Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
7Xex8yR90g.exe

Overview

General Information

Sample name:7Xex8yR90g.exe
renamed because original name is a hash value
Original sample name:8242342835f51d7321b9ef1db28b40a0N.exe
Analysis ID:1483223
MD5:8242342835f51d7321b9ef1db28b40a0
SHA1:e863d41d7641b3b9dd9fb9f6a73c5e512a84f512
SHA256:f9b6fbded3e18fa7e6d458d236bb28e14f7276209879d03a60a973b1f2723d49
Tags:exe
Infos:

Detection

Mars Stealer, Stealc, Vidar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Mars stealer
Yara detected Stealc
Yara detected Vidar stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found evasive API chain (may stop execution after checking computer name)
Found evasive API chain (may stop execution after checking locale)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 7Xex8yR90g.exe (PID: 4428 cmdline: "C:\Users\user\Desktop\7Xex8yR90g.exe" MD5: 8242342835F51D7321B9EF1DB28B40A0)
    • conhost.exe (PID: 1288 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 3792 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
NameDescriptionAttributionBlogpost URLsLink
VidarVidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.vidar
{"C2 url": "http://94.228.166.55/924cf5c06b0c4fee.php", "Botnet": "default"}
{"C2 url": "http://94.228.166.55/924cf5c06b0c4fee.php"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
    00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
      00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
        00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
          decrypted.memstrJoeSecurity_StealcYara detected StealcJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            2.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
              2.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
                2.2.RegAsm.exe.400000.0.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                  2.2.RegAsm.exe.400000.0.unpackJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
                    0.2.7Xex8yR90g.exe.1f0000.0.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                      Click to see the 1 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 7Xex8yR90g.exeAvira: detected
                      Source: http://94.228.166.55/924cf5c06b0c4fee.phpAvira URL Cloud: Label: malware
                      Source: 2.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: StealC {"C2 url": "http://94.228.166.55/924cf5c06b0c4fee.php", "Botnet": "default"}
                      Source: 2.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: Vidar {"C2 url": "http://94.228.166.55/924cf5c06b0c4fee.php"}
                      Source: 7Xex8yR90g.exeReversingLabs: Detection: 100%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: 7Xex8yR90g.exeJoe Sandbox ML: detected
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: INSERT_KEY_HERE
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: 10
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: 07
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: 20
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: 24
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetProcAddress
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: LoadLibraryA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: lstrcatA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: OpenEventA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CreateEventA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CloseHandle
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Sleep
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetUserDefaultLangID
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: VirtualAllocExNuma
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: VirtualFree
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetSystemInfo
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: VirtualAlloc
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: HeapAlloc
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetComputerNameA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: lstrcpyA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetProcessHeap
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetCurrentProcess
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: lstrlenA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: ExitProcess
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GlobalMemoryStatusEx
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetSystemTime
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SystemTimeToFileTime
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: advapi32.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: gdi32.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: user32.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: crypt32.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: ntdll.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetUserNameA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CreateDCA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetDeviceCaps
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: ReleaseDC
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CryptStringToBinaryA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: sscanf
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: VMwareVMware
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: HAL9TH
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: JohnDoe
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: DISPLAY
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: %hu/%hu/%hu
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: http://94.228.166.55
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: /924cf5c06b0c4fee.php
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: /baf849bbe7c30324/
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: default
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetEnvironmentVariableA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetFileAttributesA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GlobalLock
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: HeapFree
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetFileSize
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GlobalSize
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CreateToolhelp32Snapshot
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: IsWow64Process
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Process32Next
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetLocalTime
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: FreeLibrary
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetTimeZoneInformation
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetSystemPowerStatus
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetVolumeInformationA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetWindowsDirectoryA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Process32First
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetLocaleInfoA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetUserDefaultLocaleName
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetModuleFileNameA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: DeleteFileA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: FindNextFileA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: LocalFree
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: FindClose
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SetEnvironmentVariableA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: LocalAlloc
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetFileSizeEx
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: ReadFile
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SetFilePointer
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: WriteFile
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CreateFileA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: FindFirstFileA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CopyFileA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: VirtualProtect
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetLogicalProcessorInformationEx
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetLastError
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: lstrcpynA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: MultiByteToWideChar
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GlobalFree
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: WideCharToMultiByte
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GlobalAlloc
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: OpenProcess
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: TerminateProcess
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetCurrentProcessId
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: gdiplus.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: ole32.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: bcrypt.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: wininet.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: shlwapi.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: shell32.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: psapi.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: rstrtmgr.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CreateCompatibleBitmap
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SelectObject
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: BitBlt
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: DeleteObject
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CreateCompatibleDC
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GdipGetImageEncodersSize
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GdipGetImageEncoders
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GdipCreateBitmapFromHBITMAP
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GdiplusStartup
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GdiplusShutdown
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GdipSaveImageToStream
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GdipDisposeImage
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GdipFree
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetHGlobalFromStream
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CreateStreamOnHGlobal
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CoUninitialize
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CoInitialize
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CoCreateInstance
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: BCryptGenerateSymmetricKey
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: BCryptCloseAlgorithmProvider
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: BCryptDecrypt
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: BCryptSetProperty
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: BCryptDestroyKey
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: BCryptOpenAlgorithmProvider
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetWindowRect
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetDesktopWindow
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetDC
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CloseWindow
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: wsprintfA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: EnumDisplayDevicesA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetKeyboardLayoutList
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CharToOemW
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: wsprintfW
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: RegQueryValueExA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: RegEnumKeyExA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: RegOpenKeyExA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: RegCloseKey
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: RegEnumValueA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CryptBinaryToStringA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CryptUnprotectData
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SHGetFolderPathA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: ShellExecuteExA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: InternetOpenUrlA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: InternetConnectA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: InternetCloseHandle
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: InternetOpenA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: HttpSendRequestA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: HttpOpenRequestA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: InternetReadFile
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: InternetCrackUrlA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: StrCmpCA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: StrStrA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: StrCmpCW
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: PathMatchSpecA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetModuleFileNameExA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: RmStartSession
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: RmRegisterResources
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: RmGetList
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: RmEndSession
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: sqlite3_open
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: sqlite3_prepare_v2
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: sqlite3_step
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: sqlite3_column_text
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: sqlite3_finalize
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: sqlite3_close
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: sqlite3_column_bytes
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: sqlite3_column_blob
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: encrypted_key
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: PATH
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: C:\ProgramData\nss3.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: NSS_Init
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: NSS_Shutdown
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: PK11_GetInternalKeySlot
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: PK11_FreeSlot
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: PK11_Authenticate
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: PK11SDR_Decrypt
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: C:\ProgramData\
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SELECT origin_url, username_value, password_value FROM logins
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: browser:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: profile:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: url:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: login:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: password:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Opera
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: OperaGX
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Network
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: cookies
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: .txt
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SELECT HOST_KEY, is_httponly, path, is_secure, (expires_utc/1000000)-11644480800, name, encrypted_value from cookies
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: TRUE
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: FALSE
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: autofill
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SELECT name, value FROM autofill
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: history
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SELECT url FROM urls LIMIT 1000
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: cc
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: name:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: month:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: year:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: card:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Cookies
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Login Data
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Web Data
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: History
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: logins.json
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: formSubmitURL
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: usernameField
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: encryptedUsername
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: encryptedPassword
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: guid
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SELECT fieldname, value FROM moz_formhistory
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SELECT url FROM moz_places LIMIT 1000
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: cookies.sqlite
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: formhistory.sqlite
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: places.sqlite
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: plugins
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Local Extension Settings
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Sync Extension Settings
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: IndexedDB
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Opera Stable
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Opera GX Stable
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CURRENT
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: chrome-extension_
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: _0.indexeddb.leveldb
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Local State
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: profiles.ini
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: chrome
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: opera
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: firefox
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: wallets
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: %08lX%04lX%lu
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: ProductName
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: x32
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: x64
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: %d/%d/%d %d:%d:%d
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: HARDWARE\DESCRIPTION\System\CentralProcessor\0
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: ProcessorNameString
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: DisplayName
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: DisplayVersion
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Network Info:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - IP: IP?
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - Country: ISO?
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: System Summary:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - HWID:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - OS:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - Architecture:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - UserName:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - Computer Name:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - Local Time:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - UTC:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - Language:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - Keyboards:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - Laptop:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - Running Path:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - CPU:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - Threads:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - Cores:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - RAM:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - Display Resolution:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: - GPU:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: User Agents:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Installed Apps:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: All Users:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Current User:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Process List:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: system_info.txt
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: freebl3.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: mozglue.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: msvcp140.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: nss3.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: softokn3.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: vcruntime140.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: \Temp\
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: .exe
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: runas
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: open
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: /c start
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: %DESKTOP%
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: %APPDATA%
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: %LOCALAPPDATA%
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: %USERPROFILE%
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: %DOCUMENTS%
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: %PROGRAMFILES%
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: %PROGRAMFILES_86%
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: %RECENT%
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: *.lnk
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: files
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: \discord\
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: \Local Storage\leveldb\CURRENT
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: \Local Storage\leveldb
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: \Telegram Desktop\
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: key_datas
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: D877F783D5D3EF8C*
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: map*
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: A7FDF864FBC10B77*
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: A92DAA6EA6F891F2*
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: F8806DD0C461824F*
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Telegram
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Tox
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: *.tox
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: *.ini
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Password
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: oftware\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: 00000001
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: 00000002
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: 00000003
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: 00000004
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: \Outlook\accounts.txt
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Pidgin
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: \.purple\
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: accounts.xml
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: dQw4w9WgXcQ
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: token:
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Software\Valve\Steam
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SteamPath
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: \config\
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: ssfn*
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: config.vdf
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: DialogConfig.vdf
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: DialogConfigOverlay*.vdf
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: libraryfolders.vdf
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: loginusers.vdf
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: \Steam\
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: sqlite3.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: browsers
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: done
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: soft
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: \Discord\tokens.txt
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: /c timeout /t 5 & del /f /q "
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: " & del "C:\ProgramData\*.dll"" & exit
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: C:\Windows\system32\cmd.exe
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: https
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Content-Type: multipart/form-data; boundary=----
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: POST
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: HTTP/1.1
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Content-Disposition: form-data; name="
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: hwid
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: build
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: token
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: file_name
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: file
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: message
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: screenshot.jpg
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: INSERT_KEY_HERE
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetProcAddress
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: LoadLibraryA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: lstrcatA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: OpenEventA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CreateEventA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CloseHandle
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Sleep
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetUserDefaultLangID
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: VirtualAllocExNuma
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: VirtualFree
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetSystemInfo
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: VirtualAlloc
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: HeapAlloc
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetComputerNameA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: lstrcpyA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetProcessHeap
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetCurrentProcess
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: lstrlenA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: ExitProcess
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GlobalMemoryStatusEx
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetSystemTime
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SystemTimeToFileTime
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: advapi32.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: gdi32.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: user32.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: crypt32.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: ntdll.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetUserNameA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CreateDCA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetDeviceCaps
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: ReleaseDC
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CryptStringToBinaryA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: sscanf
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: VMwareVMware
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: HAL9TH
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: JohnDoe
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: DISPLAY
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: %hu/%hu/%hu
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: http://94.228.166.55
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: /924cf5c06b0c4fee.php
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: /baf849bbe7c30324/
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: default
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetEnvironmentVariableA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetFileAttributesA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GlobalLock
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: HeapFree
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetFileSize
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GlobalSize
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CreateToolhelp32Snapshot
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: IsWow64Process
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Process32Next
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetLocalTime
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: FreeLibrary
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetTimeZoneInformation
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetSystemPowerStatus
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetVolumeInformationA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetWindowsDirectoryA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: Process32First
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetLocaleInfoA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetUserDefaultLocaleName
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetModuleFileNameA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: DeleteFileA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: FindNextFileA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: LocalFree
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: FindClose
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SetEnvironmentVariableA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: LocalAlloc
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetFileSizeEx
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: ReadFile
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SetFilePointer
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: WriteFile
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CreateFileA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: FindFirstFileA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CopyFileA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: VirtualProtect
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetLogicalProcessorInformationEx
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetLastError
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: lstrcpynA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: MultiByteToWideChar
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GlobalFree
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: WideCharToMultiByte
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GlobalAlloc
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: OpenProcess
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: TerminateProcess
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetCurrentProcessId
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: gdiplus.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: ole32.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: bcrypt.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: wininet.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: shlwapi.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: shell32.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: psapi.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: rstrtmgr.dll
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CreateCompatibleBitmap
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SelectObject
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: BitBlt
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: DeleteObject
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CreateCompatibleDC
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GdipGetImageEncodersSize
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GdipGetImageEncoders
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GdipCreateBitmapFromHBITMAP
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GdiplusStartup
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GdiplusShutdown
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GdipSaveImageToStream
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GdipDisposeImage
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GdipFree
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetHGlobalFromStream
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CreateStreamOnHGlobal
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CoUninitialize
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CoInitialize
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CoCreateInstance
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: BCryptGenerateSymmetricKey
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: BCryptCloseAlgorithmProvider
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: BCryptDecrypt
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: BCryptSetProperty
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: BCryptDestroyKey
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: BCryptOpenAlgorithmProvider
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetWindowRect
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetDesktopWindow
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetDC
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CloseWindow
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: wsprintfA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: EnumDisplayDevicesA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetKeyboardLayoutList
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CharToOemW
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: wsprintfW
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: RegQueryValueExA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: RegEnumKeyExA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: RegOpenKeyExA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: RegCloseKey
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: RegEnumValueA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CryptBinaryToStringA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: CryptUnprotectData
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: SHGetFolderPathA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: ShellExecuteExA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: InternetOpenUrlA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: InternetConnectA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: InternetCloseHandle
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: InternetOpenA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: HttpSendRequestA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: HttpOpenRequestA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: InternetReadFile
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: InternetCrackUrlA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: StrCmpCA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: StrStrA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: StrCmpCW
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: PathMatchSpecA
                      Source: 2.2.RegAsm.exe.400000.0.unpackString decryptor: GetModuleFileNameExA
                      Source: 7Xex8yR90g.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 7Xex8yR90g.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_002126FF FindFirstFileExW,0_2_002126FF

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: http://94.228.166.55/924cf5c06b0c4fee.php
                      Source: Malware configuration extractorURLs: http://94.228.166.55/924cf5c06b0c4fee.php
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_001F46F60_2_001F46F6
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_002043620_2_00204362
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_0020C4D60_2_0020C4D6
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_002046AA0_2_002046AA
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_00216C730_2_00216C73
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_0020DD0C0_2_0020DD0C
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_00207F300_2_00207F30
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_00214FB00_2_00214FB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004043D0 appears 316 times
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: String function: 001FDC50 appears 54 times
                      Source: 7Xex8yR90g.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@4/0@0/0
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1288:120:WilError_03
                      Source: 7Xex8yR90g.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: 7Xex8yR90g.exeReversingLabs: Detection: 100%
                      Source: unknownProcess created: C:\Users\user\Desktop\7Xex8yR90g.exe "C:\Users\user\Desktop\7Xex8yR90g.exe"
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                      Source: 7Xex8yR90g.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: 7Xex8yR90g.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: 7Xex8yR90g.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: 7Xex8yR90g.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: 7Xex8yR90g.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: 7Xex8yR90g.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: 7Xex8yR90g.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: 7Xex8yR90g.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: 7Xex8yR90g.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: 7Xex8yR90g.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: 7Xex8yR90g.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: 7Xex8yR90g.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: 7Xex8yR90g.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041A9AC LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,2_2_0041A9AC
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_001FD416 push ecx; ret 0_2_001FD429
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00418EE5 push ecx; ret 2_2_00418EF8

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeEvasive API call chain: GetComputerName,DecisionNodes,ExitProcessgraph_2-12341
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_2-12338
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI coverage: 6.5 %
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_002126FF FindFirstFileExW,0_2_002126FF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00401120 GetSystemInfo,2_2_00401120
                      Source: RegAsm.exe, 00000002.00000002.2009318303.000000000161A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_00201A53 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00201A53
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041A9AC LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,2_2_0041A9AC
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_0020EBC0 mov eax, dword ptr fs:[00000030h]0_2_0020EBC0
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_00208A8C mov ecx, dword ptr fs:[00000030h]0_2_00208A8C
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_0020EC04 mov eax, dword ptr fs:[00000030h]0_2_0020EC04
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004175D0 mov eax, dword ptr fs:[00000030h]2_2_004175D0
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_002138E7 GetProcessHeap,0_2_002138E7
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_00201A53 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00201A53
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_001FDA85 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001FDA85
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_001FDBE1 SetUnhandledExceptionFilter,0_2_001FDBE1
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_001FDC95 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_001FDC95
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041B5E7 SetUnhandledExceptionFilter,2_2_0041B5E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041936E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0041936E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00418BFD memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00418BFD

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_00E8018D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_00E8018D
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 41C000Jump to behavior
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 424000Jump to behavior
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 637000Jump to behavior
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 1006008Jump to behavior
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_001FD865 cpuid 0_2_001FD865
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: EnumSystemLocalesW,0_2_0020D0B6
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_002154FF
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: GetLocaleInfoW,0_2_0020D61C
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: GetLocaleInfoW,0_2_002156FA
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: EnumSystemLocalesW,0_2_002157A1
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: EnumSystemLocalesW,0_2_002157EC
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: EnumSystemLocalesW,0_2_00215887
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00215912
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: GetLocaleInfoW,0_2_00215B65
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00215C8E
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: GetLocaleInfoW,0_2_00215D94
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00215E63
                      Source: C:\Users\user\Desktop\7Xex8yR90g.exeCode function: 0_2_001FD06A GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,0_2_001FD06A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00415720 GetUserNameA,2_2_00415720

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.7Xex8yR90g.exe.1f0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                      Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.7Xex8yR90g.exe.1f0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.7Xex8yR90g.exe.1f0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                      Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.7Xex8yR90g.exe.1f0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                      Native API
                      1
                      DLL Side-Loading
                      411
                      Process Injection
                      1
                      Virtualization/Sandbox Evasion
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      411
                      Process Injection
                      LSASS Memory21
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable Media1
                      Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                      Deobfuscate/Decode Files or Information
                      Security Account Manager1
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                      Obfuscated Files or Information
                      NTDS1
                      Account Discovery
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      DLL Side-Loading
                      LSA Secrets1
                      System Owner/User Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
                      File and Directory Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync223
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      7Xex8yR90g.exe100%ReversingLabsWin32.Trojan.LummaC
                      7Xex8yR90g.exe100%AviraHEUR/AGEN.1317001
                      7Xex8yR90g.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://94.228.166.55/924cf5c06b0c4fee.php100%Avira URL Cloudmalware
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      http://94.228.166.55/924cf5c06b0c4fee.phptrue
                      • Avira URL Cloud: malware
                      unknown
                      No contacted IP infos
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1483223
                      Start date and time:2024-07-26 21:16:05 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 2m 18s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:4
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:7Xex8yR90g.exe
                      renamed because original name is a hash value
                      Original Sample Name:8242342835f51d7321b9ef1db28b40a0N.exe
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@4/0@0/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 39
                      • Number of non-executed functions: 72
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Stop behavior analysis, all processes terminated
                      • Exclude process from analysis (whitelisted): dllhost.exe
                      • Not all processes where analyzed, report is missing behavior information
                      • VT rate limit hit for: 7Xex8yR90g.exe
                      No simulations
                      No context
                      No context
                      No context
                      No context
                      No context
                      No created / dropped files found
                      File type:PE32 executable (console) Intel 80386, for MS Windows
                      Entropy (8bit):7.35667831500931
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:7Xex8yR90g.exe
                      File size:407'040 bytes
                      MD5:8242342835f51d7321b9ef1db28b40a0
                      SHA1:e863d41d7641b3b9dd9fb9f6a73c5e512a84f512
                      SHA256:f9b6fbded3e18fa7e6d458d236bb28e14f7276209879d03a60a973b1f2723d49
                      SHA512:002f48324339b69e4b6c8ba50e51691bbb98d7348ad58552b10fbaccf4b86a225219da94e44af7bef1f967dbb7a9f9261c2c5ead47305522b7d0008c2a0dee34
                      SSDEEP:6144:o70P7uQo6KCDoQcU3oXo89vQGovkCCiQrZjn+SCYS6E/bCdjPjTuYgp5FkEKtx:MmKCDoQcUNYzrZz+D5/bCdTu7W3tx
                      TLSH:6184D02176C1C4B3D763113709A4D6B9AA7DB8300E729E9FA3950EAFCF30581DB3165A
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..M..HM..HM..H.`.I_..H.`.I...H.`.I[..H...I_..H.`.IJ..HM..H...H...I...H...IU..H...IL..H...IL..H...HL..H...IL..HRichM..H.......
                      Icon Hash:00928e8e8686b000
                      Entrypoint:0x40d742
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows cui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x668B013F [Sun Jul 7 20:57:35 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:55c0acf36986dbee7526009f420c04cb
                      Instruction
                      call 00007FE0893ADE1Dh
                      jmp 00007FE0893AD4F9h
                      int3
                      int3
                      int3
                      int3
                      push ecx
                      lea ecx, dword ptr [esp+08h]
                      sub ecx, eax
                      and ecx, 0Fh
                      add eax, ecx
                      sbb ecx, ecx
                      or eax, ecx
                      pop ecx
                      jmp 00007FE0893ADF0Fh
                      push ecx
                      lea ecx, dword ptr [esp+08h]
                      sub ecx, eax
                      and ecx, 07h
                      add eax, ecx
                      sbb ecx, ecx
                      or eax, ecx
                      pop ecx
                      jmp 00007FE0893ADEF9h
                      int3
                      int3
                      int3
                      int3
                      push ebx
                      push esi
                      mov eax, dword ptr [esp+18h]
                      or eax, eax
                      jne 00007FE0893AD69Ah
                      mov ecx, dword ptr [esp+14h]
                      mov eax, dword ptr [esp+10h]
                      xor edx, edx
                      div ecx
                      mov ebx, eax
                      mov eax, dword ptr [esp+0Ch]
                      div ecx
                      mov edx, ebx
                      jmp 00007FE0893AD6C3h
                      mov ecx, eax
                      mov ebx, dword ptr [esp+14h]
                      mov edx, dword ptr [esp+10h]
                      mov eax, dword ptr [esp+0Ch]
                      shr ecx, 1
                      rcr ebx, 1
                      shr edx, 1
                      rcr eax, 1
                      or ecx, ecx
                      jne 00007FE0893AD676h
                      div ebx
                      mov esi, eax
                      mul dword ptr [esp+18h]
                      mov ecx, eax
                      mov eax, dword ptr [esp+14h]
                      mul esi
                      add edx, ecx
                      jc 00007FE0893AD690h
                      cmp edx, dword ptr [esp+10h]
                      jnbe 00007FE0893AD68Ah
                      jc 00007FE0893AD689h
                      cmp eax, dword ptr [esp+0Ch]
                      jbe 00007FE0893AD683h
                      dec esi
                      xor edx, edx
                      mov eax, esi
                      pop esi
                      pop ebx
                      retn 0010h
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      push ebx
                      mov eax, dword ptr [esp+14h]
                      or eax, eax
                      jne 00007FE0893AD69Ah
                      mov ecx, dword ptr [esp+10h]
                      mov eax, dword ptr [esp+0Ch]
                      xor edx, edx
                      div ecx
                      mov eax, dword ptr [esp+08h]
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x37dc00x4c.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x37e0c0x3c.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x640000x1e0.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x650000x2528.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x34c680x1c.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x34cc00x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x34ba80x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x2c0000x184.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x2a7680x2a8004bc49662af4528377450033774ea73eaFalse0.5639073988970589data6.6474208482966795IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x2c0000xc7200xc80069d556a4047cc38422fbb6cc4384b18bFalse0.412890625data4.949683576573524IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x390000x2aadc0x29a00a5e05371442cefd30e20c03f1a9254aaFalse0.9648085585585585data7.965244663997813IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x640000x1e00x200e331b9e1b1a6d18839f7ba6e089ca0c7False0.52734375data4.7176788329467545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x650000x25280x26005a5b618d609bad0f4e8989761be715beFalse0.7481496710526315data6.507110253400118IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_MANIFEST0x640600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                      DLLImport
                      USER32.dllOffsetRect
                      KERNEL32.dllCreateFileW, HeapSize, SetStdHandle, WaitForSingleObject, CreateThread, VirtualAlloc, FreeConsole, RaiseException, InitOnceBeginInitialize, InitOnceComplete, CloseHandle, WaitForSingleObjectEx, GetCurrentThreadId, GetExitCodeThread, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, WakeAllConditionVariable, SleepConditionVariableSRW, WideCharToMultiByte, MultiByteToWideChar, GetStringTypeW, GetLastError, FreeLibraryWhenCallbackReturns, CreateThreadpoolWork, SubmitThreadpoolWork, CloseThreadpoolWork, GetModuleHandleExW, IsProcessorFeaturePresent, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, QueryPerformanceCounter, EncodePointer, DecodePointer, LCMapStringEx, GetSystemTimeAsFileTime, GetModuleHandleW, GetProcAddress, GetCPInfo, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetCurrentProcess, TerminateProcess, GetCurrentProcessId, InitializeSListHead, GetProcessHeap, RtlUnwind, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, ExitThread, FreeLibraryAndExitThread, ExitProcess, GetModuleFileNameW, GetStdHandle, WriteFile, GetCommandLineA, GetCommandLineW, HeapAlloc, HeapFree, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, GetFileSizeEx, SetFilePointerEx, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, WriteConsoleW
                      NameOrdinalAddress
                      DestroyObjects10x408891
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      No network behavior found

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:15:16:52
                      Start date:26/07/2024
                      Path:C:\Users\user\Desktop\7Xex8yR90g.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\7Xex8yR90g.exe"
                      Imagebase:0x1f0000
                      File size:407'040 bytes
                      MD5 hash:8242342835F51D7321B9EF1DB28B40A0
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:true

