Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
j45EY4ovxx.msi

Overview

General Information

Sample name:j45EY4ovxx.msi
renamed because original name is a hash value
Original sample name:5163541fd0f7a9dedfc220b437037d626e9ec32c50440ce3d81314d955cb223c.msi
Analysis ID:1556004
MD5:38ec29dc1f2a166922af153924482783
SHA1:1af683febce11f3c95970ba8d876a341da7f5d13
SHA256:5163541fd0f7a9dedfc220b437037d626e9ec32c50440ce3d81314d955cb223c
Tags:LionSoftwareLLCmsiuser-JAMESWT_MHT
Infos:

Detection

Matanbuchus
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Matanbuchus
AI detected suspicious sample
Drops executables to the windows directory (C:\Windows) and starts them
Sigma detected: Suspicious GUP Usage
Adds / modifies Windows certificates
Checks for available system drives (often done to infect USB drives)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to launch a program with higher privileges
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Launches processes in debugging mode, may be used to hinder debugging
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores large binary data to the registry
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • msiexec.exe (PID: 6596 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\j45EY4ovxx.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 3228 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 6156 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding A38CFB463D4DBDBACFCC2901433DC5C1 C MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 1264 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding A6367389E3E9A6AE9E1BBAB1265F4E9F MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • MSICE10.tmp (PID: 1292 cmdline: "C:\Windows\Installer\MSICE10.tmp" /DontWait "C:\Users\user\AppData\Roaming\op\\GUP.EXE" MD5: 3CAC7B7B5A847280D8803A5EB4E2B936)
  • GUP.exe (PID: 3720 cmdline: "C:\Users\user\AppData\Roaming\op\GUP.exe" MD5: 7BE4B26502BB2A8ED4982805B590DEC5)
    • WerFault.exe (PID: 6508 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 1260 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MatanbuchusAccording to PCrisk, Matanbuchus is a loader-type malicious program offered by its developers as Malware-as-a-Service (MaaS). This piece of software is designed to cause chain infections.Since it is used as a MaaS, both the malware it infiltrates into systems, and the attack reasons can vary - depending on the cyber criminals operating it. Matanbuchus has been observed being used in attacks against US universities and high schools, as well as a Belgian high-tech organization.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.matanbuchus
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Roaming\op\libcurl.dllJoeSecurity_MatanbuchusYara detected MatanbuchusJoe Security
    C:\Users\user\AppData\Roaming\op\libcurl.dllWindows_Trojan_Matanbuchus_58a61aaaunknownunknown
    • 0x18270:$a1: 55 8B EC 83 EC 08 53 56 0F 57 C0 66 0F 13 45 F8 EB 12 8B 45 F8 83 C0 01 8B 4D FC 83 D1 00 89 45 F8 89 4D FC 8B 55 FC 3B 55
    SourceRuleDescriptionAuthorStrings
    00000006.00000002.2292258011.000000006BEB1000.00000020.00000001.01000000.00000006.sdmpWindows_Trojan_Matanbuchus_58a61aaaunknownunknown
    • 0x17e70:$a1: 55 8B EC 83 EC 08 53 56 0F 57 C0 66 0F 13 45 F8 EB 12 8B 45 F8 83 C0 01 8B 4D FC 83 D1 00 89 45 F8 89 4D FC 8B 55 FC 3B 55
    SourceRuleDescriptionAuthorStrings
    6.2.GUP.exe.6beb0000.1.unpackJoeSecurity_MatanbuchusYara detected MatanbuchusJoe Security
      6.2.GUP.exe.6beb0000.1.unpackWindows_Trojan_Matanbuchus_58a61aaaunknownunknown
      • 0x18270:$a1: 55 8B EC 83 EC 08 53 56 0F 57 C0 66 0F 13 45 F8 EB 12 8B 45 F8 83 C0 01 8B 4D FC 83 D1 00 89 45 F8 89 4D FC 8B 55 FC 3B 55

      System Summary

      barindex
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\AppData\Roaming\op\GUP.exe" , CommandLine: "C:\Users\user\AppData\Roaming\op\GUP.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\op\GUP.exe, NewProcessName: C:\Users\user\AppData\Roaming\op\GUP.exe, OriginalFileName: C:\Users\user\AppData\Roaming\op\GUP.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1476, ProcessCommandLine: "C:\Users\user\AppData\Roaming\op\GUP.exe" , ProcessId: 3720, ProcessName: GUP.exe
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: https://ebaltrahal.com/tAvira URL Cloud: Label: malware
      Source: https://ebaltrahal.com/account2.aspx00Avira URL Cloud: Label: malware
      Source: https://ebaltrahal.com/account2.aspxjHAvira URL Cloud: Label: malware
      Source: https://ebaltrahal.com/Avira URL Cloud: Label: malware
      Source: https://ebaltrahal.com/account2.aspxAvira URL Cloud: Label: malware
      Source: https://bluetreewater.com/data/useraccount.aspxAvira URL Cloud: Label: malware
      Source: https://ebaltrahal.com/yAvira URL Cloud: Label: malware
      Source: https://ebaltrahal.com/#Avira URL Cloud: Label: malware
      Source: C:\Users\user\AppData\Roaming\op\libcurl.dllAvira: detection malicious, Label: TR/Dldr.Agent.xucbl
      Source: C:\Users\user\AppData\Roaming\op\libcurl.dllReversingLabs: Detection: 66%
      Source: j45EY4ovxx.msiReversingLabs: Detection: 47%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.0% probability
      Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\viewer.pdbD source: MSICE10.tmp, 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmp, MSICE10.tmp, 00000005.00000000.2099313167.000000000065F000.00000002.00000001.01000000.00000003.sdmp, j45EY4ovxx.msi, MSICE10.tmp.1.dr, 63c9f5.msi.1.dr, MSICD73.tmp.1.dr
      Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\lzmaextractor.pdb source: j45EY4ovxx.msi, 63c9f5.msi.1.dr
      Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: j45EY4ovxx.msi, MSIC9CE.tmp.0.dr, MSIBC4A.tmp.0.dr, MSICC85.tmp.1.dr, MSICCE4.tmp.1.dr, MSIC99E.tmp.0.dr, MSIBCE8.tmp.0.dr, MSIBD09.tmp.0.dr, 63c9f5.msi.1.dr, MSIC96F.tmp.0.dr, MSIBC99.tmp.0.dr, MSIBD48.tmp.0.dr, MSICD14.tmp.1.dr, MSIBBCC.tmp.0.dr
      Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\viewer.pdb source: MSICE10.tmp, 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmp, MSICE10.tmp, 00000005.00000000.2099313167.000000000065F000.00000002.00000001.01000000.00000003.sdmp, j45EY4ovxx.msi, MSICE10.tmp.1.dr, 63c9f5.msi.1.dr, MSICD73.tmp.1.dr
      Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_00651860 FindFirstFileExW,5_2_00651860
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_0079AD81 FindFirstFileExW,6_2_0079AD81
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: ebaltrahal.com
      Source: GUP.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
      Source: GUP.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
      Source: GUP.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
      Source: GUP.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
      Source: j45EY4ovxx.msi, 63c9f5.msi.1.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
      Source: j45EY4ovxx.msi, 63c9f5.msi.1.drString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
      Source: GUP.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
      Source: GUP.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
      Source: GUP.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
      Source: GUP.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
      Source: GUP.exe.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
      Source: GUP.exe, 00000006.00000002.2291501776.000000000063E000.00000004.00000020.00020000.00000000.sdmp, gup.xml.1.drString found in binary or memory: http://notepad-plus.sourceforge.net/commun/update/getDownLoadUrl.php
      Source: GUP.exe.1.drString found in binary or memory: http://ocsp.digicert.com0
      Source: GUP.exe.1.drString found in binary or memory: http://ocsp.digicert.com0A
      Source: GUP.exe.1.drString found in binary or memory: http://ocsp.digicert.com0C
      Source: GUP.exe.1.drString found in binary or memory: http://ocsp.digicert.com0X
      Source: j45EY4ovxx.msi, 63c9f5.msi.1.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
      Source: j45EY4ovxx.msi, 63c9f5.msi.1.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
      Source: j45EY4ovxx.msi, 63c9f5.msi.1.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
      Source: j45EY4ovxx.msi, 63c9f5.msi.1.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
      Source: GUP.exe.1.drString found in binary or memory: http://www.digicert.com/CPS0
      Source: GUP.exe, 00000006.00000002.2291501776.000000000063E000.00000004.00000020.00020000.00000000.sdmp, gup.xml.1.drString found in binary or memory: http://www.gnu.org/licenses/
      Source: GUP.exe, 00000006.00000002.2292425687.000000006C109000.00000004.00000001.01000000.00000006.sdmpString found in binary or memory: https://bluetreewater.com/data/useraccount.aspx
      Source: GUP.exe, 00000006.00000002.2291501776.000000000068D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaltrahal.com/
      Source: GUP.exe, 00000006.00000002.2291501776.000000000068D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaltrahal.com/#
      Source: GUP.exe, 00000006.00000002.2291501776.0000000000678000.00000004.00000020.00020000.00000000.sdmp, GUP.exe, 00000006.00000002.2292425687.000000006C109000.00000004.00000001.01000000.00000006.sdmp, GUP.exe, 00000006.00000002.2291501776.000000000069D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaltrahal.com/account2.aspx
      Source: GUP.exe, 00000006.00000002.2291501776.000000000063E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaltrahal.com/account2.aspx00
      Source: GUP.exe, 00000006.00000002.2291501776.0000000000678000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaltrahal.com/account2.aspxjH
      Source: GUP.exe, 00000006.00000002.2291501776.000000000068D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaltrahal.com/t
      Source: GUP.exe, 00000006.00000002.2291501776.00000000006AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ebaltrahal.com/y
      Source: GUP.exe, 00000006.00000002.2291501776.00000000006AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://notepad-plus-plu.org/update/getD
      Source: GUP.exe, 00000006.00000002.2291501776.000000000063E000.00000004.00000020.00020000.00000000.sdmp, gup.xml.1.drString found in binary or memory: https://notepad-plus-plu.org/update/getDownloadUrl.php
      Source: GUP.exe, 00000006.00000002.2291501776.000000000063E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://notepad-plus-plu.org/update/getDownloadUrl.php?version=
      Source: GUP.exe, 00000006.00000002.2291501776.00000000006A5000.00000004.00000020.00020000.00000000.sdmp, GUP.exe, 00000006.00000002.2291501776.000000000068D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://notepad-plus-plu.org/update/getDownloadUrl.php?version=4.6
      Source: GUP.exe, 00000006.00000002.2291501776.000000000068D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://notepad-plus-plu.org/update/getDownloadUrl.php?version=4.6W
      Source: GUP.exe, 00000006.00000002.2291501776.000000000063E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://notepad-plus-plu.org/update/getDownloadUrl.phpp
      Source: GUP.exe, 00000006.00000002.2291501776.000000000063E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://notepad-plus-plu.org/update/getDownloadUrl.phpursday:Fri:Friday:Sat:Sat
      Source: GUP.exe.1.drString found in binary or memory: https://notepad-plus-plus.org/0
      Source: GUP.exeString found in binary or memory: https://notepad-plus-plus.org/downloads/
      Source: GUP.exe, 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmp, GUP.exe, 00000006.00000000.2101008580.00000000007AA000.00000002.00000001.01000000.00000005.sdmp, GUP.exe.1.drString found in binary or memory: https://notepad-plus-plus.org/downloads/openid_moreinfohttps://npp-user-manual.org/docs/upgrading/#n
      Source: GUP.exeString found in binary or memory: https://npp-user-manual.org/docs/upgrading/#new-version-available-but-auto-updater-find-nothing
      Source: j45EY4ovxx.msi, 63c9f5.msi.1.drString found in binary or memory: https://www.globalsign.com/repository/0

