD15A7390EFB0ED04C6F1
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00B9262D
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00B9264B
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00B9266C
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00B926BC
                        • std::_Facet_Register.LIBCPMT ref: 00B926E6
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00B926FF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: std::_$Lockit$Lockit::~_$Lockit::_$Facet_Register
                        • String ID:
                        • API String ID: 1858714459-0
                        • Opcode ID: 0943d3ee0cd98a2b1020a2abc586e1c8af66c187cd34d1064720c84a78c8b1aa
                        • Instruction ID: eea8becafddd740227b1751b9fa6b313dae716a9e49f0ec11de8e726475b284f
                        • Opcode Fuzzy Hash: 0943d3ee0cd98a2b1020a2abc586e1c8af66c187cd34d1064720c84a78c8b1aa
                        • Instruction Fuzzy Hash: 4021F831900250AFCF11DF14E881A9EBBE0FB86324F1585BDE88557261DB31EE0ACBD2
                        APIs
                        • GetLastError.KERNEL32(?,?,00B9F531,00B9DC6D,00B9AB8F,0C3C7A9A,?,?,?,?,00BB8872,000000FF), ref: 00B9F548
                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00B9F556
                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00B9F56F
                        • SetLastError.KERNEL32(00000000,?,00B9F531,00B9DC6D,00B9AB8F,0C3C7A9A,?,?,?,?,00BB8872,000000FF), ref: 00B9F5C1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: ErrorLastValue___vcrt_
                        • String ID:
                        • API String ID: 3852720340-0
                        • Opcode ID: 33bea3f7aaf043f4c8b980a482d689da56d14e5e23988c8adc5ef9e607f84ada
                        • Instruction ID: cd8b3d08c818b32bf6c3d71d1b5177ab1242fadd611e12f04cb264679415059a
                        • Opcode Fuzzy Hash: 33bea3f7aaf043f4c8b980a482d689da56d14e5e23988c8adc5ef9e607f84ada
                        • Instruction Fuzzy Hash: FA01D43651C2125EEE243A74AC8577A26D8EB237F5B2283BAF610C21F0EF518C029240
                        APIs
                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,0C3C7A9A,?,?,00000000,00BB8A7C,000000FF,?,00BA6C27,?,?,00BA6BFB,00000016), ref: 00BA6CCC
                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00BA6CDE
                        • FreeLibrary.KERNEL32(00000000,?,00000000,00BB8A7C,000000FF,?,00BA6C27,?,?,00BA6BFB,00000016), ref: 00BA6D00
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$mscoree.dll
                        • API String ID: 4061214504-1276376045
                        • Opcode ID: a5cb48b053d69bb3598b061eaf4ce14f408797186db1cd1af884ecfc2ae73490
                        • Instruction ID: 0866929b7050a6ef5f2fcd9e0f832276d5cad43e0366b2b449e5eccab5aa2419
                        • Opcode Fuzzy Hash: a5cb48b053d69bb3598b061eaf4ce14f408797186db1cd1af884ecfc2ae73490
                        • Instruction Fuzzy Hash: BD01A271A04629EFDB119F44DC49BFEBBF8FB04B50F044265EC11A22E0DFB49804CA50
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00B9AD8C
                        • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,0C3C7A9A), ref: 00B9ADAB
                        • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,00000000), ref: 00B9ADD9
                        • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,00000000), ref: 00B9AE34
                        • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,00000000), ref: 00B9AE4B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: AcquireExclusiveLock$CurrentThread
                        • String ID:
                        • API String ID: 66001078-0
                        • Opcode ID: 3c21253323f14df3d4f4f59a38d80dda987e8ea9a0df9769e8a79e23bb1cb76e
                        • Instruction ID: bbedd1d0409ddf96239b3547f3fdb6e1fca74619ef11ca30810d4ce61634daa2
                        • Opcode Fuzzy Hash: 3c21253323f14df3d4f4f59a38d80dda987e8ea9a0df9769e8a79e23bb1cb76e
                        • Instruction Fuzzy Hash: 6A413830900A06DFCF20DF65D4809AAB3F9FF09351B604AB9E54697950D730F985CBA2
                        APIs
                        • __EH_prolog3.LIBCMT ref: 00B9B21D
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00B9B228
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00B9B296
                          • Part of subcall function 00B9B379: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00B9B391
                        • std::locale::_Setgloballocale.LIBCPMT ref: 00B9B243
                        • _Yarn.LIBCPMT ref: 00B9B259
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                        • String ID:
                        • API String ID: 1088826258-0
                        • Opcode ID: 749174a82f0d7c8aaab6caa99b095aad9d31f4e1562dc3c3dda7ff8b35b6b597
                        • Instruction ID: 39d0d7fa59585e1da7237421408b151460a1759976554928849fc2fa7c1e4d46
                        • Opcode Fuzzy Hash: 749174a82f0d7c8aaab6caa99b095aad9d31f4e1562dc3c3dda7ff8b35b6b597
                        • Instruction Fuzzy Hash: AF01D431A002119BDF06EB20D985ABD7FF5FF85750B1540A8E801573A2CF74AE42DBC6
                        APIs
                        • LoadLibraryExW.KERNEL32(00000011,00000000,00000800,?,00BA05E3,00000000,00000001,00C13ACC,?,?,?,00BA0786,00000004,InitializeCriticalSectionEx,00BBB150,InitializeCriticalSectionEx), ref: 00BA063F
                        • GetLastError.KERNEL32(?,00BA05E3,00000000,00000001,00C13ACC,?,?,?,00BA0786,00000004,InitializeCriticalSectionEx,00BBB150,InitializeCriticalSectionEx,00000000,?,00BA053D), ref: 00BA0649
                        • LoadLibraryExW.KERNEL32(00000011,00000000,00000000,?,00000011,00B9F4A3), ref: 00BA0671
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: LibraryLoad$ErrorLast
                        • String ID: api-ms-
                        • API String ID: 3177248105-2084034818
                        • Opcode ID: f974f38525b20fd476e1a6f1e2607c84edfad72fe9e873a4867c5d8cf8ccb771
                        • Instruction ID: b1f21893bf5734ae7731d83c7f36aa8a65dc9b4be57516376d7c050b7d5242bd
                        • Opcode Fuzzy Hash: f974f38525b20fd476e1a6f1e2607c84edfad72fe9e873a4867c5d8cf8ccb771
                        • Instruction Fuzzy Hash: 8FE01A30284204BFEF203B61EC06B693AE5AF41B54F504060FA0CE84A1DFA2982089A4