                      Target ID:1
                      Start time:15:16:52
                      Start date:26/07/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:2
                      Start time:15:16:52
                      Start date:26/07/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Imagebase:0xf20000
                      File size:65'440 bytes
                      MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:7%
                        Dynamic/Decrypted Code Coverage:0.7%
                        Signature Coverage:3.7%
                        Total number of Nodes:856
                        Total number of Limit Nodes:48
                        execution_graph 21725 1f5c9d 21726 1f5ccf 21725->21726 21757 1f2cba 21726->21757 21728 1f5d25 std::ios_base::_Ios_base_dtor 21772 1f318f 21728->21772 21732 1f5df0 21733 1f5e2c 21732->21733 21734 1f5ed4 21732->21734 21736 1f5e33 21733->21736 21737 1f5e82 21733->21737 21735 1f6159 70 API calls 21734->21735 21741 1f5e7d 21735->21741 21795 1f62b1 70 API calls 21736->21795 21740 1f6159 70 API calls 21737->21740 21739 1f5d75 std::ios_base::_Ios_base_dtor 21739->21732 21794 1f817a 69 API calls 3 library calls 21739->21794 21743 1f5ea5 21740->21743 21790 1f6159 21741->21790 21742 1f5e4b 21744 1f6159 70 API calls 21742->21744 21796 1f62b1 70 API calls 21743->21796 21744->21741 21750 1f5f64 21798 1f68ad 41 API calls _Deallocate 21750->21798 21752 1f5f70 21799 1f68d3 41 API calls 21752->21799 21754 1f5f79 21800 1fd408 21754->21800 21756 1f5f8a 21807 1f89dc 21757->21807 21761 1f2cf1 21819 1f8a34 21761->21819 21762 1f2cde 21762->21761 21826 1f546d 72 API calls 4 library calls 21762->21826 21764 1f2d27 21764->21728 21766 1f2d01 21767 1f2d2d 21766->21767 21768 1f2d08 21766->21768 21828 1f678c 43 API calls 2 library calls 21767->21828 21827 1f9cfb 43 API calls std::_Facet_Register 21768->21827 21771 1f2d32 21833 1f194e 21772->21833 21774 1f31b0 21775 1f2e9e 21774->21775 21776 1f89dc std::_Lockit::_Lockit 7 API calls 21775->21776 21777 1f2eaf 21776->21777 21778 1f400a int 9 API calls 21777->21778 21779 1f2ec2 21778->21779 21789 1f2ed5 21779->21789 21842 1f55f2 74 API calls 3 library calls 21779->21842 21780 1f8a34 std::_Lockit::~_Lockit 2 API calls 21782 1f2f0b 21780->21782 21782->21739 21783 1f2ee5 21784 1f2eec 21783->21784 21785 1f2f11 21783->21785 21843 1f9cfb 43 API calls std::_Facet_Register 21784->21843 21844 1f678c 43 API calls 2 library calls 21785->21844 21788 1f2f16 21789->21780 21791 1f5f34 21790->21791 21792 1f6164 21790->21792 21797 1f62b1 70 API calls 21791->21797 21792->21791 21845 1f3d38 70 API calls 21792->21845 21794->21739 21795->21742 21796->21741 21797->21750 21798->21752 21799->21754 21801 1fd411 IsProcessorFeaturePresent 21800->21801 21802 1fd410 21800->21802 21804 1fdcd2 21801->21804 21802->21756 21846 1fdc95 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 21804->21846 21806 1fddb5 21806->21756 21808 1f89eb 21807->21808 21809 1f89f2 21807->21809 21829 20593c 6 API calls std::_Lockit::_Lockit 21808->21829 21811 1f2ccb 21809->21811 21830 1fcb8d EnterCriticalSection 21809->21830 21813 1f400a 21811->21813 21814 1f403a 21813->21814 21815 1f4016 21813->21815 21814->21762 21816 1f89dc std::_Lockit::_Lockit 7 API calls 21815->21816 21817 1f4020 21816->21817 21818 1f8a34 std::_Lockit::~_Lockit 2 API calls 21817->21818 21818->21814 21820 1f8a3e 21819->21820 21821 20594a 21819->21821 21825 1f8a51 21820->21825 21831 1fcb9b LeaveCriticalSection 21820->21831 21832 205925 LeaveCriticalSection 21821->21832 21824 205951 21824->21764 21825->21764 21826->21766 21827->21761 21828->21771 21829->21811 21830->21811 21831->21825 21832->21824 21834 1f19c3 21833->21834 21837 1f195f 21833->21837 21841 1f6a6c 43 API calls std::_Throw_Cpp_error 21834->21841 21839 1f1966 21837->21839 21840 1f6ac6 43 API calls Concurrency::cancel_current_task 21837->21840 21839->21774 21842->21783 21843->21789 21844->21788 21845->21792 21846->21806 21847 1f6ccb 21864 1fd0bf 21847->21864 21849 1f6cec 21851 1f6d00 21849->21851 21894 1f3136 21849->21894 21854 1f6d12 21851->21854 21898 1f68ad 41 API calls _Deallocate 21851->21898 21855 1f6d5c 21854->21855 21899 1f1c54 43 API calls 2 library calls 21854->21899 21883 1f3248 21855->21883 21859 1f6d9b 21862 1fd408 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 21859->21862 21860 1f6d7b _AnonymousOriginator 21860->21859 21900 1f1a9d 41 API calls 2 library calls 21860->21900 21863 1f6daa 21862->21863 21867 1fd0c4 21864->21867 21866 1fd0de 21866->21849 21867->21866 21870 1f676f Concurrency::cancel_current_task 21867->21870 21907 20865b EnterCriticalSection LeaveCriticalSection std::_Facet_Register 21867->21907 21908 205953 15 API calls 2 library calls 21867->21908 21869 1fd0ea 21869->21869 21870->21869 21901 1fe79c RaiseException 21870->21901 21872 1f678b std::_Facet_Register 21902 1fe79c RaiseException 21872->21902 21874 1f67a8 21903 1f3820 42 API calls std::exception::exception 21874->21903 21876 1f67ba 21904 1fe79c RaiseException 21876->21904 21878 1f67c8 std::_Facet_Register 21905 1f3962 42 API calls std::_Facet_Register 21878->21905 21880 1f67ea 21906 1fe79c RaiseException 21880->21906 21882 1f67f8 21882->21849 21909 1f1a14 21883->21909 21885 1f326b 21886 1f6dac 21885->21886 21887 1f6e2a 21886->21887 21890 1f6dc0 21886->21890 21920 1f6861 41 API calls _Deallocate 21887->21920 21889 1f6e34 21889->21860 21890->21887 21891 1f14fb 71 API calls 21890->21891 21892 1f2b55 97 API calls 21890->21892 21914 20296e 21890->21914 21891->21890 21892->21890 21895 1f3153 _strlen 21894->21895 21957 1f1783 21895->21957 21897 1f3160 21897->21851 21898->21854 21899->21854 21900->21859 21901->21872 21902->21874 21903->21876 21904->21878 21905->21880 21906->21882 21907->21867 21908->21867 21910 1f1a1e 21909->21910 21912 1f1a27 21909->21912 21913 1f4a05 43 API calls 21910->21913 21912->21885 21913->21912 21915 202981 _Fputc 21914->21915 21921 201f98 21915->21921 21917 20299b 21935 20198b 21917->21935 21920->21889 21941 20289b 21921->21941 21923 201ff2 21929 202016 21923->21929 21949 202840 41 API calls _Fputc 21923->21949 21924 201faa 21924->21923 21925 201fbf 21924->21925 21934 201fda _swprintf 21924->21934 21948 201bd2 41 API calls 3 library calls 21925->21948 21931 20203a 21929->21931 21950 2028d8 44 API calls 2 library calls 21929->21950 21930 2020c2 21952 2027e9 41 API calls 2 library calls 21930->21952 21931->21930 21951 2027e9 41 API calls 2 library calls 21931->21951 21934->21917 21936 201997 21935->21936 21939 2019ae 21936->21939 21955 201a36 41 API calls 2 library calls 21936->21955 21938 2019c1 21938->21890 21939->21938 21956 201a36 41 API calls 2 library calls 21939->21956 21942 2028a0 21941->21942 21943 2028b3 21941->21943 21953 20647e 14 API calls __dosmaperr 21942->21953 21943->21924 21945 2028a5 21954 201c4f 41 API calls _Deallocate 21945->21954 21947 2028b0 21947->21924 21948->21934 21949->21929 21950->21929 21951->21930 21952->21934 21953->21945 21954->21947 21955->21939 21956->21938 21958 1f17ee 21957->21958 21961 1f1794 std::_Throw_Cpp_error 21957->21961 21972 1f6a6c 43 API calls std::_Throw_Cpp_error 21958->21972 21962 1f179b std::_Throw_Cpp_error 21961->21962 21964 1f16a8 21961->21964 21962->21897 21965 1f16bb 21964->21965 21966 1f16b3 21964->21966 21968 1f16c7 21965->21968 21970 1fd0bf std::_Facet_Register 43 API calls 21965->21970 21973 1f16ca 43 API calls 4 library calls 21966->21973 21968->21962 21969 1f16b9 21969->21962 21971 1f16c5 21970->21971 21971->21962 21973->21969 21974 1fd6fb 21983 1fdb9f GetModuleHandleW 21974->21983 21976 1fd703 21977 1fd739 21976->21977 21978 1fd707 21976->21978 21985 208b5d 23 API calls CallUnexpected 21977->21985 21979 1fd712 21978->21979 21984 208b3f 23 API calls CallUnexpected 21978->21984 21982 1fd741 21983->21976 21984->21979 21985->21982 21986 20ec35 21998 20ea5f 21986->21998 21988 20ec4e 21989 20ec42 21989->21988 21990 20ec9a 21989->21990 22016 20efcb 43 API calls __fread_nolock 21989->22016 21990->21988 21992 20ecfc 21990->21992 22017 20ea9b 21990->22017 22005 20ee25 21992->22005 21999 20ea80 21998->21999 22000 20ea6b 21998->22000 21999->21989 22024 20647e 14 API calls __dosmaperr 22000->22024 22002 20ea70 22025 201c4f 41 API calls _Deallocate 22002->22025 22004 20ea7b 22004->21989 22006 20ea5f __fread_nolock 41 API calls 22005->22006 22007 20ee34 22006->22007 22008 20ee47 22007->22008 22009 20eeda 22007->22009 22011 20ee64 22008->22011 22013 20ee8b 22008->22013 22026 210828 22009->22026 22012 210828 ___scrt_uninitialize_crt 66 API calls 22011->22012 22014 20ed0d 22012->22014 22013->22014 22037 211ff2 45 API calls _Fputc 22013->22037 22016->21990 22018 20eaa7 22017->22018 22019 20ea5f __fread_nolock 41 API calls 22018->22019 22022 20eac8 22018->22022 22020 20eac2 22019->22020 22021 2183d3 __fread_nolock 41 API calls 22020->22021 22021->22022 22022->21992 22023 2120ae 14 API calls 2 library calls 22022->22023 22023->21992 22024->22002 22025->22004 22027 210834 __FrameHandler3::FrameUnwindToState 22026->22027 22028 2108f8 22027->22028 22030 21083c 22027->22030 22031 210889 22027->22031 22068 201bd2 41 API calls 3 library calls 22028->22068 22030->22014 22038 213c45 EnterCriticalSection 22031->22038 22033 21088f 22034 2108ac 22033->22034 22039 210930 22033->22039 22067 2108f0 LeaveCriticalSection ___scrt_uninitialize_crt 22034->22067 22037->22014 22038->22033 22040 210955 22039->22040 22060 210978 __fread_nolock 22039->22060 22041 210959 22040->22041 22043 2109b7 22040->22043 22083 201bd2 41 API calls 3 library calls 22041->22083 22044 2109ce 22043->22044 22084 212090 43 API calls __fread_nolock 22043->22084 22069 2104b4 22044->22069 22048 210a1e 22050 210a81 WriteFile 22048->22050 22051 210a32 22048->22051 22049 2109de 22052 2109e5 22049->22052 22053 210a08 22049->22053 22056 210aa3 GetLastError 22050->22056 22066 210a19 22050->22066 22054 210a3a 22051->22054 22055 210a6f 22051->22055 22052->22060 22085 21044c 6 API calls ___scrt_uninitialize_crt 22052->22085 22086 21007a 47 API calls 5 library calls 22053->22086 22058 210a5d 22054->22058 22059 210a3f 22054->22059 22076 210532 22055->22076 22056->22066 22088 2106f6 8 API calls 3 library calls 22058->22088 22059->22060 22063 210a48 22059->22063 22060->22034 22087 21060d 7 API calls 2 library calls 22063->22087 22066->22060 22067->22030 22068->22030 22089 2183d3 22069->22089 22071 210527 22071->22048 22071->22049 22072 2104f4 22072->22071 22075 21050e GetConsoleMode 22072->22075 22073 2104c6 22073->22071 22073->22072 22098 202840 41 API calls _Fputc 22073->22098 22075->22071 22077 210541 ___scrt_uninitialize_crt 22076->22077 22080 2105b1 WriteFile 22077->22080 22082 2105f2 22077->22082 22078 1fd408 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22079 21060b 22078->22079 22079->22060 22080->22077 22081 2105f4 GetLastError 22080->22081 22081->22082 22082->22078 22083->22060 22084->22044 22085->22060 22086->22066 22087->22060 22088->22066 22090 2183e0 22089->22090 22091 2183ed 22089->22091 22099 20647e 14 API calls __dosmaperr 22090->22099 22093 2183f9 22091->22093 22100 20647e 14 API calls __dosmaperr 22091->22100 22093->22073 22095 2183e5 22095->22073 22096 21841a 22101 201c4f 41 API calls _Deallocate 22096->22101 22098->22072 22099->22095 22100->22096 22101->22095 22102 1fa63a 22125 1fa59b GetModuleHandleExW 22102->22125 22105 1fa680 22106 1fa59b Concurrency::details::_Reschedule_chore GetModuleHandleExW 22105->22106 22109 1fa686 22106->22109 22108 1fa674 22131 1f9774 ReleaseSRWLockExclusive 22108->22131 22111 1fa6a7 22109->22111 22132 1fa57e GetModuleHandleExW 22109->22132 22127 1f6306 22111->22127 22113 1fa697 22113->22111 22114 1fa69d FreeLibraryWhenCallbackReturns 22113->22114 22114->22111 22116 1fa59b Concurrency::details::_Reschedule_chore GetModuleHandleExW 22117 1fa6bd 22116->22117 22118 1fa6eb 22117->22118 22133 1f82ee 50 API calls std::_Throw_Cpp_error 22117->22133 22120 1fa6c9 22134 1f9774 ReleaseSRWLockExclusive 22120->22134 22122 1fa6dc 22122->22118 22135 1f98fb WakeAllConditionVariable 22122->22135 22126 1fa5b1 22125->22126 22126->22105 22130 1f82ee 50 API calls std::_Throw_Cpp_error 22126->22130 22136 1f2bac 22127->22136 22128 1f6312 22128->22116 22130->22108 22131->22105 22132->22113 22133->22120 22134->22122 22135->22118 22137 1f2bc0 Concurrency::details::_ContextCallback::_CallInContext 22136->22137 22138 1f2bbb 22136->22138 22137->22128 22148 1fe79c RaiseException 22137->22148 22142 1f4b30 22138->22142 22140 1f8b89 22143 1f4b3c __EH_prolog3_catch 22142->22143 22149 1f4265 22143->22149 22148->22140 22150 1f4270 Concurrency::details::_ContextCallback::_CallInContext 22149->22150 22153 1fe79c RaiseException 22150->22153 22152 1f8b89 22153->22152 22154 e8018d 22155 e801c5 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 22154->22155 22157 e803a2 WriteProcessMemory 22155->22157 22158 e803e7 22157->22158 22159 e80429 WriteProcessMemory Wow64SetThreadContext ResumeThread 22158->22159 22160 e803ec WriteProcessMemory 22158->22160 22160->22158 22161 1f83c2 CreateThread WaitForSingleObject 22162 1f86f5 22161->22162 22163 1f3136 std::_Throw_Cpp_error 43 API calls 22162->22163 22164 1f8714 22163->22164 22165 1fd0bf std::_Facet_Register 43 API calls 22164->22165 22166 1f871b 22165->22166 22167 1f872b VirtualAlloc 22166->22167 22186 1f32bd 46 API calls 2 library calls 22166->22186 22179 1f2a29 22167->22179 22172 1f875d 22183 1f6cb1 22172->22183 22174 1f8762 ctype 22187 1f68ad 41 API calls _Deallocate 22174->22187 22176 1f879f 22177 1fd408 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22176->22177 22178 1f87ab 22177->22178 22188 1f2a40 70 API calls 22179->22188 22181 1f2a38 22182 1f87e9 43 API calls 22181->22182 22182->22172 22189 1f46f6 22183->22189 22186->22167 22187->22176 22188->22181 22212 1f176c 22189->22212 22192 1f472d 22194 1f4775 _AnonymousOriginator 22192->22194 22215 1f14fb 22192->22215 22229 1f2b55 22192->22229 22195 1f496d 22194->22195 22198 1f47f2 OffsetRect 22194->22198 22203 1f3136 std::_Throw_Cpp_error 43 API calls 22194->22203 22204 1f2b55 97 API calls 22194->22204 22205 20296e 44 API calls 22194->22205 22206 1f3ee3 72 API calls 22194->22206 22208 1f3de6 72 API calls 22194->22208 22246 1f1b91 22194->22246 22256 1f2b7e 98 API calls 22194->22256 22257 1f68ad 41 API calls _Deallocate 22194->22257 22258 1f1a9d 41 API calls 2 library calls 22194->22258 22259 1f49c1 41 API calls 2 library calls 22194->22259 22260 1f1d17 41 API calls _AnonymousOriginator 22195->22260 22197 1f4979 22199 1fd408 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22197->22199 22236 1f1ac9 22198->22236 22201 1f498b 22199->22201 22201->22174 22203->22194 22204->22194 22205->22194 22206->22194 22208->22194 22213 1fd0bf std::_Facet_Register 43 API calls 22212->22213 22214 1f1773 22213->22214 22214->22192 22217 1f1507 __EH_prolog3_catch _strlen 22215->22217 22261 1f3902 22217->22261 22218 1f1566 22269 1f6b97 22218->22269 22219 1f15c0 22265 1fb7c2 22219->22265 22223 1f1698 Concurrency::details::_ContextCallback::_CallInContext 22223->22192 22225 1f1560 22225->22218 22225->22219 22280 1f8684 22225->22280 22226 1f15d5 22226->22218 22227 1f8684 69 API calls 22226->22227 22227->22226 22383 1f881d 22229->22383 22231 1f2b68 22387 1f844f 22231->22387 22233 1f2b73 22234 1f8043 43 API calls 22233->22234 22235 1f2b7a 22234->22235 22235->22192 22237 1f1ad5 __EH_prolog3_catch 22236->22237 22238 1f1b86 22237->22238 22239 1f1af4 22237->22239 22419 1f6a77 43 API calls std::_Throw_Cpp_error 22238->22419 22242 1f16a8 std::_Throw_Cpp_error 43 API calls 22239->22242 22243 1f1b07 ___std_swap_ranges_trivially_swappable 22242->22243 22415 1f4d08 22243->22415 22245 1f1b65 Concurrency::details::_ContextCallback::_CallInContext 22245->22194 22247 1f1b9d __EH_prolog3_catch 22246->22247 22248 1f1bbd 22247->22248 22249 1f1c49 22247->22249 22421 1f6aa8 22248->22421 22432 1f6a77 43 API calls std::_Throw_Cpp_error 22249->22432 22253 1f1bd2 22428 1f4d3b 22253->22428 22255 1f1c28 Concurrency::details::_ContextCallback::_CallInContext 22255->22194 22256->22194 22257->22194 22258->22194 22259->22194 22260->22197 22263 1f3911 22261->22263 22262 1f392f 22262->22225 22263->22262 22284 1f8043 22263->22284 22266 1fb7d1 22265->22266 22267 1fb7e4 ctype 22265->22267 22266->22226 22267->22266 22292 207436 22267->22292 22270 1f1690 22269->22270 22273 1f6bae std::ios_base::_Init 22269->22273 22276 1f3cc7 22270->22276 22271 1f6be7 22345 1fe79c RaiseException 22271->22345 22273->22271 22344 1f37d8 43 API calls std::ios_base::_Init 22273->22344 22274 1f6c00 22277 1f3ccf 22276->22277 22279 1f3c1e 22277->22279 22346 1f60aa 43 API calls 3 library calls 22277->22346 22279->22223 22281 1f8693 22280->22281 22282 1f869f 22281->22282 22347 1fb01e 22281->22347 22282->22225 22285 1f804f __EH_prolog3_catch 22284->22285 22286 1f3902 43 API calls 22285->22286 22287 1f80f4 Concurrency::details::_ContextCallback::_CallInContext 22285->22287 22290 1f806e 22286->22290 22287->22262 22288 1f80ec 22289 1f3cc7 43 API calls 22288->22289 22289->22287 22290->22288 22291 1f6b97 std::ios_base::_Init 43 API calls 22290->22291 22291->22288 22293 207449 _Fputc 22292->22293 22298 207215 22293->22298 22295 20745e 22296 20198b _Fputc 41 API calls 22295->22296 22297 20746b 22296->22297 22297->22266 22299 207223 22298->22299 22300 20724b 22298->22300 22299->22300 22301 207230 22299->22301 22302 207252 22299->22302 22300->22295 22314 201bd2 41 API calls 3 library calls 22301->22314 22306 20716e 22302->22306 22307 20717a __FrameHandler3::FrameUnwindToState 22306->22307 22315 202b17 EnterCriticalSection 22307->22315 22309 207188 22316 2071c9 22309->22316 22313 2071a6 22313->22295 22314->22300 22315->22309 22324 20ead6 22316->22324 22323 2071bd LeaveCriticalSection __fread_nolock 22323->22313 22325 20ea9b 41 API calls 22324->22325 22326 20eae7 22325->22326 22327 20dbb9 __strnicoll 15 API calls 22326->22327 22330 2071e1 22326->22330 22328 20eb41 22327->22328 22329 20cb79 ___free_lconv_mon 14 API calls 22328->22329 22329->22330 22331 20728c 22330->22331 22334 20729e 22331->22334 22335 2071ff 22331->22335 22332 2072ac 22333 201bd2 _Fputc 41 API calls 22332->22333 22333->22335 22334->22332 22334->22335 22338 2072e2 ctype _Fputc 22334->22338 22340 20eb82 22335->22340 22336 206823 ___scrt_uninitialize_crt 66 API calls 22336->22338 22337 20ea5f __fread_nolock 41 API calls 22337->22338 22338->22335 22338->22336 22338->22337 22339 210828 ___scrt_uninitialize_crt 66 API calls 22338->22339 22339->22338 22341 207195 22340->22341 22342 20eb8d 22340->22342 22341->22323 22342->22341 22343 206823 ___scrt_uninitialize_crt 66 API calls 22342->22343 22343->22341 22344->22271 22345->22274 22346->22279 22351 1fb041 22347->22351 22355 1fb03a 22347->22355 22348 1fd408 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22349 1fb124 22348->22349 22349->22282 22352 1fb0e7 22351->22352 22353 1fb08a 22351->22353 22351->22355 22354 207436 69 API calls 22352->22354 22352->22355 22353->22355 22356 1fa76a 22353->22356 22354->22355 22355->22348 22359 205ab8 22356->22359 22360 205acb _Fputc 22359->22360 22365 20595e 22360->22365 22362 205ada 22363 20198b _Fputc 41 API calls 22362->22363 22364 1fa77a 22363->22364 22364->22355 22366 20596a __FrameHandler3::FrameUnwindToState 22365->22366 22367 205973 22366->22367 22368 205997 22366->22368 22380 201bd2 41 API calls 3 library calls 22367->22380 22379 202b17 EnterCriticalSection 22368->22379 22371 20598c _Fputc 22371->22362 22372 2059a0 22373 205a4b _Fputc 22372->22373 22374 20ea5f __fread_nolock 41 API calls 22372->22374 22382 205a83 LeaveCriticalSection __fread_nolock 22373->22382 22378 2059b9 22374->22378 22376 205a1a 22381 201bd2 41 API calls 3 library calls 22376->22381 22378->22373 22378->22376 22379->22372 22380->22371 22381->22371 22382->22371 22384 1f8831 22383->22384 22397 1f2c41 22384->22397 22386 1f883a std::ios_base::_Ios_base_dtor 22386->22231 22388 1f845b __EH_prolog3_catch 22387->22388 22389 1f3902 43 API calls 22388->22389 22390 1f846d 22389->22390 22391 1f8473 22390->22391 22392 1f8684 69 API calls 22390->22392 22393 1f6b97 std::ios_base::_Init 43 API calls 22391->22393 22392->22391 22394 1f84f8 22393->22394 22395 1f3cc7 43 API calls 22394->22395 22396 1f8500 Concurrency::details::_ContextCallback::_CallInContext 22395->22396 22396->22233 22398 1f89dc std::_Lockit::_Lockit 7 API calls 22397->22398 22399 1f2c52 22398->22399 22400 1f400a int 9 API calls 22399->22400 22401 1f2c65 22400->22401 22403 1f2c78 22401->22403 22412 1f5410 72 API calls 3 library calls 22401->22412 22402 1f8a34 std::_Lockit::~_Lockit 2 API calls 22404 1f2cae 22402->22404 22403->22402 22404->22386 22406 1f2c88 22407 1f2c8f 22406->22407 22408 1f2cb4 22406->22408 22413 1f9cfb 43 API calls std::_Facet_Register 22407->22413 22414 1f678c 43 API calls 2 library calls 22408->22414 22411 1f2cb9 22412->22406 22413->22403 22414->22411 22416 1f4d1d 22415->22416 22417 1f4d10 22415->22417 22416->22245 22420 1f1a9d 41 API calls 2 library calls 22417->22420 22420->22416 22422 1f6ab3 22421->22422 22423 1f6ac0 22421->22423 22425 1f16a8 std::_Throw_Cpp_error 43 API calls 22422->22425 22433 1f676f 43 API calls 2 library calls 22423->22433 22427 1f6abc 22425->22427 22426 1f6ac5 22427->22253 22429 1f4d53 22428->22429 22430 1f4d43 22428->22430 22429->22255 22434 1f1a9d 41 API calls 2 library calls 22430->22434 22433->22426 22434->22429 22435 1f86c1 22436 1f86c9 22435->22436 22437 1f86d1 22436->22437 22439 1fc375 22436->22439 22440 1fc397 22439->22440 22441 1fc3a0 22439->22441 22442 1fd408 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22440->22442 22441->22440 22443 1fc3e0 22441->22443 22446 1fc406 22441->22446 22444 1fc402 22442->22444 22451 1fbaef 22443->22451 22444->22437 22447 1fc461 22446->22447 22448 1fc442 22446->22448 22447->22440 22449 207436 69 API calls 22447->22449 22448->22440 22450 1fbaef _Fputc 45 API calls 22448->22450 22449->22440 22450->22440 22454 207bbd 22451->22454 22455 207bd0 _Fputc 22454->22455 22460 2079c1 22455->22460 22458 20198b _Fputc 41 API calls 22459 1fbafd 22458->22459 22459->22440 22461 2079cd __FrameHandler3::FrameUnwindToState 22460->22461 22462 2079d4 22461->22462 22463 2079f9 22461->22463 22494 201bd2 41 API calls 3 library calls 22462->22494 22471 202b17 EnterCriticalSection 22463->22471 22466 207a08 22472 207a85 22466->22472 22470 2079ef 22470->22458 22471->22466 22473 207aaa _Fputc 22472->22473 22474 207abc 22472->22474 22479 1fd408 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22473->22479 22475 20ea5f __fread_nolock 41 API calls 22474->22475 22476 207ac3 22475->22476 22477 207aeb 22476->22477 22478 20ea5f __fread_nolock 41 API calls 22476->22478 22477->22473 22482 20ea5f __fread_nolock 41 API calls 22477->22482 22481 207ad4 22478->22481 22480 207a19 22479->22480 22495 207a49 LeaveCriticalSection __fread_nolock 22480->22495 22481->22477 22483 20ea5f __fread_nolock 41 API calls 22481->22483 22484 207b1e 22482->22484 22485 207ae0 22483->22485 22486 207b41 22484->22486 22488 20ea5f __fread_nolock 41 API calls 22484->22488 22487 20ea5f __fread_nolock 41 API calls 22485->22487 22486->22473 22496 20e751 22486->22496 22487->22477 22490 207b2a 22488->22490 22490->22486 22491 20ea5f __fread_nolock 41 API calls 22490->22491 22492 207b36 22491->22492 22493 20ea5f __fread_nolock 41 API calls 22492->22493 22493->22486 22494->22470 22495->22470 22497 20e766 22496->22497 22498 20e7a7 22497->22498 22504 20e76a __fread_nolock _Fputc 22497->22504 22505 20e793 __fread_nolock 22497->22505 22506 202840 41 API calls _Fputc 22497->22506 22498->22504 22498->22505 22507 2121fc WideCharToMultiByte 22498->22507 22502 20e862 22503 20e878 GetLastError 22502->22503 22502->22504 22503->22504 22503->22505 22504->22473 22505->22504 22508 201bd2 41 API calls 3 library calls 22505->22508 22506->22498 22507->22502 22508->22504 22509 1fd5c0 22510 1fd5cc __FrameHandler3::FrameUnwindToState 22509->22510 22535 1fd178 22510->22535 22512 1fd5d3 22513 1fd72c 22512->22513 22523 1fd5fd ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock CallUnexpected 22512->22523 22566 1fda85 4 API calls 2 library calls 22513->22566 22515 1fd733 22559 208b99 22515->22559 22519 1fd741 22520 1fd61c 22521 1fd69d 22546 209160 22521->22546 22523->22520 22523->22521 22562 20564b 41 API calls 4 library calls 22523->22562 22525 1fd6a3 22550 1f88ee 22525->22550 22527 1fd6ba 22563 1fdb9f GetModuleHandleW 22527->22563 22529 1fd6c4 22529->22515 22530 1fd6c8 22529->22530 22531 1fd6d1 22530->22531 22564 208b4e 23 API calls CallUnexpected 22530->22564 22565 1fd2e9 77 API calls ___scrt_uninitialize_crt 22531->22565 22534 1fd6da 22534->22520 22536 1fd181 22535->22536 22568 1fd865 IsProcessorFeaturePresent 22536->22568 22538 1fd18d 22569 2003fc 10 API calls 2 library calls 22538->22569 22540 1fd192 22545 1fd196 22540->22545 22570 2095b6 22540->22570 22543 1fd1ad 22543->22512 22545->22512 22547 20916e 22546->22547 22548 209169 22546->22548 22547->22525 22583 208eba 55 API calls 22548->22583 22584 1fd4a2 22550->22584 22552 1f88fa FreeConsole 22553 1fd0bf std::_Facet_Register 43 API calls 22552->22553 22554 1f890b 22553->22554 22555 1f8924 Concurrency::details::_ContextCallback::_CallInContext 22554->22555 22585 1f3271 22554->22585 22555->22527 22864 208981 22559->22864 22562->22521 22563->22529 22564->22531 22565->22534 22566->22515 22567 208b5d 23 API calls CallUnexpected 22567->22519 22568->22538 22569->22540 22574 213902 22570->22574 22573 20041b 7 API calls 2 library calls 22573->22545 22575 1fd19f 22574->22575 22576 213912 22574->22576 22575->22543 22575->22573 22576->22575 22578 20da7d 22576->22578 22579 20da84 22578->22579 22580 20dac7 GetStdHandle 22579->22580 22581 20db29 22579->22581 22582 20dada GetFileType 22579->22582 22580->22579 22581->22576 22582->22579 22583->22547 22584->22552 22597 1f894c 22585->22597 22588 1fd0bf std::_Facet_Register 43 API calls 22589 1f328b 22588->22589 22591 1f32a0 22589->22591 22601 1f2925 22589->22601 22609 1f82af 22591->22609 22594 1f32b8 22594->22555 22596 1f44b1 72 API calls _AnonymousOriginator 22594->22596 22596->22555 22598 1f895e 22597->22598 22618 1f889d 22598->22618 22693 1f2c22 22601->22693 22604 1f2939 _AnonymousOriginator 22696 20580b 22604->22696 22605 1f2966 22606 1f296f 22605->22606 22711 1f9b67 43 API calls 2 library calls 22605->22711 22606->22591 22610 1f82ba GetCurrentThreadId 22609->22610 22611 1f82c4 22609->22611 22610->22611 22612 1f82c8 22610->22612 22616 1f32ab 22611->22616 22863 1f9b67 43 API calls 2 library calls 22611->22863 22857 1f96f8 WaitForSingleObjectEx 22612->22857 22616->22594 22617 1f460c 41 API calls 2 library calls 22616->22617 22617->22594 22619 1f88b2 _swprintf 22618->22619 22622 20508b 22619->22622 22623 20509f _Fputc 22622->22623 22624 2050c1 22623->22624 22625 2050e8 22623->22625 22639 201bd2 41 API calls 3 library calls 22624->22639 22631 202b3f 22625->22631 22628 2050dc 22629 20198b _Fputc 41 API calls 22628->22629 22630 1f3284 22629->22630 22630->22588 22632 202b4b __FrameHandler3::FrameUnwindToState 22631->22632 22640 202b17 EnterCriticalSection 22632->22640 22634 202b59 22641 2038d2 22634->22641 22638 202b77 22638->22628 22639->22628 22640->22634 22642 20ead6 42 API calls 22641->22642 22643 2038f9 _swprintf 22642->22643 22653 203b1a 22643->22653 22648 20eb82 66 API calls 22649 20395a 22648->22649 22650 1fd408 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22649->22650 22651 202b66 22650->22651 22652 202b8e LeaveCriticalSection __fread_nolock 22651->22652 22652->22638 22671 204e2d 22653->22671 22656 203b43 22677 201bd2 41 API calls 3 library calls 22656->22677 22658 203940 22668 203894 22658->22668 22663 203b6e _swprintf 22663->22658 22664 203d4b 22663->22664 22678 202840 41 API calls _Fputc 22663->22678 22679 203aa2 41 API calls _swprintf 22663->22679 22680 2040a6 46 API calls 3 library calls 22663->22680 22681 204362 46 API calls 3 library calls 22663->22681 22682 201bd2 41 API calls 3 library calls 22664->22682 22666 203d67 22683 201bd2 41 API calls 3 library calls 22666->22683 22686 20cb79 22668->22686 22672 204e38 22671->22672 22673 204e5a 22671->22673 22684 201bd2 41 API calls 3 library calls 22672->22684 22685 204e96 41 API calls 3 library calls 22673->22685 22676 203b35 22676->22656 22676->22658 22676->22663 22677->22658 22678->22663 22679->22663 22680->22663 22681->22663 22682->22666 22683->22658 22684->22676 22685->22676 22687 20cb84 HeapFree 22686->22687 22691 2038a4 22686->22691 22688 20cb99 GetLastError 22687->22688 22687->22691 22689 20cba6 __dosmaperr 22688->22689 22692 20647e 14 API calls __dosmaperr 22689->22692 22691->22648 22692->22691 22694 1fd0bf std::_Facet_Register 43 API calls 22693->22694 22695 1f2c29 22694->22695 22695->22604 22697 205818 22696->22697 22698 20582c 22696->22698 22721 20647e 14 API calls __dosmaperr 22697->22721 22712 2057bb 22698->22712 22701 20581d 22722 201c4f 41 API calls _Deallocate 22701->22722 22704 205841 CreateThread 22706 205860 GetLastError 22704->22706 22707 20586c 22704->22707 22741 2056af 22704->22741 22705 205828 22705->22605 22723 206424 14 API calls __dosmaperr 22706->22723 22724 20572d 22707->22724 22732 20cb1c 22712->22732 22715 20cb79 ___free_lconv_mon 14 API calls 22716 2057d9 22715->22716 22717 2057e0 GetModuleHandleExW 22716->22717 22718 2057fd 22716->22718 22717->22718 22719 20572d 16 API calls 22718->22719 22720 205805 22719->22720 22720->22704 22720->22707 22721->22701 22722->22705 22723->22707 22725 205739 22724->22725 22726 20575d 22724->22726 22727 205748 22725->22727 22728 20573f CloseHandle 22725->22728 22726->22605 22729 205757 22727->22729 22730 20574e FreeLibrary 22727->22730 22728->22727 22731 20cb79 ___free_lconv_mon 14 API calls 22729->22731 22730->22729 22731->22726 22737 20cb29 __dosmaperr 22732->22737 22733 20cb69 22740 20647e 14 API calls __dosmaperr 22733->22740 22734 20cb54 RtlAllocateHeap 22735 2057cc 22734->22735 22734->22737 22735->22715 22737->22733 22737->22734 22739 20865b EnterCriticalSection LeaveCriticalSection std::_Facet_Register 22737->22739 22739->22737 22740->22735 22742 2056bb __FrameHandler3::FrameUnwindToState 22741->22742 22743 2056c2 GetLastError ExitThread 22742->22743 22744 2056cf 22742->22744 22755 20b350 GetLastError 22744->22755 22749 2056eb 22787 20588e 22749->22787 22756 20b36c 22755->22756 22757 20b366 22755->22757 22761 20b370 SetLastError 22756->22761 22796 20d5da 22756->22796 22801 20d59b 6 API calls std::_Lockit::_Lockit 22757->22801 22765 2056d4 22761->22765 22766 20b405 22761->22766 22762 20cb1c __dosmaperr 14 API calls 22764 20b39d 22762->22764 22767 20b3a5 22764->22767 22768 20b3b6 22764->22768 22782 20ebc0 22765->22782 22803 201f23 41 API calls CallUnexpected 22766->22803 22770 20d5da __dosmaperr 6 API calls 22767->22770 22771 20d5da __dosmaperr 6 API calls 22768->22771 22773 20b3b3 22770->22773 22774 20b3c2 22771->22774 22778 20cb79 ___free_lconv_mon 14 API calls 22773->22778 22775 20b3c6 22774->22775 22776 20b3dd 22774->22776 22777 20d5da __dosmaperr 6 API calls 22775->22777 22802 20b17e 14 API calls __dosmaperr 22776->22802 22777->22773 22778->22761 22780 20b3e8 22781 20cb79 ___free_lconv_mon 14 API calls 22780->22781 22781->22761 22783 20ebd2 GetPEB 22782->22783 22784 2056df 22782->22784 22783->22784 22785 20ebe5 22783->22785 22784->22749 22794 20d7e7 5 API calls std::_Lockit::_Lockit 22784->22794 22819 20d40d 22785->22819 22822 205764 22787->22822 22794->22749 22804 20d34a 22796->22804 22799 20d614 TlsSetValue 22800 20b388 22800->22761 22800->22762 22801->22756 22802->22780 22805 20d378 22804->22805 22809 20d374 22804->22809 22805->22809 22811 20d27f 22805->22811 22808 20d392 GetProcAddress 22808->22809 22810 20d3a2 std::_Lockit::_Lockit 22808->22810 22809->22799 22809->22800 22810->22809 22817 20d290 ___vcrt_InitializeCriticalSectionEx 22811->22817 22812 20d326 22812->22808 22812->22809 22813 20d2ae LoadLibraryExW 22814 20d2c9 GetLastError 22813->22814 22815 20d32d 22813->22815 22814->22817 22815->22812 22816 20d33f FreeLibrary 22815->22816 22816->22812 22817->22812 22817->22813 22818 20d2fc LoadLibraryExW 22817->22818 22818->22815 22818->22817 22820 20d34a std::_Lockit::_Lockit 5 API calls 22819->22820 22821 20d429 22820->22821 22821->22784 22831 20b4a1 GetLastError 22822->22831 22824 2057b1 ExitThread 22825 20576f 22825->22824 22826 205788 22825->22826 22854 20d822 5 API calls std::_Lockit::_Lockit 22825->22854 22828 20579b 22826->22828 22829 205794 CloseHandle 22826->22829 22828->22824 22830 2057a7 FreeLibraryAndExitThread 22828->22830 22829->22828 22830->22824 22832 20b4bd 22831->22832 22833 20b4b7 22831->22833 22835 20d5da __dosmaperr 6 API calls 22832->22835 22851 20b4c1 SetLastError 22832->22851 22855 20d59b 6 API calls std::_Lockit::_Lockit 22833->22855 22836 20b4d9 22835->22836 22838 20cb1c __dosmaperr 12 API calls 22836->22838 22836->22851 22839 20b4ee 22838->22839 22840 20b4f6 22839->22840 22841 20b507 22839->22841 22842 20d5da __dosmaperr 6 API calls 22840->22842 22843 20d5da __dosmaperr 6 API calls 22841->22843 22844 20b504 22842->22844 22845 20b513 22843->22845 22849 20cb79 ___free_lconv_mon 12 API calls 22844->22849 22846 20b517 22845->22846 22847 20b52e 22845->22847 22848 20d5da __dosmaperr 6 API calls 22846->22848 22856 20b17e 14 API calls __dosmaperr 22847->22856 22848->22844 22849->22851 22851->22825 22852 20b539 22853 20cb79 ___free_lconv_mon 12 API calls 22852->22853 22853->22851 22854->22826 22855->22832 22856->22852 22858 1f970f 22857->22858 22859 1f9741 22857->22859 22860 1f972c FindCloseChangeNotification 22858->22860 22861 1f9716 GetExitCodeThread 22858->22861 22859->22611 22860->22859 22861->22859 22862 1f9727 22861->22862 22862->22860 22865 2089c0 22864->22865 22866 2089ae 22864->22866 22876 20882a 22865->22876 22891 208a49 GetModuleHandleW 22866->22891 22869 2089b3 22869->22865 22892 208aae GetModuleHandleExW 22869->22892 22871 1fd739 22871->22567 22875 208a12 22877 208836 __FrameHandler3::FrameUnwindToState 22876->22877 22898 2058dd EnterCriticalSection 22877->22898 22879 208840 22899 208896 22879->22899 22881 20884d 22903 20886b 22881->22903 22884 208a18 22908 208a8c 22884->22908 22887 208a36 22889 208aae CallUnexpected 3 API calls 22887->22889 22888 208a26 GetCurrentProcess TerminateProcess 22888->22887 22890 208a3e ExitProcess 22889->22890 22891->22869 22893 208aed GetProcAddress 22892->22893 22894 208b0e 22892->22894 22893->22894 22897 208b01 22893->22897 22895 208b14 FreeLibrary 22894->22895 22896 2089bf 22894->22896 22895->22896 22896->22865 22897->22894 22898->22879 22900 2088a2 __FrameHandler3::FrameUnwindToState 22899->22900 22901 208909 CallUnexpected 22900->22901 22906 209421 14 API calls 3 library calls 22900->22906 22901->22881 22907 205925 LeaveCriticalSection 22903->22907 22905 208859 22905->22871 22905->22884 22906->22901 22907->22905 22913 20ec04 6 API calls CallUnexpected 22908->22913 22910 208a91 22911 208a96 GetPEB 22910->22911 22912 208a22 22910->22912 22911->22912 22912->22887 22912->22888 22913->22910