      System Summary

      barindex
      Source: 6.2.GUP.exe.6beb0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Matanbuchus_58a61aaa Author: unknown
      Source: 00000006.00000002.2292258011.000000006BEB1000.00000020.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Matanbuchus_58a61aaa Author: unknown
      Source: C:\Users\user\AppData\Roaming\op\libcurl.dll, type: DROPPEDMatched rule: Windows_Trojan_Matanbuchus_58a61aaa Author: unknown
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\63c9f5.msiJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICC85.tmpJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICCE4.tmpJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICD14.tmpJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{941EDD8F-91B1-4C2D-BD7E-4E6C3F2A346C}Jump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICD73.tmpJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICE10.tmpJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSICC85.tmpJump to behavior
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_006501505_2_00650150
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_006471A95_2_006471A9
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_006483935_2_00648393
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_0061D4005_2_0061D400
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_0063B5705_2_0063B570
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_0064168D5_2_0064168D
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_006437DC5_2_006437DC
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_0064F7A45_2_0064F7A4
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_00655A595_2_00655A59
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_00641ACC5_2_00641ACC
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_00643B755_2_00643B75
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_00645B105_2_00645B10
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_00639CEC5_2_00639CEC
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_0064FDF05_2_0064FDF0
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_0073A0E06_2_0073A0E0
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_007650D06_2_007650D0
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_007321006_2_00732100
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_007651B06_2_007651B0
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_007672BF6_2_007672BF
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_0074F3106_2_0074F310
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_0075F3006_2_0075F300
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_007A14CA6_2_007A14CA
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_007614806_2_00761480
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_007815606_2_00781560
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_007525D06_2_007525D0
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_0075F6506_2_0075F650
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_0075B6C76_2_0075B6C7
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_0075C7706_2_0075C770
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_0078C7D06_2_0078C7D0
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_0078A7A36_2_0078A7A3
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_007388206_2_00738820
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_0073A8106_2_0073A810
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_007888A86_2_007888A8
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_007459706_2_00745970
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_007949466_2_00794946
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_007639C06_2_007639C0
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_0073AA796_2_0073AA79
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_0079DA486_2_0079DA48
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_00732A306_2_00732A30
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_00762AE06_2_00762AE0
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_00753A806_2_00753A80
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_00788BEA6_2_00788BEA
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_0075EBD06_2_0075EBD0
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_00731BC06_2_00731BC0
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_00755BC06_2_00755BC0
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_0079FCE96_2_0079FCE9
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_0075AD006_2_0075AD00
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_00763DE06_2_00763DE0
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_00760DA06_2_00760DA0
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_0075DED06_2_0075DED0
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_00734F706_2_00734F70
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_00788F496_2_00788F49
      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\MSIBBCC.tmp D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\MSIBC4A.tmp D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
      Source: C:\Windows\Installer\MSICE10.tmpCode function: String function: 0063A06F appears 72 times
      Source: C:\Windows\Installer\MSICE10.tmpCode function: String function: 0063A03C appears 103 times
      Source: C:\Windows\Installer\MSICE10.tmpCode function: String function: 0063A400 appears 40 times
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: String function: 0073BCC0 appears 33 times
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: String function: 007A55D3 appears 109 times
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: String function: 00766CDF appears 39 times
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: String function: 00767A30 appears 62 times
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: String function: 007A5606 appears 79 times
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 1260
      Source: j45EY4ovxx.msiBinary or memory string: OriginalFilenameviewer.exeF vs j45EY4ovxx.msi
      Source: j45EY4ovxx.msiBinary or memory string: OriginalFilenamelzmaextractor.dllF vs j45EY4ovxx.msi
      Source: j45EY4ovxx.msiBinary or memory string: OriginalFilenameAICustAct.dllF vs j45EY4ovxx.msi
      Source: 6.2.GUP.exe.6beb0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Matanbuchus_58a61aaa reference_sample = 4eb85a5532b98cbc4a6db1697cf46b9e2b7e28e89d6bbfc137b36c0736cd80e2, os = windows, severity = x86, creation_date = 2022-03-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Matanbuchus, fingerprint = 332794db0ed7488e939a91594d2100ee013a7f8f91afc085e15f06fc69098ad5, id = 58a61aaa-51b2-47f2-ab32-2e639957b2d5, last_modified = 2022-04-12
      Source: 00000006.00000002.2292258011.000000006BEB1000.00000020.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Matanbuchus_58a61aaa reference_sample = 4eb85a5532b98cbc4a6db1697cf46b9e2b7e28e89d6bbfc137b36c0736cd80e2, os = windows, severity = x86, creation_date = 2022-03-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Matanbuchus, fingerprint = 332794db0ed7488e939a91594d2100ee013a7f8f91afc085e15f06fc69098ad5, id = 58a61aaa-51b2-47f2-ab32-2e639957b2d5, last_modified = 2022-04-12
      Source: C:\Users\user\AppData\Roaming\op\libcurl.dll, type: DROPPEDMatched rule: Windows_Trojan_Matanbuchus_58a61aaa reference_sample = 4eb85a5532b98cbc4a6db1697cf46b9e2b7e28e89d6bbfc137b36c0736cd80e2, os = windows, severity = x86, creation_date = 2022-03-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Matanbuchus, fingerprint = 332794db0ed7488e939a91594d2100ee013a7f8f91afc085e15f06fc69098ad5, id = 58a61aaa-51b2-47f2-ab32-2e639957b2d5, last_modified = 2022-04-12
      Source: classification engineClassification label: mal100.troj.evad.winMSI@10/39@1/0
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_006162B0 CreateToolhelp32Snapshot,CloseHandle,Process32FirstW,OpenProcess,CloseHandle,Process32NextW,CloseHandle,5_2_006162B0
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_00616FE0 CoInitialize,CoCreateInstance,VariantInit,IUnknown_QueryService,IUnknown_QueryInterface_Proxy,IUnknown_QueryInterface_Proxy,CoAllowSetForegroundWindow,SysAllocString,SysAllocString,SysAllocString,VariantInit,LocalFree,OpenProcess,WaitForSingleObject,GetExitCodeProcess,CloseHandle,LocalFree,VariantClear,VariantClear,VariantClear,VariantClear,SysFreeString,VariantClear,CoUninitialize,_com_issue_error,5_2_00616FE0
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_00611D80 LoadResource,LockResource,SizeofResource,5_2_00611D80
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CMLCDBE.tmpJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3720
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIBBCC.tmpJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: -options6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: -verbose6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: --help6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: -clean6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: -unzipTo6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: gup.xml6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: gupOptions.xml6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: nativeLang.xml6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: explorer.exe6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: open6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: ^t6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: .zip6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: .zip6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: (:|6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: WNLOADSTOPPED6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: ADSTOPPED6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: OPPED6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: D_UNZIPFAILED6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: ZIPFAILED6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: AILED6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: explorer.exe6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: open6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: 0.0.0.06_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: 0.0.0.06_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: 0.0.0.06_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: 0.0.0.06_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: gupOptions.xml6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: p:|6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: D_ABORTORNOT6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: ORTORNOT6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: RNOT6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: X:|6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: MSGID_UPDATEYES6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: MSGID_UPDATENo6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: @:|6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: .exe6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: .exe6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: (:|6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: MSGID_CLOSEAPP6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: @:|6_2_0074B210
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCommand line argument: open6_2_0074B210
      Source: C:\Windows\System32\msiexec.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
      Source: j45EY4ovxx.msiReversingLabs: Detection: 47%
      Source: GUP.exeString found in binary or memory: --help
      Source: GUP.exeString found in binary or memory: --help
      Source: GUP.exeString found in binary or memory: Usage : gup --help gup -options gup [-verbose] [-vVERSION_VALUE] [-pCUSTOM_PARAM] gup -clean FOLDER_TO_ACTION gup -unzipTo [-clea
      Source: GUP.exeString found in binary or memory: Usage : gup --help gup -options gup [-verbose] [-vVERSION_VALUE] [-pCUSTOM_PARAM] gup -clean FOLDER_TO_ACTION gup -unzipTo [-clea
      Source: GUP.exeString found in binary or memory: Usage :gup --helpgup -optionsgup [-verbose] [-vVERSION_VALUE] [-pCUSTOM_PARAM]gup -clean FOLDER_TO_ACTIONgup -unzipTo [-clea
      Source: GUP.exeString found in binary or memory: Usage :gup --helpgup -optionsgup [-verbose] [-vVERSION_VALUE] [-pCUSTOM_PARAM]gup -clean FOLDER_TO_ACTIONgup -unzipTo [-clea
      Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\j45EY4ovxx.msi"
      Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding A38CFB463D4DBDBACFCC2901433DC5C1 C
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding A6367389E3E9A6AE9E1BBAB1265F4E9F
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSICE10.tmp "C:\Windows\Installer\MSICE10.tmp" /DontWait "C:\Users\user\AppData\Roaming\op\\GUP.EXE"
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\op\GUP.exe "C:\Users\user\AppData\Roaming\op\GUP.exe"
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 1260
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding A38CFB463D4DBDBACFCC2901433DC5C1 CJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding A6367389E3E9A6AE9E1BBAB1265F4E9FJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSICE10.tmp "C:\Windows\Installer\MSICE10.tmp" /DontWait "C:\Users\user\AppData\Roaming\op\\GUP.EXE"Jump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: msihnd.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowmanagementapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: inputhost.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.immersive.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowmanagementapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: inputhost.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.immersive.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\Installer\MSICE10.tmpSection loaded: msi.dllJump to behavior
      Source: C:\Windows\Installer\MSICE10.tmpSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\Installer\MSICE10.tmpSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\Installer\MSICE10.tmpSection loaded: sxs.dllJump to behavior
      Source: C:\Windows\Installer\MSICE10.tmpSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Windows\Installer\MSICE10.tmpSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: libcurl.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: msi.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\Installer\MSICE10.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00020424-0000-0000-C000-000000000046}\InprocServer32Jump to behavior
      Source: j45EY4ovxx.msiStatic file information: File size 2438144 > 1048576
      Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\viewer.pdbD source: MSICE10.tmp, 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmp, MSICE10.tmp, 00000005.00000000.2099313167.000000000065F000.00000002.00000001.01000000.00000003.sdmp, j45EY4ovxx.msi, MSICE10.tmp.1.dr, 63c9f5.msi.1.dr, MSICD73.tmp.1.dr
      Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\lzmaextractor.pdb source: j45EY4ovxx.msi, 63c9f5.msi.1.dr
      Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: j45EY4ovxx.msi, MSIC9CE.tmp.0.dr, MSIBC4A.tmp.0.dr, MSICC85.tmp.1.dr, MSICCE4.tmp.1.dr, MSIC99E.tmp.0.dr, MSIBCE8.tmp.0.dr, MSIBD09.tmp.0.dr, 63c9f5.msi.1.dr, MSIC96F.tmp.0.dr, MSIBC99.tmp.0.dr, MSIBD48.tmp.0.dr, MSICD14.tmp.1.dr, MSIBBCC.tmp.0.dr
      Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\viewer.pdb source: MSICE10.tmp, 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmp, MSICE10.tmp, 00000005.00000000.2099313167.000000000065F000.00000002.00000001.01000000.00000003.sdmp, j45EY4ovxx.msi, MSICE10.tmp.1.dr, 63c9f5.msi.1.dr, MSICD73.tmp.1.dr

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 6.2.GUP.exe.6beb0000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\op\libcurl.dll, type: DROPPED
      Source: MSIBBCC.tmp.0.drStatic PE information: section name: .fptable
      Source: MSIBC4A.tmp.0.drStatic PE information: section name: .fptable
      Source: MSIBC99.tmp.0.drStatic PE information: section name: .fptable
      Source: MSIBCE8.tmp.0.drStatic PE information: section name: .fptable
      Source: MSIBD09.tmp.0.drStatic PE information: section name: .fptable
      Source: MSIBD48.tmp.0.drStatic PE information: section name: .fptable
      Source: MSIC96F.tmp.0.drStatic PE information: section name: .fptable
      Source: MSIC99E.tmp.0.drStatic PE information: section name: .fptable
      Source: MSIC9CE.tmp.0.drStatic PE information: section name: .fptable
      Source: MSICC85.tmp.1.drStatic PE information: section name: .fptable
      Source: MSICCE4.tmp.1.drStatic PE information: section name: .fptable
      Source: MSICD14.tmp.1.drStatic PE information: section name: .fptable
      Source: MSICE10.tmp.1.drStatic PE information: section name: .fptable
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_0063A019 push ecx; ret 5_2_0063A02C
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_007A55B0 push ecx; ret 6_2_007A55C3

      Persistence and Installation Behavior

      barindex
      Source: C:\Windows\System32\msiexec.exeExecutable created and started: C:\Windows\Installer\MSICE10.tmpJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIBD09.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIC9CE.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIBD48.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIC99E.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIBC4A.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICE10.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICC85.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICCE4.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\op\libcurl.dllJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIBBCC.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\op\GUP.exeJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIC96F.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICD14.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIBC99.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIBCE8.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICE10.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICC85.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICCE4.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICD14.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 BlobJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIBD09.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIC9CE.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIC99E.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIBD48.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIBC4A.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSICC85.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSICCE4.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIBBCC.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIC96F.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSICD14.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIBC99.tmpJump to dropped file
      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIBCE8.tmpJump to dropped file
      Source: C:\Windows\Installer\MSICE10.tmpCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_5-34785
      Source: C:\Windows\Installer\MSICE10.tmpAPI coverage: 6.0 %
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeAPI coverage: 8.6 %
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_00651860 FindFirstFileExW,5_2_00651860
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_0079AD81 FindFirstFileExW,6_2_0079AD81
      Source: GUP.exe, 00000006.00000002.2291501776.0000000000678000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_00799DF4 LdrInitializeThunk,6_2_00799DF4
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_0063A1F1 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_0063A1F1
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_006125A0 GetProcessHeap,5_2_006125A0
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSICE10.tmp "C:\Windows\Installer\MSICE10.tmp" /DontWait "C:\Users\user\AppData\Roaming\op\\GUP.EXE"Jump to behavior
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_0063A1F1 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_0063A1F1
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_0063E23B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_0063E23B
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_0063A385 SetUnhandledExceptionFilter,5_2_0063A385
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_0063985D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0063985D
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_00784343 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00784343
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_007675EC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_007675EC
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_00767836 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00767836
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_007679C3 SetUnhandledExceptionFilter,6_2_007679C3
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: 6_2_6BED6E7D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_6BED6E7D
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_00617800 GetWindowsDirectoryW,GetForegroundWindow,ShellExecuteExW,ShellExecuteExW,GetModuleHandleW,GetProcAddress,AllowSetForegroundWindow,GetModuleHandleW,GetProcAddress,Sleep,EnumWindows,SetWindowPos,WaitForSingleObject,GetExitCodeProcess,GetWindowThreadProcessId,GetWindowLongW,5_2_00617800
      Source: C:\Windows\Installer\MSICE10.tmpCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,5_2_006550B7
      Source: C:\Windows\Installer\MSICE10.tmpCode function: GetLocaleInfoW,5_2_0064F310
      Source: C:\Windows\Installer\MSICE10.tmpCode function: GetLocaleInfoEx,FormatMessageA,5_2_006226C1
      Source: C:\Windows\Installer\MSICE10.tmpCode function: GetACP,IsValidCodePage,GetLocaleInfoW,5_2_00654714
      Source: C:\Windows\Installer\MSICE10.tmpCode function: EnumSystemLocalesW,5_2_006549D3
      Source: C:\Windows\Installer\MSICE10.tmpCode function: EnumSystemLocalesW,5_2_00654A1E
      Source: C:\Windows\Installer\MSICE10.tmpCode function: EnumSystemLocalesW,5_2_00654AB9
      Source: C:\Windows\Installer\MSICE10.tmpCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,5_2_00654B50
      Source: C:\Windows\Installer\MSICE10.tmpCode function: EnumSystemLocalesW,5_2_0064EDE2
      Source: C:\Windows\Installer\MSICE10.tmpCode function: GetLocaleInfoW,5_2_00654DB0
      Source: C:\Windows\Installer\MSICE10.tmpCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,5_2_00654ED5
      Source: C:\Windows\Installer\MSICE10.tmpCode function: GetLocaleInfoW,5_2_00654FDB
      Source: C:\Windows\Installer\MSICE10.tmpCode function: GetLocaleInfoEx,5_2_00638F9C
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: GetLocaleInfoEx,6_2_0078016A
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: EnumSystemLocalesW,6_2_0079E23E
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: EnumSystemLocalesW,6_2_0079E289
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: EnumSystemLocalesW,6_2_0079E324
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,6_2_0079E3AF
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: GetLocaleInfoW,6_2_0079E602
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,6_2_0079E72B
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: EnumSystemLocalesW,6_2_0079885C
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: GetLocaleInfoW,6_2_0079E831
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,6_2_0079E907
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: GetLocaleInfoW,6_2_00798E1F
      Source: C:\Users\user\AppData\Roaming\op\GUP.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,6_2_0079DF92
      Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_0063A445 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,5_2_0063A445
      Source: C:\Windows\Installer\MSICE10.tmpCode function: 5_2_0064F7A4 GetTimeZoneInformation,5_2_0064F7A4
      Source: C:\Windows\System32\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 BlobJump to behavior
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire Infrastructure1
      Replication Through Removable Media
      3
      Command and Scripting Interpreter
      1
      DLL Side-Loading
      1
      Exploitation for Privilege Escalation
      121
      Masquerading
      OS Credential Dumping2
      System Time Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault Accounts1
      Native API
      Boot or Logon Initialization Scripts1
      Process Injection
      1
      Modify Registry
      LSASS Memory131
      Security Software Discovery
      Remote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Virtualization/Sandbox Evasion
      Security Account Manager1
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive1
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
      Disable or Modify Tools
      NTDS2
      Process Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Process Injection
      LSA Secrets11
      Peripheral Device Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Deobfuscate/Decode Files or Information
      Cached Domain Credentials1
      File and Directory Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
      Obfuscated Files or Information
      DCSync23
      System Information Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      DLL Side-Loading
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
      File Deletion
      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1556004 Sample: j45EY4ovxx.msi Startdate: 14/11/2024 Architecture: WINDOWS Score: 100 39 ebaltrahal.com 2->39 41 Malicious sample detected (through community Yara rule) 2->41 43 Antivirus detection for URL or domain 2->43 45 Antivirus detection for dropped file 2->45 47 5 other signatures 2->47 7 msiexec.exe 13 2->7         started        10 msiexec.exe 17 41 2->10         started        13 GUP.exe 1 12 2->13         started        signatures3 process4 file5 23 C:\Users\user\AppData\Local\...\MSIC9CE.tmp, PE32 7->23 dropped 25 C:\Users\user\AppData\Local\...\MSIC99E.tmp, PE32 7->25 dropped 27 C:\Users\user\AppData\Local\...\MSIC96F.tmp, PE32 7->27 dropped 35 6 other malicious files 7->35 dropped 29 C:\Windows\Installer\MSICE10.tmp, PE32 10->29 dropped 31 C:\Windows\Installer\MSICD14.tmp, PE32 10->31 dropped 33 C:\Windows\Installer\MSICCE4.tmp, PE32 10->33 dropped 37 3 other malicious files 10->37 dropped 49 Drops executables to the windows directory (C:\Windows) and starts them 10->49 15 msiexec.exe 10->15         started        17 msiexec.exe 10->17         started        19 MSICE10.tmp 10->19         started        21 WerFault.exe 21 13->21         started        signatures6 process7