                        APIs
                        • GetConsoleOutputCP.KERNEL32(0C3C7A9A,00000000,00000000,00000000), ref: 00BAAFAA
                          • Part of subcall function 00BAF00D: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00BAEE32,?,00000000,-00000008), ref: 00BAF0B9
                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00BAB205
                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00BAB24D
                        • GetLastError.KERNEL32 ref: 00BAB2F0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                        • String ID:
                        • API String ID: 2112829910-0
                        • Opcode ID: 2fc36d755125fb3e79b3667ce9fa978e75205eaa8613ab0c3fa29e51c2b055c0
                        • Instruction ID: 6affce1bbe407141212f8ed17e77d9967487145a6e12f65b1d415348025378dd
                        • Opcode Fuzzy Hash: 2fc36d755125fb3e79b3667ce9fa978e75205eaa8613ab0c3fa29e51c2b055c0
                        • Instruction Fuzzy Hash: 5FD14BB5D042489FCB15CFE8D880AEDBBF5FF4A304F1841AAE925EB252D730A945CB50
                        APIs
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00B95716
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00B95721
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00B95825
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00B95830
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: Cpp_errorThrow_std::_
                        • String ID:
                        • API String ID: 2134207285-0
                        • Opcode ID: 3ec27c3f9272dfcaffb6932c175bb84e7f14f21c3b7a8746133af53c0f4b8ae4
                        • Instruction ID: b552e9fc315bbbf25f6fbcf479261be93bf1d001bd00d2361d837d2dadf5ec2d
                        • Opcode Fuzzy Hash: 3ec27c3f9272dfcaffb6932c175bb84e7f14f21c3b7a8746133af53c0f4b8ae4
                        • Instruction Fuzzy Hash: 19510571800B40ABEF36AB749846B5BBBD4EF11300F044DBDF59606992D7B5A948C7A3
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: AdjustPointer
                        • String ID:
                        • API String ID: 1740715915-0
                        • Opcode ID: 39e47e625f5bd290170701ba83f5ff47df04b90648cd5ad001cb4e041ff520fb
                        • Instruction ID: be5f24ec3983d861b4516cf60a7a060ef0f1f62b4d1558309a2e2a6e7ceeeca6
                        • Opcode Fuzzy Hash: 39e47e625f5bd290170701ba83f5ff47df04b90648cd5ad001cb4e041ff520fb
                        • Instruction Fuzzy Hash: 81519C72A04207AFEF299FA0D881BBA77E4EF04720F1445BDE915872A1D735AC40CB90
                        APIs
                          • Part of subcall function 00BAF00D: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00BAEE32,?,00000000,-00000008), ref: 00BAF0B9
                        • GetLastError.KERNEL32 ref: 00BAF48D
                        • __dosmaperr.LIBCMT ref: 00BAF494
                        • GetLastError.KERNEL32(?,?,?,?), ref: 00BAF4CE
                        • __dosmaperr.LIBCMT ref: 00BAF4D5
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                        • String ID:
                        • API String ID: 1913693674-0
                        • Opcode ID: 1fff2ce16c26348e4939269466784bbf4315b889127d091828c09ecb05e6a4d1
                        • Instruction ID: 27650d51d5680da6d425cb618177bd60906b15f53c4077a3be5a74f38a101481
                        • Opcode Fuzzy Hash: 1fff2ce16c26348e4939269466784bbf4315b889127d091828c09ecb05e6a4d1
                        • Instruction Fuzzy Hash: 7C218871608606AFDB20AFE1C8909BB77E9EF0636471085B9F95997251DF30ED418790
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ef7458342202ed267df22c38dce282617f8f8c68e334b2618d478534c74d4c34
                        • Instruction ID: 6b9e5d50c76bbdadb950fbbe7f6cddf1fe9adf6a9c791bc4b739e247d449a1b6
                        • Opcode Fuzzy Hash: ef7458342202ed267df22c38dce282617f8f8c68e334b2618d478534c74d4c34
                        • Instruction Fuzzy Hash: 4E218171208A05AFDB30AF618C90D6B77EDEF0336471145A5F969D7151EB30EF5087A0
                        APIs
                        • GetEnvironmentStringsW.KERNEL32 ref: 00BB03C7
                          • Part of subcall function 00BAF00D: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00BAEE32,?,00000000,-00000008), ref: 00BAF0B9
                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00BB03FF
                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00BB041F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                        • String ID:
                        • API String ID: 158306478-0
                        • Opcode ID: d7b3fad67adf80d43f07c1cfe1363cbfc8d046bcda469db4bb691a27020fd845
                        • Instruction ID: a9e61ec5b1fb4d7f87c494dec121c95442c2702bd8fb0a583c6fa8c075fa0074
                        • Opcode Fuzzy Hash: d7b3fad67adf80d43f07c1cfe1363cbfc8d046bcda469db4bb691a27020fd845
                        • Instruction Fuzzy Hash: 3A11ADF16156167F6B1137B59C8ECFF3AECDE863A571105E4FA02A2211FEA08E0192B1
                        APIs
                        • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,00000000,?,00BB3C3A,00000000,00000001,00000000,00000000,?,00BAB344,00000000,00000000,00000000), ref: 00BB6BFE
                        • GetLastError.KERNEL32(?,00BB3C3A,00000000,00000001,00000000,00000000,?,00BAB344,00000000,00000000,00000000,00000000,00000000,?,00BAB8CB,00000000), ref: 00BB6C0A
                          • Part of subcall function 00BB6BD0: CloseHandle.KERNEL32(FFFFFFFE,00BB6C1A,?,00BB3C3A,00000000,00000001,00000000,00000000,?,00BAB344,00000000,00000000,00000000,00000000,00000000), ref: 00BB6BE0
                        • ___initconout.LIBCMT ref: 00BB6C1A
                          • Part of subcall function 00BB6B92: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00BB6BC1,00BB3C27,00000000,?,00BAB344,00000000,00000000,00000000,00000000), ref: 00BB6BA5
                        • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,?,00BB3C3A,00000000,00000001,00000000,00000000,?,00BAB344,00000000,00000000,00000000,00000000), ref: 00BB6C2F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                        • String ID:
                        • API String ID: 2744216297-0
                        • Opcode ID: 6b158d5eb316dc7f17f5f208f89909ef61cd81c534302977a0b757831a455bd1