                        Control-flow Graph

                        APIs
                        • CreateProcessA.KERNELBASE(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00E800FF,00E800EF), ref: 00E802FC
                        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00E8030F
                        • Wow64GetThreadContext.KERNEL32(00000098,00000000), ref: 00E8032D
                        • ReadProcessMemory.KERNELBASE(00000094,?,00E80143,00000004,00000000), ref: 00E80351
                        • VirtualAllocEx.KERNELBASE(00000094,?,?,00003000,00000040), ref: 00E8037C
                        • WriteProcessMemory.KERNELBASE(00000094,00000000,?,?,00000000,?), ref: 00E803D4
                        • WriteProcessMemory.KERNELBASE(00000094,00400000,?,?,00000000,?,00000028), ref: 00E8041F
                        • WriteProcessMemory.KERNELBASE(00000094,?,?,00000004,00000000), ref: 00E8045D
                        • Wow64SetThreadContext.KERNEL32(00000098,00FE0000), ref: 00E80499
                        • ResumeThread.KERNELBASE(00000098), ref: 00E804A8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2008548298.0000000000E80000.00000040.00001000.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_e80000_7Xex8yR90g.jbxd
                        Similarity
                        • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                        • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$CreateProcessA$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                        • API String ID: 2687962208-1257834847
                        • Opcode ID: 6ed679946abb4a161c9f75f6101290084365813039212a6bd0c7882d8dd446c2
                        • Instruction ID: 4dc3fff55bb4b5fd7599c317765bf55589d71f329c2721514d54b7ab9cd3c163
                        • Opcode Fuzzy Hash: 6ed679946abb4a161c9f75f6101290084365813039212a6bd0c7882d8dd446c2
                        • Instruction Fuzzy Hash: 5DB1F67264128AAFDB60CF68CC80BDA77A5FF88714F158524EA0CEB341D774FA418B94

                        Control-flow Graph

                        APIs
                          • Part of subcall function 001F14FB: __EH_prolog3_catch.LIBCMT ref: 001F1502
                          • Part of subcall function 001F14FB: _strlen.LIBCMT ref: 001F1514
                        • OffsetRect.USER32(00000000,00000000,00000000), ref: 001F47F9
                          • Part of subcall function 001F3DE6: __EH_prolog3_catch.LIBCMT ref: 001F3DED
                          • Part of subcall function 001F68AD: _Deallocate.LIBCONCRT ref: 001F68BC
                        • _Deallocate.LIBCONCRT ref: 001F48F1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: DeallocateH_prolog3_catch$OffsetRect_strlen
                        • String ID: Zatlat$`-%$`-%
                        • API String ID: 4231566263-1362805709
                        • Opcode ID: 01670947ede5fd85a47be88702fff9c2ca02968853204ab92a84646c3c92dfed
                        • Instruction ID: 5ffd9ce1b1f2c649e5b4c174073f052ba9235fd4f55cb82369bed366f28983b8
                        • Opcode Fuzzy Hash: 01670947ede5fd85a47be88702fff9c2ca02968853204ab92a84646c3c92dfed
                        • Instruction Fuzzy Hash: 6F71C07150C3889FC314EF68D88567FBBE4AF99304F500A2EFAD583282DB74D9098B56
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6fbbdb32136ce8b2d215cf4e377abeb6293306163ee6a3ef70c84ab1ebc94ce3
                        • Instruction ID: 1327db1900b0b39df738c9d67bcf5c6a82ed8e5e2f440c7ea84c558b9497bac0
                        • Opcode Fuzzy Hash: 6fbbdb32136ce8b2d215cf4e377abeb6293306163ee6a3ef70c84ab1ebc94ce3
                        • Instruction Fuzzy Hash: 33F0A032A21334EBCF22CB4CD405A9973A8EB04B65F120096E902E7181C2B0DE50CBD0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 23 20d27f-20d28b 24 20d31d-20d320 23->24 25 20d290-20d2a1 24->25 26 20d326 24->26 28 20d2a3-20d2a6 25->28 29 20d2ae-20d2c7 LoadLibraryExW 25->29 27 20d328-20d32c 26->27 30 20d346-20d348 28->30 31 20d2ac 28->31 32 20d2c9-20d2d2 GetLastError 29->32 33 20d32d-20d33d 29->33 30->27 35 20d31a 31->35 36 20d2d4-20d2e6 call 20afd8 32->36 37 20d30b-20d318 32->37 33->30 34 20d33f-20d340 FreeLibrary 33->34 34->30 35->24 36->37 40 20d2e8-20d2fa call 20afd8 36->40 37->35 40->37 43 20d2fc-20d309 LoadLibraryExW 40->43 43->33 43->37
                        APIs
                        • FreeLibrary.KERNEL32(00000000,?,0020D38C,?,?,001F8B9B,00000000,?,?,0020D5F6,00000021,FlsSetValue,002209B4,002209BC,001F8B9B), ref: 0020D340
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: FreeLibrary
                        • String ID: api-ms-$ext-ms-
                        • API String ID: 3664257935-537541572
                        • Opcode ID: c3d75ae7d97ddb51cff076c14e3b47dfbe908bd5820e6994a08a7fe36174abec
                        • Instruction ID: ad2ae7ccf9de3638910ad1e43574d9ccd51e1d5d630014dd3694ba0ca59afd91
                        • Opcode Fuzzy Hash: c3d75ae7d97ddb51cff076c14e3b47dfbe908bd5820e6994a08a7fe36174abec
                        • Instruction Fuzzy Hash: 42212771A62312ABC7229FA4BC85A9A77589B423A0F210150ED05A72D2DB30FE10CED2

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 106 1f2dac-1f2ddd call 1f89dc call 1f400a call 1f5658 113 1f2ddf-1f2de1 106->113 114 1f2e11-1f2e1e call 1f8a34 106->114 116 1f2de7-1f2dee call 1f552f 113->116 117 1f2de3-1f2de5 113->117 120 1f2df3-1f2df8 116->120 117->114 121 1f2e1f-1f2e24 call 1f678c 120->121 122 1f2dfa-1f2e0b call 1f9cfb 120->122 122->114
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 001F2DB8
                        • int.LIBCPMT ref: 001F2DCB
                          • Part of subcall function 001F400A: std::_Lockit::_Lockit.LIBCPMT ref: 001F401B
                          • Part of subcall function 001F400A: std::_Lockit::~_Lockit.LIBCPMT ref: 001F4035
                        • std::_Facet_Register.LIBCPMT ref: 001F2DFE
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 001F2E14
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                        • String ID: d)%
                        • API String ID: 459529453-3218993474
                        • Opcode ID: 037c846c8966f21cda2deb3944d0ae3091458f6c78d533d9d6d7a0a6103fc507
                        • Instruction ID: acfda896078929487308af15e2bbb43b702884d338590cc33dba14081a485435
                        • Opcode Fuzzy Hash: 037c846c8966f21cda2deb3944d0ae3091458f6c78d533d9d6d7a0a6103fc507
                        • Instruction Fuzzy Hash: BA01A27250061CEBCB14AB64DC458FE7769EF91764F340159FB06AB291DF30AE42C794

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 128 1f344c-1f3484 call 1f89dc 131 1f3499-1f34a3 call 1f8bca 128->131 132 1f3486-1f348b call 1f9e2b 128->132 135 1f3490-1f3496 132->135
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 001F3453
                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 001F348B
                          • Part of subcall function 001F9E2B: _Yarn.LIBCPMT ref: 001F9E4A
                          • Part of subcall function 001F9E2B: _Yarn.LIBCPMT ref: 001F9E6E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: Yarnstd::_$Locinfo::_Locinfo_ctorLockitLockit::_
                        • String ID: bad locale name
                        • API String ID: 1908188788-1405518554
                        • Opcode ID: b210fd67326a5067d342724666aaf906fbefd279a00f61cfb8efaf53f0d231c8
                        • Instruction ID: e342c4b8401f093f52380446752dca8b51b6bce50b524d097934c02d94d2893d
                        • Opcode Fuzzy Hash: b210fd67326a5067d342724666aaf906fbefd279a00f61cfb8efaf53f0d231c8
                        • Instruction Fuzzy Hash: 37F01DB2505B449E83319F6A9481453FBE4BE29610354CA6FE1DEC3A11D730A504CBAA

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 137 20580b-205816 138 205818-20582b call 20647e call 201c4f 137->138 139 20582c-20583f call 2057bb 137->139 145 205841-20585e CreateThread 139->145 146 20586d 139->146 149 205860-20586c GetLastError call 206424 145->149 150 20587c-205881 145->150 147 20586f-20587b call 20572d 146->147 149->146 153 205883-205886 150->153 154 205888-20588c 150->154 153->154 154->147
                        APIs
                        • CreateThread.KERNELBASE(00000000,?,002056AF,00000000,?,00000000), ref: 00205854
                        • GetLastError.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,001F6B38,?,00000000,?,?,?), ref: 00205860
                        • __dosmaperr.LIBCMT ref: 00205867
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateErrorLastThread__dosmaperr
                        • String ID:
                        • API String ID: 2744730728-0
                        • Opcode ID: 020fa354eeae8cef330500fd309889f0ea0d488b4749bd59af60f5a86f66dad9
                        • Instruction ID: 99cb27c016f186b4df1e6bd2c22db10d3585e8e2a4cfa47a02149bb868e1eafc
                        • Opcode Fuzzy Hash: 020fa354eeae8cef330500fd309889f0ea0d488b4749bd59af60f5a86f66dad9
                        • Instruction Fuzzy Hash: C8014C7652172AAFDF259FA0DC06AAF7BA5EF04350F108158FC0196192EB71CEA0DF90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 157 1f96f8-1f970d WaitForSingleObjectEx 158 1f970f-1f9714 157->158 159 1f9741-1f9743 157->159 160 1f972c-1f973f FindCloseChangeNotification 158->160 161 1f9716-1f9725 GetExitCodeThread 158->161 162 1f9744-1f9746 159->162 160->162 161->159 163 1f9727-1f972a 161->163 163->160
                        APIs
                        • WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000), ref: 001F9704
                        • GetExitCodeThread.KERNEL32(?,?), ref: 001F971D
                        • FindCloseChangeNotification.KERNELBASE(?), ref: 001F972F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ChangeCloseCodeExitFindNotificationObjectSingleThreadWait
                        • String ID:
                        • API String ID: 3816883391-0
                        • Opcode ID: 8302906b403d85d630cdb3c87833dad064d1dd8adb8c7f929adb03cf962b71d7
                        • Instruction ID: 1e22694657252bc9836a92c68983a40f33b2453bd23db25fe0564abb5db96edb
                        • Opcode Fuzzy Hash: 8302906b403d85d630cdb3c87833dad064d1dd8adb8c7f929adb03cf962b71d7
                        • Instruction Fuzzy Hash: BEF05E36554218EBDB206F68EC09BA93BA8EB15770F344310FA25D61E0D770DE409A80

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 164 205764-205771 call 20b4a1 167 2057b1-2057b4 ExitThread 164->167 168 205773-20577b 164->168 168->167 169 20577d-205781 168->169 170 205783 call 20d822 169->170 171 205788-20578e 169->171 170->171 173 205790-205792 171->173 174 20579b-2057a1 171->174 173->174 175 205794-205795 CloseHandle 173->175 174->167 176 2057a3-2057a5 174->176 175->174 176->167 177 2057a7-2057ab FreeLibraryAndExitThread 176->177 177->167
                        APIs
                          • Part of subcall function 0020B4A1: GetLastError.KERNEL32(001F8B9B,?,00206483,0020DBFC,?,?,001FE744,?,?,?,?,?,001F379B,001F8B9B,?,?), ref: 0020B4A5
                          • Part of subcall function 0020B4A1: SetLastError.KERNEL32(00000000,001F8B9B), ref: 0020B547
                        • CloseHandle.KERNEL32(?,?,?,0020589B,?,?,0020570D,00000000), ref: 00205795
                        • FreeLibraryAndExitThread.KERNELBASE(?,?,?,?,0020589B,?,?,0020570D,00000000), ref: 002057AB
                        • ExitThread.KERNEL32 ref: 002057B4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorExitLastThread$CloseFreeHandleLibrary
                        • String ID:
                        • API String ID: 1991824761-0
                        • Opcode ID: 9c287a2e15e54541c22148c6a0fea18beaaf81fb6a4607f6f7368b9caaa62c13
                        • Instruction ID: 3ad1d4c1335153d7dc2ca72346b54c87b5a59f699373de8dcef50ae68fe2467f
                        • Opcode Fuzzy Hash: 9c287a2e15e54541c22148c6a0fea18beaaf81fb6a4607f6f7368b9caaa62c13
                        • Instruction Fuzzy Hash: F0F05434411F22EBDB215F65D85CB67B6A86F05360F688610B829D21F2DB20DD61DE90

                        Control-flow Graph

                        APIs
                        • GetCurrentProcess.KERNEL32(?,?,00208A12,00000016,00201A52,?,?,B1BFA320,00201A52,?), ref: 00208A29
                        • TerminateProcess.KERNEL32(00000000,?,00208A12,00000016,00201A52,?,?,B1BFA320,00201A52,?), ref: 00208A30
                        • ExitProcess.KERNEL32 ref: 00208A42
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: Process$CurrentExitTerminate
                        • String ID:
                        • API String ID: 1703294689-0
                        • Opcode ID: 32ce2962e248c5a88c616a9df25561bf47b0d769cfd493a637898b8fb6ddc87c
                        • Instruction ID: 7c30a3bda8bc4d4ca670744db3570439add9a4cea3525e41bef5e2d75d14b4ad
                        • Opcode Fuzzy Hash: 32ce2962e248c5a88c616a9df25561bf47b0d769cfd493a637898b8fb6ddc87c
                        • Instruction Fuzzy Hash: A1D09E35150204FFCF616FA0ED0DA8A3F26AF643917158012B94956472DF3199A19E91

                        Control-flow Graph

                        APIs
                          • Part of subcall function 001FA59B: GetModuleHandleExW.KERNEL32(00000002,00000000,?,?,?,001FA5ED,00000000,?,001FA62E,00000000,?,001F6444,00000000), ref: 001FA5A7
                        • FreeLibraryWhenCallbackReturns.KERNEL32(?,00000000,B1BFA320,?,?,?,0021B3CE,000000FF), ref: 001FA6A1
                          • Part of subcall function 001F82EE: std::_Throw_Cpp_error.LIBCPMT ref: 001F830F
                          • Part of subcall function 001F9774: ReleaseSRWLockExclusive.KERNEL32(001F59A0,?,001F59A8,?,?,?,?,?,?,?,?,?,?,?,?,001F13D2), ref: 001F9788
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: CallbackCpp_errorExclusiveFreeHandleLibraryLockModuleReleaseReturnsThrow_Whenstd::_
                        • String ID: $,%
                        • API String ID: 3627539351-2989525191
                        • Opcode ID: dddccbb25e28d5edbeff152f9e25df373748d680a2beed235771f3f3139f7905
                        • Instruction ID: 379aefb3c197cebb7c98036bbd5f959a380395d53903577d143acbe04f197e7b
                        • Opcode Fuzzy Hash: dddccbb25e28d5edbeff152f9e25df373748d680a2beed235771f3f3139f7905
                        • Instruction Fuzzy Hash: 8C1138726006089BCB267F25EC45A3D77A8EF56B31F15451AFA06D72E1CF39D800C65A

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 234 210930-21094f 235 210955-210957 234->235 236 210b29 234->236 237 210983-2109a9 235->237 238 210959-210978 call 201bd2 235->238 239 210b2b-210b2f 236->239 241 2109ab-2109ad 237->241 242 2109af-2109b5 237->242 247 21097b-21097e 238->247 241->242 243 2109b7-2109c1 241->243 242->238 242->243 245 2109d1-2109dc call 2104b4 243->245 246 2109c3-2109ce call 212090 243->246 252 210a1e-210a30 245->252 253 2109de-2109e3 245->253 246->245 247->239 254 210a81-210aa1 WriteFile 252->254 255 210a32-210a38 252->255 256 2109e5-2109e9 253->256 257 210a08-210a1c call 21007a 253->257 262 210aa3-210aa9 GetLastError 254->262 263 210aac 254->263 258 210a3a-210a3d 255->258 259 210a6f-210a7a call 210532 255->259 260 210af1-210b03 256->260 261 2109ef-2109fe call 21044c 256->261 273 210a01-210a03 257->273 266 210a5d-210a6d call 2106f6 258->266 267 210a3f-210a42 258->267 279 210a7f 259->279 268 210b05-210b0b 260->268 269 210b0d-210b1f 260->269 261->273 262->263 265 210aaf-210aba 263->265 274 210b24-210b27 265->274 275 210abc-210ac1 265->275 284 210a58-210a5b 266->284 267->260 276 210a48-210a53 call 21060d 267->276 268->236 268->269 269->247 273->265 274->239 280 210ac3-210ac8 275->280 281 210aef 275->281 276->284 279->284 285 210ae1-210aea call 206447 280->285 286 210aca-210adc 280->286 281->260 284->273 285->247 286->247
                        APIs
                          • Part of subcall function 0021007A: GetConsoleOutputCP.KERNEL32(B1BFA320,00000000,00000000,00000000), ref: 002100DD
                        • WriteFile.KERNEL32(?,00000000,?,00227CA0,00000000,0000000C,00000000,00000000,?,00000000,00227CA0,00000010,002073AD,00000000,00000000,00000000), ref: 00210A99
                        • GetLastError.KERNEL32(?,00000000), ref: 00210AA3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ConsoleErrorFileLastOutputWrite
                        • String ID:
                        • API String ID: 2915228174-0
                        • Opcode ID: ef686f7b600154f82c036c7974b41b6d69cbba401cc1434e0527c8a1b2a9c2f6
                        • Instruction ID: a0b27e4f298b5b30d7671ae1a294d8e22d58a21f25a44a0eb6ac6d2e5ddba2f7
                        • Opcode Fuzzy Hash: ef686f7b600154f82c036c7974b41b6d69cbba401cc1434e0527c8a1b2a9c2f6
                        • Instruction Fuzzy Hash: 7461B771D24249AEDF11CFA8C8C4EEEBBF9AF29318F144045E904A7252D3B1D9E5CB60

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 289 1f14fb-1f152e call 1fd4a2 call 2055c0 294 1f1546-1f1551 289->294 295 1f1530 289->295 296 1f1554-1f1564 call 1f3902 294->296 297 1f1532-1f1534 295->297 298 1f1540-1f1544 295->298 304 1f1566-1f156b 296->304 305 1f1570-1f1584 296->305 297->294 299 1f1536-1f1538 297->299 298->296 299->294 301 1f153a 299->301 301->298 303 1f153c-1f153e 301->303 303->294 303->298 306 1f1675-1f169f call 1f6b97 call 1f3cc7 call 1fd416 304->306 307 1f1586 305->307 308 1f15c2-1f15d2 call 1fb7c2 305->308 310 1f1589-1f158b 307->310 312 1f15d5-1f15d8 308->312 313 1f158d 310->313 314 1f15c0 310->314 316 1f161f-1f1624 312->316 317 1f15da-1f15dc 312->317 318 1f158f-1f1591 313->318 319 1f1593-1f15aa call 1f8684 313->319 314->308 320 1f1627-1f1638 316->320 317->316 322 1f15de 317->322 318->314 318->319 319->316 327 1f15ac-1f15be 319->327 320->306 326 1f15e1-1f15e3 322->326 329 1f1618-1f161d 326->329 330 1f15e5 326->330 327->310 329->320 331 1f15eb-1f1602 call 1f8684 330->331 332 1f15e7-1f15e9 330->332 331->316 335 1f1604-1f1616 331->335 332->329 332->331 335->326
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: H_prolog3_catch_strlen
                        • String ID:
                        • API String ID: 3133806014-0
                        • Opcode ID: 1f9044bd18656c1715738ab2383d5f54a03d9b6582c84c73f6d6ba2eae03da16
                        • Instruction ID: 9faf3a68044b1dc395912bdf2038703beae3f3be86ad4d6db907093104f55889
                        • Opcode Fuzzy Hash: 1f9044bd18656c1715738ab2383d5f54a03d9b6582c84c73f6d6ba2eae03da16
                        • Instruction Fuzzy Hash: A6517171E00518DFCB14DF68C8809BCBBF2AF89324B294259EA25EB2A2D771DD41CB51