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      j45EY4ovxx.msi47%ReversingLabsWin32.Trojan.Matanbuchus
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\op\libcurl.dll100%AviraTR/Dldr.Agent.xucbl
      C:\Users\user\AppData\Local\Temp\MSIBBCC.tmp0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\MSIBC4A.tmp0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\MSIBC99.tmp0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\MSIBCE8.tmp0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\MSIBD09.tmp0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\MSIBD48.tmp0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\MSIC96F.tmp0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\MSIC99E.tmp0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\MSIC9CE.tmp0%ReversingLabs
      C:\Users\user\AppData\Roaming\op\GUP.exe0%ReversingLabs
      C:\Users\user\AppData\Roaming\op\libcurl.dll67%ReversingLabsWin32.Trojan.Generic
      C:\Windows\Installer\MSICC85.tmp0%ReversingLabs
      C:\Windows\Installer\MSICCE4.tmp0%ReversingLabs
      C:\Windows\Installer\MSICD14.tmp0%ReversingLabs
      C:\Windows\Installer\MSICE10.tmp0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://notepad-plus-plu.org/update/getDownloadUrl.php?version=0%Avira URL Cloudsafe
      https://ebaltrahal.com/t100%Avira URL Cloudmalware
      https://ebaltrahal.com/account2.aspx00100%Avira URL Cloudmalware
      https://notepad-plus-plu.org/update/getDownloadUrl.php?version=4.6W0%Avira URL Cloudsafe
      https://ebaltrahal.com/account2.aspxjH100%Avira URL Cloudmalware
      https://ebaltrahal.com/100%Avira URL Cloudmalware
      https://notepad-plus-plu.org/update/getDownloadUrl.phpp0%Avira URL Cloudsafe
      https://notepad-plus-plu.org/update/getD0%Avira URL Cloudsafe
      https://notepad-plus-plu.org/update/getDownloadUrl.php0%Avira URL Cloudsafe
      https://ebaltrahal.com/account2.aspx100%Avira URL Cloudmalware
      https://notepad-plus-plu.org/update/getDownloadUrl.phpursday:Fri:Friday:Sat:Sat0%Avira URL Cloudsafe
      https://notepad-plus-plu.org/update/getDownloadUrl.php?version=4.60%Avira URL Cloudsafe
      https://bluetreewater.com/data/useraccount.aspx100%Avira URL Cloudmalware
      https://ebaltrahal.com/y100%Avira URL Cloudmalware
      https://npp-user-manual.org/docs/upgrading/#new-version-available-but-auto-updater-find-nothing0%Avira URL Cloudsafe
      https://ebaltrahal.com/#100%Avira URL Cloudmalware
      NameIPActiveMaliciousAntivirus DetectionReputation
      ebaltrahal.com
      unknown
      unknowntrue
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://notepad-plus-plu.org/update/getDownloadUrl.phpGUP.exe, 00000006.00000002.2291501776.000000000063E000.00000004.00000020.00020000.00000000.sdmp, gup.xml.1.drfalse
        • Avira URL Cloud: safe
        unknown
        https://ebaltrahal.com/account2.aspxGUP.exe, 00000006.00000002.2291501776.0000000000678000.00000004.00000020.00020000.00000000.sdmp, GUP.exe, 00000006.00000002.2292425687.000000006C109000.00000004.00000001.01000000.00000006.sdmp, GUP.exe, 00000006.00000002.2291501776.000000000069D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        https://notepad-plus-plu.org/update/getDownloadUrl.phppGUP.exe, 00000006.00000002.2291501776.000000000063E000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://ebaltrahal.com/GUP.exe, 00000006.00000002.2291501776.000000000068D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        https://ebaltrahal.com/account2.aspx00GUP.exe, 00000006.00000002.2291501776.000000000063E000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://notepad-plus.sourceforge.net/commun/update/getDownLoadUrl.phpGUP.exe, 00000006.00000002.2291501776.000000000063E000.00000004.00000020.00020000.00000000.sdmp, gup.xml.1.drfalse
          high
          https://ebaltrahal.com/account2.aspxjHGUP.exe, 00000006.00000002.2291501776.0000000000678000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: malware
          unknown
          https://notepad-plus-plu.org/update/getDGUP.exe, 00000006.00000002.2291501776.00000000006AA000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://notepad-plus-plu.org/update/getDownloadUrl.php?version=4.6WGUP.exe, 00000006.00000002.2291501776.000000000068D000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://notepad-plus-plu.org/update/getDownloadUrl.php?version=GUP.exe, 00000006.00000002.2291501776.000000000063E000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://notepad-plus-plus.org/0GUP.exe.1.drfalse
            high
            https://ebaltrahal.com/tGUP.exe, 00000006.00000002.2291501776.000000000068D000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: malware
            unknown
            https://notepad-plus-plus.org/downloads/openid_moreinfohttps://npp-user-manual.org/docs/upgrading/#nGUP.exe, 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmp, GUP.exe, 00000006.00000000.2101008580.00000000007AA000.00000002.00000001.01000000.00000005.sdmp, GUP.exe.1.drfalse
              high
              https://notepad-plus-plu.org/update/getDownloadUrl.phpursday:Fri:Friday:Sat:SatGUP.exe, 00000006.00000002.2291501776.000000000063E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://bluetreewater.com/data/useraccount.aspxGUP.exe, 00000006.00000002.2292425687.000000006C109000.00000004.00000001.01000000.00000006.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              https://ebaltrahal.com/yGUP.exe, 00000006.00000002.2291501776.00000000006AA000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              https://notepad-plus-plu.org/update/getDownloadUrl.php?version=4.6GUP.exe, 00000006.00000002.2291501776.00000000006A5000.00000004.00000020.00020000.00000000.sdmp, GUP.exe, 00000006.00000002.2291501776.000000000068D000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://npp-user-manual.org/docs/upgrading/#new-version-available-but-auto-updater-find-nothingGUP.exefalse
              • Avira URL Cloud: safe
              unknown
              http://www.gnu.org/licenses/GUP.exe, 00000006.00000002.2291501776.000000000063E000.00000004.00000020.00020000.00000000.sdmp, gup.xml.1.drfalse
                high
                https://ebaltrahal.com/#GUP.exe, 00000006.00000002.2291501776.000000000068D000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                https://notepad-plus-plus.org/downloads/GUP.exefalse
                  high
                  No contacted IP infos
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1556004
                  Start date and time:2024-11-14 19:42:05 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 5m 40s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:13
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:j45EY4ovxx.msi
                  renamed because original name is a hash value
                  Original Sample Name:5163541fd0f7a9dedfc220b437037d626e9ec32c50440ce3d81314d955cb223c.msi
                  Detection:MAL
                  Classification:mal100.troj.evad.winMSI@10/39@1/0
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 79%
                  • Number of executed functions: 22
                  • Number of non-executed functions: 266
                  Cookbook Comments:
                  • Found application associated with file extension: .msi
                  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 13.89.179.12
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • VT rate limit hit for: j45EY4ovxx.msi
                  TimeTypeDescription
                  13:43:20API Interceptor1x Sleep call for process: WerFault.exe modified
                  No context
                  No context
                  No context
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  C:\Users\user\AppData\Local\Temp\MSIBC4A.tmppdfguruhub.msiGet hashmaliciousUnknownBrowse
                    JR2xwuR1Zc.msiGet hashmaliciousUnknownBrowse
                      rs8dpaIe6D.msiGet hashmaliciousUltraVNCBrowse
                        Bill Details.exeGet hashmaliciousUltraVNCBrowse
                          Bill Details.exeGet hashmaliciousUltraVNCBrowse
                            C:\Users\user\AppData\Local\Temp\MSIBBCC.tmppdfguruhub.msiGet hashmaliciousUnknownBrowse
                              JR2xwuR1Zc.msiGet hashmaliciousUnknownBrowse
                                rs8dpaIe6D.msiGet hashmaliciousUltraVNCBrowse
                                  Bill Details.exeGet hashmaliciousUltraVNCBrowse
                                    Bill Details.exeGet hashmaliciousUltraVNCBrowse
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:modified
                                      Size (bytes):1507
                                      Entropy (8bit):5.672485948698376
                                      Encrypted:false
                                      SSDEEP:24:cbOgKRYUgkW6NRiDyRivRihW9RiSOQtRiBpUPFP9FHGIDhiSSdsLK:cayUg8khXyaP7HGID8Sk
                                      MD5:1F8327BADB55748A101492D5325DAD99
                                      SHA1:6DFB56EACC24652B24602E1DD75226AC12AF6C33
                                      SHA-256:D1373CB358E42127685AEB60E6B2FE92C969D4F7172BAB56804692BFFE7A2398
                                      SHA-512:63AD0E5E88351B63787080D19D7FD478D55A6A7B86CBA798D5F83A0718B42B72E2815439E177AB71BB5B8BF0D823938D838E6B26CD4754FD78A33F0FE4BB9652
                                      Malicious:false
                                      Reputation:low
                                      Preview:...@IXOS.@.....@amnY.@.....@.....@.....@.....@.....@......&.{941EDD8F-91B1-4C2D-BD7E-4E6C3F2A346C}..ChromiumDriver..j45EY4ovxx.msi.@.....@.....@.....@........&.{EB657984-42A2-4FBD-AF6E-C6A8C5A895A3}.....@.....@.....@.....@.......@.....@.....@.......@......ChromiumDriver......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{B48CC27C-9823-4256-8235-834BFD2D0DBB}&.{941EDD8F-91B1-4C2D-BD7E-4E6C3F2A346C}.@......&.{4A323D5F-6D73-4C26-8E39-BE8928DA13EB}&.{941EDD8F-91B1-4C2D-BD7E-4E6C3F2A346C}.@......&.{657DD84A-3BD6-4FEC-B308-61F1AE5C5C4B}&.{941EDD8F-91B1-4C2D-BD7E-4E6C3F2A346C}.@......&.{A955067D-C818-46EB-AC18-02AE30008615}&.{941EDD8F-91B1-4C2D-BD7E-4E6C3F2A346C}.@......&.{9492B67F-93E9-4E51-A29F-F51CA07A0BB0}&.{941EDD8F-91B1-4C2D-BD7E-4E6C3F2A346C}.@........CreateFolders..Creating folders..Folder: [1]#.>.C:\Users\user\AppData\Roaming\ChromiumDriver\ChromiumDriver\.@........InstallFiles..Copying n
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):65536
                                      Entropy (8bit):0.9766857127247661
                                      Encrypted:false
                                      SSDEEP:192:Hzugm33m70BU/Aj7cJ3zuiFaZ24IO8ev:qj33mIBU/AjOzuiFaY4IO8O
                                      MD5:21A141E048911ACAA936035C8EC70924
                                      SHA1:250181004B3BB32DCFCB8A7E7A76BDE2C29B3A57
                                      SHA-256:95D5AE58793D41EDABBEBCF682E7AC9B9CF111E58FD117D992531519B97347DE
                                      SHA-512:AF4122331FF4E35BA0A3D1ECD21D8AA3A829CCD56006DD343B881313178EA0CC7920DDE4CF44BE0423537E99B96F17E7075E6E6E5998BF3128B8879FBEFF75E2
                                      Malicious:false
                                      Reputation:low
                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.6.0.8.3.3.8.2.1.5.2.2.9.2.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.6.0.8.3.3.8.2.6.3.6.6.7.3.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.c.6.a.3.c.9.d.-.6.4.6.4.-.4.4.6.d.-.8.1.a.2.-.d.b.1.2.f.6.d.2.1.b.9.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.8.c.9.3.8.7.e.-.8.f.2.e.-.4.7.e.a.-.9.b.c.1.-.6.d.9.e.c.b.1.7.c.3.d.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.G.U.P...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.g.u.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.e.8.8.-.0.0.0.1.-.0.0.1.4.-.a.8.c.3.-.7.a.0.8.c.5.3.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.b.5.5.2.e.9.b.2.a.f.3.b.5.d.d.8.2.c.5.b.f.1.b.4.c.5.2.2.1.7.e.0.0.0.0.0.9.0.4.!.0.0.0.0.a.f.a.1.e.e.7.1.f.e.2.3.c.4.e.7.f.8.f.c.0.1.9.5.f.5.f.b.4.a.3.d.9.6.8.5.0.0.b.6.!.G.U.P...e.x.
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:Mini DuMP crash report, 14 streams, Thu Nov 14 18:43:02 2024, 0x1205a4 type
                                      Category:dropped
                                      Size (bytes):100598
                                      Entropy (8bit):1.8794099249146552
                                      Encrypted:false
                                      SSDEEP:384:C1PPoIxiEv/PzSQRc/SccUTJ4v55vR2VCrFM8ZL557zhwqzhN+LtjADzOOiXi:IPpxiEHPN8jKvoOh5P+LKGi
                                      MD5:8DFE72987939920ACE38B22AA9DD810B
                                      SHA1:9D3210EB0E1B2DD20DCD44662D5F21BD4DE0B4E8
                                      SHA-256:C85AEB4FEA3ED5EC23AF95CD5EBA144DA84F586FB6F1C1BCF21FE4C801DE92B1
                                      SHA-512:AB35B82E4121CFA2BA8677F5D69D89EA1B5717F451D2868242A0963555ABEBA91B567EF421423FC8DD7C7FE41293F0AD20CB365860CBC05C75F4A1334CB7E9BD
                                      Malicious:false
                                      Reputation:low
                                      Preview:MDMP..a..... ........D6g....................................$....C..........T.......8...........T............4..fT....................... ..............................................................................eJ......4!......GenuineIntel............T............D6g............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):8296
                                      Entropy (8bit):3.6974146712924476
                                      Encrypted:false
                                      SSDEEP:192:R6l7wVeJ9m6IFK6YEINSU4IqgmfA4sjprM89bfVsffVm:R6lXJ86IFK6YEiSU4IqgmfA4sHfufQ
                                      MD5:6DCE6B09F4BE0664C72270A214A14EAF
                                      SHA1:83BA1939579836425AE8AC61996DB43D00FE7867
                                      SHA-256:3FA3EAEF0A658F0E6F31578D5299E960EB5D25EAECB9516F664DDBBE3DE1D2D6
                                      SHA-512:0EC6CE4A6A6A40C8A92A0527887E9D3F058E27C8BE6C83A95E31DE49B0027A8B20AB377962EDDC961050DDEE96FC74AE5681DEAB997672B45413951BFC452890
                                      Malicious:false
                                      Reputation:low
                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.7.2.0.<./.P.i.
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):4622
                                      Entropy (8bit):4.476753809711422
                                      Encrypted:false
                                      SSDEEP:48:cvIwWl8zsDJg77aI9pWWpW8VYCvYm8M4J0Xi6FRB+q8P6VuZKys8lKd:uIjfdI7f37V9yJxkHuQ/gKd
                                      MD5:4735DE887CAD617B5DD1C6703975E093
                                      SHA1:C01E6DA4677A2152B7B6392F7CB7DA10ADBBAEE0
                                      SHA-256:CFECAA9E99D755AEF6643D4F69E8786D8F72364C10DB7264BA627E33115B2985
                                      SHA-512:468D00620C6D91A1FEC58E5E40F8209154AE7E0F2F9D5997DABE55104E319F3D6FB33C034C05A7CC01F9F4D168513194CF9F3D1517F81D03234F3684BD5E7902
                                      Malicious:false
                                      Reputation:low
                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="588105" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):470
                                      Entropy (8bit):3.408852469805291
                                      Encrypted:false
                                      SSDEEP:12:QwDEafYnhVnMCl3vLxy/LZdMa6GWG2wa8eZUYNK41mcK5H:Q+YnMCl3Ny/LzMajEDpjmFH
                                      MD5:7B9982F0FEAE1B7B4D6813125DFA6CE6
                                      SHA1:DF97066EC56557AC4FA5F56081DC25BBC2C723BA
                                      SHA-256:8E128CA5DD232DBF6361325C8744E9CFAFF4333FD8F0696F14B764D3384C201E
                                      SHA-512:77801181F2115D7839A43719551CA69A8D0C07C810E9DB09F1EE8B68FCCE66763DC416150F73F71ACABB476AE9CEF6E3C366FE8344C3B946DA2D82030FDD9ADA
                                      Malicious:false
                                      Preview:..E.r.r.o.r. .2.8.0.3... .D.i.a.l.o.g. .V.i.e.w. .d.i.d. .n.o.t. .f.i.n.d. .a. .r.e.c.o.r.d. .f.o.r. .t.h.e. .d.i.a.l.o.g. .E.r.r.o.r.D.l.g.......T.h.i.s. .p.a.c.k.a.g.e. .w.a.s. .c.r.e.a.t.e.d. .w.i.t.h. .a. .t.r.i.a.l. .v.e.r.s.i.o.n. .o.f. .A.d.v.a.n.c.e.d. .I.n.s.t.a.l.l.e.r... .Y.o.u. .m.a.y. .u.s.e. .i.t. .f.o.r. .e.v.a.l.u.a.t.i.o.n. .p.u.r.p.o.s.e.s. .o.n.l.y.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .1.4./.1.1./.2.0.2.4. . .1.3.:.4.3.:.0.1. .=.=.=.....
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):1021792
                                      Entropy (8bit):6.608380087035959
                                      Encrypted:false
                                      SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                      MD5:EC6EBF65FE4F361A73E473F46730E05C
                                      SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                      SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                      SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Joe Sandbox View:
                                      • Filename: pdfguruhub.msi, Detection: malicious, Browse
                                      • Filename: JR2xwuR1Zc.msi, Detection: malicious, Browse
                                      • Filename: rs8dpaIe6D.msi, Detection: malicious, Browse
                                      • Filename: Bill Details.exe, Detection: malicious, Browse
                                      • Filename: Bill Details.exe, Detection: malicious, Browse
                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):1021792
                                      Entropy (8bit):6.608380087035959
                                      Encrypted:false
                                      SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                      MD5:EC6EBF65FE4F361A73E473F46730E05C
                                      SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                      SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                      SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Joe Sandbox View:
                                      • Filename: pdfguruhub.msi, Detection: malicious, Browse
                                      • Filename: JR2xwuR1Zc.msi, Detection: malicious, Browse
                                      • Filename: rs8dpaIe6D.msi, Detection: malicious, Browse
                                      • Filename: Bill Details.exe, Detection: malicious, Browse
                                      • Filename: Bill Details.exe, Detection: malicious, Browse
                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):1021792
                                      Entropy (8bit):6.608380087035959
                                      Encrypted:false
                                      SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                      MD5:EC6EBF65FE4F361A73E473F46730E05C
                                      SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                      SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                      SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):1021792
                                      Entropy (8bit):6.608380087035959
                                      Encrypted:false
                                      SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                      MD5:EC6EBF65FE4F361A73E473F46730E05C
                                      SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                      SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                      SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):1021792
                                      Entropy (8bit):6.608380087035959
                                      Encrypted:false
                                      SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                      MD5:EC6EBF65FE4F361A73E473F46730E05C
                                      SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                      SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                      SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):1021792
                                      Entropy (8bit):6.608380087035959
                                      Encrypted:false
                                      SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                      MD5:EC6EBF65FE4F361A73E473F46730E05C
                                      SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                      SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                      SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):1021792
                                      Entropy (8bit):6.608380087035959
                                      Encrypted:false
                                      SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                      MD5:EC6EBF65FE4F361A73E473F46730E05C
                                      SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                      SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                      SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):1021792
                                      Entropy (8bit):6.608380087035959
                                      Encrypted:false
                                      SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                      MD5:EC6EBF65FE4F361A73E473F46730E05C
                                      SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                      SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                      SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):1021792
                                      Entropy (8bit):6.608380087035959
                                      Encrypted:false
                                      SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                      MD5:EC6EBF65FE4F361A73E473F46730E05C
                                      SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                      SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                      SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):632664
                                      Entropy (8bit):6.649250206858323
                                      Encrypted:false
                                      SSDEEP:12288:4hnL9BvdSgq4WhO6JI1TKWP2Tpc1pcBpR0Bj3APRZIbFxviYNTSuDzPnWe:snLz9qHO1TKW+pc1pcBpaBwPRZI/vigr
                                      MD5:7BE4B26502BB2A8ED4982805B590DEC5
                                      SHA1:AFA1EE71FE23C4E7F8FC0195F5FB4A3D968500B6
                                      SHA-256:97E196B8AA0694ECF37BDDAB2ADE90FFBA78251AF7E49F6A24ADEA0A6EE704B3
                                      SHA-512:013CE05CA4982B8BBAFA33B4011B1A2731C605F581223557EF66CF75DF96307D5B2444A9CCB28B3FF39E34AD989E2D5B931AB9BFCCCD7DD5F63EABDB726AB749