                        • Instruction ID: e95d4614b2e2df836cad892d415b448313932eef96bd8e06474b8cce3965f892
                        • Opcode Fuzzy Hash: 6b158d5eb316dc7f17f5f208f89909ef61cd81c534302977a0b757831a455bd1
                        • Instruction Fuzzy Hash: FAF0C03650012CBBCF222F95DC19ADD3F76FB0A3B1F548154FA5896130CA768D20EB90
                        APIs
                        • ___except_validate_context_record.LIBVCRUNTIME ref: 00B9F37F
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00B9F433
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: CurrentImageNonwritable___except_validate_context_record
                        • String ID: csm
                        • API String ID: 3480331319-1018135373
                        • Opcode ID: a21538b824931b59cc17e577da50b84cfea458df3cd3965778cf3fee0cb7bf91
                        • Instruction ID: 452261fc859b38448d08cbc7563daa1209fb7a081e24ee06d83388687a81aa28
                        • Opcode Fuzzy Hash: a21538b824931b59cc17e577da50b84cfea458df3cd3965778cf3fee0cb7bf91
                        • Instruction Fuzzy Hash: A341B230A04209ABCF10EF68C881AAEBBF5EF45324F14C1F5E9149B392D775D901CB90
                        APIs
                        • EncodePointer.KERNEL32(00000000,?), ref: 00B9FC72
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: EncodePointer
                        • String ID: MOC$RCC
                        • API String ID: 2118026453-2084237596
                        • Opcode ID: 1227a90e758e99c44e5d845ed387a02af9475fcda0b98a807ae571abc1f7a955
                        • Instruction ID: 6c15f0aacd700970ad018a1fdd76d03915f7835aa3b3b87ef3263e9b66111cff
                        • Opcode Fuzzy Hash: 1227a90e758e99c44e5d845ed387a02af9475fcda0b98a807ae571abc1f7a955
                        • Instruction Fuzzy Hash: 0A41387290020AAFCF15DFA8C981AEEBBF5FF48324F1481B9F914A7261D3359951DB50
                        APIs
                        • __alloca_probe_16.LIBCMT ref: 00B9ACD8
                        • RaiseException.KERNEL32(?,?,?,?,?,00000000), ref: 00B9ACFD
                          • Part of subcall function 00B9CFC0: RaiseException.KERNEL32(E06D7363,00000001,00000003,00B9CCE1,?,?,?,?,00B9CCE1,?,00BC379C), ref: 00B9D020
                          • Part of subcall function 00BA0D70: IsProcessorFeaturePresent.KERNEL32(00000017,00BA0942,?,00BA08B1,00000001,00000016,00BA0AC0,?,?,?,?,?,00000000), ref: 00BA0D8C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: ExceptionRaise$FeaturePresentProcessor__alloca_probe_16
                        • String ID: csm
                        • API String ID: 1924019822-1018135373
                        • Opcode ID: 5d6a63569d0a9b3afc865de02a5719ce85c0fa2c298bf063e0d76862b02e1b7c
                        • Instruction ID: a0a0c0b7f7af560bb3cd14ce4cc165bde80d5c82779432e0c3db93f67d9e505f
                        • Opcode Fuzzy Hash: 5d6a63569d0a9b3afc865de02a5719ce85c0fa2c298bf063e0d76862b02e1b7c
                        • Instruction Fuzzy Hash: C0218072D002189BCF24DF94D845AAEBBF9FF04710F5444A9E805AF290C734AD45CBD2
                        APIs
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00B96B7E
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00B96B89
                        Strings
                        • This function cannot be called on a default constructed task, xrefs: 00B960D6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: Cpp_errorThrow_std::_
                        • String ID: This function cannot be called on a default constructed task
                        • API String ID: 2134207285-3567850458
                        • Opcode ID: ab5dabfe104b8a6828bdefc8a6e8b10899e93dee27eb1b301e4132826966d426
                        • Instruction ID: 9f94d483b5962b7c0c9ed64c40ceced9de9c5d4893e1742cf314230192c55875
                        • Opcode Fuzzy Hash: ab5dabfe104b8a6828bdefc8a6e8b10899e93dee27eb1b301e4132826966d426
                        • Instruction Fuzzy Hash: 02112931504300AFDF25AB64D806BABB7E4EF51700F0449FCF599865A1E7B1A458CB93
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1792917918.0000000000B91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B90000, based on PE: true
                        • Associated: 00000000.00000002.1792901079.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792938752.0000000000BB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792953808.0000000000BC5000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1792985424.0000000000C15000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b90000_1Gvue8ItW8.jbxd
                        Similarity
                        • API ID: CommandLine
                        • String ID: %i
                        • API String ID: 3253501508-950836615
                        • Opcode ID: 65d25806847c90e1056840edba40fc5d63de5fa50399fe520b08c48fd73d3819
                        • Instruction ID: 46d853b7f6f35125323eac6f73a49e35792e7f34e54c9ab838c83e1737fbad9a
                        • Opcode Fuzzy Hash: 65d25806847c90e1056840edba40fc5d63de5fa50399fe520b08c48fd73d3819
                        • Instruction Fuzzy Hash: A2B048788102428B8704AF20BDCEB883AB4B64A3063C04195DA2283220EA740202CA00

                        Execution Graph

                        Execution Coverage:2.7%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:26.3%
                        Total number of Nodes:38
                        Total number of Limit Nodes:1
                        execution_graph 10963 4092d0 10966 4092db 10963->10966 10964 4092df 10965 409320 ExitProcess 10964->10965 10966->10964 10967 4092ea 10966->10967 10972 40a690 10966->10972 10976 4381b0 10967->10976 10970 4092f1 10970->10967 10979 40b650 FreeLibrary 10970->10979 10973 40a6b4 LoadLibraryExW 10972->10973 10975 40a7dc 10973->10975 10975->10970 10980 439f00 10976->10980 10978 4381b5 FreeLibrary 10978->10965 10979->10967 10981 439f09 10980->10981 10981->10978 10982 4389a3 10983 4389cc 10982->10983 10984 438a42 10983->10984 10986 438320 LdrInitializeThunk 10983->10986 10986->10984 10987 434181 10988 43410c 10987->10988 10989 43414d 10988->10989 10991 43b170 10988->10991 10993 43b190 10991->10993 10992 43b2ce 10992->10989 10993->10992 10995 438320 LdrInitializeThunk 10993->10995 10995->10992 10996 437ad7 GetLogicalDrives 11000 438350 10996->11000 10998 437ae2 GetLogicalDrives 10999 437aed 10998->10999 11008 43878e 11009 4387c9 11008->11009 11012 43883e 11009->11012 11014 438320 LdrInitializeThunk 11009->11014 11013 438320 LdrInitializeThunk 11012->11013 11013->11012 11014->11012 11015 437ccc 11016 437cd7 11015->11016 11017 437d99 LoadLibraryExW 11016->11017 11018 437da7 11017->11018