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 337 1fc375-1fc395 338 1fc397-1fc39e call 1fc35b 337->338 339 1fc3a0-1fc3a7 337->339 347 1fc3f5-1fc403 call 1fd408 338->347 341 1fc3c9-1fc3cd 339->341 342 1fc3a9-1fc3b3 339->342 345 1fc3cf-1fc3de call 1fbfff 341->345 346 1fc3f2 341->346 342->341 344 1fc3b5-1fc3c7 342->344 344->347 351 1fc406-1fc43b 345->351 352 1fc3e0-1fc3e4 call 1fbaef 345->352 346->347 359 1fc43d-1fc440 351->359 360 1fc461-1fc469 351->360 355 1fc3e9-1fc3ed 352->355 355->346 357 1fc3ef 355->357 357->346 359->360 363 1fc442-1fc446 359->363 361 1fc46b-1fc47c call 207436 360->361 362 1fc482-1fc48c 360->362 361->346 361->362 362->346 365 1fc492-1fc495 362->365 363->346 366 1fc448-1fc457 call 1fbaef 363->366 365->347 366->346 370 1fc459-1fc45f 366->370 370->346
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: Fputc
                        • String ID:
                        • API String ID: 3078413507-0
                        • Opcode ID: dd8703c62aafdfa4e53624adf071c9fd01dbb25cd06f55076ef98c4c64afd240
                        • Instruction ID: 2d44df8fd6e1211f7295a25b489f04bd07c231dbd27e5b4cd2b383e2f9332231
                        • Opcode Fuzzy Hash: dd8703c62aafdfa4e53624adf071c9fd01dbb25cd06f55076ef98c4c64afd240
                        • Instruction Fuzzy Hash: E8414C3690021EEBCB18DF69C6808FEB7B9FF08350B148526E641A7640DB31ED55EBD0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 371 210532-210587 call 1fdff0 374 210589 371->374 375 2105fc-21060c call 1fd408 371->375 377 21058f 374->377 379 210595-210597 377->379 380 2105b1-2105d6 WriteFile 379->380 381 210599-21059e 379->381 382 2105f4-2105fa GetLastError 380->382 383 2105d8-2105e3 380->383 384 2105a0-2105a6 381->384 385 2105a7-2105af 381->385 382->375 383->375 386 2105e5-2105f0 383->386 384->385 385->379 385->380 386->377 387 2105f2 386->387 387->375
                        APIs
                        • WriteFile.KERNELBASE(?,?,?,?,00000000,00000000,00000000,00000000,?,00210A7F,00000000,00000000,00000000,?,0000000C,00000000), ref: 002105CE
                        • GetLastError.KERNEL32(?,00210A7F,00000000,00000000,00000000,?,0000000C,00000000,00000000,?,00000000,00227CA0,00000010,002073AD,00000000,00000000), ref: 002105F4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorFileLastWrite
                        • String ID:
                        • API String ID: 442123175-0
                        • Opcode ID: 8ac31fcbe67ac275d457471c7fabbdef9246333cf396afa19bfb13ae47aa5180
                        • Instruction ID: cc03c9dbfad4a0763e66070a1dee4e24f5bc6a83d2ff76145646b83f3ca6ecd2
                        • Opcode Fuzzy Hash: 8ac31fcbe67ac275d457471c7fabbdef9246333cf396afa19bfb13ae47aa5180
                        • Instruction Fuzzy Hash: E121A030A10219ABCF15CF19DD80AE9B7FAFB5C301F6440A9E906D7211D670DE86CF64
                        APIs
                        • GetStdHandle.KERNEL32(000000F6), ref: 0020DAC9
                        • GetFileType.KERNELBASE(00000000), ref: 0020DADB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: FileHandleType
                        • String ID:
                        • API String ID: 3000768030-0
                        • Opcode ID: 0f8ed1500e959a13be556a443c82879160558ca7ccada5ac0bb5a6481229affc
                        • Instruction ID: abfbb449bbef95616fb8c2c0a2f9cc4d0c7103616e339be7a9f4e3a8e46019bc
                        • Opcode Fuzzy Hash: 0f8ed1500e959a13be556a443c82879160558ca7ccada5ac0bb5a6481229affc
                        • Instruction Fuzzy Hash: 7E1103367297424AC7308EBE9C88632BA95AB5A374B39070AD1B6C65F3C770D8A1D640
                        APIs
                          • Part of subcall function 001F3136: _strlen.LIBCMT ref: 001F314E
                        • VirtualAlloc.KERNELBASE(00000000,000004AC,00001000,00000040,0000000006:1@0000000005:@), ref: 001F873A
                        Strings
                        • 0000000006:1@0000000005:@, xrefs: 001F8707
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocVirtual_strlen
                        • String ID: 0000000006:1@0000000005:@
                        • API String ID: 3554592677-176982251
                        • Opcode ID: 167fe7331a1a0e619f035d70f3602801842fa377f3e7558f46d4d8551ce37cae
                        • Instruction ID: e06a7aad36c7942eecb01390aad8f3e416e72c3d9849bcb5ceee3d0ce53dd04c
                        • Opcode Fuzzy Hash: 167fe7331a1a0e619f035d70f3602801842fa377f3e7558f46d4d8551ce37cae
                        • Instruction Fuzzy Hash: DF119131A4020CABCB14FBA4EC56FFE77749FA5760F244128F605B61C1DF7499068669
                        APIs
                        • GetLastError.KERNEL32(002277F0,0000000C), ref: 002056C2
                        • ExitThread.KERNEL32 ref: 002056C9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorExitLastThread
                        • String ID:
                        • API String ID: 1611280651-0
                        • Opcode ID: 8b65fd7f767051dd156f332860df0fa9a010636e4345d7f8ca7c9f21d281d535
                        • Instruction ID: cdc08f27972980cb182683b470f3e9bfe22b42a3d56f54a40fd9eec8b430c70d
                        • Opcode Fuzzy Hash: 8b65fd7f767051dd156f332860df0fa9a010636e4345d7f8ca7c9f21d281d535
                        • Instruction Fuzzy Hash: 9CF0AF71990705AFDB14AFB0D80AA6E7B78EF15300F208149F4169B2E3CF755960CFA1
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 001F82BA
                        • std::_Throw_Cpp_error.LIBCPMT ref: 001F82E8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: Cpp_errorCurrentThreadThrow_std::_
                        • String ID:
                        • API String ID: 350343453-0
                        • Opcode ID: fd1357e52a5e6188e71bc9d518b94213de1583fbe682ce0a4a4d257269a8a402
                        • Instruction ID: 1a5184ce798a455be38294131c4e8b1eeb06293f62346a4b671457f546df2fc3
                        • Opcode Fuzzy Hash: fd1357e52a5e6188e71bc9d518b94213de1583fbe682ce0a4a4d257269a8a402
                        • Instruction Fuzzy Hash: 53E0D831601F089AD7302E159D02B77B6E5EFE1B21F11842FA79592481EB716441DB55
                        APIs
                        • __EH_prolog3_catch.LIBCMT ref: 001F88F5
                        • FreeConsole.KERNELBASE(00000010), ref: 001F88FA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ConsoleFreeH_prolog3_catch
                        • String ID:
                        • API String ID: 2618692183-0
                        • Opcode ID: c7f3bed51f09b5ddddf57db6dc3fd81a10e1b92568aedf5fe3a9a3a8723c6391
                        • Instruction ID: cd38069a8fb6b23003a0c410d0b5baaba6b0ac94281e238b4609fc3c456f6b59
                        • Opcode Fuzzy Hash: c7f3bed51f09b5ddddf57db6dc3fd81a10e1b92568aedf5fe3a9a3a8723c6391
                        • Instruction Fuzzy Hash: 25E0C23474030D42EF2177B0681B3BD24D16F60328F2406287721DB1D2DFB5DA406212
                        APIs
                        • CreateThread.KERNELBASE(00000000,00000000,Function_000086F5,00000000,00000000,00000000), ref: 001F83CE
                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 001F83D7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateObjectSingleThreadWait
                        • String ID:
                        • API String ID: 1891408510-0
                        • Opcode ID: df23f01b67da87562d7fbfb1512bd64e02018683b6a77fdf7ab9419186e77d54
                        • Instruction ID: 9efc58d28948fd8c4581a7cb77b2edba80b0afc692050dddbd0bdce4c571065d
                        • Opcode Fuzzy Hash: df23f01b67da87562d7fbfb1512bd64e02018683b6a77fdf7ab9419186e77d54
                        • Instruction Fuzzy Hash: 09C048E4A84201BEAE0097A06C0CD77261CE6183753208A007921D12E0EE648C008634
                        APIs
                        • GetLastError.KERNEL32(?,00000008,0020CE8D), ref: 0020B354
                        • SetLastError.KERNEL32(00000000,001F8B9B,00000005,000000FF), ref: 0020B3F6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLast
                        • String ID:
                        • API String ID: 1452528299-0
                        • Opcode ID: 0eca90188c8a94e1498a86757ee6cdb87b6da2dea26ea321988e370431073cae
                        • Instruction ID: 5bdac37061b1902831679f29705db3395c3ece6c7484cd5329782c0c530fc00e
                        • Opcode Fuzzy Hash: 0eca90188c8a94e1498a86757ee6cdb87b6da2dea26ea321988e370431073cae
                        • Instruction Fuzzy Hash: D311A3712753066BD7322BB5ACCA92B77589B253A9B300274F910825D3DFA04C344964
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bb0a065571fd36107d584ce04171bf7b5e39e7f1aaf95a198bc5eaf6d7028769
                        • Instruction ID: d88205dff0d89e7e491694fa7c37cd811cf64978e4d54f2a517c887eaa3e2f8e
                        • Opcode Fuzzy Hash: bb0a065571fd36107d584ce04171bf7b5e39e7f1aaf95a198bc5eaf6d7028769
                        • Instruction Fuzzy Hash: 3331727291810EABCB14CF64D8D49FEB7B9BF09310F144269E611A3690DB31E954CBA0
                        APIs
                        • _Deallocate.LIBCONCRT ref: 001F6D96
                          • Part of subcall function 001F3136: _strlen.LIBCMT ref: 001F314E
                          • Part of subcall function 001F1C54: __EH_prolog3_catch.LIBCMT ref: 001F1C5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: DeallocateH_prolog3_catch_strlen
                        • String ID:
                        • API String ID: 3043132973-0
                        • Opcode ID: 2453900fafcc164929209b5fa7e48ac727474e9884bea1b9ac61bfa39bf4e961
                        • Instruction ID: 2fe60fd2bd366d014f85eb2c591ff8e14d71807c757a5112495a8b48ffc26d14
                        • Opcode Fuzzy Hash: 2453900fafcc164929209b5fa7e48ac727474e9884bea1b9ac61bfa39bf4e961
                        • Instruction Fuzzy Hash: C0219F31F0421CAADB04EFB9E8829FDB7B4EB58720F245219E611B7181DB755D81CBA4
                        APIs
                        • __EH_prolog3_catch.LIBCMT ref: 001F3EEA
                          • Part of subcall function 001F2DAC: std::_Lockit::_Lockit.LIBCPMT ref: 001F2DB8
                          • Part of subcall function 001F2DAC: int.LIBCPMT ref: 001F2DCB
                          • Part of subcall function 001F2DAC: std::_Lockit::~_Lockit.LIBCPMT ref: 001F2E14
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: Lockitstd::_$H_prolog3_catchLockit::_Lockit::~_
                        • String ID:
                        • API String ID: 1693569656-0
                        • Opcode ID: faf2d089db29fc02977670ea90f63ec8e3c89042d61c13bb5aeb6ed5e33bce9a
                        • Instruction ID: 02c44ff34cf5c98af2446bcdc94921b0dcf77b1b8849ea8cfaa65fbe5afd80af
                        • Opcode Fuzzy Hash: faf2d089db29fc02977670ea90f63ec8e3c89042d61c13bb5aeb6ed5e33bce9a
                        • Instruction Fuzzy Hash: 57213D71A012199FCB14DFA4C5859EEFBF5FF58310B24416AE615B7251C731AE01CBA4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 45e10b339bf6663e0c2bd1831cbea8df0d1a05b7d2b1b5fa6adbe6a7a8f5254c
                        • Instruction ID: 63636c68c72841f8dcc29f4320f99e39893a1dbff0761330a429b34134f664af
                        • Opcode Fuzzy Hash: 45e10b339bf6663e0c2bd1831cbea8df0d1a05b7d2b1b5fa6adbe6a7a8f5254c
                        • Instruction Fuzzy Hash: C70128377213129FDB169FADFC45A6A3396AB84320B248560FD04CB1DADA31D8108FD1
                        APIs
                        • std::_Throw_Cpp_error.LIBCPMT ref: 001F297A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: Cpp_errorThrow_std::_
                        • String ID:
                        • API String ID: 2134207285-0
                        • Opcode ID: 7b837c0cb35a5c0a5b6434836e6af29e140a2b718bc337d5645bb0a69c1f624b
                        • Instruction ID: 8e69fa3c96c2fd1f3662e823c6afa6c53015e4e47005ffae55fb878cae9b3b2a
                        • Opcode Fuzzy Hash: 7b837c0cb35a5c0a5b6434836e6af29e140a2b718bc337d5645bb0a69c1f624b
                        • Instruction Fuzzy Hash: 32F090B220530E6FD210AE11EC06E7BBB9CEB623A8F10441EF34456192DB72A85486B1
                        APIs
                        • RtlAllocateHeap.NTDLL(00000008,?,001F8B9B,?,0020B4EE,00000001,00000364,001F8B9B,00000005,000000FF,?,001FE744,?,?,?,?), ref: 0020CB5D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: bbaf10e280ca15b16eebbc33ac9d37d9505e0da05c6ed56509c19fc7104c41b4
                        • Instruction ID: fd4c0771afa26f4aaa8899a6d3641a3c9297677dd9d86c12f8e45ab6130a7ebb
                        • Opcode Fuzzy Hash: bbaf10e280ca15b16eebbc33ac9d37d9505e0da05c6ed56509c19fc7104c41b4
                        • Instruction Fuzzy Hash: 53F0E9719703266BDB216F26EC07B5A3758AF41B74B348321BC04971D3CA30D8308AE5
                        APIs
                        • RtlAllocateHeap.NTDLL(00000000,001F8B9B,?,?,001FE744,?,?,?,?,?,001F379B,001F8B9B,?,?,?,?), ref: 0020DBEB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: bb3fd2b5171616c051484bd86073f01db587a9b762fd0273861462f1666e8ad7
                        • Instruction ID: 8bb8bd50124bff23d21fa638d67dfea35c90cff66db158b4e847dc1fed37f360
                        • Opcode Fuzzy Hash: bb3fd2b5171616c051484bd86073f01db587a9b762fd0273861462f1666e8ad7
                        • Instruction Fuzzy Hash: 92E065211763126BD7212EF59C08B6B7A5C9B417B4F260161BD45965D3CF60CC3185A5
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: H_prolog3_catch
                        • String ID:
                        • API String ID: 3886170330-0
                        • Opcode ID: 6fa7a9e716067004fbba4ed54e8435119fd05977637ef94957158dbee63bc4c8
                        • Instruction ID: c38af705c8a8640b23d2f3c2b57e2cdc599b47b6aa4cd55401f4e0b85f42c91a
                        • Opcode Fuzzy Hash: 6fa7a9e716067004fbba4ed54e8435119fd05977637ef94957158dbee63bc4c8
                        • Instruction Fuzzy Hash: 96E08C709212098BDB10EFA0D5427FEB6B5BB50720F600218B251A71C1CF701B4487A3
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: __floor_pentium4
                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                        • API String ID: 4168288129-2761157908
                        • Opcode ID: f944c92d22e0f58be482936173f469b06ffc19d53fbfc31195b52e2805c46088
                        • Instruction ID: a2d13ea744c4df04cd989b5823310c113e27854ca946ecbeff09764827009674
                        • Opcode Fuzzy Hash: f944c92d22e0f58be482936173f469b06ffc19d53fbfc31195b52e2805c46088
                        • Instruction Fuzzy Hash: 14D21971E282298FDB65CE28DD447EAB7F5EBA4304F1441EAD40DA7240EB74AED58F40
                        APIs
                        • GetLocaleInfoW.KERNEL32(?,2000000B,00215FAC,00000002,00000000,?,?,?,00215FAC,?,00000000), ref: 00215D27
                        • GetLocaleInfoW.KERNEL32(?,20001004,00215FAC,00000002,00000000,?,?,?,00215FAC,?,00000000), ref: 00215D50
                        • GetACP.KERNEL32(?,?,00215FAC,?,00000000), ref: 00215D65
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: InfoLocale
                        • String ID: ACP$OCP
                        • API String ID: 2299586839-711371036
                        • Opcode ID: 79fcf7c33c60a9c96e8ac4e5c547a039c947525be3f1bf1ce42d30626bb260dc
                        • Instruction ID: cac0492bd25ff6430c52133dc5ced0f7d97779dea7dc46b9a39afda9abf34c57
                        • Opcode Fuzzy Hash: 79fcf7c33c60a9c96e8ac4e5c547a039c947525be3f1bf1ce42d30626bb260dc
                        • Instruction Fuzzy Hash: F221C961630926E6D7309F64E808AD772E6EBF0B50B6684E5E80AD7100E732DD91C390
                        APIs
                          • Part of subcall function 0020B350: GetLastError.KERNEL32(?,00000008,0020CE8D), ref: 0020B354
                          • Part of subcall function 0020B350: SetLastError.KERNEL32(00000000,001F8B9B,00000005,000000FF), ref: 0020B3F6
                        • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00215F6F
                        • IsValidCodePage.KERNEL32(00000000), ref: 00215FB8
                        • IsValidLocale.KERNEL32(?,00000001), ref: 00215FC7
                        • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 0021600F
                        • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 0021602E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                        • String ID:
                        • API String ID: 415426439-0
                        • Opcode ID: 213669a9749c31efc3137d32e7241153effa51912930743e54ebbc2b104a87fc
                        • Instruction ID: 9e71eb75cbb537ec898b9b83f0b9266def1502a251b041246ebe82f022521141
                        • Opcode Fuzzy Hash: 213669a9749c31efc3137d32e7241153effa51912930743e54ebbc2b104a87fc
                        • Instruction Fuzzy Hash: A2519371920626EFDB10DFA4DC45AEEB3F8FFA5700F1444A5B504D7191EB709A918B60
                        APIs
                          • Part of subcall function 0020B350: GetLastError.KERNEL32(?,00000008,0020CE8D), ref: 0020B354
                          • Part of subcall function 0020B350: SetLastError.KERNEL32(00000000,001F8B9B,00000005,000000FF), ref: 0020B3F6
                        • GetACP.KERNEL32(?,?,?,?,?,?,00209EF0,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 002155C0
                        • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00209EF0,?,?,?,00000055,?,-00000050,?,?), ref: 002155EB
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 0021574E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLast$CodeInfoLocalePageValid
                        • String ID: utf8
                        • API String ID: 607553120-905460609
                        • Opcode ID: 1134832ea7383eb5399272b93cc2d70d20dd3266e52478ed45cd1a480691e300
                        • Instruction ID: a0e729a79ea39f37621aaa4df639e75ad5208d6d99df4d3414cec16002c6feeb
                        • Opcode Fuzzy Hash: 1134832ea7383eb5399272b93cc2d70d20dd3266e52478ed45cd1a480691e300
                        • Instruction Fuzzy Hash: 1371F771620B16EADB24AF74DC46BE673EDEFA4700F6440A9F505D7181EB70E9A08B90
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: _strrchr
                        • String ID:
                        • API String ID: 3213747228-0
                        • Opcode ID: 75b648e633f190c86c236c7fc6c97fed487f58425f7dd828c5b9198bf3fd1d21
                        • Instruction ID: 4b71f7dc58414d91fff5cf8637bd8f8745079f08c03b3a2acbc53a0f1e7bd53e
                        • Opcode Fuzzy Hash: 75b648e633f190c86c236c7fc6c97fed487f58425f7dd828c5b9198bf3fd1d21
                        • Instruction Fuzzy Hash: 1DB158329263469FDB158FA8C8817FEBBE5EF55310F15816AE801AB2C3D2749D61CB60
                        APIs
                        • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 001FDA91
                        • IsDebuggerPresent.KERNEL32 ref: 001FDB5D
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 001FDB76
                        • UnhandledExceptionFilter.KERNEL32(?), ref: 001FDB80
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                        • String ID:
                        • API String ID: 254469556-0
                        • Opcode ID: 3a431e6becad64829c5744c9db8bd5dae32c9b35bca6b69fbfc399d026ae4a62
                        • Instruction ID: 265400f5fa9bd3117f1d4b85e26439bb78bd849a81fa14d13f118da1a1ea64f9
                        • Opcode Fuzzy Hash: 3a431e6becad64829c5744c9db8bd5dae32c9b35bca6b69fbfc399d026ae4a62
                        • Instruction Fuzzy Hash: 1231F679D0521CDBDB20EFA4E9497DDBBB8AF18304F1041AAE50DAB250EB719B848F45
                        APIs
                          • Part of subcall function 0020B350: GetLastError.KERNEL32(?,00000008,0020CE8D), ref: 0020B354
                          • Part of subcall function 0020B350: SetLastError.KERNEL32(00000000,001F8B9B,00000005,000000FF), ref: 0020B3F6
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00215966
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 002159B0
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00215A76
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: InfoLocale$ErrorLast
                        • String ID:
                        • API String ID: 661929714-0
                        • Opcode ID: 2ce619fc6d8aa3a451a3d4261ed5c460faa935517a855e2b1f6f6d46de5a872c
                        • Instruction ID: 7a4767205c8202908614be96e305228a777b0c6dfccbd47a75b02019b73ada5e
                        • Opcode Fuzzy Hash: 2ce619fc6d8aa3a451a3d4261ed5c460faa935517a855e2b1f6f6d46de5a872c
                        • Instruction Fuzzy Hash: 3861A171560A27DFDB299F24CC82BEAB3E8EF64300F1441E9E916C6185E774DAE1CB50
                        APIs
                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,001F8B9B), ref: 00201B4B
                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,001F8B9B), ref: 00201B55
                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,001F8B9B), ref: 00201B62
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                        • String ID:
                        • API String ID: 3906539128-0
                        • Opcode ID: 24880b2bfb994a7ac242787eec150b486a86413d7d700c8e0b0516d020304dd5
                        • Instruction ID: d0b0433688cdecc6dcc9dabe34ea0860c8ce282699cda593e4e1edc2498e4da5
                        • Opcode Fuzzy Hash: 24880b2bfb994a7ac242787eec150b486a86413d7d700c8e0b0516d020304dd5
                        • Instruction Fuzzy Hash: E331D67495121C9BCB21DF28DD897DCBBB4BF18310F5041DAE41CA6291EB709B958F44
                        APIs
                          • Part of subcall function 0020B350: GetLastError.KERNEL32(?,00000008,0020CE8D), ref: 0020B354
                          • Part of subcall function 0020B350: SetLastError.KERNEL32(00000000,001F8B9B,00000005,000000FF), ref: 0020B3F6
                        • EnumSystemLocalesW.KERNEL32(00215912,00000001,00000000,?,-00000050,?,00215F43,00000000,?,?,?,00000055,?), ref: 0021585E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLast$EnumLocalesSystem
                        • String ID: C_!
                        • API String ID: 2417226690-4241996622
                        • Opcode ID: 2fdecbbac9faceb1114ca58d6c0b383423089781c4f58ee3bf2a3f34c687359c
                        • Instruction ID: 20f2a430216b9b24a6cfcd621f08355f07ac0e99bc670bbfe14f7ddc5d13c3a7
                        • Opcode Fuzzy Hash: 2fdecbbac9faceb1114ca58d6c0b383423089781c4f58ee3bf2a3f34c687359c
                        • Instruction Fuzzy Hash: 4211063A2107019FDB189F39D8915BAB7D1FF90328B15446CE98747A40D3716992CB40
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 328877cfbec143cfb10e340733355c27c4f7255f62cec1a1cc70739699e5e674
                        • Instruction ID: 20cf16cbb48f75b99ac075a1dc9b0d0ff5254f2a2857a18a6c7741b791b52556
                        • Opcode Fuzzy Hash: 328877cfbec143cfb10e340733355c27c4f7255f62cec1a1cc70739699e5e674
                        • Instruction Fuzzy Hash: 53F15E71E1061A9FDF14CF68C880AAEB7B1FF88314F158269E959A7381DB30AD15CF94
                        APIs
                        • GetSystemTimePreciseAsFileTime.KERNEL32(?,001FCBF5,?,00000000,00000000,?,001FCBB4,?,?,00000000,?,001F981C,?,?,00000000), ref: 001FD0A2
                        • GetSystemTimeAsFileTime.KERNEL32(?,B1BFA320,?,?,0021B3B1,000000FF,?,001FCBF5,?,00000000,00000000,?,001FCBB4,?,?,00000000), ref: 001FD0A6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: Time$FileSystem$Precise
                        • String ID:
                        • API String ID: 743729956-0
                        • Opcode ID: 1c001ec6ab8a90f98b0b7403f8593b051cf6ac5411a49acd309d452e0a242599
                        • Instruction ID: 1d820eb5e2ba7328b7f0ef6698c59331713b2af6599800140d9c93c8c6e19f4c
                        • Opcode Fuzzy Hash: 1c001ec6ab8a90f98b0b7403f8593b051cf6ac5411a49acd309d452e0a242599
                        • Instruction Fuzzy Hash: 6BF0A036A48A18EBC7129F54ED05BADB7B8F708B10F11422AE81293790DB3568008B84
                        APIs
                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0020C4D1,?,?,00000008,?,?,00219233,00000000), ref: 0020C703
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExceptionRaise
                        • String ID:
                        • API String ID: 3997070919-0
                        • Opcode ID: 0e33e59d853ec131d401de5efd644bbdb44251edef7c13b2b6a4b3b8c24e1c51
                        • Instruction ID: 1f2c36bbd93e28e93ffef48a9f72f6a6f1a7e3bde7cdd926e29fc4248228e8c9
                        • Opcode Fuzzy Hash: 0e33e59d853ec131d401de5efd644bbdb44251edef7c13b2b6a4b3b8c24e1c51
                        • Instruction Fuzzy Hash: A2B13C756206098FD724CF28C486B657BA0FF45364F658658E899CF2E2C335E9A2CF40
                        APIs
                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 001FD87B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: FeaturePresentProcessor
                        • String ID:
                        • API String ID: 2325560087-0
                        • Opcode ID: caa5ce4a8c122736b20b8afc70970a179e3ca3e37c83e7d379b2da4648c59277
                        • Instruction ID: 0fbdbef67778d7a01775a69cbb779a1ed294b4d0ff634edfef9953d062b15ef5
                        • Opcode Fuzzy Hash: caa5ce4a8c122736b20b8afc70970a179e3ca3e37c83e7d379b2da4648c59277
                        • Instruction Fuzzy Hash: F3517BB19002098BDB15CF98F8857BEB7F6FB48306F24842AD511EB290D7B59D40CB54
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 535d6bcd6c3d62efffba69e292355d7573434850ed76900db01083e23cd90ff3
                        • Instruction ID: 0361ae10892f6815839b5063d6816aff4f30c7b0596ed9f11b412431ec7cf6e3
                        • Opcode Fuzzy Hash: 535d6bcd6c3d62efffba69e292355d7573434850ed76900db01083e23cd90ff3
                        • Instruction Fuzzy Hash: 4541C5B5814219AFDF20DF69CC89AEABBF8EF55300F1442D9F418D3241DA359EA98F50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: 0
                        • API String ID: 0-4108050209
                        • Opcode ID: 00711911d6dd09d64c97408e2f3d49b769a09835586b42a01e32b69993276636
                        • Instruction ID: c2a554048724d2257c6c4974a3a8e827bb818e37cabf67141f2d9bc6340c9a9d
                        • Opcode Fuzzy Hash: 00711911d6dd09d64c97408e2f3d49b769a09835586b42a01e32b69993276636
                        • Instruction Fuzzy Hash: 4DC1E2F0A2074A8FCB24EF58C490A7AB7B1AF06304F24C61DDA52972E3C730AD65CB50
                        APIs
                          • Part of subcall function 0020B350: GetLastError.KERNEL32(?,00000008,0020CE8D), ref: 0020B354
                          • Part of subcall function 0020B350: SetLastError.KERNEL32(00000000,001F8B9B,00000005,000000FF), ref: 0020B3F6
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00215BB9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLast$InfoLocale
                        • String ID:
                        • API String ID: 3736152602-0
                        • Opcode ID: af495c87065167e3f6378fdfb158ef21c11fe6a8b639ee0fb4e6080f3d4b6233
                        • Instruction ID: 55ee28df4c151057e1daad6ef159a70b8b28a7e614f578daf321134133894ddf
                        • Opcode Fuzzy Hash: af495c87065167e3f6378fdfb158ef21c11fe6a8b639ee0fb4e6080f3d4b6233
                        • Instruction Fuzzy Hash: 2C21B672524617EBDB289F25DC41AFA73E8EF64314F1040BAF905C6141EB759DA48B90
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: 0
                        • API String ID: 0-4108050209
                        • Opcode ID: 9c987fc7f4ab2134c0047946b64493224a35ad2b060bcba1d886876f09638e66
                        • Instruction ID: 304bba47ede8299dafcd2fd8566dc81ffd9fdf22ffa3cb0d14850911c7747cfd
                        • Opcode Fuzzy Hash: 9c987fc7f4ab2134c0047946b64493224a35ad2b060bcba1d886876f09638e66
                        • Instruction Fuzzy Hash: 72B1D0F092070B8BCB28FF6884956BEBBB5AB01300F64865ED752972C3D771AD61CB51
                        APIs
                          • Part of subcall function 0020B350: GetLastError.KERNEL32(?,00000008,0020CE8D), ref: 0020B354
                          • Part of subcall function 0020B350: SetLastError.KERNEL32(00000000,001F8B9B,00000005,000000FF), ref: 0020B3F6
                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00215B2E,00000000,00000000,?), ref: 00215DC0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLast$InfoLocale
                        • String ID:
                        • API String ID: 3736152602-0
                        • Opcode ID: 7acde789c31496469952f7b4363c0e7aa3ba5dc124d7f25e090c19e9fdc9571c
                        • Instruction ID: 6d69f604c35c7b28922b2298adf67a21963e796b859b6b27798388127f057bdd
                        • Opcode Fuzzy Hash: 7acde789c31496469952f7b4363c0e7aa3ba5dc124d7f25e090c19e9fdc9571c
                        • Instruction Fuzzy Hash: B0F0F932620522FBDB285B25D809AFA77A4EB90754F1544A9EC06A3180DA74FDA2CB90
                        APIs
                          • Part of subcall function 0020B350: GetLastError.KERNEL32(?,00000008,0020CE8D), ref: 0020B354
                          • Part of subcall function 0020B350: SetLastError.KERNEL32(00000000,001F8B9B,00000005,000000FF), ref: 0020B3F6
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 0021574E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLast$InfoLocale
                        • String ID: utf8
                        • API String ID: 3736152602-905460609
                        • Opcode ID: 6fd23ac49f7649d509d9c0d2de806bb4934ef4df02b3c250ab69e697a1e28f34
                        • Instruction ID: eca0e0b3082a2be6b7ebad9fda7602351c2aa4524145b66f028800e61a1362e1
                        • Opcode Fuzzy Hash: 6fd23ac49f7649d509d9c0d2de806bb4934ef4df02b3c250ab69e697a1e28f34
                        • Instruction Fuzzy Hash: 9CF02832620219EBC715AF34DC4AEFA73E8DF55310F1040B9B606D7281EA78AD028790
                        APIs
                          • Part of subcall function 0020B350: GetLastError.KERNEL32(?,00000008,0020CE8D), ref: 0020B354
                          • Part of subcall function 0020B350: SetLastError.KERNEL32(00000000,001F8B9B,00000005,000000FF), ref: 0020B3F6
                        • EnumSystemLocalesW.KERNEL32(00215B65,00000001,?,?,-00000050,?,00215F07,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 002158D1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLast$EnumLocalesSystem
                        • String ID:
                        • API String ID: 2417226690-0
                        • Opcode ID: 6178f6879cefe69dd94b6a47b932d359913f38813fa9014d112328f635574701
                        • Instruction ID: 56dd4cebcc13c3bdbad8508340ce026374b5dac039758e3190a90a74b0e9a53f
                        • Opcode Fuzzy Hash: 6178f6879cefe69dd94b6a47b932d359913f38813fa9014d112328f635574701
                        • Instruction Fuzzy Hash: C4F0F6362107159FDB246F35D881AFA7BD1FFC0768F2A84ACF9468B680C671ACD1DA50
                        APIs
                          • Part of subcall function 002058DD: EnterCriticalSection.KERNEL32(-0005A85D,?,0020869F,00000000,002279F0,0000000C,00208666,?,?,0020CB4F,?,?,0020B4EE,00000001,00000364,001F8B9B), ref: 002058EC
                        • EnumSystemLocalesW.KERNEL32(0020D0A9,00000001,00227C00,0000000C,0020D518,00000000), ref: 0020D0EE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: CriticalEnterEnumLocalesSectionSystem
                        • String ID:
                        • API String ID: 1272433827-0
                        • Opcode ID: b84debd1ec614b21f6578d556617d81d3a4981effbf38f1e1e8474ad7c97ba15
                        • Instruction ID: 57941efb91c63d1c15f09a6a5ddd84dd2ff3cc0f959b5aea7286eb38381527fc
                        • Opcode Fuzzy Hash: b84debd1ec614b21f6578d556617d81d3a4981effbf38f1e1e8474ad7c97ba15
                        • Instruction Fuzzy Hash: D6F03C76A54304AFD701EF98E846B9D77F0EB08721F20402AF414972E1DBB54950CF40
                        APIs
                          • Part of subcall function 0020B350: GetLastError.KERNEL32(?,00000008,0020CE8D), ref: 0020B354
                          • Part of subcall function 0020B350: SetLastError.KERNEL32(00000000,001F8B9B,00000005,000000FF), ref: 0020B3F6
                        • EnumSystemLocalesW.KERNEL32(002156FA,00000001,?,?,?,00215F65,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 002157D8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLast$EnumLocalesSystem
                        • String ID:
                        • API String ID: 2417226690-0
                        • Opcode ID: 7650e04cf73b7fad69b5cc66e4d4881594d405af0ca5264d29ad8a52ab2e2259
                        • Instruction ID: 04fa490972d09473d0bb25ce033704d9167f4b936b37a728750bff69b1fff6bc
                        • Opcode Fuzzy Hash: 7650e04cf73b7fad69b5cc66e4d4881594d405af0ca5264d29ad8a52ab2e2259