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...........Q..Q..Q.....Z...........D...f5.P...f.G...f.C...f.......]..Ba..Y..Ba.\...g.R..Q.....Ba._..Ba7.P..Q._.P..Ba.P..RichQ..........PE..L...'(.f...............(.............q............@.......................................@..........................................P...............~..X)...`..HI......8...............................@...............\............................text.............................. ..`.rdata..fo.......p..................@..@.data...$;.......*..................@....rsrc........P.......$..............@..@.reloc..HI...`...J...4..............@..B........................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):4607
                                      Entropy (8bit):5.014058451204837
                                      Encrypted:false
                                      SSDEEP:96:rrxgFDl+72Y+WbPRkrm++U4YeJS2kG6QrABYUCJ8PYPwJrkFI:rVgFhunzbpka++UNQo2sBCPwJrkFI
                                      MD5:30823E98EDC86AC1C1B71BA49366BB86
                                      SHA1:1FBAEDF0850C6BB298D81843A174FE2ED0D09388
                                      SHA-256:F26E3A06FC46EEFB24D2D412C5E5ED1BC97EC14E2B7D8670AEA0736CE7FB15DD
                                      SHA-512:6A907EC6E57D4A7EE0EAC473DF439DB48D4C3457D440417A0A1908E1E8FBC7A15955166DC5D4B2C2DC42E92CAA73C74C12B7F9B477C9991EE677A93CD3AA45F5
                                      Malicious:false
                                      Preview:<?xml version="1.0" ?>.. .. Copyright 2007 Don HO <don.h@free.fr>..... This file is part of WinGup..... WinGup is free software: you can redistribute it and/or modify.. it under the terms of the GNU Lesser General Public License as published by.. the Free Software Foundation, either version 3 of the License, or.. (at your option) any later version..... WinGup is distributed in the hope that it will be useful,.. but WITHOUT ANY WARRANTY; without even the implied warranty of.. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the.. GNU Lesser General Public License for more details..... You should have received a copy of the GNU Lesser General Public License.. along with GUP. If not, see <http://www.gnu.org/licenses/>...-->..<GUPInput>... optional....It's the current version of your program. WinGup will add "?version=versionNumber" at the end of InfoUrl....This parameter will be ignored if you pass directly your version number to WinGup
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):292352
                                      Entropy (8bit):6.613174333582973
                                      Encrypted:false
                                      SSDEEP:6144:0ItnTOW5IHd4lS5Rj0tenQMfJYM4puXlT0HOVVvv2nh:7tTO4IHd5R6enQMhp4EXIh
                                      MD5:DBC0C2B6D7D32F874BCD3106F289BD39
                                      SHA1:3A7B9EDF266BC28D3DD5AB227AB85E58D8DD7812
                                      SHA-256:B3FBD0D41A21FAA8808DC9ACFB383DF8CBFAA6DCDBB97D694F1107151CBECF33
                                      SHA-512:841388F58B434A6BEA241004251D861FB7F93C09DF4D1CF3AA48D906AA32A8F30A1CEE9A22701D5D876E94E5F1EB674937CFD59839A7B7ADA3316176ADDA228C
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_Matanbuchus, Description: Yara detected Matanbuchus, Source: C:\Users\user\AppData\Roaming\op\libcurl.dll, Author: Joe Security
                                      • Rule: Windows_Trojan_Matanbuchus_58a61aaa, Description: unknown, Source: C:\Users\user\AppData\Roaming\op\libcurl.dll, Author: unknown
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 67%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........@|..@|..@|......J|.......|......T|..F...`|..F...P|..F...U|......K|..@|...|..*...B|..*...A|..*...A|..Rich@|..........PE..L...q..g.........."!...&.J....G......i.......`................................K...........@..........................,..$.......x.............................J.|>..........................@.......P...@............`...............................text....I.......J.................. ..`.rdata.......`.......N..............@..@.data....{F..@.......(..............@....reloc..|>....J..@...6..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {EB657984-42A2-4FBD-AF6E-C6A8C5A895A3}, Number of Words: 10, Subject: ChromiumDriver, Author: ChromiumDriver, Name of Creating Application: ChromiumDriver (Evaluation Installer), Template: ;1033, Comments: Selenium Remote WebDriver implementation for test automation of Windows application based on WinFroms and WPF platforms. (Evaluation Installer), Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Wed Oct 16 20:55:48 2024, Last Saved Time/Date: Wed Oct 16 20:55:48 2024, Last Printed: Wed Oct 16 20:55:48 2024, Number of Pages: 450
                                      Category:dropped
                                      Size (bytes):2438144
                                      Entropy (8bit):7.000748363194672
                                      Encrypted:false
                                      SSDEEP:49152:k/p3z0A+biU50unDN5GQizNkyRmopy4duG/8Wea/xwuUkd4:cK3INkomkym
                                      MD5:38EC29DC1F2A166922AF153924482783
                                      SHA1:1AF683FEBCE11F3C95970BA8D876A341DA7F5D13
                                      SHA-256:5163541FD0F7A9DEDFC220B437037D626E9EC32C50440CE3D81314D955CB223C
                                      SHA-512:3A6C74B3DDCD912581DE4E42B082F132F4FB88EC4D196318391DA8BA2DF00A7B7AA3835ED9CA6C8716BA26C9C559DB5C75EF0BA78D9D00E3C1C5D58D627821E5
                                      Malicious:false
                                      Preview:......................>...................&...................................F.......w.......Q...R...S...T...U...V...W.......T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...............................................................................................................................................................................................................................................................................................................................................<...........!...4............................................................................................... ...+..."...#...$...%...&...'...(...)...*...2...,...-......./...0...1...5...3...;...@...6...7...8...9...:...?...=...t...>.......O...A...B...C...D...E...N.......H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):1021792
                                      Entropy (8bit):6.608380087035959
                                      Encrypted:false
                                      SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                      MD5:EC6EBF65FE4F361A73E473F46730E05C
                                      SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                      SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                      SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):1021792
                                      Entropy (8bit):6.608380087035959
                                      Encrypted:false
                                      SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                      MD5:EC6EBF65FE4F361A73E473F46730E05C
                                      SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                      SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                      SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):1021792
                                      Entropy (8bit):6.608380087035959
                                      Encrypted:false
                                      SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                      MD5:EC6EBF65FE4F361A73E473F46730E05C
                                      SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                      SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                      SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):422932
                                      Entropy (8bit):6.503515536190355
                                      Encrypted:false
                                      SSDEEP:12288:al7GrJZsRtP01Ab+biU50unhTzTQWNy7kokGqzTC:e7UJaR10A+biU50unhFNyIGqfC
                                      MD5:4066F5A63406738AEB026DEC1D1E4B44
                                      SHA1:DD442E9E1D93AB2403AB37D127BF743417F77D5B
                                      SHA-256:EAA8E3F7F744FD0405E4CAA8DEC499DCC076CC63A1F31300998A2FCCFB0477ED
                                      SHA-512:C4A9E6806186320CB3A84AA38947412609D0427CF20DDAFCC4B52E8B74586358B170B4FBFA0033D53B231DE841835BC88AA8F39ED55613BAD26658E3AAD7A546
                                      Malicious:false
                                      Preview:...@IXOS.@.....@amnY.@.....@.....@.....@.....@.....@......&.{941EDD8F-91B1-4C2D-BD7E-4E6C3F2A346C}..ChromiumDriver..j45EY4ovxx.msi.@.....@.....@.....@........&.{EB657984-42A2-4FBD-AF6E-C6A8C5A895A3}.....@.....@.....@.....@.......@.....@.....@.......@......ChromiumDriver......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration...@.....@.....@.]....&.{B48CC27C-9823-4256-8235-834BFD2D0DBB}>.C:\Users\user\AppData\Roaming\ChromiumDriver\ChromiumDriver\.@.......@.....@.....@......&.{4A323D5F-6D73-4C26-8E39-BE8928DA13EB}2.01:\Software\ChromiumDriver\ChromiumDriver\Version.@.......@.....@.....@......&.{657DD84A-3BD6-4FEC-B308-61F1AE5C5C4B}*.C:\Users\user\AppData\Roaming\op\GUP.exe.@.......@.....@.....@......&.{A955067D-C818-46EB-AC18-02AE30008615}*.C:\Users\user\AppData\Roaming\op\gup.xml.@.......@.....@.....@......&.{9492B67F-93E9-4E51-A29F-F51CA07A0BB0}..C:\Users\user\AppData\Roaming
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):420864
                                      Entropy (8bit):6.500505031355211
                                      Encrypted:false
                                      SSDEEP:12288:0l7GrJZsRtP01Ab+biU50unhTzTQWNy7kokGqzT:M7UJaR10A+biU50unhFNyIGqf
                                      MD5:3CAC7B7B5A847280D8803A5EB4E2B936
                                      SHA1:D20C6283B6EB8F5471B59C4E3D175D784AAEC301
                                      SHA-256:7A4AE0F0B81A5F43BE29C3CC189887F4D64B859567BEC1EFEC1D3564A77457FE
                                      SHA-512:F49C71D3A6ACE0FF24DEA24BE8F9DBF85B0EF25D74A78E48087A7C031A28D4B74D843EB97183484A4442D41BF95DB882B65C1484781500A169BA77354809750A
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........................M...............................................6.............Q....9.........Rich..........PE..L......f.........."....)..........................@.................................|.....@..........................................p..8........................;..P...p...............................@............................................text............................... ..`.rdata..*%.......&..................@..@.data....7... ......................@....fptable.....`......."..............@....rsrc...8....p.......$..............@..@.reloc...;.......<...0..............@..B........................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Cannot read section info
                                      Category:dropped
                                      Size (bytes):20480
                                      Entropy (8bit):1.1642869783110767
                                      Encrypted:false
                                      SSDEEP:12:JSbX72FjXlAGiLIlHVRpZh/7777777777777777777777777vDHFENd29bit/l0G:J7QI5t2NgUiF
                                      MD5:1E6C713B457C081462E6002EB25AA235
                                      SHA1:903100FDC6A3520101584C865F3D9EB0DB8392BD
                                      SHA-256:34A6DD2154E9A2C9231304A253796DE7BD9EE18BA2C4CF5CE1278553EFED86DB
                                      SHA-512:02B96F5958E472232DCD4A376CFE66C006654C0406E967BE23C9F2BF2AA442F7F205ED4A3979E3C573BE5BF1B9ADE5F2BC6446D06C8EA3DDDB9D6A77874FB3D0
                                      Malicious:false
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Cannot read section info
                                      Category:dropped
                                      Size (bytes):20480
                                      Entropy (8bit):1.5993862675144292
                                      Encrypted:false
                                      SSDEEP:48:f8PhmuRc06WXJWjT5fesS3VAErCy9X2USDTumlw:ehm1tjTYs8ewCMzKw
                                      MD5:E3BC62E81E61C55755747EE4C318B92E
                                      SHA1:20B01DF18B292FB6A2CFF5DCF27B120703037102
                                      SHA-256:7FD522BBFC27F4CB2D9D6A3413A6C6945CBE244EF730F96A01CD1CE4A04D4025
                                      SHA-512:F514E06B960030DF28A20D27C4A5FF2CA1459A3D83ED1C28C98F3E816464E9B81DA0C916477B4E6F6E775CD6B991517ED09BC3B9F408B45829773F72B1BE3432
                                      Malicious:false
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):364484
                                      Entropy (8bit):5.365495244943878
                                      Encrypted:false
                                      SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26KgauB:zTtbmkExhMJCIpE+
                                      MD5:CB5AF7B8F38BD3BE0DF84DEC8EA2955D
                                      SHA1:8D93DCF47971B26968BFE4EBEC3A4F7E95E89E0D
                                      SHA-256:170BBEB6124CE2F47E0A1511369C359592908E68D2E70F0C8974EB8A3C15798D
                                      SHA-512:4CB305A3C9BF7AF24D17EC9AB21C04F5BBE58C8BEE8B3AB0EA2078D6EA2C94D2267A0FC9479838170F3C7485750A9F5BFD5E5CCA2510EF0ABE9705DCD7068F09
                                      Malicious:false
                                      Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):32768
                                      Entropy (8bit):0.07201799471881946
                                      Encrypted:false
                                      SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOEDNusdOZt8gVky6lit/:2F0i8n0itFzDHFENd2Git/
                                      MD5:5C24FFC9007DADAABD97B2DBF7B3A7EC
                                      SHA1:97DED5027226B9CDBCC437B97F8603B49794D048
                                      SHA-256:D9C98EF02F4B413557C785289C2D466C50C86CD70ADFA26E6125A785C0A4354F
                                      SHA-512:C99C6108CD1CD311EE45BE42BF28C7C036BB9740E3979F34E1FB4677F4028BC9DCE9C3DAA95868E295F81330B9813F6B52D896EF84D87475F4D5D703A7F305BC
                                      Malicious:false
                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Cannot read section info
                                      Category:dropped
                                      Size (bytes):20480
                                      Entropy (8bit):1.5993862675144292
                                      Encrypted:false
                                      SSDEEP:48:f8PhmuRc06WXJWjT5fesS3VAErCy9X2USDTumlw:ehm1tjTYs8ewCMzKw
                                      MD5:E3BC62E81E61C55755747EE4C318B92E
                                      SHA1:20B01DF18B292FB6A2CFF5DCF27B120703037102
                                      SHA-256:7FD522BBFC27F4CB2D9D6A3413A6C6945CBE244EF730F96A01CD1CE4A04D4025
                                      SHA-512:F514E06B960030DF28A20D27C4A5FF2CA1459A3D83ED1C28C98F3E816464E9B81DA0C916477B4E6F6E775CD6B991517ED09BC3B9F408B45829773F72B1BE3432
                                      Malicious:false
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):512
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3::
                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                      Malicious:false
                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):512
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3::
                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                      Malicious:false
                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):512
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3::
                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                      Malicious:false
                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Cannot read section info
                                      Category:dropped
                                      Size (bytes):20480
                                      Entropy (8bit):1.5993862675144292
                                      Encrypted:false
                                      SSDEEP:48:f8PhmuRc06WXJWjT5fesS3VAErCy9X2USDTumlw:ehm1tjTYs8ewCMzKw
                                      MD5:E3BC62E81E61C55755747EE4C318B92E
                                      SHA1:20B01DF18B292FB6A2CFF5DCF27B120703037102
                                      SHA-256:7FD522BBFC27F4CB2D9D6A3413A6C6945CBE244EF730F96A01CD1CE4A04D4025
                                      SHA-512:F514E06B960030DF28A20D27C4A5FF2CA1459A3D83ED1C28C98F3E816464E9B81DA0C916477B4E6F6E775CD6B991517ED09BC3B9F408B45829773F72B1BE3432
                                      Malicious:false
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Cannot read section info
                                      Category:dropped
                                      Size (bytes):32768
                                      Entropy (8bit):1.2793069232896244
                                      Encrypted:false
                                      SSDEEP:48:ZnuuyI+CFXJxT58qesS3VAErCy9X2USDTumlw:1uGZTm7s8ewCMzKw
                                      MD5:C160A991BCF961BA5C7CC8FE50CF0E68
                                      SHA1:C31ACCA64BFEA81D9A30CC86112DB654B8A31798
                                      SHA-256:DC19949B7CBA22434BA2FEECB856A4749EA9954769A3935CF64780BB7689C793
                                      SHA-512:E6C139F5A648216DA9AABDFADB312D59CCF353CEDB9C23C97D342FF4BDDBE5BE9D7C6AA8D3701E2FAED483D2922871F29A9DC0D9ACE91D5DA8C3C4A0D6862BB0
                                      Malicious:false
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):512
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3::
                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                      Malicious:false
                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Cannot read section info
                                      Category:dropped
                                      Size (bytes):32768
                                      Entropy (8bit):1.2793069232896244
                                      Encrypted:false
                                      SSDEEP:48:ZnuuyI+CFXJxT58qesS3VAErCy9X2USDTumlw:1uGZTm7s8ewCMzKw
                                      MD5:C160A991BCF961BA5C7CC8FE50CF0E68
                                      SHA1:C31ACCA64BFEA81D9A30CC86112DB654B8A31798
                                      SHA-256:DC19949B7CBA22434BA2FEECB856A4749EA9954769A3935CF64780BB7689C793
                                      SHA-512:E6C139F5A648216DA9AABDFADB312D59CCF353CEDB9C23C97D342FF4BDDBE5BE9D7C6AA8D3701E2FAED483D2922871F29A9DC0D9ACE91D5DA8C3C4A0D6862BB0
                                      Malicious:false
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):73728
                                      Entropy (8bit):0.1506830965262357
                                      Encrypted:false
                                      SSDEEP:24:lmlwtHTx0O77FipV0O77b0O77FipV0O77DVAEV0yjCyeYVQwGaVKO2jw/+bu:lmlwlTdSbS3VAErCy9X2Wc
                                      MD5:58FD8C04D29E4CC0544897F45C224930
                                      SHA1:34731089E4D9664BE337FA90611971C93D99C47B
                                      SHA-256:7BE4A60D797342C5048F6BA7DCE4B72A902251468C0658820548A744EEECD931
                                      SHA-512:5F553FCB9F6AB7F2A7604AD23EE03445944FC50668B724F4D5BF1D91018885629C9AE17B88ACFCA41B91A78C1DD943ACF12CC3A863642EB7A17BBC9A64EA83DE
                                      Malicious:false
                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):512
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3::
                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                      Malicious:false
                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Cannot read section info
                                      Category:dropped
                                      Size (bytes):32768
                                      Entropy (8bit):1.2793069232896244
                                      Encrypted:false
                                      SSDEEP:48:ZnuuyI+CFXJxT58qesS3VAErCy9X2USDTumlw:1uGZTm7s8ewCMzKw
                                      MD5:C160A991BCF961BA5C7CC8FE50CF0E68
                                      SHA1:C31ACCA64BFEA81D9A30CC86112DB654B8A31798
                                      SHA-256:DC19949B7CBA22434BA2FEECB856A4749EA9954769A3935CF64780BB7689C793
                                      SHA-512:E6C139F5A648216DA9AABDFADB312D59CCF353CEDB9C23C97D342FF4BDDBE5BE9D7C6AA8D3701E2FAED483D2922871F29A9DC0D9ACE91D5DA8C3C4A0D6862BB0
                                      Malicious:false
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {EB657984-42A2-4FBD-AF6E-C6A8C5A895A3}, Number of Words: 10, Subject: ChromiumDriver, Author: ChromiumDriver, Name of Creating Application: ChromiumDriver (Evaluation Installer), Template: ;1033, Comments: Selenium Remote WebDriver implementation for test automation of Windows application based on WinFroms and WPF platforms. (Evaluation Installer), Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Wed Oct 16 20:55:48 2024, Last Saved Time/Date: Wed Oct 16 20:55:48 2024, Last Printed: Wed Oct 16 20:55:48 2024, Number of Pages: 450
                                      Entropy (8bit):7.000748363194672
                                      TrID:
                                      • Windows SDK Setup Transform Script (63028/2) 47.91%
                                      • Microsoft Windows Installer (60509/1) 46.00%
                                      • Generic OLE2 / Multistream Compound File (8008/1) 6.09%
                                      File name:j45EY4ovxx.msi
                                      File size:2'438'144 bytes
                                      MD5:38ec29dc1f2a166922af153924482783
                                      SHA1:1af683febce11f3c95970ba8d876a341da7f5d13
                                      SHA256:5163541fd0f7a9dedfc220b437037d626e9ec32c50440ce3d81314d955cb223c
                                      SHA512:3a6c74b3ddcd912581de4e42b082f132f4fb88ec4d196318391da8ba2df00a7b7aa3835ed9ca6c8716ba26c9c559db5c75ef0ba78d9d00e3c1c5d58d627821e5
                                      SSDEEP:49152:k/p3z0A+biU50unDN5GQizNkyRmopy4duG/8Wea/xwuUkd4:cK3INkomkym
                                      TLSH:98B5BE217387C43AE5AD01B3A929EE6E553DAE770B3005D7B3E4399E1D708C1667AB03
                                      File Content Preview:........................>...................&...................................F.......w.......Q...R...S...T...U...V...W.......T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c..................................................................
                                      Icon Hash:2d2e3797b32b2b99
                                      TimestampSource PortDest PortSource IPDest IP
                                      Nov 14, 2024 19:43:02.505616903 CET4937453192.168.2.51.1.1.1
                                      Nov 14, 2024 19:43:02.531429052 CET53493741.1.1.1192.168.2.5
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Nov 14, 2024 19:43:02.505616903 CET192.168.2.51.1.1.10x99e6Standard query (0)ebaltrahal.comA (IP address)IN (0x0001)false