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 207 438320-438348 LdrInitializeThunk
                        APIs
                        • LdrInitializeThunk.NTDLL(0043B2FC,005C003F,00000006,?,?,00000018,FCFDFEFF,?,bA), ref: 00438346
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: InitializeThunk
                        • String ID:
                        • API String ID: 2994545307-0
                        • Opcode ID: 3af67e3b8a4cf002b2d8122619789f5e408d063de0ae60c6913db66b84c766ee
                        • Instruction ID: 9a2a3e30e6272c7ba4599b7d5b49d8b1df743313db24dc7d28a19b0c9381744b
                        • Opcode Fuzzy Hash: 3af67e3b8a4cf002b2d8122619789f5e408d063de0ae60c6913db66b84c766ee
                        • Instruction Fuzzy Hash: 82D04875908216AB9A09CF44C54040EFBE6BFC4714F228C8EA88873214C3B0BD46EB82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 226 43878e-4387c7 227 438814-43881c 226->227 228 4387c9 226->228 230 438886-4388bf 227->230 231 43881e-438829 227->231 229 4387d0-438812 228->229 229->227 229->229 232 438913-43891e 230->232 233 4388c1 230->233 234 438830-438837 231->234 236 438870-438883 232->236 237 438924-43892f 232->237 235 4388d0-438911 233->235 238 438840-438846 234->238 239 438839-43883c 234->239 235->232 235->235 236->230 240 438930-438937 237->240 238->230 242 438848-43886e call 438320 238->242 239->234 241 43883e 239->241 244 438950-438956 240->244 245 438939-43893c 240->245 241->230 242->230 244->236 248 43895c-43897a call 438320 244->248 245->240 247 43893e 245->247 247->236 250 43897f-438982 248->250 250->236
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 044b874a55659fa948095ef11831204bb356b2225e975078b5d7879ccd68c00b
                        • Instruction ID: 2cf05e4cf8f6f6dbf893debbf2c53f162e7b1a22df841908556717fdb3880936
                        • Opcode Fuzzy Hash: 044b874a55659fa948095ef11831204bb356b2225e975078b5d7879ccd68c00b
                        • Instruction Fuzzy Hash: 4A515474600B019FD338CF04C991B23B7E2AB89704F249A1DE5965BBA5DB75F802CB48

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 276 4389a3-4389ca 277 438a14-438a1c 276->277 278 4389cc-4389cf 276->278 280 438a22-438a2f 277->280 281 43929b-4392b5 277->281 279 4389d0-438a12 278->279 279->277 279->279 282 438a30-438a37 280->282 283 438b1f-438b25 282->283 284 438a3d-438a40 282->284 283->281 286 438b2b-438b35 call 438320 283->286 284->282 285 438a42 284->285 285->281 288 438b3a-438b3d 286->288 288->281
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a2c95184dcf7c07f8d7c13873dbb68fca03d6ede8ffde89fc6f6fcd018078773
                        • Instruction ID: 79eb86affbbb3008090b733135b6854575ca707f7b79335950cbdad60a3e140a
                        • Opcode Fuzzy Hash: a2c95184dcf7c07f8d7c13873dbb68fca03d6ede8ffde89fc6f6fcd018078773
                        • Instruction Fuzzy Hash: BF213974604B418BD728CF04D4E0A37F7A2EF8A304F24A95EE49747B55CB75AC46DB48

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 70 4092d0-4092dd call 437a20 73 4092e1-4092e8 call 4326c0 70->73 74 4092df 70->74 78 4092ea 73->78 79 4092ec call 40a690 73->79 75 409320-409329 ExitProcess 74->75 80 40931b call 4381b0 78->80 83 4092f1-4092f3 79->83 80->75 84 4092f5 83->84 85 4092f7-409317 call 409330 call 4109b0 call 40b650 83->85 86 409319 84->86 85->86 86->80
                        APIs
                        Strings
                        • system or character via spellings glyphs a is uses that in their modified other on often reflection or resemblance on it leetspeak, used similarity internet. play eleet the of the replacements of primarily ways, xrefs: 004092FB
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: ExitProcess
                        • String ID: system or character via spellings glyphs a is uses that in their modified other on often reflection or resemblance on it leetspeak, used similarity internet. play eleet the of the replacements of primarily ways
                        • API String ID: 621844428-780655312
                        • Opcode ID: 6bb019bc48d639c8d66610fb0196f6cd95211f2d8c0977f5060d02f71867bf4a
                        • Instruction ID: c9cb50bf6bf141655dc87ef0ae3040be436f68c1221d25903396ab8f3c92cebf
                        • Opcode Fuzzy Hash: 6bb019bc48d639c8d66610fb0196f6cd95211f2d8c0977f5060d02f71867bf4a
                        • Instruction Fuzzy Hash: 24E0393040C201D9CA54BB7192522A977A46FA8308F11483FEDC1B12E3DB3D884A9A6F

                        Control-flow Graph

                        APIs
                        • GetLogicalDrives.KERNEL32 ref: 00437AD7
                        • GetLogicalDrives.KERNELBASE ref: 00437AE2
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: DrivesLogical
                        • String ID:
                        • API String ID: 999431828-0
                        • Opcode ID: b540a48382952d41cb8f3814b904b0b0bdefd46bf9d723699629da43a78b1796
                        • Instruction ID: a47c07ae15452c95a21e58e00c346428eb9ef769f1dc06488aa2f6ad3c72eddf
                        • Opcode Fuzzy Hash: b540a48382952d41cb8f3814b904b0b0bdefd46bf9d723699629da43a78b1796
                        • Instruction Fuzzy Hash: 3CC012786112009FC708A725EC150197731EB46609315903EE40242365CE3684098A4D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 123 40a690-40a734 125 40a736-40a73f 123->125 126 40a7a8-40a7de LoadLibraryExW call 4379e0 123->126 128 40a741-40a79b 125->128 131 40a7f0-40a98b call 43a5c0 * 12 126->131 132 40a7e0-40a7eb 126->132 128->128 130 40a79d-40a7a6 128->130 130->126 158 40a98e-40a99f 131->158 133 40aae7-40aaf6 132->133 161 40a9a1-40a9aa 158->161 162 40a9af-40a9d6 call 40a3f0 158->162 165 40aad0-40aad8 161->165 167 40a9d8-40a9e2 162->167 165->133 171 40aada-40aae5 165->171 167->167 170 40a9e4-40a9fd 167->170 172 40aa5c-40aa67 call 40ab00 170->172 173 40a9ff-40aa05 170->173 171->133 176 40aa6c-40aa71 172->176 174 40aa07-40aa0a 173->174 177 40aa10-40aa54 call 410810 174->177 178 40aa0c-40aa0e 174->178 179 40aa73-40aa9a 176->179 180 40aa75-40aa98 call 40b610 176->180 177->174 181 40aa56-40aa59 177->181 178->181 187 40aaa1-40aaa9 179->187 180->187 181->172 189 40aab4-40aabc 187->189 190 40aaab-40aab2 187->190 192 40aace 189->192 193 40aabe-40aac9 189->193 190->189 192->165 193->158