                        • Instruction Fuzzy Hash: 76F0553A30030597CB149F39D8566AABFD4EFD2720B1A4098EA0A8B281C6719883CB90
                        APIs
                        • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,0020AA56,?,20001004,00000000,00000002,?,?,0020A058), ref: 0020D650
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: InfoLocale
                        • String ID:
                        • API String ID: 2299586839-0
                        • Opcode ID: 3d2e09c3c060658c0a04d0f0f9f2a0fc3ba552264d0c46376bd2046276102b93
                        • Instruction ID: adecc54f52159fd10ae571fa962aec015cb0711a728fedfd3597a2520fe522d3
                        • Opcode Fuzzy Hash: 3d2e09c3c060658c0a04d0f0f9f2a0fc3ba552264d0c46376bd2046276102b93
                        • Instruction Fuzzy Hash: 86E04F35591218BBCF122FA0EC09A9E7F29EF447A0F108011FD09652A3CF728931AAD4
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(Function_0000DBED,001FD5B3), ref: 001FDBE6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: b5362df1a1672080a28acabda6d87e09162c329d40dc54a338940d4c7c00b172
                        • Instruction ID: e2b97d64970b86b97c394b1dd6db8ef961e8923c04e1de88f4762ab4ca4cf661
                        • Opcode Fuzzy Hash: b5362df1a1672080a28acabda6d87e09162c329d40dc54a338940d4c7c00b172
                        • Instruction Fuzzy Hash:
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: HeapProcess
                        • String ID:
                        • API String ID: 54951025-0
                        • Opcode ID: 145529458bfd02b003e21267f250fe23f77f063a5f6d0cb4190b3126f6f1654d
                        • Instruction ID: 7f7e8fd8ccdf068c8b2778086b0a8160272e2675ee8995d5ff1d9dacffa8323c
                        • Opcode Fuzzy Hash: 145529458bfd02b003e21267f250fe23f77f063a5f6d0cb4190b3126f6f1654d
                        • Instruction Fuzzy Hash: AEA01132200200EF83008F30BE0C20A3AACAA082C232280A8A008C20A0EA3080808B08
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLastProcess$CurrentFeatureInfoLocalePresentProcessorTerminate
                        • String ID:
                        • API String ID: 3471368781-0
                        • Opcode ID: 5226c0ddec9e8c2ad195d09310e9c09f225f6b852bf3a34607cd3a4f7ad4d9c0
                        • Instruction ID: c8ec62df179c4f69943aa679b7f937e6365b2ddb7b7f23472fd37f57a0ce1723
                        • Opcode Fuzzy Hash: 5226c0ddec9e8c2ad195d09310e9c09f225f6b852bf3a34607cd3a4f7ad4d9c0
                        • Instruction Fuzzy Hash: 50B12936520B12DBCB349F64CC82BF7B3E9EFA4308F1444ADE94786580E6B5A9D5CB50
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9f52d7548de73c2df35ffbc499fbf997fd1a510aea2d130e71c389f74e202ceb
                        • Instruction ID: 5d917911cfbaac73aaba8f9d0a0edee6803e80c5cb363c7f7edcad0404057f86
                        • Opcode Fuzzy Hash: 9f52d7548de73c2df35ffbc499fbf997fd1a510aea2d130e71c389f74e202ceb
                        • Instruction Fuzzy Hash: A5E0EC72921328EBCB15DBD8D94598AF7ECEB45F50B1648ABF901D3192C271DE50CBD0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fe2f21aa9c1ecbffe2708fd8a0ab1a033b91d0d6599410b1735c5d2c8283de74
                        • Instruction ID: 6b7ce74d2258e74df3ee76d90cfa33ec83d70c52e27dd51d311554fd79eff523
                        • Opcode Fuzzy Hash: fe2f21aa9c1ecbffe2708fd8a0ab1a033b91d0d6599410b1735c5d2c8283de74
                        • Instruction Fuzzy Hash: C5C08C34230F0046CF298D1886B13A63364B3D1792F80088EC5430BEC3CA2E9C93DA22
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: $@l
                        • API String ID: 0-2145061437
                        • Opcode ID: 3ee044625a6727b8f201762c3b156c269b07f7ab8677930cf71408fd805818c2
                        • Instruction ID: faa3af49837e0e14e2547fef2685d9504a5241f57728dcf806d0882b87049f40
                        • Opcode Fuzzy Hash: 3ee044625a6727b8f201762c3b156c269b07f7ab8677930cf71408fd805818c2
                        • Instruction Fuzzy Hash: 40B1F6B0E24246AFDB11CF98E845BEDBBF1AF69350F144158E60097292D7709EB1CF61
                        APIs
                        • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 001FD02B
                        • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 001FD039
                        • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 001FD04A
                        • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 001FD05B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: AddressProc$HandleModule
                        • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                        • API String ID: 667068680-1247241052
                        • Opcode ID: f30668bccfceaa879079a75402cc1ea43043da1f6850396eecb7c985c3de6e3d
                        • Instruction ID: d709c91135fc4b781ed488a23f5144f1505428345689809cfc56c058f700132d
                        • Opcode Fuzzy Hash: f30668bccfceaa879079a75402cc1ea43043da1f6850396eecb7c985c3de6e3d
                        • Instruction Fuzzy Hash: 71E0EC39AB1320EB83156F70BC0D9C67AF8AA3F7123108116F40DD26E0DBB404568BA4
                        APIs
                        • type_info::operator==.LIBVCRUNTIME ref: 00200AD1
                        • ___TypeMatch.LIBVCRUNTIME ref: 00200BDF
                        • _UnwindNestedFrames.LIBCMT ref: 00200D31
                        • CallUnexpected.LIBVCRUNTIME ref: 00200D4C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                        • String ID: csm$csm$csm
                        • API String ID: 2751267872-393685449
                        • Opcode ID: d8213d6b7899c3d3cd85f8dfb9f988d7427f0645617b858c989489f84c73d2cc
                        • Instruction ID: cadaf28e7cc4535fc4cff81aee9052122d25bc12607b89cd6aeeec48448a5360
                        • Opcode Fuzzy Hash: d8213d6b7899c3d3cd85f8dfb9f988d7427f0645617b858c989489f84c73d2cc
                        • Instruction Fuzzy Hash: 47B1367182030AAFEF24DFA4C8C1AAEBBB5AF14314F14415AE9116B293D771DA61CF91
                        APIs
                        • __EH_prolog3.LIBCMT ref: 001FA78B
                        • std::_Lockit::_Lockit.LIBCPMT ref: 001FA795
                        • int.LIBCPMT ref: 001FA7AC
                          • Part of subcall function 001F400A: std::_Lockit::_Lockit.LIBCPMT ref: 001F401B
                          • Part of subcall function 001F400A: std::_Lockit::~_Lockit.LIBCPMT ref: 001F4035
                        • codecvt.LIBCPMT ref: 001FA7CF
                        • std::_Facet_Register.LIBCPMT ref: 001FA7E6
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 001FA806
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                        • String ID: H-%
                        • API String ID: 712880209-3940977602
                        • Opcode ID: 6981335e426c4bf397ab0783a6cf88a6c583be426d150b33113d14233b3f32d0
                        • Instruction ID: d6eff34b9b3ea266863a6c7252d801e14ba1791c3048ea5696242196d126589a
                        • Opcode Fuzzy Hash: 6981335e426c4bf397ab0783a6cf88a6c583be426d150b33113d14233b3f32d0
                        • Instruction Fuzzy Hash: AE11D3B190121C9FCB05EFA8D8016BEB7F5EF64310F644419E609A7391DFB4AE068B92
                        APIs
                        • GetCPInfo.KERNEL32(01024DA0,01024DA0,?,7FFFFFFF,?,00219CFA,01024DA0,01024DA0,?,01024DA0,?,?,?,?,01024DA0,?), ref: 00219AD0
                        • __alloca_probe_16.LIBCMT ref: 00219B8B
                        • __alloca_probe_16.LIBCMT ref: 00219C1A
                        • __freea.LIBCMT ref: 00219C65
                        • __freea.LIBCMT ref: 00219C6B
                        • __freea.LIBCMT ref: 00219CA1
                        • __freea.LIBCMT ref: 00219CA7
                        • __freea.LIBCMT ref: 00219CB7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: __freea$__alloca_probe_16$Info
                        • String ID:
                        • API String ID: 127012223-0
                        • Opcode ID: 53b8956054c67988d13664e55e9be16aa81c1337de12c1abdfd76adf0fe2d41c
                        • Instruction ID: 0e25fa4c259184d900e820020d1405ddd67ad45630523b63678e580e08e71457
                        • Opcode Fuzzy Hash: 53b8956054c67988d13664e55e9be16aa81c1337de12c1abdfd76adf0fe2d41c
                        • Instruction Fuzzy Hash: 3C714B32A2420A5BDF20DF549C61BEF7BFAAF69714F240016E945A7282D735DDE08BD0
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 001FCD07
                        • __alloca_probe_16.LIBCMT ref: 001FCD33
                        • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 001FCD72
                        • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 001FCD8F
                        • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 001FCDCE
                        • __alloca_probe_16.LIBCMT ref: 001FCDEB
                        • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 001FCE2D
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 001FCE50
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ByteCharMultiStringWide$__alloca_probe_16
                        • String ID:
                        • API String ID: 2040435927-0
                        • Opcode ID: 2ceed716acd98af5c36406cbeabaaf42561a67bcdaceaa07cc51dc4697adc3e0
                        • Instruction ID: e23d08a2e4515f688e3566d9fb71900c2f11d57181f6ca429e7a9b93d2d7cf58
                        • Opcode Fuzzy Hash: 2ceed716acd98af5c36406cbeabaaf42561a67bcdaceaa07cc51dc4697adc3e0
                        • Instruction Fuzzy Hash: 91519C7291020EABEF209F64DD45FBF7FA9EB94B50F214424BA1596191DB309C10EBE0
                        APIs
                        • _ValidateLocalCookies.LIBCMT ref: 002004B7
                        • ___except_validate_context_record.LIBVCRUNTIME ref: 002004BF
                        • _ValidateLocalCookies.LIBCMT ref: 00200548
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00200573
                        • _ValidateLocalCookies.LIBCMT ref: 002005C8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                        • String ID: csm
                        • API String ID: 1170836740-1018135373
                        • Opcode ID: f68380d513e2a529a7d06bc6c62990882e70cc7e37d91220d2fd9f30c408a8a5
                        • Instruction ID: af15c7340553aa7dc5412b34e56c1189fc4aed84b680a2814624017973cfb66a
                        • Opcode Fuzzy Hash: f68380d513e2a529a7d06bc6c62990882e70cc7e37d91220d2fd9f30c408a8a5
                        • Instruction Fuzzy Hash: D3419C34A20309ABDB10DF68CC85BAEBBB5BF45324F548055E9185B2D3D731AA25CF91
                        APIs
                        • __EH_prolog3.LIBCMT ref: 001FBB34
                        • std::_Lockit::_Lockit.LIBCPMT ref: 001FBB3E
                        • int.LIBCPMT ref: 001FBB55
                          • Part of subcall function 001F400A: std::_Lockit::_Lockit.LIBCPMT ref: 001F401B
                          • Part of subcall function 001F400A: std::_Lockit::~_Lockit.LIBCPMT ref: 001F4035
                        • codecvt.LIBCPMT ref: 001FBB78
                        • std::_Facet_Register.LIBCPMT ref: 001FBB8F
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 001FBBAF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                        • String ID:
                        • API String ID: 712880209-0
                        • Opcode ID: 8379fb8fa115fffbbea06c316bd23b14b3450b412711e542200c95f187c4cd17
                        • Instruction ID: 9a3dd9b7377b120b11c30d10cdcc9ac9bf83c5cf9f75ed44d991cec9e36951da
                        • Opcode Fuzzy Hash: 8379fb8fa115fffbbea06c316bd23b14b3450b412711e542200c95f187c4cd17
                        • Instruction Fuzzy Hash: FA11EE7291021C9BCB01EF68D8467BE77B9BFA4325F244409EA05A7291DFB0AA058B94
                        APIs
                        • GetLastError.KERNEL32(?,?,0020063B,001FED6A,001F9554,B1BFA320,?,?,?,?,0021B1A7,000000FF), ref: 00200652
                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00200660
                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00200679
                        • SetLastError.KERNEL32(00000000,?,0020063B,001FED6A,001F9554,B1BFA320,?,?,?,?,0021B1A7,000000FF), ref: 002006CB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLastValue___vcrt_
                        • String ID:
                        • API String ID: 3852720340-0
                        • Opcode ID: b804793c454351bb13b8406b4bca2b79aff6b6ab6db63a86af02daa2644e672d
                        • Instruction ID: 6bb9e4ed1eb440691e5a13f5fb6860ce7f051761eff20ed3f913981a7ceba808
                        • Opcode Fuzzy Hash: b804793c454351bb13b8406b4bca2b79aff6b6ab6db63a86af02daa2644e672d
                        • Instruction Fuzzy Hash: 2F01DD321393139FF7152AB4BCCA66A364AE751376F30032AF510410E3EFA35D715548
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 001F2D3F
                        • int.LIBCPMT ref: 001F2D52
                          • Part of subcall function 001F400A: std::_Lockit::_Lockit.LIBCPMT ref: 001F401B
                          • Part of subcall function 001F400A: std::_Lockit::~_Lockit.LIBCPMT ref: 001F4035
                        • std::_Facet_Register.LIBCPMT ref: 001F2D85
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 001F2D9B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                        • String ID: h)%
                        • API String ID: 459529453-3066497062
                        • Opcode ID: d3ebac731a55864eab05066d0cd43a7b2e97bebe1f7f4a8dcd98be2eb2d36817
                        • Instruction ID: 70dbc3fd80fbb78434802b428b4f3b635a6172dc7568de35f2eb02c281f517fd
                        • Opcode Fuzzy Hash: d3ebac731a55864eab05066d0cd43a7b2e97bebe1f7f4a8dcd98be2eb2d36817
                        • Instruction Fuzzy Hash: B301267250011CEBCB14ABA4D805CBE7768EFA1724F200109FB15AB380EF30AE02CB84
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 001F2E31
                        • int.LIBCPMT ref: 001F2E44
                          • Part of subcall function 001F400A: std::_Lockit::_Lockit.LIBCPMT ref: 001F401B
                          • Part of subcall function 001F400A: std::_Lockit::~_Lockit.LIBCPMT ref: 001F4035
                        • std::_Facet_Register.LIBCPMT ref: 001F2E77
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 001F2E8D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                        • String ID: l)%
                        • API String ID: 459529453-2983108858
                        • Opcode ID: 6635550815556ec34c1370fbfe6973ba5d69c3f9815a93754b4e0baff1709eb0
                        • Instruction ID: a15cd2714b20a85997f277f5f024bbd3810304eac855d8139e85b3fa06fcec04
                        • Opcode Fuzzy Hash: 6635550815556ec34c1370fbfe6973ba5d69c3f9815a93754b4e0baff1709eb0
                        • Instruction Fuzzy Hash: CD01267250151CABCB14EB64D8058FE7768EFA0764F340209FB05AB391EF70AE02CB84
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 001F2EAA
                        • int.LIBCPMT ref: 001F2EBD
                          • Part of subcall function 001F400A: std::_Lockit::_Lockit.LIBCPMT ref: 001F401B
                          • Part of subcall function 001F400A: std::_Lockit::~_Lockit.LIBCPMT ref: 001F4035
                        • std::_Facet_Register.LIBCPMT ref: 001F2EF0
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 001F2F06
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                        • String ID: p)%
                        • API String ID: 459529453-2767387374
                        • Opcode ID: bf6161016de909570ae885cdcd9b607802279fde84ece50f38e9c093016bd087
                        • Instruction ID: 81c4f168646c010e372e5a129a52884a52d471743c5092346808c37570a45aa1
                        • Opcode Fuzzy Hash: bf6161016de909570ae885cdcd9b607802279fde84ece50f38e9c093016bd087
                        • Instruction Fuzzy Hash: D101A27290151CABCB18EB68D8058BE77B8DF91364F240159FB059B291EF349E028794
                        APIs
                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,B1BFA320,?,?,00000000,0021B3CE,000000FF,?,00208A3E,?,?,00208A12,00000016), ref: 00208AE3
                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00208AF5
                        • FreeLibrary.KERNEL32(00000000,?,00000000,0021B3CE,000000FF,?,00208A3E,?,?,00208A12,00000016), ref: 00208B17
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$mscoree.dll
                        • API String ID: 4061214504-1276376045
                        • Opcode ID: f13eda520b13c2859830ccb497dff5661c0a65724e2b770e9a3bf676d88a9f0a
                        • Instruction ID: 6511cf7b7fee2aafecbe8eabe61ce37ebb3a6052d7e97f1b7edac6d20799f743
                        • Opcode Fuzzy Hash: f13eda520b13c2859830ccb497dff5661c0a65724e2b770e9a3bf676d88a9f0a
                        • Instruction Fuzzy Hash: 3701A775954629FBDB119F90DC09FEEB7B9FB08B15F104525F811E22D0DF749910CA90
                        APIs
                        • __alloca_probe_16.LIBCMT ref: 0020FB38
                        • __alloca_probe_16.LIBCMT ref: 0020FBF9
                        • __freea.LIBCMT ref: 0020FC60
                          • Part of subcall function 0020DBB9: RtlAllocateHeap.NTDLL(00000000,001F8B9B,?,?,001FE744,?,?,?,?,?,001F379B,001F8B9B,?,?,?,?), ref: 0020DBEB
                        • __freea.LIBCMT ref: 0020FC75
                        • __freea.LIBCMT ref: 0020FC85
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: __freea$__alloca_probe_16$AllocateHeap
                        • String ID:
                        • API String ID: 1423051803-0
                        • Opcode ID: cd5a6c286e2e2086261c75e3baff2ba125063b6bdc1bccd109df0e5825521e50
                        • Instruction ID: 50b878246e5466619a088f0dffefb32deff42c9f3c39b4d393b36c4333ed0954
                        • Opcode Fuzzy Hash: cd5a6c286e2e2086261c75e3baff2ba125063b6bdc1bccd109df0e5825521e50
                        • Instruction Fuzzy Hash: 6851B47266030AABEB35DEA4CD82DBB36A9EB44714B150139FD08D6592E770DD20DA60
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 001F97A6
                        • AcquireSRWLockExclusive.KERNEL32(00000000,?,001F82F7,?,?,001F599E), ref: 001F97C5
                        • AcquireSRWLockExclusive.KERNEL32(00000000,?,00000000,?,001F82F7,?,?,001F599E), ref: 001F97F3
                        • TryAcquireSRWLockExclusive.KERNEL32(00000000,?,00000000,?,001F82F7,?,?,001F599E), ref: 001F984E
                        • TryAcquireSRWLockExclusive.KERNEL32(00000000,?,00000000,?,001F82F7,?,?,001F599E), ref: 001F9865
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: AcquireExclusiveLock$CurrentThread
                        • String ID:
                        • API String ID: 66001078-0
                        • Opcode ID: 25fcb749b6923dcd7c7043420cb74ce256a2753fc11494c06f29b865222d6c1d
                        • Instruction ID: 866459910677e9840a695ef802ea50dd2aa73d8ce9aa70864d416ff2efced91b
                        • Opcode Fuzzy Hash: 25fcb749b6923dcd7c7043420cb74ce256a2753fc11494c06f29b865222d6c1d
                        • Instruction Fuzzy Hash: E5415D7590060EDFCB24EF66D485ABAB3F5FF4A390B20892AD646D7540D730E984CBA0
                        APIs
                        • __EH_prolog3.LIBCMT ref: 001F9D34
                        • std::_Lockit::_Lockit.LIBCPMT ref: 001F9D3F
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 001F9DAD
                          • Part of subcall function 001F9E90: std::locale::_Locimp::_Locimp.LIBCPMT ref: 001F9EA8
                        • std::locale::_Setgloballocale.LIBCPMT ref: 001F9D5A
                        • _Yarn.LIBCPMT ref: 001F9D70
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                        • String ID:
                        • API String ID: 1088826258-0
                        • Opcode ID: 08814ec8b1e1ab20a34319ca3592e5202de9fcb3b29585103cfca770c9759e76
                        • Instruction ID: 28b713f45f56e6ad3fd165b2a8b2f7811c4019c10cf971eb9fd95c04ecfd26e8
                        • Opcode Fuzzy Hash: 08814ec8b1e1ab20a34319ca3592e5202de9fcb3b29585103cfca770c9759e76
                        • Instruction Fuzzy Hash: 3001F275A402289BC70AFF20E81967D7BB2FFA5340B24405DEA1257382CF74AE42CBC5
                        APIs
                        • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,002016F8,?,?,00000000,?,?,?,00201822,00000002,FlsGetValue,0021E2C8,FlsGetValue), ref: 00201754
                        • GetLastError.KERNEL32(?,002016F8,?,?,00000000,?,?,?,00201822,00000002,FlsGetValue,0021E2C8,FlsGetValue,?,?,00200665), ref: 0020175E
                        • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 00201786
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: LibraryLoad$ErrorLast
                        • String ID: api-ms-
                        • API String ID: 3177248105-2084034818
                        • Opcode ID: 3286ec3d92f47ed1941910bd112559edeaff677910dd3ad9b0c72c33e8154bc0
                        • Instruction ID: 5259c42e1225fb8cd433d10f684f479fe39da313e0eb3e10b1f1cccc02f40080
                        • Opcode Fuzzy Hash: 3286ec3d92f47ed1941910bd112559edeaff677910dd3ad9b0c72c33e8154bc0
                        • Instruction Fuzzy Hash: 9BE012702E0309B7EF101F50EC4ABA83B599B14B54F208120F90DE44E1DB6199B49985
                        APIs
                        • GetConsoleOutputCP.KERNEL32(B1BFA320,00000000,00000000,00000000), ref: 002100DD
                          • Part of subcall function 002121FC: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,0020FC56,?,00000000,-00000008), ref: 002122A8
                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00210338
                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00210380
                        • GetLastError.KERNEL32 ref: 00210423
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                        • String ID:
                        • API String ID: 2112829910-0
                        • Opcode ID: 8aa23a05e90f5ecc17fbfc9fa2cdeb56e3275fbc88e64ac4f53db4868268fdee
                        • Instruction ID: 2dbd252325df0599b97ea572a4ade8b650257f2c56e1136f4eb2c30f24ebdd23
                        • Opcode Fuzzy Hash: 8aa23a05e90f5ecc17fbfc9fa2cdeb56e3275fbc88e64ac4f53db4868268fdee
                        • Instruction Fuzzy Hash: 7BD168B5E102489FCB11CFA8D8C4AEDBBF5FF18310F28816AE915E7251D770A996CB50
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: AdjustPointer
                        • String ID:
                        • API String ID: 1740715915-0
                        • Opcode ID: 7a823ddaace9f9d802c2e2dc63e1a42705255662905796db0c35f259247aae66
                        • Instruction ID: c45d5096ebb40ac34234423450e82187381320646f8eac22c50a292d79033e28
                        • Opcode Fuzzy Hash: 7a823ddaace9f9d802c2e2dc63e1a42705255662905796db0c35f259247aae66
                        • Instruction Fuzzy Hash: 6F51D171A25306AFFB289F90D885BBAB7A4FF54700F14842DE905875E2DB71AD60CBD0
                        APIs
                          • Part of subcall function 002121FC: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,0020FC56,?,00000000,-00000008), ref: 002122A8
                        • GetLastError.KERNEL32 ref: 00212520
                        • __dosmaperr.LIBCMT ref: 00212527
                        • GetLastError.KERNEL32(?,?,?,?), ref: 00212561
                        • __dosmaperr.LIBCMT ref: 00212568
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                        • String ID:
                        • API String ID: 1913693674-0
                        • Opcode ID: d11dd2cfeb8db600bcca0db515994e9f9ff751578b3fedc0a812258f7b4e4d04
                        • Instruction ID: fcc80d327ec93d34a72d75360e674ec5271bb56f4ff2e20317bdd8157ed9819a
                        • Opcode Fuzzy Hash: d11dd2cfeb8db600bcca0db515994e9f9ff751578b3fedc0a812258f7b4e4d04
                        • Instruction Fuzzy Hash: 7421D671620306FFCB34AFA5DC908ABBBEAEF243607908518F95593151D730ECB48B90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 28d99357a6622b0368e7106a2842cef80fdd52a773982ef0fc7c716404f7859a
                        • Instruction ID: cc45cc5b3d8b926b9b86863e531fda63c379c708df3318e7963ade1b3d560f02
                        • Opcode Fuzzy Hash: 28d99357a6622b0368e7106a2842cef80fdd52a773982ef0fc7c716404f7859a
                        • Instruction Fuzzy Hash: B021A171220306AFDB20AF64DC849AB7BE9EF003647518914F999972D3EF30ED708B90
                        APIs
                        • GetEnvironmentStringsW.KERNEL32 ref: 0021345A
                          • Part of subcall function 002121FC: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,0020FC56,?,00000000,-00000008), ref: 002122A8
                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00213492
                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 002134B2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                        • String ID:
                        • API String ID: 158306478-0
                        • Opcode ID: 2ec61a38b815fcadee20479f372d5c5d85ce2692f8306408be05a2f7d2b0fc6e
                        • Instruction ID: 4e5ff2c10ef79b6d10d8dc990e8480d7708739c94d404400ba597b081b614f67
                        • Opcode Fuzzy Hash: 2ec61a38b815fcadee20479f372d5c5d85ce2692f8306408be05a2f7d2b0fc6e
                        • Instruction Fuzzy Hash: 191108F19312157FEB22A7B16C8ECEF79DDCE663943204124F905D1102EE74CEA046B0
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 001F2C4D
                        • int.LIBCPMT ref: 001F2C60
                          • Part of subcall function 001F400A: std::_Lockit::_Lockit.LIBCPMT ref: 001F401B
                          • Part of subcall function 001F400A: std::_Lockit::~_Lockit.LIBCPMT ref: 001F4035
                        • std::_Facet_Register.LIBCPMT ref: 001F2C93
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 001F2CA9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                        • String ID:
                        • API String ID: 459529453-0
                        • Opcode ID: 75df507e1fe22ee751240ecc2c369219fb6f153e34891a5760a66db4d832f96a
                        • Instruction ID: 4073c3353a969380d2477b51b5904b77de6bd2d3f4da26adc9b9e65b77ede45e
                        • Opcode Fuzzy Hash: 75df507e1fe22ee751240ecc2c369219fb6f153e34891a5760a66db4d832f96a
                        • Instruction Fuzzy Hash: CA01F27290111CABCB18EB64D8158BE7B78EFA1764B240219FB05AB291EF309E028784
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 001F2CC6
                        • int.LIBCPMT ref: 001F2CD9
                          • Part of subcall function 001F400A: std::_Lockit::_Lockit.LIBCPMT ref: 001F401B
                          • Part of subcall function 001F400A: std::_Lockit::~_Lockit.LIBCPMT ref: 001F4035
                        • std::_Facet_Register.LIBCPMT ref: 001F2D0C
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 001F2D22
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                        • String ID:
                        • API String ID: 459529453-0
                        • Opcode ID: 7c2a7d76a1c4dce110a0f7a1bf5e891187f78d50cd6a3e0649a654cd73d5360b
                        • Instruction ID: 09ed06b0a47c6b2d4b97e4f3c47edc7e8762a3610a9d3a5737e188a1f9a64c88
                        • Opcode Fuzzy Hash: 7c2a7d76a1c4dce110a0f7a1bf5e891187f78d50cd6a3e0649a654cd73d5360b
                        • Instruction Fuzzy Hash: 6101F27250061CEBCB14ABA4D8058BEB768EF91364F340159FB159B281EF309E4287A4
                        APIs
                        • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,00000000,?,00218615,00000000,00000001,00000000,00000000,?,00210477,00000000,00000000,00000000), ref: 00219876
                        • GetLastError.KERNEL32(?,00218615,00000000,00000001,00000000,00000000,?,00210477,00000000,00000000,00000000,00000000,00000000,?,002109FE,00000000), ref: 00219882
                          • Part of subcall function 00219848: CloseHandle.KERNEL32(FFFFFFFE,00219892,?,00218615,00000000,00000001,00000000,00000000,?,00210477,00000000,00000000,00000000,00000000,00000000), ref: 00219858
                        • ___initconout.LIBCMT ref: 00219892
                          • Part of subcall function 0021980A: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00219839,00218602,00000000,?,00210477,00000000,00000000,00000000,00000000), ref: 0021981D
                        • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,?,00218615,00000000,00000001,00000000,00000000,?,00210477,00000000,00000000,00000000,00000000), ref: 002198A7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                        • String ID:
                        • API String ID: 2744216297-0
                        • Opcode ID: 5737eceff194ba4a1f78f94404b3cdbafc39088c6f96b36894050fce292ff57d
                        • Instruction ID: eb47e3ecee0f029d1c5861e08bc3c9a0dd1d556f2854f0ed8a01b89df661f569
                        • Opcode Fuzzy Hash: 5737eceff194ba4a1f78f94404b3cdbafc39088c6f96b36894050fce292ff57d
                        • Instruction Fuzzy Hash: 7FF03736490155BBCF222F95EC0CAC93FA5FF1A3A1B154110F91885130CA3288B0DF90
                        APIs
                        • EncodePointer.KERNEL32(00000000,?), ref: 00200D7C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: EncodePointer
                        • String ID: MOC$RCC
                        • API String ID: 2118026453-2084237596
                        • Opcode ID: fc2eba5100fe37cba23ad518938e1823c0b809f6565e9dc40f387459e04321c0
                        • Instruction ID: 733079fe64a117c9978e83783ceaabfd8ffa755c5915d7200c6eaa603debb2d6
                        • Opcode Fuzzy Hash: fc2eba5100fe37cba23ad518938e1823c0b809f6565e9dc40f387459e04321c0
                        • Instruction Fuzzy Hash: 6641387191020AAFEF15DF94DC81BAE7BB5FF48304F148559FA08762A2D335A960DB50
                        APIs
                        • __alloca_probe_16.LIBCMT ref: 001F969D
                        • RaiseException.KERNEL32(?,?,?,001F864E,?,?,?,?,?,?,?,?,?,?,001F864E,00000001), ref: 001F96C2
                          • Part of subcall function 001FE79C: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,001F8BA9,?,00227068,?,0000000006:1@0000000005:@), ref: 001FE7FC
                          • Part of subcall function 00201F23: IsProcessorFeaturePresent.KERNEL32(00000017,00201A52,?,002019C1,001F8B9B,00000016,00201BD0,?,?,?,?,?,00000000,?,?), ref: 00201F3F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExceptionRaise$FeaturePresentProcessor__alloca_probe_16
                        • String ID: csm
                        • API String ID: 1924019822-1018135373
                        • Opcode ID: f009f7e49e7b68afc93d65bf36ac6b3552ad9b282c065302fd8077896067ff91
                        • Instruction ID: 47d7da83fefc48ba32a16601d0af3988677b5a57fdea4e72c53e17990b7e941e
                        • Opcode Fuzzy Hash: f009f7e49e7b68afc93d65bf36ac6b3552ad9b282c065302fd8077896067ff91
                        • Instruction Fuzzy Hash: A121AF31D0121CABCF25EFD5D845ABEB7B9AF14720F14041AE606EB660DB30AD45CB81
                        APIs
                        • InitOnceBeginInitialize.KERNEL32(?,00000000,00000000,00000000,00000000,00000028,?,001F52C7,0025295C,?,00000028,001F63A8,00000028,00000028,?,001F6518), ref: 001F2AC8
                        • InitOnceComplete.KERNEL32(?,00000000,00000000,?,001F52C7,0025295C,?,00000028,001F63A8,00000028,00000028,?,001F6518,001F49E3,00000000,00000001), ref: 001F2AE6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2007700127.00000000001F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001F0000, based on PE: true
                        • Associated: 00000000.00000002.2007667141.00000000001F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007739846.000000000021C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007768798.0000000000250000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2007820814.0000000000254000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f0000_7Xex8yR90g.jbxd
                        Yara matches
                        Similarity
                        • API ID: InitOnce$BeginCompleteInitialize
                        • String ID: H)%
                        • API String ID: 51270584-2391428806
                        • Opcode ID: 8b0602dcf98087865dbdc0caf6ff5c45cd7dc155bad7de4ad09cc2941905101d
                        • Instruction ID: 97104f2da3120f5a53e5f9030ef330d9d3d2c73f0894ca88368d3e986b8f9bc3
                        • Opcode Fuzzy Hash: 8b0602dcf98087865dbdc0caf6ff5c45cd7dc155bad7de4ad09cc2941905101d
                        • Instruction Fuzzy Hash: 66E06D7090222CFA8B306BA1EC0DDFB3E6CFF057907104014FA05D2454EB749A01E6E0