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:13:42:56
                                      Start date:14/11/2024
                                      Path:C:\Windows\System32\msiexec.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\j45EY4ovxx.msi"
                                      Imagebase:0x7ff638cf0000
                                      File size:69'632 bytes
                                      MD5 hash:E5DA170027542E25EDE42FC54C929077
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:1
                                      Start time:13:42:56
                                      Start date:14/11/2024
                                      Path:C:\Windows\System32\msiexec.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\msiexec.exe /V
                                      Imagebase:0x7ff638cf0000
                                      File size:69'632 bytes
                                      MD5 hash:E5DA170027542E25EDE42FC54C929077
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:false

                                      Target ID:3
                                      Start time:13:42:56
                                      Start date:14/11/2024
                                      Path:C:\Windows\SysWOW64\msiexec.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding A38CFB463D4DBDBACFCC2901433DC5C1 C
                                      Imagebase:0xe70000
                                      File size:59'904 bytes
                                      MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:4
                                      Start time:13:43:01
                                      Start date:14/11/2024
                                      Path:C:\Windows\SysWOW64\msiexec.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding A6367389E3E9A6AE9E1BBAB1265F4E9F
                                      Imagebase:0xe70000
                                      File size:59'904 bytes
                                      MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:5
                                      Start time:13:43:01
                                      Start date:14/11/2024
                                      Path:C:\Windows\Installer\MSICE10.tmp
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\Installer\MSICE10.tmp" /DontWait "C:\Users\user\AppData\Roaming\op\\GUP.EXE"
                                      Imagebase:0x610000
                                      File size:420'864 bytes
                                      MD5 hash:3CAC7B7B5A847280D8803A5EB4E2B936
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Antivirus matches:
                                      • Detection: 0%, ReversingLabs
                                      Reputation:low
                                      Has exited:true