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: fcdacc4a8362a72f717871775c4339c361b00aa55d82c45d43573f11ad3fc477
                        • Instruction ID: 694cfbb1631157e8e0ed226ac6b1e342c32a53261db2656c02c5ec5e4d54bb27
                        • Opcode Fuzzy Hash: fcdacc4a8362a72f717871775c4339c361b00aa55d82c45d43573f11ad3fc477
                        • Instruction Fuzzy Hash: D5D181B5504B408FC360DF38DA8561ABFE0AB56304F048A3ED4DA97792E738A459CB5B

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 195 437ccc-437d50 call 43a5c0 * 3 202 437d52 195->202 203 437d99-437da5 LoadLibraryExW 195->203 204 437d60-437d97 202->204 205 437da7 203->205 206 437dac-437dc8 203->206 204->203 204->204 205->206
                        APIs
                        • LoadLibraryExW.KERNELBASE(?,00000000,00000800), ref: 00437DA1
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 449fa25e72c0fdf5e36f1a21c55355699d495bc5e021d8156ebeee141ee6c9dd
                        • Instruction ID: f72b181c648b9e41485b42c861cff61790dcc45bb66c4d6a0fcf813ed363230b
                        • Opcode Fuzzy Hash: 449fa25e72c0fdf5e36f1a21c55355699d495bc5e021d8156ebeee141ee6c9dd
                        • Instruction Fuzzy Hash: E721D7B56106019BDB18CF15DCA162A7BE2EF46308F14843DD8565BB56DB30D814CF59

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 208 4381b0-4381c1 call 439f00 FreeLibrary
                        APIs
                        • FreeLibrary.KERNELBASE(00409320), ref: 004381BB
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID:
                        • API String ID: 3664257935-0
                        • Opcode ID: d300a1c182c2077e89e7dfe57fd24d42c7cde770933798e25a6fb4481fef4116
                        • Instruction ID: e73da9c1ca550ade86c2df5deef5cf4b8e18f51b4ab0f75cbe256fc059d6447c
                        • Opcode Fuzzy Hash: d300a1c182c2077e89e7dfe57fd24d42c7cde770933798e25a6fb4481fef4116
                        • Instruction Fuzzy Hash: 08A00239404040ABCF117B21FD0950D3B77AB56306B64D079B501A0635CE651C21EE0C
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: !U![$"Q$W$-Y/_$3S$5!$;)$HI$RD$[]$bA$uAtG${|$}v$-#$<
                        • API String ID: 0-464808535
                        • Opcode ID: 19b6cb9ab93a02827a646f508cb0c35bb4b58a66424fb1cc1268c136a008f0b2
                        • Instruction ID: 85d251671945215b837daedd315465b10013f942ac52b543377f94dd1d46e813
                        • Opcode Fuzzy Hash: 19b6cb9ab93a02827a646f508cb0c35bb4b58a66424fb1cc1268c136a008f0b2
                        • Instruction Fuzzy Hash: D162C8B4109385CAE3B8CF05E881BDABBE1FB86344F908D2DC5D99B255DB748185CF92
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: E!G'$E!G'$PM* $Q35L$U6>G$Vb[0$Y=23$Y=23$[-V#$[-V#$]f\?
                        • API String ID: 0-3456503560
                        • Opcode ID: 997a5ab458e2af8f7fa829c70201f0762908d8f9ebdb0b3d8776a430c062fa53
                        • Instruction ID: 5fd28eec1e695261d059a9cddd2b251c86a75db0370a92879bef33610febb659
                        • Opcode Fuzzy Hash: 997a5ab458e2af8f7fa829c70201f0762908d8f9ebdb0b3d8776a430c062fa53
                        • Instruction Fuzzy Hash: 28327BB5600B418FD324CF29D491713BBE2AF9A304F18896DD49B8BBA1D778F845CB54
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: Object$DeleteMetricsSelectSystem
                        • String ID:
                        • API String ID: 3911056724-3916222277
                        • Opcode ID: 597b8e30144e0e2eceb53b5f22b31e9bd37f884534ba61141307096243fbe6bf
                        • Instruction ID: 215dcb33d68a914d34a3b44855d908f04e9e5e2142284df43b478014995d5bd5
                        • Opcode Fuzzy Hash: 597b8e30144e0e2eceb53b5f22b31e9bd37f884534ba61141307096243fbe6bf
                        • Instruction Fuzzy Hash: EB816AB4A04B00DFC354EF29D585A1ABBF0FF49304F10896DE99ACB761D731A848CB92
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: *lpy$GFCJ$GU[C$_QPX$q2f`$s~`;$|oiV$UW
                        • API String ID: 0-126452777
                        • Opcode ID: 874571777eb0c4d7690a4567f53514362963559b2e34a3bde314e90c543d0463
                        • Instruction ID: 7d47eb114653d1d726cdae475206f5a01ad741cc92355c4efb45072913166f82
                        • Opcode Fuzzy Hash: 874571777eb0c4d7690a4567f53514362963559b2e34a3bde314e90c543d0463
                        • Instruction Fuzzy Hash: 4B428A715083858BC718CF15C4906ABBBF2FFC6358F148A1DE8DA5B381D7789945CB8A
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: bjA$rjA$tNxk$wxen$yV$|Fps$}yuf
                        • API String ID: 0-285463896
                        • Opcode ID: 114e6e5e0264a4ed448d7fc14f2699dd1df45e7b100340791603d64a255ebc76
                        • Instruction ID: 467d824c4601f87a7865333182d839afc619194b9d53572c23a6f25b8a2ccca3
                        • Opcode Fuzzy Hash: 114e6e5e0264a4ed448d7fc14f2699dd1df45e7b100340791603d64a255ebc76
                        • Instruction Fuzzy Hash: AB42CBB56083418FC714DF28C89166BBBE1EF89304F154A2EF8D587391E738D981CB9A
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: Clipboard$CloseDataLongOpenWindow
                        • String ID:
                        • API String ID: 1647500905-0
                        • Opcode ID: 9442ce80d2397ba16d82406eab7ac1b596dc54a01643120e3497832b66bc57ea
                        • Instruction ID: 20b27c47ccb5b13297646b9ad50e959624215d224444b37dcb6cb3dbd70bcec4
                        • Opcode Fuzzy Hash: 9442ce80d2397ba16d82406eab7ac1b596dc54a01643120e3497832b66bc57ea
                        • Instruction Fuzzy Hash: 966190B4504740CFC720DF3AD884616BFF0AF5A320F148A6DE4D68B7A6D734A806CB66
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: VZ[$tuCK$uMLJ
                        • API String ID: 0-3793942351
                        • Opcode ID: d27ae5429ca876241fbf3fc9c8b7ecf51f196858ca90d3e1bbe08051f68e6db9
                        • Instruction ID: f5d49edd8e83901a92a3b06d928d8ebedfe163ecb700b6e81eef2cfcbfe5fc17
                        • Opcode Fuzzy Hash: d27ae5429ca876241fbf3fc9c8b7ecf51f196858ca90d3e1bbe08051f68e6db9