                        Execution Graph

                        Execution Coverage:3.3%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:0.3%
                        Total number of Nodes:1439
                        Total number of Limit Nodes:18
                        execution_graph 12327 414920 12347 402170 12327->12347 12331 414930 12441 401120 GetSystemInfo 12331->12441 12337 414951 12338 414956 GetUserDefaultLangID 12337->12338 12339 415720 GetUserNameA 12338->12339 12340 414960 12339->12340 12341 4157b0 GetComputerNameA 12340->12341 12345 414973 12341->12345 12452 414850 12345->12452 12346 414a46 12514 4043d0 LocalAlloc 12347->12514 12350 4043d0 2 API calls 12351 40219d 12350->12351 12352 4043d0 2 API calls 12351->12352 12353 4021b6 12352->12353 12354 4043d0 2 API calls 12353->12354 12355 4021cf 12354->12355 12356 4043d0 2 API calls 12355->12356 12357 4021e8 12356->12357 12358 4043d0 2 API calls 12357->12358 12359 402201 12358->12359 12360 4043d0 2 API calls 12359->12360 12361 40221a 12360->12361 12362 4043d0 2 API calls 12361->12362 12363 402233 12362->12363 12364 4043d0 2 API calls 12363->12364 12365 40224c 12364->12365 12366 4043d0 2 API calls 12365->12366 12367 402265 12366->12367 12368 4043d0 2 API calls 12367->12368 12369 40227e 12368->12369 12370 4043d0 2 API calls 12369->12370 12371 402297 12370->12371 12372 4043d0 2 API calls 12371->12372 12373 4022b0 12372->12373 12374 4043d0 2 API calls 12373->12374 12375 4022c9 12374->12375 12376 4043d0 2 API calls 12375->12376 12377 4022e2 12376->12377 12378 4043d0 2 API calls 12377->12378 12379 4022fb 12378->12379 12380 4043d0 2 API calls 12379->12380 12381 402314 12380->12381 12382 4043d0 2 API calls 12381->12382 12383 40232d 12382->12383 12384 4043d0 2 API calls 12383->12384 12385 402346 12384->12385 12386 4043d0 2 API calls 12385->12386 12387 40235f 12386->12387 12388 4043d0 2 API calls 12387->12388 12389 402378 12388->12389 12390 4043d0 2 API calls 12389->12390 12391 402391 12390->12391 12392 4043d0 2 API calls 12391->12392 12393 4023aa 12392->12393 12394 4043d0 2 API calls 12393->12394 12395 4023c3 12394->12395 12396 4043d0 2 API calls 12395->12396 12397 4023dc 12396->12397 12398 4043d0 2 API calls 12397->12398 12399 4023f5 12398->12399 12400 4043d0 2 API calls 12399->12400 12401 40240e 12400->12401 12402 4043d0 2 API calls 12401->12402 12403 402427 12402->12403 12404 4043d0 2 API calls 12403->12404 12405 402440 12404->12405 12406 4043d0 2 API calls 12405->12406 12407 402459 12406->12407 12408 4043d0 2 API calls 12407->12408 12409 402472 12408->12409 12410 4043d0 2 API calls 12409->12410 12411 40248b 12410->12411 12412 4043d0 2 API calls 12411->12412 12413 4024a4 12412->12413 12414 4043d0 2 API calls 12413->12414 12415 4024bd 12414->12415 12416 4043d0 2 API calls 12415->12416 12417 4024d6 12416->12417 12418 4043d0 2 API calls 12417->12418 12419 4024ef 12418->12419 12420 4043d0 2 API calls 12419->12420 12421 402508 12420->12421 12422 4043d0 2 API calls 12421->12422 12423 402521 12422->12423 12424 4043d0 2 API calls 12423->12424 12425 40253a 12424->12425 12426 4043d0 2 API calls 12425->12426 12427 402553 12426->12427 12428 4043d0 2 API calls 12427->12428 12429 40256c 12428->12429 12430 4043d0 2 API calls 12429->12430 12431 402585 12430->12431 12432 4043d0 2 API calls 12431->12432 12433 40259e 12432->12433 12434 4176e0 12433->12434 12518 4175d0 GetPEB 12434->12518 12436 417913 LoadLibraryA 12437 417931 LoadLibraryA 12436->12437 12439 417966 12437->12439 12439->12331 12440 4176e8 12440->12436 12442 40113c 12441->12442 12443 4010d0 12442->12443 12444 4010f1 VirtualAllocExNuma 12443->12444 12445 401101 12444->12445 12519 401060 VirtualAlloc 12445->12519 12447 40110e 12448 4011e0 12447->12448 12521 4168a0 12448->12521 12451 401209 __aulldiv 12451->12337 12453 4148a2 12452->12453 12454 414910 12453->12454 12455 414908 ExitProcess 12453->12455 12456 413d60 12454->12456 12457 413d6d 12456->12457 12523 4025b0 12457->12523 12459 413e97 13140 404560 12459->13140 12461 413f7c 13144 410ac0 12461->13144 12463 413f84 13150 405630 12463->13150 12465 413fbb 13158 410390 12465->13158 12467 413fc3 12468 405630 3 API calls 12467->12468 12469 413ffb 12468->12469 13164 4100d0 12469->13164 12471 414003 12472 405630 3 API calls 12471->12472 12473 414039 12472->12473 13170 410280 12473->13170 12475 414041 13176 410cf0 12475->13176 12477 414057 13184 40fe10 12477->13184 12479 4140f4 12480 405630 3 API calls 12479->12480 12481 41412b 12480->12481 13197 4104b0 12481->13197 12483 414133 13203 401db0 12483->13203 12485 414172 12486 405630 3 API calls 12485->12486 12487 4141a9 12486->12487 13209 410610 12487->13209 12489 4141b1 13215 412aa0 12489->13215 12491 4141f0 12492 414222 12491->12492 13219 412d70 memset 12491->13219 12495 41423e 12492->12495 13239 4133e0 12492->13239 12498 41425a 12495->12498 13243 4137d0 12495->13243 12496 41420c 13233 413ce0 12496->13233 12499 414276 12498->12499 13257 413970 memset 12498->13257 12502 414292 12499->12502 13268 413b30 12499->13268 12505 4142ae 12502->12505 13274 407110 12502->13274 12507 4142ca 12505->12507 13326 413c30 12505->13326 12509 4142e8 12507->12509 13330 416f20 12507->13330 12510 405630 3 API calls 12509->12510 12511 414312 12510->12511 13336 412330 12511->13336 12513 41431a 12513->12346 12515 4043fb 12514->12515 12516 40440c strlen 12515->12516 12517 402184 12515->12517 12516->12515 12517->12350 12518->12440 12520 401082 ctype 12519->12520 12520->12447 12522 4011f3 GlobalMemoryStatusEx 12521->12522 12522->12451 12524 4043d0 2 API calls 12523->12524 12525 4025c4 12524->12525 12526 4043d0 2 API calls 12525->12526 12527 4025dd 12526->12527 12528 4043d0 2 API calls 12527->12528 12529 4025f6 12528->12529 12530 4043d0 2 API calls 12529->12530 12531 40260f 12530->12531 12532 4043d0 2 API calls 12531->12532 12533 402628 12532->12533 12534 4043d0 2 API calls 12533->12534 12535 402641 12534->12535 12536 4043d0 2 API calls 12535->12536 12537 40265a 12536->12537 12538 4043d0 2 API calls 12537->12538 12539 402673 12538->12539 12540 4043d0 2 API calls 12539->12540 12541 40268c 12540->12541 12542 4043d0 2 API calls 12541->12542 12543 4026a5 12542->12543 12544 4043d0 2 API calls 12543->12544 12545 4026be 12544->12545 12546 4043d0 2 API calls 12545->12546 12547 4026d7 12546->12547 12548 4043d0 2 API calls 12547->12548 12549 4026f0 12548->12549 12550 4043d0 2 API calls 12549->12550 12551 402709 12550->12551 12552 4043d0 2 API calls 12551->12552 12553 402722 12552->12553 12554 4043d0 2 API calls 12553->12554 12555 40273b 12554->12555 12556 4043d0 2 API calls 12555->12556 12557 402754 12556->12557 12558 4043d0 2 API calls 12557->12558 12559 40276d 12558->12559 12560 4043d0 2 API calls 12559->12560 12561 402786 12560->12561 12562 4043d0 2 API calls 12561->12562 12563 40279f 12562->12563 12564 4043d0 2 API calls 12563->12564 12565 4027b8 12564->12565 12566 4043d0 2 API calls 12565->12566 12567 4027d1 12566->12567 12568 4043d0 2 API calls 12567->12568 12569 4027ea 12568->12569 12570 4043d0 2 API calls 12569->12570 12571 402803 12570->12571 12572 4043d0 2 API calls 12571->12572 12573 40281c 12572->12573 12574 4043d0 2 API calls 12573->12574 12575 402835 12574->12575 12576 4043d0 2 API calls 12575->12576 12577 40284e 12576->12577 12578 4043d0 2 API calls 12577->12578 12579 402867 12578->12579 12580 4043d0 2 API calls 12579->12580 12581 402880 12580->12581 12582 4043d0 2 API calls 12581->12582 12583 402899 12582->12583 12584 4043d0 2 API calls 12583->12584 12585 4028b2 12584->12585 12586 4043d0 2 API calls 12585->12586 12587 4028cb 12586->12587 12588 4043d0 2 API calls 12587->12588 12589 4028e4 12588->12589 12590 4043d0 2 API calls 12589->12590 12591 4028fd 12590->12591 12592 4043d0 2 API calls 12591->12592 12593 402916 12592->12593 12594 4043d0 2 API calls 12593->12594 12595 40292f 12594->12595 12596 4043d0 2 API calls 12595->12596 12597 402948 12596->12597 12598 4043d0 2 API calls 12597->12598 12599 402961 12598->12599 12600 4043d0 2 API calls 12599->12600 12601 40297a 12600->12601 12602 4043d0 2 API calls 12601->12602 12603 402993 12602->12603 12604 4043d0 2 API calls 12603->12604 12605 4029ac 12604->12605 12606 4043d0 2 API calls 12605->12606 12607 4029c5 12606->12607 12608 4043d0 2 API calls 12607->12608 12609 4029de 12608->12609 12610 4043d0 2 API calls 12609->12610 12611 4029f7 12610->12611 12612 4043d0 2 API calls 12611->12612 12613 402a10 12612->12613 12614 4043d0 2 API calls 12613->12614 12615 402a29 12614->12615 12616 4043d0 2 API calls 12615->12616 12617 402a42 12616->12617 12618 4043d0 2 API calls 12617->12618 12619 402a5b 12618->12619 12620 4043d0 2 API calls 12619->12620 12621 402a74 12620->12621 12622 4043d0 2 API calls 12621->12622 12623 402a8d 12622->12623 12624 4043d0 2 API calls 12623->12624 12625 402aa6 12624->12625 12626 4043d0 2 API calls 12625->12626 12627 402abf 12626->12627 12628 4043d0 2 API calls 12627->12628 12629 402ad8 12628->12629 12630 4043d0 2 API calls 12629->12630 12631 402af1 12630->12631 12632 4043d0 2 API calls 12631->12632 12633 402b0a 12632->12633 12634 4043d0 2 API calls 12633->12634 12635 402b23 12634->12635 12636 4043d0 2 API calls 12635->12636 12637 402b3c 12636->12637 12638 4043d0 2 API calls 12637->12638 12639 402b55 12638->12639 12640 4043d0 2 API calls 12639->12640 12641 402b6e 12640->12641 12642 4043d0 2 API calls 12641->12642 12643 402b87 12642->12643 12644 4043d0 2 API calls 12643->12644 12645 402ba0 12644->12645 12646 4043d0 2 API calls 12645->12646 12647 402bb9 12646->12647 12648 4043d0 2 API calls 12647->12648 12649 402bd2 12648->12649 12650 4043d0 2 API calls 12649->12650 12651 402beb 12650->12651 12652 4043d0 2 API calls 12651->12652 12653 402c04 12652->12653 12654 4043d0 2 API calls 12653->12654 12655 402c1d 12654->12655 12656 4043d0 2 API calls 12655->12656 12657 402c36 12656->12657 12658 4043d0 2 API calls 12657->12658 12659 402c4f 12658->12659 12660 4043d0 2 API calls 12659->12660 12661 402c68 12660->12661 12662 4043d0 2 API calls 12661->12662 12663 402c81 12662->12663 12664 4043d0 2 API calls 12663->12664 12665 402c9a 12664->12665 12666 4043d0 2 API calls 12665->12666 12667 402cb3 12666->12667 12668 4043d0 2 API calls 12667->12668 12669 402ccc 12668->12669 12670 4043d0 2 API calls 12669->12670 12671 402ce5 12670->12671 12672 4043d0 2 API calls 12671->12672 12673 402cfe 12672->12673 12674 4043d0 2 API calls 12673->12674 12675 402d17 12674->12675 12676 4043d0 2 API calls 12675->12676 12677 402d30 12676->12677 12678 4043d0 2 API calls 12677->12678 12679 402d49 12678->12679 12680 4043d0 2 API calls 12679->12680 12681 402d62 12680->12681 12682 4043d0 2 API calls 12681->12682 12683 402d7b 12682->12683 12684 4043d0 2 API calls 12683->12684 12685 402d94 12684->12685 12686 4043d0 2 API calls 12685->12686 12687 402dad 12686->12687 12688 4043d0 2 API calls 12687->12688 12689 402dc6 12688->12689 12690 4043d0 2 API calls 12689->12690 12691 402ddf 12690->12691 12692 4043d0 2 API calls 12691->12692 12693 402df8 12692->12693 12694 4043d0 2 API calls 12693->12694 12695 402e11 12694->12695 12696 4043d0 2 API calls 12695->12696 12697 402e2a 12696->12697 12698 4043d0 2 API calls 12697->12698 12699 402e43 12698->12699 12700 4043d0 2 API calls 12699->12700 12701 402e5c 12700->12701 12702 4043d0 2 API calls 12701->12702 12703 402e75 12702->12703 12704 4043d0 2 API calls 12703->12704 12705 402e8e 12704->12705 12706 4043d0 2 API calls 12705->12706 12707 402ea7 12706->12707 12708 4043d0 2 API calls 12707->12708 12709 402ec0 12708->12709 12710 4043d0 2 API calls 12709->12710 12711 402ed9 12710->12711 12712 4043d0 2 API calls 12711->12712 12713 402ef2 12712->12713 12714 4043d0 2 API calls 12713->12714 12715 402f0b 12714->12715 12716 4043d0 2 API calls 12715->12716 12717 402f24 12716->12717 12718 4043d0 2 API calls 12717->12718 12719 402f3d 12718->12719 12720 4043d0 2 API calls 12719->12720 12721 402f56 12720->12721 12722 4043d0 2 API calls 12721->12722 12723 402f6f 12722->12723 12724 4043d0 2 API calls 12723->12724 12725 402f88 12724->12725 12726 4043d0 2 API calls 12725->12726 12727 402fa1 12726->12727 12728 4043d0 2 API calls 12727->12728 12729 402fba 12728->12729 12730 4043d0 2 API calls 12729->12730 12731 402fd3 12730->12731 12732 4043d0 2 API calls 12731->12732 12733 402fec 12732->12733 12734 4043d0 2 API calls 12733->12734 12735 403005 12734->12735 12736 4043d0 2 API calls 12735->12736 12737 40301e 12736->12737 12738 4043d0 2 API calls 12737->12738 12739 403037 12738->12739 12740 4043d0 2 API calls 12739->12740 12741 403050 12740->12741 12742 4043d0 2 API calls 12741->12742 12743 403069 12742->12743 12744 4043d0 2 API calls 12743->12744 12745 403082 12744->12745 12746 4043d0 2 API calls 12745->12746 12747 40309b 12746->12747 12748 4043d0 2 API calls 12747->12748 12749 4030b4 12748->12749 12750 4043d0 2 API calls 12749->12750 12751 4030cd 12750->12751 12752 4043d0 2 API calls 12751->12752 12753 4030e6 12752->12753 12754 4043d0 2 API calls 12753->12754 12755 4030ff 12754->12755 12756 4043d0 2 API calls 12755->12756 12757 403118 12756->12757 12758 4043d0 2 API calls 12757->12758 12759 403131 12758->12759 12760 4043d0 2 API calls 12759->12760 12761 40314a 12760->12761 12762 4043d0 2 API calls 12761->12762 12763 403163 12762->12763 12764 4043d0 2 API calls 12763->12764 12765 40317c 12764->12765 12766 4043d0 2 API calls 12765->12766 12767 403195 12766->12767 12768 4043d0 2 API calls 12767->12768 12769 4031ae 12768->12769 12770 4043d0 2 API calls 12769->12770 12771 4031c7 12770->12771 12772 4043d0 2 API calls 12771->12772 12773 4031e0 12772->12773 12774 4043d0 2 API calls 12773->12774 12775 4031f9 12774->12775 12776 4043d0 2 API calls 12775->12776 12777 403212 12776->12777 12778 4043d0 2 API calls 12777->12778 12779 40322b 12778->12779 12780 4043d0 2 API calls 12779->12780 12781 403244 12780->12781 12782 4043d0 2 API calls 12781->12782 12783 40325d 12782->12783 12784 4043d0 2 API calls 12783->12784 12785 403276 12784->12785 12786 4043d0 2 API calls 12785->12786 12787 40328f 12786->12787 12788 4043d0 2 API calls 12787->12788 12789 4032a8 12788->12789 12790 4043d0 2 API calls 12789->12790 12791 4032c1 12790->12791 12792 4043d0 2 API calls 12791->12792 12793 4032da 12792->12793 12794 4043d0 2 API calls 12793->12794 12795 4032f3 12794->12795 12796 4043d0 2 API calls 12795->12796 12797 40330c 12796->12797 12798 4043d0 2 API calls 12797->12798 12799 403325 12798->12799 12800 4043d0 2 API calls 12799->12800 12801 40333e 12800->12801 12802 4043d0 2 API calls 12801->12802 12803 403357 12802->12803 12804 4043d0 2 API calls 12803->12804 12805 403370 12804->12805 12806 4043d0 2 API calls 12805->12806 12807 403389 12806->12807 12808 4043d0 2 API calls 12807->12808 12809 4033a2 12808->12809 12810 4043d0 2 API calls 12809->12810 12811 4033bb 12810->12811 12812 4043d0 2 API calls 12811->12812 12813 4033d4 12812->12813 12814 4043d0 2 API calls 12813->12814 12815 4033ed 12814->12815 12816 4043d0 2 API calls 12815->12816 12817 403406 12816->12817 12818 4043d0 2 API calls 12817->12818 12819 40341f 12818->12819 12820 4043d0 2 API calls 12819->12820 12821 403438 12820->12821 12822 4043d0 2 API calls 12821->12822 12823 403451 12822->12823 12824 4043d0 2 API calls 12823->12824 12825 40346a 12824->12825 12826 4043d0 2 API calls 12825->12826 12827 403483 12826->12827 12828 4043d0 2 API calls 12827->12828 12829 40349c 12828->12829 12830 4043d0 2 API calls 12829->12830 12831 4034b5 12830->12831 12832 4043d0 2 API calls 12831->12832 12833 4034ce 12832->12833 12834 4043d0 2 API calls 12833->12834 12835 4034e7 12834->12835 12836 4043d0 2 API calls 12835->12836 12837 403500 12836->12837 12838 4043d0 2 API calls 12837->12838 12839 403519 12838->12839 12840 4043d0 2 API calls 12839->12840 12841 403532 12840->12841 12842 4043d0 2 API calls 12841->12842 12843 40354b 12842->12843 12844 4043d0 2 API calls 12843->12844 12845 403564 12844->12845 12846 4043d0 2 API calls 12845->12846 12847 40357d 12846->12847 12848 4043d0 2 API calls 12847->12848 12849 403596 12848->12849 12850 4043d0 2 API calls 12849->12850 12851 4035af 12850->12851 12852 4043d0 2 API calls 12851->12852 12853 4035c8 12852->12853 12854 4043d0 2 API calls 12853->12854 12855 4035e1 12854->12855 12856 4043d0 2 API calls 12855->12856 12857 4035fa 12856->12857 12858 4043d0 2 API calls 12857->12858 12859 403613 12858->12859 12860 4043d0 2 API calls 12859->12860 12861 40362c 12860->12861 12862 4043d0 2 API calls 12861->12862 12863 403645 12862->12863 12864 4043d0 2 API calls 12863->12864 12865 40365e 12864->12865 12866 4043d0 2 API calls 12865->12866 12867 403677 12866->12867 12868 4043d0 2 API calls 12867->12868 12869 403690 12868->12869 12870 4043d0 2 API calls 12869->12870 12871 4036a9 12870->12871 12872 4043d0 2 API calls 12871->12872 12873 4036c2 12872->12873 12874 4043d0 2 API calls 12873->12874 12875 4036db 12874->12875 12876 4043d0 2 API calls 12875->12876 12877 4036f4 12876->12877 12878 4043d0 2 API calls 12877->12878 12879 40370d 12878->12879 12880 4043d0 2 API calls 12879->12880 12881 403726 12880->12881 12882 4043d0 2 API calls 12881->12882 12883 40373f 12882->12883 12884 4043d0 2 API calls 12883->12884 12885 403758 12884->12885 12886 4043d0 2 API calls 12885->12886 12887 403771 12886->12887 12888 4043d0 2 API calls 12887->12888 12889 40378a 12888->12889 12890 4043d0 2 API calls 12889->12890 12891 4037a3 12890->12891 12892 4043d0 2 API calls 12891->12892 12893 4037bc 12892->12893 12894 4043d0 2 API calls 12893->12894 12895 4037d5 12894->12895 12896 4043d0 2 API calls 12895->12896 12897 4037ee 12896->12897 12898 4043d0 2 API calls 12897->12898 12899 403807 12898->12899 12900 4043d0 2 API calls 12899->12900 12901 403820 12900->12901 12902 4043d0 2 API calls 12901->12902 12903 403839 12902->12903 12904 4043d0 2 API calls 12903->12904 12905 403852 12904->12905 12906 4043d0 2 API calls 12905->12906 12907 40386b 12906->12907 12908 4043d0 2 API calls 12907->12908 12909 403884 12908->12909 12910 4043d0 2 API calls 12909->12910 12911 40389d 12910->12911 12912 4043d0 2 API calls 12911->12912 12913 4038b6 12912->12913 12914 4043d0 2 API calls 12913->12914 12915 4038cf 12914->12915 12916 4043d0 2 API calls 12915->12916 12917 4038e8 12916->12917 12918 4043d0 2 API calls 12917->12918 12919 403901 12918->12919 12920 4043d0 2 API calls 12919->12920 12921 40391a 12920->12921 12922 4043d0 2 API calls 12921->12922 12923 403933 12922->12923 12924 4043d0 2 API calls 12923->12924 12925 40394c 12924->12925 12926 4043d0 2 API calls 12925->12926 12927 403965 12926->12927 12928 4043d0 2 API calls 12927->12928 12929 40397e 12928->12929 12930 4043d0 2 API calls 12929->12930 12931 403997 12930->12931 12932 4043d0 2 API calls 12931->12932 12933 4039b0 12932->12933 12934 4043d0 2 API calls 12933->12934 12935 4039c9 12934->12935 12936 4043d0 2 API calls 12935->12936 12937 4039e2 12936->12937 12938 4043d0 2 API calls 12937->12938 12939 4039fb 12938->12939 12940 4043d0 2 API calls 12939->12940 12941 403a14 12940->12941 12942 4043d0 2 API calls 12941->12942 12943 403a2d 12942->12943 12944 4043d0 2 API calls 12943->12944 12945 403a46 12944->12945 12946 4043d0 2 API calls 12945->12946 12947 403a5f 12946->12947 12948 4043d0 2 API calls 12947->12948 12949 403a78 12948->12949 12950 4043d0 2 API calls 12949->12950 12951 403a91 12950->12951 12952 4043d0 2 API calls 12951->12952 12953 403aaa 12952->12953 12954 4043d0 2 API calls 12953->12954 12955 403ac3 12954->12955 12956 4043d0 2 API calls 12955->12956 12957 403adc 12956->12957 12958 4043d0 2 API calls 12957->12958 12959 403af5 12958->12959 12960 4043d0 2 API calls 12959->12960 12961 403b0e 12960->12961 12962 4043d0 2 API calls 12961->12962 12963 403b27 12962->12963 12964 4043d0 2 API calls 12963->12964 12965 403b40 12964->12965 12966 4043d0 2 API calls 12965->12966 12967 403b59 12966->12967 12968 4043d0 2 API calls 12967->12968 12969 403b72 12968->12969 12970 4043d0 2 API calls 12969->12970 12971 403b8b 12970->12971 12972 4043d0 2 API calls 12971->12972 12973 403ba4 12972->12973 12974 4043d0 2 API calls 12973->12974 12975 403bbd 12974->12975 12976 4043d0 2 API calls 12975->12976 12977 403bd6 12976->12977 12978 4043d0 2 API calls 12977->12978 12979 403bef 12978->12979 12980 4043d0 2 API calls 12979->12980 12981 403c08 12980->12981 12982 4043d0 2 API calls 12981->12982 12983 403c21 12982->12983 12984 4043d0 2 API calls 12983->12984 12985 403c3a 12984->12985 12986 4043d0 2 API calls 12985->12986 12987 403c53 12986->12987 12988 4043d0 2 API calls 12987->12988 12989 403c6c 12988->12989 12990 4043d0 2 API calls 12989->12990 12991 403c85 12990->12991 12992 4043d0 2 API calls 12991->12992 12993 403c9e 12992->12993 12994 4043d0 2 API calls 12993->12994 12995 403cb7 12994->12995 12996 4043d0 2 API calls 12995->12996 12997 403cd0 12996->12997 12998 4043d0 2 API calls 12997->12998 12999 403ce9 12998->12999 13000 4043d0 2 API calls 12999->13000 13001 403d02 13000->13001 13002 4043d0 2 API calls 13001->13002 13003 403d1b 13002->13003 13004 4043d0 2 API calls 13003->13004 13005 403d34 13004->13005 13006 4043d0 2 API calls 13005->13006 13007 403d4d 13006->13007 13008 4043d0 2 API calls 13007->13008 13009 403d66 13008->13009 13010 4043d0 2 API calls 13009->13010 13011 403d7f 13010->13011 13012 4043d0 2 API calls 13011->13012 13013 403d98 13012->13013 13014 4043d0 2 API calls 13013->13014 13015 403db1 13014->13015 13016 4043d0 2 API calls 13015->13016 13017 403dca 13016->13017 13018 4043d0 2 API calls 13017->13018 13019 403de3 13018->13019 13020 4043d0 2 API calls 13019->13020 13021 403dfc 13020->13021 13022 4043d0 2 API calls 13021->13022 13023 403e15 13022->13023 13024 4043d0 2 API calls 13023->13024 13025 403e2e 13024->13025 13026 4043d0 2 API calls 13025->13026 13027 403e47 13026->13027 13028 4043d0 2 API calls 13027->13028 13029 403e60 13028->13029 13030 4043d0 2 API calls 13029->13030 13031 403e79 13030->13031 13032 4043d0 2 API calls 13031->13032 13033 403e92 13032->13033 13034 4043d0 2 API calls 13033->13034 13035 403eab 13034->13035 13036 4043d0 2 API calls 13035->13036 13037 403ec4 13036->13037 13038 4043d0 2 API calls 13037->13038 13039 403edd 13038->13039 13040 4043d0 2 API calls 13039->13040 13041 403ef6 13040->13041 13042 4043d0 2 API calls 13041->13042 13043 403f0f 13042->13043 13044 4043d0 2 API calls 13043->13044 13045 403f28 13044->13045 13046 4043d0 2 API calls 13045->13046 13047 403f41 13046->13047 13048 4043d0 2 API calls 13047->13048 13049 403f5a 13048->13049 13050 4043d0 2 API calls 13049->13050 13051 403f73 13050->13051 13052 4043d0 2 API calls 13051->13052 13053 403f8c 13052->13053 13054 4043d0 2 API calls 13053->13054 13055 403fa5 13054->13055 13056 4043d0 2 API calls 13055->13056 13057 403fbe 13056->13057 13058 4043d0 2 API calls 13057->13058 13059 403fd7 13058->13059 13060 4043d0 2 API calls 13059->13060 13061 403ff0 13060->13061 13062 4043d0 2 API calls 13061->13062 13063 404009 13062->13063 13064 4043d0 2 API calls 13063->13064 13065 404022 13064->13065 13066 4043d0 2 API calls 13065->13066 13067 40403b 13066->13067 13068 4043d0 2 API calls 13067->13068 13069 404054 13068->13069 13070 4043d0 2 API calls 13069->13070 13071 40406d 13070->13071 13072 4043d0 2 API calls 13071->13072 13073 404086 13072->13073 13074 4043d0 2 API calls 13073->13074 13075 40409f 13074->13075 13076 4043d0 2 API calls 13075->13076 13077 4040b8 13076->13077 13078 4043d0 2 API calls 13077->13078 13079 4040d1 13078->13079 13080 4043d0 2 API calls 13079->13080 13081 4040ea 13080->13081 13082 4043d0 2 API calls 13081->13082 13083 404103 13082->13083 13084 4043d0 2 API calls 13083->13084 13085 40411c 13084->13085 13086 4043d0 2 API calls 13085->13086 13087 404135 13086->13087 13088 4043d0 2 API calls 13087->13088 13089 40414e 13088->13089 13090 4043d0 2 API calls 13089->13090 13091 404167 13090->13091 13092 4043d0 2 API calls 13091->13092 13093 404180 13092->13093 13094 4043d0 2 API calls 13093->13094 13095 