                                      Target ID:6
                                      Start time:13:43:01
                                      Start date:14/11/2024
                                      Path:C:\Users\user\AppData\Roaming\op\GUP.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Roaming\op\GUP.exe"
                                      Imagebase:0x730000
                                      File size:632'664 bytes
                                      MD5 hash:7BE4B26502BB2A8ED4982805B590DEC5
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: Windows_Trojan_Matanbuchus_58a61aaa, Description: unknown, Source: 00000006.00000002.2292258011.000000006BEB1000.00000020.00000001.01000000.00000006.sdmp, Author: unknown
                                      Antivirus matches:
                                      • Detection: 0%, ReversingLabs
                                      Reputation:low
                                      Has exited:true

                                      Target ID:9
                                      Start time:13:43:02
                                      Start date:14/11/2024
                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 1260
                                      Imagebase:0xa50000
                                      File size:483'680 bytes
                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:1.3%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:27.5%
                                        Total number of Nodes:324
                                        Total number of Limit Nodes:7
                                        execution_graph 34540 6181b0 34543 618210 GetTokenInformation 34540->34543 34544 6181e8 34543->34544 34545 61828e GetLastError 34543->34545 34545->34544 34546 618299 34545->34546 34547 6182de GetTokenInformation 34546->34547 34548 6182a9 moneypunct 34546->34548 34549 6182b9 34546->34549 34547->34544 34548->34547 34552 6184a0 50 API calls 2 library calls 34549->34552 34551 6182c2 34551->34547 34552->34551 34553 639b32 34554 639b3e ___scrt_is_nonwritable_in_current_image 34553->34554 34579 639682 34554->34579 34556 639c98 34626 63a1f1 4 API calls 2 library calls 34556->34626 34557 639b45 34557->34556 34568 639b6f ___scrt_is_nonwritable_in_current_image __CreateFrameInfo ___scrt_release_startup_lock 34557->34568 34559 639c9f 34627 64a713 44 API calls __CreateFrameInfo 34559->34627 34561 639ca5 34628 64a6d7 44 API calls __CreateFrameInfo 34561->34628 34563 639cad 34564 639b8e 34565 639c0f 34590 63a306 34565->34590 34567 639c15 34594 621ee0 GetCommandLineW 34567->34594 34568->34564 34568->34565 34625 64a6ed 44 API calls 3 library calls 34568->34625 34580 63968b 34579->34580 34629 639cec IsProcessorFeaturePresent 34580->34629 34582 639697 34630 63cca8 10 API calls 2 library calls 34582->34630 34584 63969c 34589 6396a0 34584->34589 34631 64b1be 34584->34631 34587 6396b7 34587->34557 34589->34557 34640 63ae90 34590->34640 34592 63a319 GetStartupInfoW 34593 63a32c 34592->34593 34593->34567 34595 621f20 34594->34595 34641 614f50 LocalAlloc 34595->34641 34597 621f31 34642 618de0 34597->34642 34599 621f89 34600 621f9d 34599->34600 34601 621f8d 34599->34601 34650 621090 LocalAlloc LocalAlloc 34600->34650 34697 6189d0 84 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 34601->34697 34604 621f96 34607 6220e6 ExitProcess 34604->34607 34605 621fa9 34651 6213a0 34605->34651 34612 621feb 34669 61ae70 34612->34669 34614 622042 34615 622074 34614->34615 34616 612ae0 45 API calls 34614->34616 34620 6220c8 34615->34620 34675 619060 34615->34675 34616->34615 34618 6220af 34619 6220bb 34618->34619 34618->34620 34698 6218c0 CreateFileW SetFilePointer WriteFile CloseHandle 34619->34698 34699 6140d0 45 API calls 34620->34699 34623 6220d7 34700 6220f0 LocalFree LocalFree 34623->34700 34625->34565 34626->34559 34627->34561 34628->34563 34629->34582 34630->34584 34635 6527f6 34631->34635 34634 63ccc7 7 API calls 2 library calls 34634->34589 34636 652806 34635->34636 34637 6396a9 34635->34637 34636->34637 34639 64f530 VirtualProtect 34636->34639 34637->34587 34637->34634 34639->34636 34640->34592 34641->34597 34643 618e32 34642->34643 34644 618e74 34643->34644 34647 618e62 34643->34647 34645 6394f0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 34644->34645 34646 618e82 34645->34646 34646->34599 34701 6394f0 34647->34701 34649 618e70 34649->34599 34650->34605 34652 6213b4 34651->34652 34654 62176e 34651->34654 34653 621787 34652->34653 34652->34654 34709 618620 9 API calls 34653->34709 34658 612ae0 34654->34658 34656 621791 RegOpenKeyExW 34656->34654 34657 6217ac RegQueryValueExW 34656->34657 34657->34654 34659 612b01 34658->34659 34659->34659 34710 613b70 34659->34710 34661 612b19 34662 619380 34661->34662 34718 612b20 34662->34718 34664 6193c6 34734 619b40 34664->34734 34670 61ae7a 34669->34670 34671 61ae7d 34669->34671 34670->34614 34673 61ae8a ___vcrt_FlsGetValue 34671->34673 34782 643173 45 API calls 2 library calls 34671->34782 34673->34614 34674 61ae9d 34674->34614 34676 619094 34675->34676 34677 6190a9 34675->34677 34676->34618 34783 616050 GetCurrentProcess OpenProcessToken 34677->34783 34679 6190bc 34680 619196 34679->34680 34683 6190d6 34679->34683 34681 611fd0 65 API calls 34680->34681 34682 6191bd 34681->34682 34685 611fd0 65 API calls 34682->34685 34788 611fd0 34683->34788 34687 6191d2 34685->34687 34686 6190ea 34688 611fd0 65 API calls 34686->34688 34689 611fd0 65 API calls 34687->34689 34690 619107 34688->34690 34691 6191e3 34689->34691 34692 611fd0 65 API calls 34690->34692 34854 617800 34691->34854 34694 619115 34692->34694 34807 616fe0 34694->34807 34696 61912d 34696->34618 34697->34604 34698->34620 34699->34623 34700->34607 34702 6394f9 IsProcessorFeaturePresent 34701->34702 34703 6394f8 34701->34703 34705 63989a 34702->34705 34703->34649 34708 63985d SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 34705->34708 34707 63997d 34707->34649 34708->34707 34709->34656 34711 613c41 34710->34711 34715 613b84 codecvt 34710->34715 34717 6136e0 45 API calls 34711->34717 34715->34661 34720 612b46 34718->34720 34719 612c01 34772 6136e0 45 API calls 34719->34772 34720->34719 34721 612b5b codecvt 34720->34721 34724 612bfc 34720->34724 34726 612bd0 LocalAlloc 34720->34726 34727 612b95 34720->34727 34721->34664 34723 612c06 34773 63e447 44 API calls 2 library calls 34723->34773 34771 613b50 RaiseException CallUnexpected 34724->34771 34726->34721 34727->34724 34729 612b9c LocalAlloc 34727->34729 34729->34723 34731 612bab 34729->34731 34731->34721 34735 619b9a ___vcrt_FlsGetValue 34734->34735 34739 619d02 ___vcrt_FlsGetValue 34734->34739 34738 619bc5 34735->34738 34735->34739 34736 6394f0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 34737 6193db 34736->34737 34761 619e60 34737->34761 34740 619e41 34738->34740 34741 619be2 34738->34741 34743 619e4b 34739->34743 34744 619d5b 34739->34744 34756 619ce9 34739->34756 34777 6146e0 45 API calls 34740->34777 34745 613b70 45 API calls 34741->34745 34779 6146e0 45 API calls 34743->34779 34748 613b70 45 API calls 34744->34748 34749 619c06 34745->34749 34746 619e46 34778 63e447 44 API calls 2 library calls 34746->34778 34750 619d7f 34748->34750 34774 61a150 48 API calls codecvt 34749->34774 34776 613d20 45 API calls 34750->34776 34755 619c21 34775 613d20 45 API calls 34755->34775 34756->34736 34758 619c6a 34758->34746 34758->34756 34759 619cde 34758->34759 34759->34756 34760 619ce2 LocalFree 34759->34760 34760->34756 34770 619edc codecvt 34761->34770 34762 6193f3 34762->34612 34763 61a0f7 34763->34762 34765 61a111 LocalFree 34763->34765 34764 61a141 34780 63e447 44 API calls 2 library calls 34764->34780 34765->34762 34767 61a146 34781 6146e0 45 API calls 34767->34781 34770->34762 34770->34763 34770->34764 34770->34767 34774->34755 34775->34758 34776->34756 34782->34674 34784 616071 34783->34784 34785 616077 GetTokenInformation 34783->34785 34784->34679 34786 6160a6 34785->34786 34787 6160ae CloseHandle 34785->34787 34786->34787 34787->34679 34904 6125a0 34788->34904 34791 612109 34923 6118e0 LocalFree RaiseException CallUnexpected 34791->34923 34792 61200a 34806 6120bb 34792->34806 34919 611cc0 10 API calls 34792->34919 34794 6120ab 34794->34806 34924 6118e0 LocalFree RaiseException CallUnexpected 34794->34924 34796 61211d 34798 612048 34799 612052 FindResourceW 34798->34799 34798->34806 34800 61206a 34799->34800 34799->34806 34920 611d80 LoadResource LockResource SizeofResource 34800->34920 34802 612074 34803 61209b 34802->34803 34802->34806 34921 612810 44 API calls 34802->34921 34922 63e8d2 44 API calls 3 library calls 34803->34922 34806->34686 34808 616050 4 API calls 34807->34808 34809 61702a 34808->34809 34810 617030 34809->34810 34811 617052 CoInitialize CoCreateInstance 34809->34811 34812 617800 88 API calls 34810->34812 34813 617095 VariantInit 34811->34813 34819 61708c 34811->34819 34814 61704a 34812->34814 34815 6170e3 34813->34815 34816 6394f0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 34814->34816 34820 6170f2 IUnknown_QueryService 34815->34820 34826 6170e9 VariantClear 34815->34826 34818 6176a9 34816->34818 34817 617689 CoUninitialize 34817->34814 34818->34696 34819->34814 34819->34817 34821 617121 34820->34821 34820->34826 34823 6171aa IUnknown_QueryInterface_Proxy 34821->34823 34821->34826 34824 6171b9 34823->34824 34823->34826 34825 61720c IUnknown_QueryInterface_Proxy 34824->34825 34824->34826 34825->34826 34827 61721b CoAllowSetForegroundWindow 34825->34827 34826->34819 34828 617292 SysAllocString 34827->34828 34829 61722f SysAllocString 34827->34829 34828->34829 34830 6176b2 _com_issue_error 34828->34830 34832 617262 SysAllocString 34829->34832 34833 61725a 34829->34833 34936 6118e0 LocalFree RaiseException CallUnexpected 34830->34936 34835 617288 34832->34835 34836 6172ab VariantInit 34832->34836 34833->34830 34833->34832 34835->34830 34835->34836 34840 617331 34836->34840 34837 6176c6 34837->34696 34838 617337 VariantClear VariantClear VariantClear VariantClear SysFreeString 34838->34826 34840->34838 34851 617382 34840->34851 34841 613b70 45 API calls 34841->34851 34845 6176ad 34935 63e447 44 API calls 2 library calls 34845->34935 34846 617428 LocalFree 34846->34851 34848 61747d OpenProcess WaitForSingleObject 34850 6174b2 GetExitCodeProcess 34848->34850 34848->34851 34850->34851 34851->34838 34851->34840 34851->34841 34851->34845 34851->34846 34851->34848 34852 6174cc CloseHandle 34851->34852 34853 617517 LocalFree 34851->34853 34931 614170 51 API calls 2 library calls 34851->34931 34932 6162b0 92 API calls 2 library calls 34851->34932 34933 613d20 45 API calls 34851->34933 34934 616b50 10 API calls 34851->34934 34852->34851 34853->34851 34855 617874 34854->34855 34937 612120 45 API calls 4 library calls 34855->34937 34857 61788c 34938 612120 45 API calls 4 library calls 34857->34938 34859 6178a3 34939 617fb0 57 API calls 2 library calls 34859->34939 34861 6178bb 34862 617c8b 34861->34862 34863 6178ea 34861->34863 34940 612810 44 API calls 34861->34940 34948 6118e0 LocalFree RaiseException CallUnexpected 34862->34948 34941 642f8c 46 API calls 34863->34941 34867 617c95 GetWindowThreadProcessId 34869 617cf1 34867->34869 34870 617cbe GetWindowLongW 34867->34870 34868 6178f8 34868->34862 34871 617909 34868->34871 34869->34696 34870->34696 34942 612120 45 API calls 4 library calls 34871->34942 34873 617a5d GetForegroundWindow 34875 617a66 34873->34875 34874 617a76 ShellExecuteExW 34876 617a90 34874->34876 34877 617a87 34874->34877 34875->34874 34880 617acb 34876->34880 34883 617aa6 ShellExecuteExW 34876->34883 34945 617e40 6 API calls 34877->34945 34878 6179cf GetWindowsDirectoryW 34943 611950 68 API calls 34878->34943 34887 617bae 34880->34887 34888 617af7 GetModuleHandleW GetProcAddress 34880->34888 34881 61791e 34881->34878 34890 617a08 34881->34890 34883->34880 34885 617ac2 34883->34885 34884 6179f0 34944 611950 68 API calls 34884->34944 34946 617e40 6 API calls 34885->34946 34891 617bd8 34887->34891 34892 617bc2 WaitForSingleObject GetExitCodeProcess 34887->34892 34893 617b1b AllowSetForegroundWindow 34888->34893 34890->34873 34890->34875 34947 617f30 CloseHandle 34891->34947 34892->34891 34893->34887 34896 617b2f 34893->34896 34896->34887 34898 617b38 GetModuleHandleW GetProcAddress 34896->34898 34897 617be7 34899 6394f0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 34897->34899 34898->34887 34901 617b56 34898->34901 34900 617c83 34899->34900 34900->34696 34901->34887 34902 617b6c Sleep EnumWindows 34901->34902 34902->34901 34903 617b98 SetWindowPos 34902->34903 34903->34887 34905 6125d8 34904->34905 34917 61262c 34904->34917 34925 6395a8 AcquireSRWLockExclusive ReleaseSRWLockExclusive SleepConditionVariableSRW 34905->34925 34907 6125e2 34909 6125ee GetProcessHeap 34907->34909 34907->34917 34926 639848 47 API calls 34909->34926 34910 612646 34918 612000 34910->34918 34929 639848 47 API calls 34910->34929 34913 61261b 34927 639557 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 34913->34927 34914 6126a6 34930 639557 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 34914->34930 34917->34918 34928 6395a8 AcquireSRWLockExclusive ReleaseSRWLockExclusive SleepConditionVariableSRW 34917->34928 34918->34791 34918->34792 34919->34798 34920->34802 34921->34803 34922->34794 34923->34794 34924->34796 34925->34907 34926->34913 34927->34917 34928->34910 34929->34914 34930->34918 34931->34851 34932->34851 34933->34851 34934->34851 34936->34837 34937->34857 34938->34859 34939->34861 34940->34863 34941->34868 34942->34881 34943->34884 34944->34890 34945->34876 34946->34880 34947->34897 34948->34867 34949 64d2d0 34959 64f553 34949->34959 34953 64d2e4 34954 64d2ee 34953->34954 34955 64d1f2 __dosmaperr 13 API calls 34953->34955 34956 64d2f6 34955->34956 34957 64d303 34956->34957 34958 64d310 FlsFree 34956->34958 34958->34954 34960 64f561 34959->34960 34961 64d2d5 34959->34961 34960->34961 34964 64f02d 34960->34964 34963 64f27c FlsAlloc 34961->34963 34970 64f03e 34964->34970 34965 64f07a 34980 6494a1 EnterCriticalSection 34965->34980 34967 64f0e6 GetProcAddress 34967->34965 34969 64f083 VirtualProtect 34971 64f0f4 34969->34971 34972 64f0a0 VirtualProtect 34969->34972 34970->34965 34970->34967 34973 64f0d7 34970->34973 34981 64f0fa LoadLibraryExW GetLastError LoadLibraryExW ___vcrt_FlsGetValue 34970->34981 34983 64a227 44 API calls __CreateFrameInfo 34971->34983 34972->34971 34974 64f0c8 34972->34974 34973->34967 34975 64f0df FreeLibrary 34973->34975 34982 6494f1 LeaveCriticalSection 34974->34982 34975->34967 34978 64f0f9 34979 64f0cf 34979->34961 34980->34969 34981->34970 34982->34979 34983->34978