                        • Instruction Fuzzy Hash: 3322CBB5608351DFC314CF28D890B6ABBE1FB8A704F19892DE4C59B390D739E941CB96
                        APIs
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000000,00000000,00000000,?), ref: 00414B9C
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000000,00000000,?,?), ref: 00414BD0
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: EnvironmentExpandStrings
                        • String ID: fr
                        • API String ID: 237503144-3430272718
                        • Opcode ID: 1d6a050e95d81dc08db0a155775389eb3c9a044462c37621009ee92df2785378
                        • Instruction ID: d2f90663543e0846a8a64cd2ccecfbfdae6383fe26cdc8fe9979ae81a7c8c18f
                        • Opcode Fuzzy Hash: 1d6a050e95d81dc08db0a155775389eb3c9a044462c37621009ee92df2785378
                        • Instruction Fuzzy Hash: D4D166706193808FD374CF14C484BABB7E5AFC6314F544A2DE4C98B2A1DB39A985CB5B
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: WU$^B$_U
                        • API String ID: 0-591993885
                        • Opcode ID: cd41040d685ea2c313f7dbb6a2624a2e5f5346267575e1b0956321566fb9f1b4
                        • Instruction ID: 26604fa9a37f978f440af0564f2ee4edb63b4cd241d3f45d3be4518d4252efb5
                        • Opcode Fuzzy Hash: cd41040d685ea2c313f7dbb6a2624a2e5f5346267575e1b0956321566fb9f1b4
                        • Instruction Fuzzy Hash: A612BD75508302CBC314DF18C4906ABB7F2FF95744F64892EE4C997361E739998ACB8A
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: kq$uu$xu
                        • API String ID: 0-535774355
                        • Opcode ID: fc64322a301a5e93c18408ef949b478cc6094cd19f7d47e3e4a47550b6a2373a
                        • Instruction ID: 1c2165c96939e3264217c5fc0a4d2196341c5566413f012fcb623f6ae5d2571e
                        • Opcode Fuzzy Hash: fc64322a301a5e93c18408ef949b478cc6094cd19f7d47e3e4a47550b6a2373a
                        • Instruction Fuzzy Hash: CF0276B46083809FE724DF14E894B2BBBE2FBD5344F54492DE0C59B262D7399851CF86
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: A$0
                        • API String ID: 0-656361183
                        • Opcode ID: 6c73cbdd669adeee578ace77e95927fd4416312482b92dedc921ff671c155627
                        • Instruction ID: e0c997abc26ea5b074cfc10ef48591b167812406c997c3c776c1ceb64f9b5363
                        • Opcode Fuzzy Hash: 6c73cbdd669adeee578ace77e95927fd4416312482b92dedc921ff671c155627
                        • Instruction Fuzzy Hash: E68156B02083808FD335CF14C4947DABBE2ABD6314F18496ED8D98B392DB7A9585CB56
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: "
                        • API String ID: 0-123907689
                        • Opcode ID: adf6ed3e698e2dd5574221ee585976b2ec91fd27fac6ea7a494ecf8a47db6e87
                        • Instruction ID: 86c222965204581046d0eee725827c16c28f66926ab6f1be5d5431f76e2c7699
                        • Opcode Fuzzy Hash: adf6ed3e698e2dd5574221ee585976b2ec91fd27fac6ea7a494ecf8a47db6e87
                        • Instruction Fuzzy Hash: DA020571B083219FD714CE29D88072BB7E5EFC5354F88896EE899C7381E638DD058B96
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: P6D.
                        • API String ID: 0-2188168786
                        • Opcode ID: d4aa32c36da15f0e938d6e4ec00f5013e8a4da2126bbdb2f2e17faf83540c73d
                        • Instruction ID: d0591a4521c5945aa649341e4b3688b1c8e6dc550d27dab62784e6145c7dacbc
                        • Opcode Fuzzy Hash: d4aa32c36da15f0e938d6e4ec00f5013e8a4da2126bbdb2f2e17faf83540c73d
                        • Instruction Fuzzy Hash: 08F17B70204B918FD735CF2AC490BA7BBF1AF56304F58496EC4EA8B792D739A449CB14
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: P6D.
                        • API String ID: 0-2188168786
                        • Opcode ID: 81445dc25f918b03dae5532813b050ce03539f3b8583c7e5eb569cf7d2ebcef2
                        • Instruction ID: a596d029d974648880208cc2360ea4cb246b11e167ba61bd996dfb6d99741efc
                        • Opcode Fuzzy Hash: 81445dc25f918b03dae5532813b050ce03539f3b8583c7e5eb569cf7d2ebcef2
                        • Instruction Fuzzy Hash: D8D1AD70204B918FD725CF29C490BA7BBF1AF56304F58496EC4EB8B792DB39A449CB14
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: x
                        • API String ID: 0-2363233923
                        • Opcode ID: 00b71554387ea3534e494a4f9f4899544b8668c0752fbe8079921a4fcfff5bfc
                        • Instruction ID: 8fd463b269a7a3957ed6b0a4189cd9e6052444ae2363209e1951705bc26e5c6c
                        • Opcode Fuzzy Hash: 00b71554387ea3534e494a4f9f4899544b8668c0752fbe8079921a4fcfff5bfc
                        • Instruction Fuzzy Hash: 9181A271A083409FC725CF18C484BABB7E5AF86314F04492EF4DA87391D7789A85CB97
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: ]A
                        • API String ID: 0-3942631043
                        • Opcode ID: 77a47f286c6bcbc44aa191ea336216389c5aa7aaa75078af2d2d6d9255a96ed4
                        • Instruction ID: 88110684d43a2d23bab092def3d20486dfea0ad500bfecadd86f3b2e11d6b500
                        • Opcode Fuzzy Hash: 77a47f286c6bcbc44aa191ea336216389c5aa7aaa75078af2d2d6d9255a96ed4
                        • Instruction Fuzzy Hash: BF71C274500A00CFC728CF28D991A7773B2FF9A314758866DD5868BBA1EB39F851CB94
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: & B
                        • API String ID: 0-3470255966
                        • Opcode ID: 3b20ebea1024a802e5d78e1439fc98d15b6c3c5caf8cec883990154cbdbc3c2b
                        • Instruction ID: 97350ce0ab16778797588418698f8ea2a93937be802be3b237760b229504a026
                        • Opcode Fuzzy Hash: 3b20ebea1024a802e5d78e1439fc98d15b6c3c5caf8cec883990154cbdbc3c2b
                        • Instruction Fuzzy Hash: FC419D346082A1EFD7289F04D5A0B2FBBA2FB85344FA4191EE58217751C376A811CF9A
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: "@E
                        • API String ID: 0-843559302
                        • Opcode ID: bff0bf0d1777f859e2dbe93fb29319f1f67baa5c0654329b282fa691da219b1d
                        • Instruction ID: dbb33a83d536ebf5fa0ea25f45846df316eb77a4a33f4542893643f65e6850a9
                        • Opcode Fuzzy Hash: bff0bf0d1777f859e2dbe93fb29319f1f67baa5c0654329b282fa691da219b1d
                        • Instruction Fuzzy Hash: 7501FB34254140CBDB29CF19C5E1A25F7E1EF5A308F18A85DD5868B396D739A845CB88