404199 13094->13095 13096 4043d0 2 API calls 13095->13096 13097 4041b2 13096->13097 13098 4043d0 2 API calls 13097->13098 13099 4041cb 13098->13099 13100 4043d0 2 API calls 13099->13100 13101 4041e4 13100->13101 13102 4043d0 2 API calls 13101->13102 13103 4041fd 13102->13103 13104 4043d0 2 API calls 13103->13104 13105 404216 13104->13105 13106 4043d0 2 API calls 13105->13106 13107 40422f 13106->13107 13108 4043d0 2 API calls 13107->13108 13109 404248 13108->13109 13110 4043d0 2 API calls 13109->13110 13111 404261 13110->13111 13112 4043d0 2 API calls 13111->13112 13113 40427a 13112->13113 13114 4043d0 2 API calls 13113->13114 13115 404293 13114->13115 13116 4043d0 2 API calls 13115->13116 13117 4042ac 13116->13117 13118 4043d0 2 API calls 13117->13118 13119 4042c5 13118->13119 13120 4043d0 2 API calls 13119->13120 13121 4042de 13120->13121 13122 4043d0 2 API calls 13121->13122 13123 4042f7 13122->13123 13124 4043d0 2 API calls 13123->13124 13125 404310 13124->13125 13126 4043d0 2 API calls 13125->13126 13127 404329 13126->13127 13128 4043d0 2 API calls 13127->13128 13129 404342 13128->13129 13130 4043d0 2 API calls 13129->13130 13131 40435b 13130->13131 13132 4043d0 2 API calls 13131->13132 13133 404374 13132->13133 13134 4043d0 2 API calls 13133->13134 13135 40438d 13134->13135 13136 4043d0 2 API calls 13135->13136 13137 4043a6 13136->13137 13138 4043d0 2 API calls 13137->13138 13139 4043bf 13138->13139 13139->12459 13141 404579 13140->13141 13343 404490 13141->13343 13143 404585 ctype 13143->12461 13145 410ae4 13144->13145 13146 410b07 strtok_s 13145->13146 13149 410b14 13146->13149 13147 410cac 13147->12463 13148 410c88 strtok_s 13148->13149 13149->13147 13149->13148 13151 405649 13150->13151 13152 404490 malloc 13151->13152 13154 405655 13152->13154 13153 405be7 ctype 13153->12465 13154->13153 13155 405b8b memcpy 13154->13155 13156 405ba4 13155->13156 13157 405bc4 memcpy 13156->13157 13157->13153 13354 4188f0 13158->13354 13160 4103b7 strtok_s 13163 4103c4 13160->13163 13161 41046d strtok_s 13161->13163 13162 410491 13162->12467 13163->13161 13163->13162 13355 4188f0 13164->13355 13166 4100f7 strtok_s 13169 410104 13166->13169 13167 410257 13167->12471 13168 410233 strtok_s 13168->13169 13169->13167 13169->13168 13356 4188f0 13170->13356 13172 4102a7 strtok_s 13173 4102b4 13172->13173 13174 410384 13173->13174 13175 410360 strtok_s 13173->13175 13174->12475 13175->13173 13177 410d06 13176->13177 13178 415720 GetUserNameA 13177->13178 13179 410ff4 13178->13179 13180 4157b0 GetComputerNameA 13179->13180 13181 41106e 13180->13181 13357 404de0 13181->13357 13183 411976 13183->12477 13367 4092d0 13184->13367 13186 40fe23 13187 4100a4 13186->13187 13190 40fe44 13186->13190 13394 40f920 13187->13394 13189 4100b7 13189->12479 13195 40feec 13190->13195 13370 40f210 13190->13370 13192 410099 13192->12479 13193 40fff6 13193->13192 13386 40f720 13193->13386 13195->13193 13378 40f460 13195->13378 13537 4188f0 13197->13537 13199 4104d7 strtok_s 13202 4104e4 13199->13202 13200 4105f0 13200->12483 13201 4105cc strtok_s 13201->13202 13202->13200 13202->13201 13208 401dbf 13203->13208 13204 401e4e 13542 4012d0 memset 13204->13542 13206 401e61 13206->12485 13208->13204 13538 401600 13208->13538 13548 4188f0 13209->13548 13211 410646 strtok_s 13214 41067b ctype 13211->13214 13212 410a92 13212->12489 13213 410a5f strtok_s 13213->13214 13214->13212 13214->13213 13217 412aaf 13215->13217 13216 412aef 13216->12491 13217->13216 13549 412990 13217->13549 13220 412dba ctype 13219->13220 13562 412b70 13220->13562 13222 412e42 13223 412b70 4 API calls 13222->13223 13224 412e66 13223->13224 13225 412b70 4 API calls 13224->13225 13226 412e8a 13225->13226 13227 412b70 4 API calls 13226->13227 13228 412eae 13227->13228 13229 412b70 4 API calls 13228->13229 13230 412ed2 13229->13230 13231 412b70 4 API calls 13230->13231 13232 412ef6 ctype 13231->13232 13232->12496 13234 413cf3 13233->13234 13566 415220 13234->13566 13236 413cf8 13237 404de0 4 API calls 13236->13237 13238 413d40 13237->13238 13238->12492 13240 4133fa ctype 13239->13240 13242 41350c ctype 13240->13242 13729 4131e0 13240->13729 13242->12495 13244 4137ea ctype 13243->13244 13741 413560 13244->13741 13246 41385a 13247 413560 4 API calls 13246->13247 13248 413889 13247->13248 13249 413560 4 API calls 13248->13249 13250 4138b9 13249->13250 13251 413560 4 API calls 13250->13251 13252 4138e8 13251->13252 13253 413560 4 API calls 13252->13253 13254 413918 13253->13254 13255 413560 4 API calls 13254->13255 13256 413947 ctype 13255->13256 13256->12498 13258 41399e 13257->13258 13259 413560 4 API calls 13258->13259 13260 4139fc memset 13259->13260 13261 413a24 13260->13261 13262 413560 4 API calls 13261->13262 13263 413a82 memset 13262->13263 13264 413aaa 13263->13264 13265 413560 4 API calls 13264->13265 13266 413b08 memset 13265->13266 13267 413b2a 13266->13267 13267->12499 13269 413b4a ctype 13268->13269 13270 413560 4 API calls 13269->13270 13271 413be0 13270->13271 13272 413560 4 API calls 13271->13272 13273 413c0f ctype 13272->13273 13273->12502 13275 40711d ctype 13274->13275 13746 406fd0 13275->13746 13278 406fd0 79 API calls 13279 40769f 13278->13279 13280 406fd0 79 API calls 13279->13280 13281 4076ae 13280->13281 13282 406fd0 79 API calls 13281->13282 13283 4076bd 13282->13283 13284 406fd0 79 API calls 13283->13284 13285 4076cc 13284->13285 13286 406fd0 79 API calls 13285->13286 13287 4076db 13286->13287 13288 406fd0 79 API calls 13287->13288 13289 4076ea 13288->13289 13290 406fd0 79 API calls 13289->13290 13291 4076f9 13290->13291 13292 406fd0 79 API calls 13291->13292 13293 407708 13292->13293 13294 406fd0 79 API calls 13293->13294 13295 407717 13294->13295 13296 406fd0 79 API calls 13295->13296 13297 407726 13296->13297 13298 406fd0 79 API calls 13297->13298 13299 407735 13298->13299 13300 406fd0 79 API calls 13299->13300 13301 407744 13300->13301 13302 406fd0 79 API calls 13301->13302 13303 407753 13302->13303 13304 406fd0 79 API calls 13303->13304 13305 407762 13304->13305 13306 406fd0 79 API calls 13305->13306 13307 407771 13306->13307 13308 406fd0 79 API calls 13307->13308 13309 407780 13308->13309 13310 406fd0 79 API calls 13309->13310 13311 40778f 13310->13311 13312 406fd0 79 API calls 13311->13312 13313 40779e 13312->13313 13314 406fd0 79 API calls 13313->13314 13315 4077ad 13314->13315 13316 406fd0 79 API calls 13315->13316 13317 4077bc 13316->13317 13318 406fd0 79 API calls 13317->13318 13319 4077cb 13318->13319 13320 406fd0 79 API calls 13319->13320 13321 4077da 13320->13321 13322 406fd0 79 API calls 13321->13322 13323 4077e9 ctype 13322->13323 13324 404de0 4 API calls 13323->13324 13325 407874 ctype 13323->13325 13324->13325 13325->12505 13327 413c4a ctype 13326->13327 13328 413560 4 API calls 13327->13328 13329 413cba ctype 13328->13329 13329->12507 13332 416f37 ctype 13330->13332 13331 416f5d 13331->12509 13332->13331 13926 416e40 13332->13926 13334 417050 13334->13331 13335 404de0 4 API calls 13334->13335 13335->13331 13932 4188f0 13336->13932 13338 412357 strtok_s 13341 412371 13338->13341 13339 412445 strtok_s 13339->13341 13340 412469 13340->12513 13341->13339 13341->13340 13933 411f80 13341->13933 13344 4044a6 13343->13344 13351 416800 malloc 13344->13351 13346 4044cf 13352 416800 malloc 13346->13352 13348 4044e5 13353 416800 malloc 13348->13353 13350 4044fb 13350->13143 13351->13346 13352->13348 13353->13350 13354->13160 13355->13166 13356->13172 13358 404df9 13357->13358 13359 404490 malloc 13358->13359 13360 404e05 13359->13360 13361 40545b memcpy 13360->13361 13366 4054e1 ctype 13360->13366 13362 40547c 13361->13362 13363 405483 memcpy 13362->13363 13364 40549b 13363->13364 13365 4054bb memcpy 13364->13365 13365->13366 13366->13183 13405 409280 13367->13405 13369 4092e1 13369->13186 13371 40f226 13370->13371 13372 40f340 13371->13372 13409 4096e0 13371->13409 13413 40b630 13372->13413 13375 40f3a1 13424 40e380 13375->13424 13377 40f407 13377->13195 13379 40f476 13378->13379 13380 40f5f7 13379->13380 13381 4096e0 memcmp 13379->13381 13382 40b630 8 API calls 13380->13382 13381->13380 13383 40f658 13382->13383 13384 40e380 4 API calls 13383->13384 13385 40f6c7 13384->13385 13385->13193 13387 40f736 13386->13387 13389 40f8e6 13387->13389 13463 4119a0 13387->13463 13389->13192 13390 40f817 13390->13389 13477 40d1f0 13390->13477 13392 40f876 13485 40ede0 13392->13485 13395 40f936 13394->13395 13396 40f9df strtok_s 13395->13396 13397 40fdb8 13395->13397 13404 40fa04 13396->13404 13397->13189 13398 40fd5a 13400 404de0 4 API calls 13398->13400 13399 4167b0 malloc strncpy 13399->13404 13401 40fd91 13400->13401 13402 40fd9f memset 13401->13402 13402->13397 13403 40fd3f strtok_s 13403->13404 13404->13398 13404->13399 13404->13403 13408 416800 malloc 13405->13408 13407 40928d ctype 13407->13369 13408->13407 13411 409703 13409->13411 13410 4097a1 13410->13372 13411->13410 13412 409789 memcmp 13411->13412 13412->13410 13421 40b646 13413->13421 13414 40b6c4 13414->13375 13416 40a050 8 API calls 13416->13421 13417 40b630 8 API calls 13417->13421 13419 404de0 4 API calls 13419->13421 13421->13414 13421->13416 13421->13417 13421->13419 13428 409b50 13421->13428 13434 40a700 13421->13434 13438 40ad00 13421->13438 13444 40b270 13421->13444 13450 40aa40 13421->13450 13425 40e38f 13424->13425 13426 40e434 13425->13426 13459 40db90 13425->13459 13426->13377 13433 409b66 13428->13433 13429 409f81 13431 404de0 4 API calls 13429->13431 13430 409fc2 13430->13421 13431->13430 13433->13429 13433->13430 13454 409810 13433->13454 13437 40a716 13434->13437 13435 404de0 4 API calls 13436 40a9c6 13435->13436 13436->13421 13437->13435 13437->13436 13439 40ad16 13438->13439 13440 40b1fc 13439->13440 13441 40b1a7 13439->13441 13443 409810 2 API calls 13439->13443 13440->13421 13441->13440 13442 404de0 4 API calls 13441->13442 13442->13440 13443->13439 13449 40b286 13444->13449 13445 409810 2 API calls 13445->13449 13446 40b56a 13447 404de0 4 API calls 13446->13447 13448 40b5bf 13446->13448 13447->13448 13448->13421 13449->13445 13449->13446 13449->13448 13451 40aa56 13450->13451 13452 40ac8a 13451->13452 13453 404de0 4 API calls 13451->13453 13452->13421 13453->13452 13455 409820 memcmp 13454->13455 13458 4098b4 13454->13458 13456 40983c 13455->13456 13455->13458 13457 409856 memset 13456->13457 13456->13458 13457->13458 13458->13433 13461 40dbad 13459->13461 13460 40dc11 13460->13425 13461->13460 13462 40d570 memcpy memcpy memcpy malloc 13461->13462 13462->13461 13464 4119b6 13463->13464 13476 411f0d 13463->13476 13491 405d60 13464->13491 13466 411e53 13467 405d60 malloc 13466->13467 13468 411e7a 13467->13468 13469 405d60 malloc 13468->13469 13470 411e9e 13469->13470 13471 405d60 malloc 13470->13471 13472 411ec5 13471->13472 13473 405d60 malloc 13472->13473 13474 411ee9 13473->13474 13475 405d60 malloc 13474->13475 13475->13476 13476->13390 13481 40d206 13477->13481 13478 40d26a 13478->13392 13481->13478 13484 40d1f0 7 API calls 13481->13484 13495 40c670 13481->13495 13501 40cb80 13481->13501 13505 40c130 13481->13505 13513 40cef0 13481->13513 13484->13481 13489 40edf6 13485->13489 13486 40ee5a 13486->13389 13487 40ede0 5 API calls 13487->13489 13489->13486 13489->13487 13518 4173e0 13489->13518 13522 40ebd0 13489->13522 13492 405d79 13491->13492 13493 404490 malloc 13492->13493 13494 405d85 ctype 13493->13494 13494->13466 13497 40c686 13495->13497 13496 40cafa memset 13498 40cb0b 13496->13498 13497->13496 13497->13498 13499 404de0 4 API calls 13497->13499 13498->13481 13500 40caec 13499->13500 13500->13496 13504 40cb96 13501->13504 13502 40ce64 13502->13481 13503 404de0 4 API calls 13503->13502 13504->13502 13504->13503 13507 40c141 13505->13507 13506 40c60f 13506->13481 13507->13506 13517 416800 malloc 13507->13517 13509 40c5ce 13510 404de0 4 API calls 13509->13510 13510->13506 13511 40c254 13511->13509 13512 40bfc0 memset memcpy 13511->13512 13512->13511 13515 40cf06 13513->13515 13514 40d15b 13514->13481 13515->13514 13516 404de0 4 API calls 13515->13516 13516->13514 13517->13511 13526 41b700 13518->13526 13521 417413 13521->13489 13524 40ebef 13522->13524 13523 40ed80 13523->13489 13524->13523 13528 40ea30 13524->13528 13527 4173ed memset 13526->13527 13527->13521 13529 40ea43 13528->13529 13531 40eb69 13529->13531 13532 40e450 13529->13532 13531->13523 13534 40e461 13532->13534 13533 40e49a 13533->13531 13534->13533 13535 404de0 4 API calls 13534->13535 13536 40e450 4 API calls 13534->13536 13535->13534 13536->13534 13537->13199 13540 401616 ctype 13538->13540 13539 401862 13539->13208 13540->13539 13541 404de0 4 API calls 13540->13541 13541->13540 13544 401304 13542->13544 13543 4014e4 13543->13206 13544->13543 13545 404de0 4 API calls 13544->13545 13546 40148f 13544->13546 13545->13546 13547 4014c5 memset 13546->13547 13547->13543 13548->13211 13556 4188f0 13549->13556 13551 4129a7 strtok_s 13552 4129bb 13551->13552 13553 412a1a ctype 13552->13553 13555 412a2c strtok_s 13552->13555 13557 412630 13552->13557 13553->13217 13555->13552 13556->13551 13560 41264f __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z ctype 13557->13560 13558 412686 13558->13552 13559 412630 4 API calls 13559->13560 13560->13558 13560->13559 13561 404de0 4 API calls 13560->13561 13561->13560 13563 412b93 ctype 13562->13563 13564 412bb9 ctype 13563->13564 13565 404de0 4 API calls 13563->13565 13564->13222 13565->13563 13567 41522e 13566->13567 13570 415000 ??_U@YAPAXI 13567->13570 13569 41523d 13569->13236 13585 418560 13570->13585 13572 415041 OpenProcess 13581 415078 allocator 13572->13581 13584 41505b 13572->13584 13573 415085 memset 13587 414e30 strlen ??_U@YAPAXI 13573->13587 13574 4151de ??_V@YAXPAX 13574->13584 13576 415109 ReadProcessMemory 13576->13581 13577 4150f5 13577->13574 13580 407a60 memcpy codecvt 13580->13581 13581->13573 13581->13574 13581->13576 13581->13577 13581->13580 13582 4151a5 13581->13582 13594 415250 13581->13594 13600 414a90 13581->13600 13614 407a60 13582->13614 13584->13569 13586 418570 13585->13586 13586->13572 13617 414b00 strlen 13587->13617 13589 414eb4 VirtualQueryEx 13590 414fd9 ??_V@YAXPAX 13589->13590 13591 414e9c 13589->13591 13593 414f38 13590->13593 13591->13589 13592 414d10 ReadProcessMemory 13591->13592 13591->13593 13592->13591 13593->13581 13595 415261 allocator 13594->13595 13621 407c90 13595->13621 13597 415275 13625 407c60 13597->13625 13601 415250 76 API calls 13600->13601 13602 414aa3 13601->13602 13704 4152d0 13602->13704 13605 414abf 13708 415300 13605->13708 13606 414ade 13712 408f40 13606->13712 13611 407a60 codecvt memcpy 13613 414ad9 13611->13613 13612 407a60 codecvt memcpy 13612->13613 13613->13581 13615 407c90 codecvt memcpy 13614->13615 13616 407a73 task 13615->13616 13616->13584 13618 414b31 strlen 13617->13618 13619 414c90 13618->13619 13620 414b47 13618->13620 13619->13591 13620->13618 13622 407ca3 13621->13622 13623 407ca1 codecvt task 13621->13623 13622->13623 13630 406be0 memcpy 13622->13630 13623->13597 13631 406bc0 strlen 13625->13631 13627 407c70 13632 407ff0 13627->13632 13629 407c80 13629->13581 13630->13623 13631->13627 13633 408003 13632->13633 13634 40802a 13633->13634 13635 40800a allocator 13633->13635 13654 4086d0 13634->13654 13641 408610 13635->13641 13638 408028 codecvt 13638->13629 13639 408038 allocator 13639->13638 13663 406be0 memcpy 13639->13663 13642 408621 allocator 13641->13642 13644 40862e allocator 13642->13644 13664 4080e0 13642->13664 13645 408652 13644->13645 13646 408677 13644->13646 13667 408940 13645->13667 13648 4086d0 allocator 74 API calls 13646->13648 13652 408685 allocator 13648->13652 13649 408667 13651 408940 allocator 73 API calls 13649->13651 13650 408675 codecvt 13650->13638 13651->13650 13652->13650 13673 406be0 memcpy 13652->13673 13655 4086e1 allocator 13654->13655 13656 4086ee 13655->13656 13682 4087b0 13655->13682 13658 4086f9 13656->13658 13661 40870e 13656->13661 13685 408a10 13658->13685 13660 40870c codecvt 13660->13639 13661->13660 13662 407c90 codecvt memcpy 13661->13662 13662->13660 13663->13638 13674 41b800 13664->13674 13668 408954 13667->13668 13670 40895c allocator 13667->13670 13669 4080e0 allocator 72 API calls 13668->13669 13669->13670 13672 4089a9 codecvt 13670->13672 13681 406c00 memmove 13670->13681 13672->13649 13673->13650 13675 418983 std::exception::exception strlen malloc strcpy_s 13674->13675 13676 41b81a 13675->13676 13677 41b874 __CxxThrowException@8 RaiseException 13676->13677 13678 41b82f 13677->13678 13679 418a11 std::exception::exception 71 API calls 13678->13679 13680 4080f1 13679->13680 13680->13644 13681->13672 13693 41b7b3 13682->13693 13686 408a46 allocator 13685->13686 13700 408bd0 13686->13700 13688 408b40 13690 407c90 codecvt memcpy 13688->13690 13689 408abe allocator 13689->13688 13703 406be0 memcpy 13689->13703 13691 408b4f codecvt 13690->13691 13691->13660 13694 418983 std::exception::exception strlen malloc strcpy_s 13693->13694 13695 41b7cd 13694->13695 13696 41b874 __CxxThrowException@8 RaiseException 13695->13696 13697 41b7e2 13696->13697 13698 418a11 std::exception::exception 71 API calls 13697->13698 13699 4087c1 13698->13699 13699->13656 13701 408de0 allocator 5 API calls 13700->13701 13702 408be2 13701->13702 13702->13689 13703->13688 13705 4152df allocator 13704->13705 13718 415390 13705->13718 13707 414ab1 13707->13605 13707->13606 13709 415315 13708->13709 13723 415340 13709->13723 13713 408f58 allocator 13712->13713 13714 407c90 codecvt memcpy 13713->13714 13715 408f6c 13714->13715 13716 408610 allocator 75 API calls 13715->13716 13717 408f7c 13716->13717 13717->13611 13720 4153a4 allocator 13718->13720 13721 4153ee allocator 13718->13721 13720->13721 13722 414a70 memchr 13720->13722 13721->13707 13722->13720 13724 415355 allocator 13723->13724 13725 407c90 codecvt memcpy 13724->13725 13726 415369 13725->13726 13727 408610 allocator 75 API calls 13726->13727 13728 414ad1 13727->13728 13728->13612 13730 4131f6 13729->13730 13732 4132fd ctype 13730->13732 13733 41323f ctype 13730->13733 13735 412f20 memset memset 13730->13735 13732->13733 13734 404de0 4 API calls 13732->13734 13733->13242 13734->13733 13736 412f7a 13735->13736 13737 4096e0 memcmp 13736->13737 13740 413108 ctype 13736->13740 13738 41302d ctype 13737->13738 13739 409810 2 API calls 13738->13739 13738->13740 13739->13740 13740->13730 13744 41357f ctype 13741->13744 13742 4135a5 13742->13246 13743 413560 4 API calls 13743->13744 13744->13742 13744->13743 13745 404de0 4 API calls 13744->13745 13745->13744 13751 406cd0 13746->13751 13749 407100 13749->13278 13750 406feb 13766 407b20 13750->13766 13752 406cdd 13751->13752 13753 406cee memset 13752->13753 13765 406d40 13753->13765 13754 406f40 13791 407ae0 13754->13791 13757 407b20 task memcpy 13758 406f5a 13757->13758 13758->13750 13760 407a80 76 API calls 13760->13765 13764 408c20 strcpy_s 13764->13765 13765->13754 13765->13760 13765->13764 13769 406f70 13765->13769 13774 408c40 vsprintf_s 13765->13774 13775 407b60 13765->13775 13786 406fa0 13765->13786 13767 407f00 task memcpy 13766->13767 13768 407b2f task 13767->13768 13768->13749 13795 407a30 13769->13795 13772 407a30 memcpy 13773 406f8d 13772->13773 13773->13765 13774->13765 13776 407b72 construct 13775->13776 13777 407c02 13776->13777 13778 407b85 construct 13776->13778 13779 407e90 75 API calls 13777->13779 13780 407c1a 13777->13780 13781 407bb9 13778->13781 13799 407e90 13778->13799 13779->13780 13810 408c70 13780->13810 13806 408cb0 13781->13806 13784 407bee 13784->13765 13787 407a60 codecvt memcpy 13786->13787 13788 406fb2 13787->13788 13789 407a60 codecvt memcpy 13788->13789 13790 406fbd 13789->13790 13790->13765 13792 407af8 construct allocator 13791->13792 13884 407d60 13792->13884 13794 406f4f 13794->13757 13796 407a41 allocator 13795->13796 13797 407c90 codecvt memcpy 13796->13797 13798 406f82 13797->13798 13798->13772 13800 407ea1 13799->13800 13801 407eb4 13800->13801 13804 407ebe 13800->13804 13814 408530 13801->13814 13803 407ebc 13803->13781 13804->13803 13817 408220 13804->13817 13807 408cbc construct 13806->13807 13868 408e90 13807->13868 13811 408c7c construct 13810->13811 13877 408e70 13811->13877 13815 41b7b3 std::_Xinvalid_argument 72 API calls 13814->13815 13816 408541 13815->13816 13816->13803 13818 40824d 13817->13818 13819 408252 13818->13819 13821 40825f 13818->13821 13820 408530 72 API calls 13819->13820 13826 40825a task 13820->13826 13821->13826 13828 408860 13821->13828 13825 4082a2 13825->13826 13834 4084a0 13825->13834 13826->13803 13837 408d80 13828->13837 13831 408cd0 13852 408fb0 13831->13852 13860 408d00 13834->13860 13838 40827f 13837->13838 13839 408d9c 13837->13839 13838->13831 13840 408db1 13839->13840 13845 416800 malloc 13839->13845 13840->13838 13846 406b30 13840->13846 13845->13840 13847 418983 std::exception::exception strlen malloc strcpy_s 13846->13847 13848 406b43 13847->13848 13849 41b874 13848->13849 13850 41b8a9 RaiseException 13849->13850 13851 41b89d 13849->13851 13850->13838 13851->13850 13853 408fc1 _Copy_impl 13852->13853 13856 409140 13853->13856 13857 40916f 13856->13857 13858 408cef 13857->13858 13859 408cb0 construct 75 API calls 13857->13859 13858->13825 13859->13857 13861 408d11 _Copy_impl 13860->13861 13864 409010 13861->13864 13865 409015 13864->13865 13866 4084bb 13865->13866 13867 409200 task memcpy 13865->13867 13866->13826 13867->13865 13869 408ea4 construct allocator 13868->13869 13870 408ccc 13869->13870 13872 408ee0 13869->13872 13870->13784 13873 408f40 allocator 75 API calls 13872->13873 13874 408f03 13873->13874 13875 408f40 allocator 75 API calls 13874->13875 13876 408f15 13875->13876 13876->13870 13880 409080 13877->13880 13881 409097 construct allocator 13880->13881 13882 408ee0 allocator 75 API calls 13881->13882 13883 408c8c 13881->13883 13882->13883 13883->13784 13885 407d76 13884->13885 13890 407d71 std::error_category::default_error_condition 13884->13890 13886 407df7 13885->13886 13887 407d9f 13885->13887 13908 407f00 13886->13908 13893 408450 13887->13893 13890->13794 13891 407da7 construct 13891->13890 13897 408100 13891->13897 13894 408465 13893->13894 13912 4087d0 13894->13912 13898 408112 construct 13897->13898 13899 4081af 13898->13899 13901 408129 construct 13898->13901 13900 407e90 75 API calls 13899->13900 13903 4081c7 construct 13899->13903 13900->13903 13902 407e90 75 API calls 13901->13902 13905 40815d construct 13901->13905 13902->13905 13904 408cb0 construct 75 API calls 13903->13904 13907 40819b 13904->13907 13906 408cb0 construct 75 API calls 13905->13906 13906->13907 13907->13891 13909 407f2c task 13908->13909 13910 407f0f task 13908->13910 13909->13890 13911 4084a0 task memcpy 13910->13911 13911->13909 13913 4087e9 std::error_category::default_error_condition 13912->13913 13914 40848f 13913->13914 13918 408d40 13913->13918 13914->13891 13917 4084a0 task memcpy 13917->13914 13919 408d51 _Copy_impl 13918->13919 13922 409040 13919->13922 13924 409045 construct 13922->13924 13923 408820 13923->13917 13924->13923 13925 4090d0 _Copy_impl 75 API calls 13924->13925 13925->13924 13927 416e69 13926->13927 13928 416e77 malloc 13927->13928 13929 416e6f 13927->13929 13928->13929 13930 416e95 13928->13930 13929->13334 13930->13929 13931 416edd memset 13930->13931 13931->13929 13932->13338 13934 411f96 13933->13934 13935 405d60 malloc 13934->13935 13936 41227c 13935->13936 13936->13341 13937 414a23 13941 4149e1 13937->13941 13938 414850 ExitProcess 13939 414a41 13938->13939 13940 413d60 141 API calls 13939->13940 13942 414a46 13940->13942 13941->13938 12314 401150 12319 4157b0 12314->12319 12316 40115e 12318 401177 12316->12318 12323 415720 12316->12323 12320 4157e6 GetComputerNameA 12319->12320 12322 415809 12320->12322 12322->12316 12324 415756 GetUserNameA 12323->12324 12326 415793 12324->12326 12326->12318