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 616fe0-61702e call 616050 3 617030-61704d call 617800 0->3 4 617052-61708a CoInitialize CoCreateInstance 0->4 12 617692-6176ac call 6394f0 3->12 6 617095-6170e7 VariantInit 4->6 7 61708c-617090 4->7 20 6170f2-617116 IUnknown_QueryService 6->20 21 6170e9-6170ed 6->21 9 617661-61766a 7->9 10 61767c-617687 9->10 11 61766c-61767a 9->11 15 617689 CoUninitialize 10->15 16 61768f 10->16 11->10 15->16 16->12 23 617121-617145 20->23 24 617118-61711c 20->24 22 617635-61763e 21->22 25 617650-61765b VariantClear 22->25 26 617640-61764e 22->26 33 617150-61717b 23->33 34 617147-61714b 23->34 27 61761a-617623 24->27 25->9 26->25 27->22 29 617625-617633 27->29 29->22 40 617186-6171ae IUnknown_QueryInterface_Proxy 33->40 41 61717d-617181 33->41 35 6175ff-617608 34->35 35->27 36 61760a-617618 35->36 36->27 45 6171b0-6171b4 40->45 46 6171b9-6171dd 40->46 42 6175e4-6175ed 41->42 42->35 44 6175ef-6175fd 42->44 44->35 47 6175c9-6175d2 45->47 53 6171e8-617210 IUnknown_QueryInterface_Proxy 46->53 54 6171df-6171e3 46->54 47->42 50 6175d4-6175e2 47->50 50->42 58 617212-617216 53->58 59 61721b-61722d CoAllowSetForegroundWindow 53->59 55 6175ae-6175b7 54->55 55->47 56 6175b9-6175c7 55->56 56->47 61 617593-61759c 58->61 62 617292-6172a3 SysAllocString 59->62 63 61722f-617231 59->63 61->55 64 61759e-6175ac 61->64 65 6172a9 62->65 66 6176bc-617702 call 6118e0 62->66 67 617237-617258 SysAllocString 63->67 64->55 65->67 78 617714-617723 66->78 79 617704-617712 66->79 68 617262-617286 SysAllocString 67->68 69 61725a-61725c 67->69 72 617288-61728a 68->72 73 6172ab-617335 VariantInit 68->73 69->68 71 6176b2-6176b7 call 622170 69->71 71->66 72->71 76 617290 72->76 83 617340-617344 73->83 84 617337-61733b 73->84 76->73 79->78 86 617540 83->86 87 61734a-61734f 83->87 85 617544-61758d VariantClear * 4 SysFreeString 84->85 85->61 86->85 88 617352-617371 87->88 89 617377-617380 88->89 89->89 90 617382-6173fe call 613b70 call 614170 call 6162b0 call 613d20 89->90 99 617400-617411 90->99 100 61742f-61744b 90->100 101 617413-61741e 99->101 102 617424-617426 99->102 103 617452 100->103 104 61744d-617450 100->104 101->102 106 6176ad call 63e447 101->106 102->100 107 617428-617429 LocalFree 102->107 105 617459-61745b 103->105 104->105 108 617461-61746b 105->108 109 6174e0-6174ef 105->109 106->71 107->100 111 61747d-6174b0 OpenProcess WaitForSingleObject 108->111 112 61746d-61747b call 616b50 108->112 113 6174f1-617500 109->113 114 617533-61753a 109->114 116 6174b2-6174b4 GetExitCodeProcess 111->116 117 6174ba-6174ca 111->117 112->111 118 617513-617515 113->118 119 617502-61750d 113->119 114->86 114->88 116->117 121 6174dd 117->121 122 6174cc-6174d3 CloseHandle 117->122 123 617517-617518 LocalFree 118->123 124 61751e-61752c 118->124 119->106 119->118 121->109 122->121 123->124 124->114
                                        APIs
                                          • Part of subcall function 00616050: GetCurrentProcess.KERNEL32(00000008,?,C1C81EE7), ref: 00616060
                                          • Part of subcall function 00616050: OpenProcessToken.ADVAPI32(00000000), ref: 00616067
                                        • CoInitialize.OLE32(00000000), ref: 00617052
                                        • CoCreateInstance.OLE32(0065FD30,00000000,00000004,0066A530,00000000,?), ref: 00617082
                                        • CoUninitialize.COMBASE ref: 00617689
                                        • _com_issue_error.COMSUPP ref: 006176B7
                                          • Part of subcall function 006118E0: LocalFree.KERNEL32(?,C1C81EE7,?,00000000,0065B020,000000FF,?,?,00670558,?,?,006116A4,80004005), ref: 0061192C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Process$CreateCurrentFreeInitializeInstanceLocalOpenTokenUninitialize_com_issue_error
                                        • String ID: $
                                        • API String ID: 2507920217-3993045852
                                        • Opcode ID: 2703456e967bbf36b6d694c5c65cc59da6ee15588dfb85873980df3bf337093a
                                        • Instruction ID: 15952a0415d01c9d62099def6af36cf11c79bf9e41aefbf25852ce6245fdb6f8
                                        • Opcode Fuzzy Hash: 2703456e967bbf36b6d694c5c65cc59da6ee15588dfb85873980df3bf337093a
                                        • Instruction Fuzzy Hash: 5032AE70A08358DFDB15CFA8C808BEDBBB6AF49304F184199E805EB391DB759E85CB51

                                        Control-flow Graph

                                        APIs
                                        • GetLastError.KERNEL32(?,0064D268,?,0063E0E9,?,?,?,?,?,?,0061163C,?,?,00000020), ref: 0064D0B1
                                        • SetLastError.KERNEL32(00000000,000000FF,?,0063E0E9,?,?,?,?,?,?,0061163C,?,?,00000020), ref: 0064D0CB
                                        • SetLastError.KERNEL32(00000000,00000000,00000000,?,000000FF,?,0063E0E9,?,?,?,?,?,?,0061163C,?,?), ref: 0064D101
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ErrorLast
                                        • String ID: h!g
                                        • API String ID: 1452528299-3872170642
                                        • Opcode ID: 59126430c4091def6273d89e78cc4f9d4ea549cd30e351fae7f016729d6cedd3
                                        • Instruction ID: d0c2890c1680838c337e07f7dc554d1f19c6a062812754dab7a0ff8cc6c6e934
                                        • Opcode Fuzzy Hash: 59126430c4091def6273d89e78cc4f9d4ea549cd30e351fae7f016729d6cedd3
                                        • Instruction Fuzzy Hash: 3601F132A052006EE39137B0BC8AD6F2B9BFF417B5B500139FA08912A2FE914C424259