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ab62303539955bd95230b7125987844e4bfd44cd9b6a0d4408a5446568b9d93f
                        • Instruction ID: 87bb4e0cd7287ba6e13664a6a389a294ff2a99fd859947e59b2ce07af86d3d55
                        • Opcode Fuzzy Hash: ab62303539955bd95230b7125987844e4bfd44cd9b6a0d4408a5446568b9d93f
                        • Instruction Fuzzy Hash: 48A1BFB1A443119BCB209F14CCD1BABB3E1EF95354F18491EE89657391E378DD80CB9A
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7fb11e1f1a5072700c971984d345dc6ce7588a8c06ee241612960d902c317378
                        • Instruction ID: 578618304e1e6edbbc53f92c97c895c0cb153a14734f1648a83d3c7b86a6326e
                        • Opcode Fuzzy Hash: 7fb11e1f1a5072700c971984d345dc6ce7588a8c06ee241612960d902c317378
                        • Instruction Fuzzy Hash: 38919AB11083409BD314CF18C891A6BBBF1FF85358F154A1DE4C98B391E779D94ACB8A
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7445ada3c4e85ce49fc40c125633498c91604dbe3399542091493906c0f33ae3
                        • Instruction ID: 92a2e04ee97317fe24bda433d9ac0bdbb073839fc6768deef82f97a72007f9cd
                        • Opcode Fuzzy Hash: 7445ada3c4e85ce49fc40c125633498c91604dbe3399542091493906c0f33ae3
                        • Instruction Fuzzy Hash: 1C81F7B460C3528FD725CF18C49062AFBE1AFC9314F18966EE4D58B352D235E806CB56
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2ad08ab66fa3dd150af01fdd681d9423cf8bdebc7d25c60bebb7bd4e8b55ebf1
                        • Instruction ID: 6946e0d6b54ad114bc8b2b978a00d4ec1e7363f26eff0d187c7a2d407db216d2
                        • Opcode Fuzzy Hash: 2ad08ab66fa3dd150af01fdd681d9423cf8bdebc7d25c60bebb7bd4e8b55ebf1
                        • Instruction Fuzzy Hash: 53518534204B418BD329CF29D4A0BB7BBE2EF89315F68496DD49B87B51DB34B845CB44
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 158d479c5145a9205d3ab65a921b8e9941c99e51dc791a90f1cd797b62414836
                        • Instruction ID: 2b1af8b6834acfc50a8f724011b5b50dbd716ff745917a8f4dd016b095905ad2
                        • Opcode Fuzzy Hash: 158d479c5145a9205d3ab65a921b8e9941c99e51dc791a90f1cd797b62414836
                        • Instruction Fuzzy Hash: CD41277194C708CBC3209F54C8C07E7B7E8EFD6354F09462AE88947381E7B99980C79A
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6d013eb53bfa8aafb41391ec4766f743eec051038b523a3d4f15b619ad4889d3
                        • Instruction ID: af474f354511f4eb8c5214fce8331daca1a7d88c9d6d71eacc042523f230b064
                        • Opcode Fuzzy Hash: 6d013eb53bfa8aafb41391ec4766f743eec051038b523a3d4f15b619ad4889d3
                        • Instruction Fuzzy Hash: 43318BB0900700DFC724CF19C852AA3BBF5FF5A360B19865DE88ACB390E375A941CB95
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d1f5af266e939ccce1b7378ddab4054c1fbbc1fd21743718fbba20083b2f9bed
                        • Instruction ID: 2f9739cf8b79e149764de2ad18d33ae431cab02926e09e965eece9fdffe7164c
                        • Opcode Fuzzy Hash: d1f5af266e939ccce1b7378ddab4054c1fbbc1fd21743718fbba20083b2f9bed
                        • Instruction Fuzzy Hash: EE212C345083808BC778CB04D8A07ABB3A2FBC5354F94C56DC4CE17651DF356C8A8B8A
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 011eccb829c0754c369a0d0c911fda4cddf60cc09be4ea519ee264c3a8b7ecd4
                        • Instruction ID: 4e929b51ca137bdeabe6b5274e57f178a5ddffb459a8f9238e4324ec68506a5e
                        • Opcode Fuzzy Hash: 011eccb829c0754c369a0d0c911fda4cddf60cc09be4ea519ee264c3a8b7ecd4
                        • Instruction Fuzzy Hash: 7C01B1F170071147DB20AE65F4C073BB2A8EFD5708F58053EE9485B382EB79EC458A99
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 88f7683796af6ba6e4e403cbac95914115f46536e04e9b4791853cf417276b5d
                        • Instruction ID: 9474c11c63e4d2ac21a9f32532a12f03ab210f81b7c5d710ed0768dcb451daef
                        • Opcode Fuzzy Hash: 88f7683796af6ba6e4e403cbac95914115f46536e04e9b4791853cf417276b5d
                        • Instruction Fuzzy Hash: CC21AF72A093808FD374CF20C8897DBB7E2ABC6314F14492EE48A97751DF789582CB46
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d025f8d1106fa3073235a06081f30e5e6d35d93d253bf2a8f007ec5545cb8a71
                        • Instruction ID: 20969ee6c65fe4576e9b7c11e1bb499825f71a37cacde963a22b7668a6501342
                        • Opcode Fuzzy Hash: d025f8d1106fa3073235a06081f30e5e6d35d93d253bf2a8f007ec5545cb8a71
                        • Instruction Fuzzy Hash: B7F0BB367192151BA630DD76A8C0427F75AD7CD215B19563DE941A3341C537E9018299
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c87c7ed7364d5c5be00f2a35e118e659a701458e691d9056c0835880681633d0
                        • Instruction ID: 16e159206387e55a572d68b23afad9c383aa2147fea4fc9411d26a5a5340caac
                        • Opcode Fuzzy Hash: c87c7ed7364d5c5be00f2a35e118e659a701458e691d9056c0835880681633d0
                        • Instruction Fuzzy Hash: FAE0CD79C01411DFD6726F117E0375A7224EB5330CF012035FA8462152DA759616C7CF
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c8df43ff04dc8b3d70e051d8ccd9e6fde491254f7107998c7e9f0249ef5b9721
                        • Instruction ID: 9c759e773bd463f077edaee26e908758f1732f927fa58ccd1a665bdfc78d1019
                        • Opcode Fuzzy Hash: c8df43ff04dc8b3d70e051d8ccd9e6fde491254f7107998c7e9f0249ef5b9721
                        • Instruction Fuzzy Hash: F6F058B8508341CFD720DF24C51478BFBE0BBC8318F01892ED88997391DBB8A8488F82
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                        • Instruction ID: b258b08327b2475435291265ee57a1677d6f08efe037edb6cda992b35cca9733
                        • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                        • Instruction Fuzzy Hash: 81D0A7615487A54E9758CE3884E047BFBE9E987652F1815AFE4D2F3245D234DC0146DC
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 775e801aa4d1235640d8704acf4e3793971ff74856f1d1a31868e556823b1718
                        • Instruction ID: 06ae55dbfde411660cdba928c6b3c9a89f32669e46d701800c5fed9fa027d894
                        • Opcode Fuzzy Hash: 775e801aa4d1235640d8704acf4e3793971ff74856f1d1a31868e556823b1718
                        • Instruction Fuzzy Hash: E0C012386440828AC304CF38D885B22FBA0AB9B200B10252AC482E3291C360D8168A0C