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 146 415720-4157a3 GetUserNameA
                        APIs
                        • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041576F
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: NameUser
                        • String ID:
                        • API String ID: 2645101109-0
                        • Opcode ID: ff341ca2485ce75d8ca8b4895e1ba19bee9f4f2c9a5c364ee356505f83e2034c
                        • Instruction ID: fb0e6887b18507a8360df8850ef64887ceecd31fd32c6e2cb66bf59abcbf9730
                        • Opcode Fuzzy Hash: ff341ca2485ce75d8ca8b4895e1ba19bee9f4f2c9a5c364ee356505f83e2034c
                        • Instruction Fuzzy Hash: E2F04FB1944608EBCB10DF98DD46BAEBBB8FB08721F10021AF615A2680C77415448BE1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 156 401120-40113a GetSystemInfo 157 401144-401147 156->157 158 40113c 156->158 158->157
                        APIs
                        • GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,00414947,0041E4C7), ref: 0040112A
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: InfoSystem
                        • String ID:
                        • API String ID: 31276548-0
                        • Opcode ID: a7c4ad7a45245c78411457a8aae732031052a62564fa7a9854ab3dd0ef33967d
                        • Instruction ID: 5654751876d9203a98455e97ebb2cdec33529a1649c917b0838c613bd50292a7
                        • Opcode Fuzzy Hash: a7c4ad7a45245c78411457a8aae732031052a62564fa7a9854ab3dd0ef33967d
                        • Instruction Fuzzy Hash: 9AD05E7490160CDBCB24EFE09A496DDBB79AB0C711F001455DD0672240D6305441CA65

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 4011e0-401207 call 4168a0 GlobalMemoryStatusEx 3 401233-40123a 0->3 4 401209-401231 call 41b8d0 * 2 0->4 6 401241-401245 3->6 4->6 8 401247 6->8 9 40125a-40125d 6->9 11 401252 8->11 12 401249-401250 8->12 11->9 12->9 12->11
                        APIs
                        • GlobalMemoryStatusEx.KERNELBASE(00000040,?,00000000,00000040), ref: 004011FE
                        • __aulldiv.LIBCMT ref: 00401218
                        • __aulldiv.LIBCMT ref: 00401226
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: __aulldiv$GlobalMemoryStatus
                        • String ID: @
                        • API String ID: 2185283323-2766056989
                        • Opcode ID: 721940bddceabd09e7a22a1874063ddbad559e8aadbfb121420a8f9c72e410a4
                        • Instruction ID: 790ec4d6eeec2f0dc411d0ded6d90965183085be92245a2b05edb6ec41bb63a3
                        • Opcode Fuzzy Hash: 721940bddceabd09e7a22a1874063ddbad559e8aadbfb121420a8f9c72e410a4
                        • Instruction Fuzzy Hash: 0601FFB0D40208FBDB10EBD0CD4AB9EB778AF54705F24405AE605B61D0D77855458B59

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 14 4176e0-4176f4 call 4175d0 17 417913-417972 LoadLibraryA * 2 14->17 18 4176fa-41790e call 417600 14->18 26 417974-417988 17->26 27 41798d-417994 17->27 18->17 26->27 28 4179c6-4179cd 27->28 29 417996-4179c1 27->29 32 4179e8-4179ef 28->32 33 4179cf-4179e3 28->33 29->28 34 4179f1-417a04 32->34 35 417a09-417a10 32->35 33->32 34->35 38 417a41-417a42 35->38 39 417a12-417a3c 35->39 39->38
                        APIs
                        • LoadLibraryA.KERNELBASE(?,?,00414930), ref: 0041791A
                        • LoadLibraryA.KERNELBASE(?,?,00414930), ref: 0041794F
                        Strings
                        • NtQueryInformationProcess, xrefs: 00417A2A
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: LibraryLoad
                        • String ID: NtQueryInformationProcess
                        • API String ID: 1029625771-2781105232
                        • Opcode ID: edc41c486c73209fe29b0a49e24866dd51b81ab44828690f739836faedfb6f2e
                        • Instruction ID: ea941fe70d333bd79c2ba667982baca8a39bee8649eabf8ef2794d8e25bdaf96
                        • Opcode Fuzzy Hash: edc41c486c73209fe29b0a49e24866dd51b81ab44828690f739836faedfb6f2e
                        • Instruction Fuzzy Hash: 8BA14FB5910E00AFC375DFA8FE88A1637BBBB4C3217106519B60BC72A0D7759482DF55

                        Control-flow Graph

                        APIs
                          • Part of subcall function 00401120: GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,00414947,0041E4C7), ref: 0040112A
                          • Part of subcall function 004010D0: VirtualAllocExNuma.KERNELBASE(00000000,?,?,0041494C), ref: 004010F2
                          • Part of subcall function 004011E0: GlobalMemoryStatusEx.KERNELBASE(00000040,?,00000000,00000040), ref: 004011FE
                          • Part of subcall function 004011E0: __aulldiv.LIBCMT ref: 00401218
                          • Part of subcall function 004011E0: __aulldiv.LIBCMT ref: 00401226
                        • GetUserDefaultLangID.KERNELBASE ref: 00414956
                          • Part of subcall function 00415720: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041576F
                          • Part of subcall function 004157B0: GetComputerNameA.KERNEL32(?,00000104), ref: 004157FF
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: NameUser__aulldiv$AllocComputerDefaultGlobalInfoLangMemoryNumaStatusSystemVirtual
                        • String ID:
                        • API String ID: 736289943-0
                        • Opcode ID: 4f7ef2c71eb91229e7ae373baf6c6d29b9fb87ff9e34d6da5537cebc80361348
                        • Instruction ID: c38b05ecb25792c20249c5c89c2b60808eb8a299d8fab61a246423dbd112778e
                        • Opcode Fuzzy Hash: 4f7ef2c71eb91229e7ae373baf6c6d29b9fb87ff9e34d6da5537cebc80361348
                        • Instruction Fuzzy Hash: AD315C71940208AACB14FBF2DC56BEE733AAF58348F50411EF112661D2DF785A818B6D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 125 414850-4148fc call 414750 call 4188f0 call 418620 136 414910-414913 125->136 137 4148fe 125->137 138 414900-414906 137->138 139 414908-41490a ExitProcess 137->139 138->136 138->139
                        APIs
                        • ExitProcess.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,0041E988,?), ref: 0041490A
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: f5e36cd12a51ae680a947cead6980d9d7f72cef3edb0b117d6f6898e0a85ae73
                        • Instruction ID: 0a1651ad7484662879aa6b78d62b143174ee3cb6ee1315efa2ac3206c72aa24e
                        • Opcode Fuzzy Hash: f5e36cd12a51ae680a947cead6980d9d7f72cef3edb0b117d6f6898e0a85ae73
                        • Instruction Fuzzy Hash: 5121FAB5D10209ABCF14EFE4E945AEEB7BABF4C300F04852EE516E3250EB345604CB69

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 140 4157b0-415807 GetComputerNameA 143 415812-415815 140->143 144 415809-41580e 140->144 145 415832-415842 143->145 144->145
                        APIs
                        • GetComputerNameA.KERNEL32(?,00000104), ref: 004157FF
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: ComputerName
                        • String ID:
                        • API String ID: 3545744682-0
                        • Opcode ID: 427ee067d7557a8dd958476cf6c683832bbce3556a3e299bf2a0a6b1e8b6a2fc
                        • Instruction ID: 6cf1fd53c786beb2c1615a04a07a3920453c59c76323e89f420815a02362f81b
                        • Opcode Fuzzy Hash: 427ee067d7557a8dd958476cf6c683832bbce3556a3e299bf2a0a6b1e8b6a2fc
                        • Instruction Fuzzy Hash: F60186B1E44608EBC720DF95DE45BEABBB8FB44751F10011AFA06E3290C3795941CBA5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 150 4010d0-4010ff VirtualAllocExNuma 152 401101 150->152 153 401109-401111 call 401060 150->153 152->153
                        APIs
                        • VirtualAllocExNuma.KERNELBASE(00000000,?,?,0041494C), ref: 004010F2
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocNumaVirtual
                        • String ID:
                        • API String ID: 4233825816-0
                        • Opcode ID: f6278b5c68f5ffb6a33ba1ea485b1aac214440932dca370ae1e3c865b0252ec4
                        • Instruction ID: 6ed2ff167a0b6f4e171b06faf37e7030b09d9d956d5a446bdb7a3213d1831e4b
                        • Opcode Fuzzy Hash: f6278b5c68f5ffb6a33ba1ea485b1aac214440932dca370ae1e3c865b0252ec4
                        • Instruction Fuzzy Hash: 6AE0867098530CFBEB20ABA0DE0EB0976689B08B06F101055F7097A1D0C6B429009A59

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 159 401060-401080 VirtualAlloc 160 401082-401085 159->160 161 401087-40108f 159->161 160->161 162 401091-4010b6 call 416880 161->162 163 4010bd-4010c1 161->163 162->163
                        APIs
                        • VirtualAlloc.KERNELBASE(00000000,17C841C0,00003000,00000004,?,?,?,0040110E,?,?,0041494C), ref: 00401073
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: ea4f8485ffce1a6c69b8ae5c9f82f2fa57c2f46f4f54c1ff86e01909371c657e
                        • Instruction ID: d6f10d961bdd3346436d2f5e9e7134fa9a4a54fa336e7859eb55749a310f2e10
                        • Opcode Fuzzy Hash: ea4f8485ffce1a6c69b8ae5c9f82f2fa57c2f46f4f54c1ff86e01909371c657e
                        • Instruction Fuzzy Hash: 19F027B1681208BBE7249AB4AC49FAFF39CA705B04F304559F985E3390D6719F00CAA4
                        APIs
                        • IsDebuggerPresent.KERNEL32 ref: 0041A666
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041A67B
                        • UnhandledExceptionFilter.KERNEL32(0041D690), ref: 0041A686
                        • GetCurrentProcess.KERNEL32(C0000409), ref: 0041A6A2
                        • TerminateProcess.KERNEL32(00000000), ref: 0041A6A9
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                        • String ID:
                        • API String ID: 2579439406-0
                        • Opcode ID: 6bf7682afb6d8dbebff2f52ede0b53c16104900d82106410403a613429f015c3
                        • Instruction ID: 3bf40617ca31318f22f05e73492665b9c2615933019aa7c646c7410b41e430ec
                        • Opcode Fuzzy Hash: 6bf7682afb6d8dbebff2f52ede0b53c16104900d82106410403a613429f015c3
                        • Instruction Fuzzy Hash: B321CFB4A11A04EFC720EF65FD847947BA5FB0C319BD0803AE40887264E7B45AC28F5D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 817 41ad4a-41ad55 818 41ad5b-41b0bb call 418a67 * 86 817->818 819 41b0be-41b0c0 817->819 818->819
                        APIs
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 55745e4d8ffa3bcd4bae6bd50e23aa08e34946fc70669168e917a1c48e4fa5ed
                        • Instruction ID: bd53e233f0d03b40c249cc71735c843a5be27039ca8159180e4194d4a002c6fe
                        • Opcode Fuzzy Hash: 55745e4d8ffa3bcd4bae6bd50e23aa08e34946fc70669168e917a1c48e4fa5ed
                        • Instruction Fuzzy Hash: 7F71D631431B00DFD7627B32ED03ADA7EA27F04384F304A1FB1D620536AE266AE59759

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1079 40f920-40f9bc call 418560 call 416cf0 call 418740 call 4186c0 call 418620 * 2 call 4187d0 call 4186c0 call 418620 call 4185c0 call 4093c0 1102 40fdf0-40fe03 call 418620 call 401500 1079->1102 1103 40f9c2-40f9d9 call 416d40 1079->1103 1103->1102 1108 40f9df-40fa3f strtok_s call 418560 * 4 1103->1108 1121 40fa42-40fa46 1108->1121 1122 40fd5a-40fdeb call 4185c0 call 401540 call 404de0 call 418620 memset call 418860 * 4 call 418620 * 4 1121->1122 1123 40fa4c-40fa5d 1121->1123 1122->1102 1126 40fa96-40faa7 1123->1126 1127 40fa5f-40fa79 1123->1127 1133 40fae0-40faf1 1126->1133 1134 40faa9-40fac3 1126->1134 1136 40fa7a call 4167b0 1127->1136 1145 40faf3-40fb0d 1133->1145 1146 40fb2a-40fb3b 1133->1146 1143 40fac4 call 4167b0 1134->1143 1138 40fa7f-40fa91 call 4186c0 call 418620 1136->1138 1138->1126 1148 40fac9-40fadb call 4186c0 call 418620 1143->1148 1159 40fb0e call 4167b0 1145->1159 1156 40fb41-40fb5b 1146->1156 1157 40fbc9-40fbdb call 4188f0 1146->1157 1148->1133 1169 40fb5c call 4167b0 1156->1169 1175 40fbe1-40fbf3 call 4188f0 1157->1175 1176 40fd3f-40fd55 strtok_s 1157->1176 1163 40fb13-40fb25 call 4186c0 call 418620 1159->1163 1163->1146 1172 40fb61-40fb93 call 4186c0 call 418620 call 4188f0 call 4094c0 1169->1172 1172->1157 1199 40fb95-40fbc4 call 418640 call 4187d0 call 4186c0 call 418620 1172->1199 1175->1176 1192 40fbf9-40fc0b call 4188f0 1175->1192 1176->1121 1192->1176 1204 40fc11-40fc23 call 4188f0 1192->1204 1199->1157 1204->1176 1213 40fc29-40fd3a call 4188f0 * 4 call 418640 * 4 1204->1213 1213->1176
                        APIs
                        • strtok_s.MSVCRT ref: 0040F9EB
                        • memset.MSVCRT ref: 0040FDA7
                          • Part of subcall function 004167B0: malloc.MSVCRT ref: 004167B8
                          • Part of subcall function 004167B0: strncpy.MSVCRT ref: 004167D3
                        • strtok_s.MSVCRT ref: 0040FD49
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: strtok_s$mallocmemsetstrncpy
                        • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                        • API String ID: 2676359353-555421843
                        • Opcode ID: 6aabf572ed382ee09d367e8f8101b8ec4fe61848a25cf5ef6d5f756fff2462cb
                        • Instruction ID: 7976c24c085ce95d0d3806a1bd210927e9112773adbae4baebf1d20f2d0aea97
                        • Opcode Fuzzy Hash: 6aabf572ed382ee09d367e8f8101b8ec4fe61848a25cf5ef6d5f756fff2462cb
                        • Instruction Fuzzy Hash: C1D15075900208ABCB14FBE1DD56EEE7739AF14305F50442EF502B6191EF38AA89CB69
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: memset
                        • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$vBA
                        • API String ID: 2221118986-3203047241
                        • Opcode ID: f99a1c978ec400aed53fc4aeec21fe9dbeeaa349f41ca42d3a61e1ed00d303d6
                        • Instruction ID: c1ddf549a3185eee1cf366a17899702eaf285fd5c84bb07dd93c5e47f306484d
                        • Opcode Fuzzy Hash: f99a1c978ec400aed53fc4aeec21fe9dbeeaa349f41ca42d3a61e1ed00d303d6
                        • Instruction Fuzzy Hash: 1F41E8B9A4020867CB10FBB1DD4BFDD77399B54708F0004A9BA4A660C1FEB897D4CB99
                        APIs
                        • ??_U@YAPAXI@Z.MSVCRT ref: 0041500E
                        • OpenProcess.KERNEL32(001FFFFF,00000000,0041523D,0041E289), ref: 0041504C
                        • memset.MSVCRT ref: 0041509A
                        • ??_V@YAXPAX@Z.MSVCRT ref: 004151EE
                        Strings
                        • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 004150BC
                        • =RA, xrefs: 004151DE, 004150A9, 004150AC
                        • =RA, xrefs: 00415041
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: OpenProcessmemset
                        • String ID: 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30$=RA$=RA
                        • API String ID: 1606381396-2611623248
                        • Opcode ID: 5408a6fdec579d4e8794376ce2b54233cef3db923b30dd2742b599a838c73704
                        • Instruction ID: 3d2114f900441ae6779428b499920d18cd927d595516dea7e75ef008834ef850
                        • Opcode Fuzzy Hash: 5408a6fdec579d4e8794376ce2b54233cef3db923b30dd2742b599a838c73704
                        • Instruction Fuzzy Hash: 9B516DB0D00218DFDB24EB90DC95BEEB775AF48304F1041AEE11566281EB786AC8CF5D
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: memcpy
                        • String ID: "$"$------$------$------$BHhf
                        • API String ID: 3510742995-139268881
                        • Opcode ID: d8e6dd6a8b5d6a296bb9701e9e48709a091b0a019164f255e5a3a51bdccc2c48
                        • Instruction ID: 7bc56bd7008279cffeafecc701a892dd96ebdc034ac279f9d55c1fdb42abf425
                        • Opcode Fuzzy Hash: d8e6dd6a8b5d6a296bb9701e9e48709a091b0a019164f255e5a3a51bdccc2c48
                        • Instruction Fuzzy Hash: 6A12F071820118ABCB15EFA1DC95FEEB379BF14704F1041AEB10662091EF786A89CF69
                        APIs
                        • __getptd.LIBCMT ref: 0041A06F
                          • Part of subcall function 0041934C: __getptd_noexit.LIBCMT ref: 0041934F
                          • Part of subcall function 0041934C: __amsg_exit.LIBCMT ref: 0041935C
                        • __amsg_exit.LIBCMT ref: 0041A08F
                        • __lock.LIBCMT ref: 0041A09F
                        • InterlockedDecrement.KERNEL32(?), ref: 0041A0BC
                        • _free.LIBCMT ref: 0041A0CF
                        • InterlockedIncrement.KERNEL32(00424530), ref: 0041A0E7
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                        • String ID: 0EB
                        • API String ID: 3470314060-3472271230
                        • Opcode ID: ab0ea71207d29a33da4758858cc2f3310f2abfdd7e021ef5217a10f467ab084c
                        • Instruction ID: 76282fdaf3b8c19a36a251396487ec24a99463cd9570642b7e7b2ba8c7c514a5
                        • Opcode Fuzzy Hash: ab0ea71207d29a33da4758858cc2f3310f2abfdd7e021ef5217a10f467ab084c
                        • Instruction Fuzzy Hash: 5A018632A427119BC721EF7594497CE7F60AF08714F51401BE814A7280DB2C69D18BDE
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: %s%s$%s\%s$%s\%s$%s\%s\%s$%s\*
                        • API String ID: 0-2524465048
                        • Opcode ID: 5e0f23735c823d7341d52953dcacf576fe4b34b3c017a92124451107c7e3d789
                        • Instruction ID: cb8c73ae0fa23ec5bc4c6471165f6cae956c3bc494efd63fff728c58d7a03a5e
                        • Opcode Fuzzy Hash: 5e0f23735c823d7341d52953dcacf576fe4b34b3c017a92124451107c7e3d789
                        • Instruction Fuzzy Hash: 709192B1A00618ABDB24EBA4CD85FEE7379BF58300F04459DF50A92181EB749BC5CF65
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: memset
                        • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                        • API String ID: 2221118986-218353709
                        • Opcode ID: 5cabfe073c2fae5f2355a97b7a6f3856c3ba4f59f8fb87468531855ea9d1ec65
                        • Instruction ID: 1b332567489456fb62c760348c8647518560d1585b7d5e50cdfb220c40b478b1
                        • Opcode Fuzzy Hash: 5cabfe073c2fae5f2355a97b7a6f3856c3ba4f59f8fb87468531855ea9d1ec65
                        • Instruction Fuzzy Hash: F15151B19401189BCB25FB61DD92AED733D9F54304F4041EEB60A62091EE785BC9CF6D
                        APIs
                        • __lock.LIBCMT ref: 004193CE
                          • Part of subcall function 00418E61: __mtinitlocknum.LIBCMT ref: 00418E77
                          • Part of subcall function 00418E61: __amsg_exit.LIBCMT ref: 00418E83
                          • Part of subcall function 00418E61: EnterCriticalSection.KERNEL32(00000000,00000000,?,00419269,0000000D,?,?,00418BEF,00418A8D,?,?,00418978,00000000,00422C38,004189BF), ref: 00418E8B
                        • DecodePointer.KERNEL32(00422B40,00000020,00419511,00000000,00000001,00000000,?,00419533,000000FF,?,00418E88,00000011,00000000,?,00419269,0000000D), ref: 0041940A
                        • DecodePointer.KERNEL32(?,00419533,000000FF,?,00418E88,00000011,00000000,?,00419269,0000000D,?,?,00418BEF,00418A8D), ref: 0041941B
                          • Part of subcall function 004191E2: EncodePointer.KERNEL32(00000000,0041A9D2,00424DC8,00000314,00000000,?,?,?,?,?,00419728,00424DC8,Microsoft Visual C++ Runtime Library,00012010), ref: 004191E4
                        • DecodePointer.KERNEL32(-00000004,?,00419533,000000FF,?,00418E88,00000011,00000000,?,00419269,0000000D,?,?,00418BEF,00418A8D), ref: 00419441
                        • DecodePointer.KERNEL32(?,00419533,000000FF,?,00418E88,00000011,00000000,?,00419269,0000000D,?,?,00418BEF,00418A8D), ref: 00419454
                        • DecodePointer.KERNEL32(?,00419533,000000FF,?,00418E88,00000011,00000000,?,00419269,0000000D,?,?,00418BEF,00418A8D), ref: 0041945E
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                        • String ID:
                        • API String ID: 2005412495-0
                        • Opcode ID: 6787e4a62188f966182c1abd02db5d80c923dbbedc8b6710139852f0a565a2ad
                        • Instruction ID: ec45cbb63e575e7dfa4a739f1c8945c5b3cdfef98aadd4b1d2212cafd0e9415b
                        • Opcode Fuzzy Hash: 6787e4a62188f966182c1abd02db5d80c923dbbedc8b6710139852f0a565a2ad
                        • Instruction Fuzzy Hash: 7E31F770A0430ADADF109FA9D9956DDBAF1BB49314F14802BE445A6290CBBD4C82CF69
                        APIs
                        • strlen.MSVCRT ref: 00414E4F
                        • ??_U@YAPAXI@Z.MSVCRT ref: 00414E7D
                          • Part of subcall function 00414B00: strlen.MSVCRT ref: 00414B11
                          • Part of subcall function 00414B00: strlen.MSVCRT ref: 00414B35
                        • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00414EC2
                        • ??_V@YAXPAX@Z.MSVCRT ref: 00414FE3
                          • Part of subcall function 00414D10: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00414D28
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: strlen$MemoryProcessQueryReadVirtual
                        • String ID: @
                        • API String ID: 2950663791-2766056989
                        • Opcode ID: 91b2ae15c4c849b549ef5c59baf7caa3ea964161e284581303b129ce0e8bce8f
                        • Instruction ID: b0bbf0b6c3750b47cc488a957d558671af21addf7bbdc9c64f8f4371bbb237c3
                        • Opcode Fuzzy Hash: 91b2ae15c4c849b549ef5c59baf7caa3ea964161e284581303b129ce0e8bce8f
                        • Instruction Fuzzy Hash: 765108B5E04109EBDB04CF98D881AEFB7B6FF88304F108519F919A7344D738AA51CBA5
                        APIs
                        • __getptd.LIBCMT ref: 00419DD3
                          • Part of subcall function 0041934C: __getptd_noexit.LIBCMT ref: 0041934F
                          • Part of subcall function 0041934C: __amsg_exit.LIBCMT ref: 0041935C
                        • __getptd.LIBCMT ref: 00419DEA
                        • __amsg_exit.LIBCMT ref: 00419DF8
                        • __lock.LIBCMT ref: 00419E08
                        • __updatetlocinfoEx_nolock.LIBCMT ref: 00419E1C
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                        • String ID:
                        • API String ID: 938513278-0
                        • Opcode ID: 37b2352c4fb0e4768deab2e0261b02f8975124246e1bc660967e8be418fd72b0
                        • Instruction ID: 3b7c04d60f0ed2116800135477a66f5436a0bf7a158807113c67b1e310743546
                        • Opcode Fuzzy Hash: 37b2352c4fb0e4768deab2e0261b02f8975124246e1bc660967e8be418fd72b0
                        • Instruction Fuzzy Hash: 25F06232A01710EBD721BBA698137CD3690AB00B28F65420FF404A72D2CF6C5DC18A5E
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: __aulldiv
                        • String ID: %d MB$@
                        • API String ID: 3732870572-3474575989
                        • Opcode ID: 854f6f18041aef9052c10d726e8fe1c6cf7f394222e00842828e43ac8fd55494
                        • Instruction ID: 86a0d1c95250957502f9069e218e2e702108611cd08c93e7abb5f400dcac6395
                        • Opcode Fuzzy Hash: 854f6f18041aef9052c10d726e8fe1c6cf7f394222e00842828e43ac8fd55494
                        • Instruction Fuzzy Hash: E2214DB1E40608ABDB10DFD5CD45FEEBBB9FB48B14F10410AF605BB280C77999018BA9
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: memcmpmemset
                        • String ID: @$v10
                        • API String ID: 1065087418-24753345
                        • Opcode ID: be7a7bf30e8dfa2c74541271a7926a37dcea6f90517c6e88833ccdca67e744b3
                        • Instruction ID: fc4e448515f09bb5da9a5ac1c9e7ff8d15c4cfdf5233ea8e25c6de54a2f7759e
                        • Opcode Fuzzy Hash: be7a7bf30e8dfa2c74541271a7926a37dcea6f90517c6e88833ccdca67e744b3
                        • Instruction Fuzzy Hash: B2410871900208ABDB04DF95C895BEEB7B5BF44704F10812DF909AB295DB78A985CB98
                        APIs
                        • memset.MSVCRT ref: 00406D14
                        • task.LIBCPMTD ref: 00406F55
                          • Part of subcall function 00408C40: vsprintf_s.MSVCRT ref: 00408C5B
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: memsettaskvsprintf_s
                        • String ID: Password
                        • API String ID: 2675463923-3434357891
                        • Opcode ID: a0cf22f0caf7218a01e8e3ba9f5175e45e8d8716ca8a0ec26cca2d0c8a9108e8
                        • Instruction ID: a8ebb56f113b74727cc5d985c2ec7289bfcadc6b8ecbef954b02f85ed49113f4
                        • Opcode Fuzzy Hash: a0cf22f0caf7218a01e8e3ba9f5175e45e8d8716ca8a0ec26cca2d0c8a9108e8
                        • Instruction Fuzzy Hash: AA613EB5D0425C9BDB24DB50CC45BDAB7B8BF48304F0081EAE64AA6281DB746FC9CF95
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.2008201264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                        Yara matches
                        Similarity
                        • API ID: strtok_s
                        • String ID: block
                        • API String ID: 3330995566-2199623458
                        • Opcode ID: 8316f14ca9ff6f9b828477e3767543a3f6e36db89bb659a220fdaa77001074a8
                        • Instruction ID: 4317100fa9659050eb711cd2864b3395f4f015c4d44f906a7fe8c0eb3a643ef8
                        • Opcode Fuzzy Hash: 8316f14ca9ff6f9b828477e3767543a3f6e36db89bb659a220fdaa77001074a8
                        • Instruction Fuzzy Hash: FB516374A44209EFEB14DF91DA44BEE7775BF54304F10815AE802A7240E7B8D9C6CF9A