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 624a8a517524d297ebcb97e7b2dea9ab5ed274ddd15cd338aeed38ef3d31587c
                        • Instruction ID: 0eb8f653568e1cb150bc590d41ed214eddbb83f20fc0137d47c3ed099ebd2df5
                        • Opcode Fuzzy Hash: 624a8a517524d297ebcb97e7b2dea9ab5ed274ddd15cd338aeed38ef3d31587c
                        • Instruction Fuzzy Hash: 36B09278AAC10187D608CF04E852536B338A307204B00342A8113F3652C650E602CA0C
                        APIs
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,00000000,?), ref: 0042325A
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,?,?), ref: 0042328A
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: EnvironmentExpandStrings
                        • String ID: A=<C$Q5F;$V1u7$]9N?$_)M/$_-Z3$b%K+$z5B
                        • API String ID: 237503144-9369427
                        • Opcode ID: a963405a74f5af1b60c063329d792d429d764d63d498300577dbc332c42219dd
                        • Instruction ID: 6c25a6aea91cc028f66e97bb300721ebc9fdf4a9df31a65af47228b30aa1f588
                        • Opcode Fuzzy Hash: a963405a74f5af1b60c063329d792d429d764d63d498300577dbc332c42219dd
                        • Instruction Fuzzy Hash: FEF189706083518BD734CF14C890B9BB7E1FFC6318F14892DE8999B391DB789949CB86
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: Object$DeleteMetricsSelectSystem
                        • String ID:
                        • API String ID: 3911056724-3916222277
                        • Opcode ID: 1605eace1faa76802830f269757faa115ef100bcd827436c2b41e4d5f58b5c70
                        • Instruction ID: c40496c8a484868a2327d7f54dc2d7edf9c34fca813400c8b045d7ec2e198c16
                        • Opcode Fuzzy Hash: 1605eace1faa76802830f269757faa115ef100bcd827436c2b41e4d5f58b5c70
                        • Instruction Fuzzy Hash: D0914CB4615B009FC364EF28D991A16BBF0FB49700F108A6DE89AC7760D731B849CF96
                        APIs
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 0041605A
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 00416088
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: EnvironmentExpandStrings
                        • String ID: 2cA$mbA
                        • API String ID: 237503144-1881964337
                        • Opcode ID: 3ac4021c3b304e15311e697455f3890b0cc16a5055b9ccaa249406f6e546627b
                        • Instruction ID: b7f3bb75b84548121afdad034296d64894c6c64753ceb7b3df10d445bd4aead1
                        • Opcode Fuzzy Hash: 3ac4021c3b304e15311e697455f3890b0cc16a5055b9ccaa249406f6e546627b
                        • Instruction Fuzzy Hash: E281CB746083409BD324DF14C891BABB7E5FF86304F004A2EF9A65B381D778E941CB9A
                        APIs
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 0041DFCB
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 0041DFFA
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: EnvironmentExpandStrings
                        • String ID: I}$M3
                        • API String ID: 237503144-3697166928
                        • Opcode ID: 31a75f8d1e6469b78e716ba028577c81f064eeb2942d06f8d0adcf80bfbe9018
                        • Instruction ID: ec9b90382bb7ead40b53adb9eb2f2c858f9463fc7d762bbc74e40cbc7989eaf1
                        • Opcode Fuzzy Hash: 31a75f8d1e6469b78e716ba028577c81f064eeb2942d06f8d0adcf80bfbe9018
                        • Instruction Fuzzy Hash: D75174B5508341AFD314CF05C980B5BBBE1ABC6798F148A2DF8E98B281D778D945CB86
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID: #<<=$1>7m
                        • API String ID: 3664257935-2836878564
                        • Opcode ID: 73d4e8fbbd3f4895bcfb2218b51f07f7290b50547b71166f37177a2e894aa29f
                        • Instruction ID: 46ffd743c2d5f18cae89b939e5a4606d1ec7a32bf8cd79bd14c2559badb1df61
                        • Opcode Fuzzy Hash: 73d4e8fbbd3f4895bcfb2218b51f07f7290b50547b71166f37177a2e894aa29f
                        • Instruction Fuzzy Hash: 7BF19D70244F928ED325CF38C890BE7BBE1AF52309F48486ED4EA97282D7796549CF54
                        APIs
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 0042238A
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 004223B5
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: EnvironmentExpandStrings
                        • String ID: rv
                        • API String ID: 237503144-1192486884
                        • Opcode ID: 61f5135b817b3f4c21feb52014c1508f77880dd09578de0e4621473b5797ba22
                        • Instruction ID: 6d77fcc0a91432310f68b07f5124296895fc3133316a91327832852efa189109
                        • Opcode Fuzzy Hash: 61f5135b817b3f4c21feb52014c1508f77880dd09578de0e4621473b5797ba22
                        • Instruction Fuzzy Hash: 6F51A7B4608341AFE320CF24D980B5ABBE5EFC5748F104A2DFAD55B391CBB49901CB96
                        APIs
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 0042238A
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 004223B5
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: EnvironmentExpandStrings
                        • String ID: rv
                        • API String ID: 237503144-1192486884
                        • Opcode ID: db5fc486bf25cce9f9300e247e65b815125ead8ed2000b91c1b903857374ce2f
                        • Instruction ID: 58f3cc8b1fa40384d476b545bd10d231c1409be3ce6ecbf456986f598687cb40
                        • Opcode Fuzzy Hash: db5fc486bf25cce9f9300e247e65b815125ead8ed2000b91c1b903857374ce2f
                        • Instruction Fuzzy Hash: 7651A7B4608341AFE720CF24D940B5ABBE5EFC5748F104A2DFAD55B391CBB49801CB96
                        APIs
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000006,?,00000200,?), ref: 0041281A
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1660870354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: EnvironmentExpandStrings
                        • String ID: 21$~-G3
                        • API String ID: 237503144-3798633473
                        • Opcode ID: 27eaee2bc581c9b7e85decfa4d0b84888851f2f295c7832c70fea0a894c45223
                        • Instruction ID: a50e971d16cb0bb45665c54bad1e550bbef6a266b1fa2ac380cdc832f9aa0fcf
                        • Opcode Fuzzy Hash: 27eaee2bc581c9b7e85decfa4d0b84888851f2f295c7832c70fea0a894c45223
                        • Instruction Fuzzy Hash: D13169702083808BD334CF14C985B9BB3E5FF85344F04882DE48ACB291DBB49946CB56