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 152 64f02d-64f03c 153 64f075-64f078 152->153 154 64f03e-64f04c 153->154 155 64f07a 153->155 156 64f04e-64f050 154->156 157 64f058-64f069 call 64f0fa 154->157 158 64f07c-64f09e call 6494a1 VirtualProtect 155->158 160 64f0e6-64f0f2 GetProcAddress 156->160 161 64f056 156->161 168 64f0d7-64f0dd 157->168 169 64f06b-64f070 157->169 166 64f0f4-64f0f9 call 64a227 158->166 167 64f0a0-64f0c6 VirtualProtect 158->167 160->158 164 64f072 161->164 164->153 167->166 170 64f0c8-64f0d6 call 6494f1 167->170 168->160 171 64f0df-64f0e0 FreeLibrary 168->171 169->164 171->160
                                        APIs
                                        • VirtualProtect.KERNELBASE(00676000,00000080,00000004,00000000,?,?,0064F188,0000001A,AppPolicyGetProcessTerminationMethod,00664848,AppPolicyGetProcessTerminationMethod,?,?,0065167E,00000000), ref: 0064F096
                                        • VirtualProtect.KERNELBASE(00676000,00000080,00000002,00000000,?,?,0064F188,0000001A,AppPolicyGetProcessTerminationMethod,00664848,AppPolicyGetProcessTerminationMethod,?,?,0065167E,00000000), ref: 0064F0BE
                                        • FreeLibrary.KERNEL32(00000000,?,?,?,?,0064F188,0000001A,AppPolicyGetProcessTerminationMethod,00664848,AppPolicyGetProcessTerminationMethod,?,?,0065167E,00000000), ref: 0064F0E0
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 0064F0EA
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual$AddressFreeLibraryProc
                                        • String ID:
                                        • API String ID: 3998452802-0
                                        • Opcode ID: 57c284efb52ec3d3cde639b8d433a8b38e14a2406860861e9f1a72b5685f3073
                                        • Instruction ID: 2a8dced443562cc3797afcb67d110e054e5669e507da10c45f2344778ec96ab8
                                        • Opcode Fuzzy Hash: 57c284efb52ec3d3cde639b8d433a8b38e14a2406860861e9f1a72b5685f3073
                                        • Instruction Fuzzy Hash: 3B21D732600225ABDB319F69DC55E9B379AEF81B70F24423AF911D7291DE61DC0186A1

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 176 616050-61606f GetCurrentProcess OpenProcessToken 177 616071-616076 176->177 178 616077-6160a4 GetTokenInformation 176->178 179 6160a6-6160ab 178->179 180 6160ae-6160be CloseHandle 178->180 179->180
                                        APIs
                                        • GetCurrentProcess.KERNEL32(00000008,?,C1C81EE7), ref: 00616060
                                        • OpenProcessToken.ADVAPI32(00000000), ref: 00616067
                                        • GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?), ref: 0061609C
                                        • CloseHandle.KERNEL32(?), ref: 006160B2
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                        • String ID:
                                        • API String ID: 215268677-0
                                        • Opcode ID: 72e193686657d15f72cb86c1f2ef2260ba66ae1b456925ad224b59180e2fc088
                                        • Instruction ID: 02b9af8c3bfd168fc3c9436bb80a974fceee98a81d6c8c646901d7bf8705f4e9
                                        • Opcode Fuzzy Hash: 72e193686657d15f72cb86c1f2ef2260ba66ae1b456925ad224b59180e2fc088
                                        • Instruction Fuzzy Hash: 4AF06274144301ABEB10DF20EC49BAA77E9BB44705F488829F984C22A0D378855CEA63

                                        Control-flow Graph

                                        APIs
                                        • GetCommandLineW.KERNEL32(C1C81EE7,?,0000FFFF), ref: 00621F0D
                                          • Part of subcall function 00614F50: LocalAlloc.KERNEL32(00000040,?,?,?,?,?,00000000,00000000,?,?), ref: 00614F6C
                                        • ExitProcess.KERNEL32 ref: 006220E7
                                          • Part of subcall function 006189D0: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00618A4D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: AllocCommandCreateExitFileLineLocalProcess
                                        • String ID: Full command line:
                                        • API String ID: 1878577176-831861440
                                        • Opcode ID: 1d5165c116f5f2b9cf57db2edec151c3b8b954f30404e904b785f444d6d452b3
                                        • Instruction ID: 1f7e8319efc5b5746d690953db36c4211c63792dad5ea18b8077f8b5ecf82a9a
                                        • Opcode Fuzzy Hash: 1d5165c116f5f2b9cf57db2edec151c3b8b954f30404e904b785f444d6d452b3
                                        • Instruction Fuzzy Hash: 125171318141689ECB65EB60DC69BEEB776AF11300F1881DCE00967292EF741F89CBA5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 239 618210-61828c GetTokenInformation 240 6182f0-618303 239->240 241 61828e-618297 GetLastError 239->241 241->240 242 618299-6182a7 241->242 243 6182a9-6182ac 242->243 244 6182ae 242->244 245 6182db 243->245 246 6182b0-6182b7 244->246 247 6182de-6182ea GetTokenInformation 244->247 245->247 248 6182c7-6182d8 call 63ae90 246->248 249 6182b9-6182c5 call 6184a0 246->249 247->240 248->245 249->247
                                        APIs
                                        • GetTokenInformation.KERNELBASE(?,00000001(TokenIntegrityLevel),00000000,00000000,006181E8,C1C81EE7), ref: 00618284
                                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,00000000,00000000,006181E8,C1C81EE7), ref: 0061828E
                                        • GetTokenInformation.KERNELBASE(?,00000001(TokenIntegrityLevel),?,00000000,00000000,?,TokenIntegrityLevel,00000000,00000000,006181E8,C1C81EE7), ref: 006182EA
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: InformationToken$ErrorLast
                                        • String ID:
                                        • API String ID: 2567405617-0
                                        • Opcode ID: 690c86c7df0d2eb385de810e33efe1ca838b429801cd8c83e6f847dc124e1504
                                        • Instruction ID: c666cd23638b61d4bdffec3d91f80d770953289011061e6fa82b9431dbc5f12f
                                        • Opcode Fuzzy Hash: 690c86c7df0d2eb385de810e33efe1ca838b429801cd8c83e6f847dc124e1504
                                        • Instruction Fuzzy Hash: 15316B71A00605AFDB24CF98CC45BAFBBFAFF44714F14452EE415A7280DBB5AA448BE0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 254 64ed50-64ed5b 255 64ed5d-64ed67 254->255 256 64ed69-64ed75 254->256 255->256 257 64eda0-64edab call 63e5d2 255->257 258 64ed8b-64ed9c RtlAllocateHeap 256->258 263 64edad-64edaf 257->263 259 64ed77-64ed7e call 64cb10 258->259 260 64ed9e 258->260 259->257 266 64ed80-64ed89 call 652890 259->266 260->263 266->257 266->258
                                        APIs
                                        • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0064D0E3,00000001,00000364,00000000,?,000000FF,?,0063E0E9,?,?,?), ref: 0064ED94
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: AllocateHeap
                                        • String ID:
                                        • API String ID: 1279760036-0
                                        • Opcode ID: 169024a257cb808732df986dde7dfc796a802c4fedb95a9135010a2289b8224a
                                        • Instruction ID: fd13a366b77e16da93ed495607a881f5f8ab3efdf16d0296a502e2e8dd329255
                                        • Opcode Fuzzy Hash: 169024a257cb808732df986dde7dfc796a802c4fedb95a9135010a2289b8224a
                                        • Instruction Fuzzy Hash: F8F0E932E41636AADBA06B75DC05A9B378BFF413B0F154525FC05E7280DF32D90145E4

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 269 64f530-64f552 VirtualProtect
                                        APIs
                                        • VirtualProtect.KERNELBASE(00676000,00000080,00000002,?), ref: 0064F546
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual
                                        • String ID:
                                        • API String ID: 544645111-0
                                        • Opcode ID: d77dd71bcbb76e80bebb7fc5644fbae09c9d742a74c0781063af1eb1771fad3d
                                        • Instruction ID: 2644fd6ace4ee26b7b17fe270c4c99077b023e53da29b182314bdd1990d66a7e
                                        • Opcode Fuzzy Hash: d77dd71bcbb76e80bebb7fc5644fbae09c9d742a74c0781063af1eb1771fad3d
                                        • Instruction Fuzzy Hash: CDC08C31340308BBE7209BA2CC0BF4B369EA780F51F058124B646E60C0D9A0ED084260
                                        APIs
                                        • GetWindowsDirectoryW.KERNEL32(00000010,00000104,?,?,?), ref: 006179D8
                                        • GetForegroundWindow.USER32(?,?,?), ref: 00617A5D
                                        • ShellExecuteExW.SHELL32(?), ref: 00617A7A
                                        • ShellExecuteExW.SHELL32(?), ref: 00617AB8
                                        • GetModuleHandleW.KERNEL32(Kernel32.dll,GetProcessId,?,?,?,?), ref: 00617B01
                                        • GetProcAddress.KERNEL32(00000000), ref: 00617B08
                                        • AllowSetForegroundWindow.USER32(00000000), ref: 00617B1E
                                        • GetModuleHandleW.KERNEL32(Kernel32.dll,GetProcessId,?,?,?,?), ref: 00617B42
                                        • GetProcAddress.KERNEL32(00000000), ref: 00617B49
                                        • Sleep.KERNEL32(00000064,?,?,?,?), ref: 00617B6E
                                        • EnumWindows.USER32(00617CA0,?), ref: 00617B8A
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00004003,?,?,?,?), ref: 00617BA8
                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?), ref: 00617BC5
                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00617BD2
                                        • GetWindowThreadProcessId.USER32(?,?), ref: 00617CAC
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00617CC4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Window$AddressExecuteForegroundHandleModuleProcProcessShellWindows$AllowCodeDirectoryEnumExitLongObjectSingleSleepThreadWait
                                        • String ID: %s\System32\cmd.exe$.bat$.cmd$/C ""%s" %s"$GetProcessId$Kernel32.dll$open$runas
                                        • API String ID: 3646750338-986041216
                                        • Opcode ID: 30aa488a2702fbc884491d784ec2aee11eb896f934cdb739818b5d17b2247a4c
                                        • Instruction ID: 8133340f9d8aa95abc14836261809cfaeb6f35e459386906efc1a320514d6a8f
                                        • Opcode Fuzzy Hash: 30aa488a2702fbc884491d784ec2aee11eb896f934cdb739818b5d17b2247a4c
                                        • Instruction Fuzzy Hash: 7FF18D71A043099FDB10DFA8C888AEEBBB6FF18311F184569E515EB391DB319E45CB60
                                        APIs
                                        • _swprintf.LIBCMT ref: 0061D5C2
                                        • LocalFree.KERNEL32(00000000,?,?,?,?,?,00000000,00000000,?), ref: 0061D61D
                                        • _swprintf.LIBCMT ref: 0061D822
                                        • LocalFree.KERNEL32(00000000,?,?,?,?,?,00000000,00000000,?), ref: 0061D87D
                                        • _swprintf.LIBCMT ref: 0061D958
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: _swprintf$FreeLocal
                                        • String ID: %$+
                                        • API String ID: 2429749586-2626897407
                                        • Opcode ID: 6dda37a40db29f8c96706d248f798a7e919b43ce984424b61ad7e22a73f123d6
                                        • Instruction ID: e9bbaeaa3210245753d859b469faa243f0efb1e63ed9f7821766ffc143d6edac
                                        • Opcode Fuzzy Hash: 6dda37a40db29f8c96706d248f798a7e919b43ce984424b61ad7e22a73f123d6
                                        • Instruction Fuzzy Hash: 5502DF71D002199FDB19DFA8DC44BEEBBB6FF49304F184229F815AB281D7349985CB91
                                        APIs
                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,C1C81EE7), ref: 00616322
                                        • CloseHandle.KERNEL32(00000000), ref: 00616363
                                        • Process32FirstW.KERNEL32(?,0000022C), ref: 006163A5
                                        • OpenProcess.KERNEL32(00000410,00000000,?), ref: 006163C0
                                        • CloseHandle.KERNEL32(?), ref: 00616517
                                        • Process32NextW.KERNEL32(?,0000022C), ref: 00616534
                                        • CloseHandle.KERNEL32(?), ref: 00616565
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: CloseHandle$Process32$CreateFirstNextOpenProcessSnapshotToolhelp32
                                        • String ID:
                                        • API String ID: 708755948-0
                                        • Opcode ID: f1bfc1953d82db9753b528049a2957f31f2c69bcebfc2500baa3d8bfb6e2cd0d
                                        • Instruction ID: 6505a17868407b3c71130a4719ee1d0d811fe63cc27204ca01e9ad9912bade2b
                                        • Opcode Fuzzy Hash: f1bfc1953d82db9753b528049a2957f31f2c69bcebfc2500baa3d8bfb6e2cd0d
                                        • Instruction Fuzzy Hash: B6A14A74905259DFDB20DF68CD48BDEBBBAEF04314F1482D9E409A7290DB759A84CF50
                                        APIs
                                        • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 006551BF
                                        • IsValidCodePage.KERNEL32(00000000), ref: 006551FD
                                        • IsValidLocale.KERNEL32(?,00000001), ref: 00655210
                                        • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00655258
                                        • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00655273
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Locale$InfoValid$CodeDefaultPageUser
                                        • String ID: lVf
                                        • API String ID: 3475089800-4139570665
                                        • Opcode ID: 71a93bbe945ec173b9eb5c9ce7147b058069b0f99a546b9e4562436fe316a218
                                        • Instruction ID: 5f0cdbd774f2e2bd0344da59346ce7d94f6869f7b536a063ec0e6d13d0afb425
                                        • Opcode Fuzzy Hash: 71a93bbe945ec173b9eb5c9ce7147b058069b0f99a546b9e4562436fe316a218
                                        • Instruction Fuzzy Hash: AB518471A00A05ABDB60DFA4CC59BFF77BABF04702F144469ED02E7251EB709A488B60
                                        APIs
                                        • __libm_sse2_log10_precise.LIBCMT ref: 00655C85
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: __libm_sse2_log10_precise
                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                        • API String ID: 3323863637-2761157908
                                        • Opcode ID: ca7dae276ec93b3023ae85b73a8f3a9bac62a6cbcc0aed94a48905391dccad71
                                        • Instruction ID: 5a5431eccf05205e695f57e59bdb4afba3ccc3a79f29a4ffd4d84d006f9ca813
                                        • Opcode Fuzzy Hash: ca7dae276ec93b3023ae85b73a8f3a9bac62a6cbcc0aed94a48905391dccad71
                                        • Instruction Fuzzy Hash: 54C27E71E086288FDB65CE28CD447EAB7B6EB44305F5441EAE84DE7240EB74AE85CF41
                                        APIs
                                        • GetACP.KERNEL32(?,?,?,?,?,?,0064BB76,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 006547DD
                                        • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,0064BB76,?,?,?,00000055,?,-00000050,?,?), ref: 00654814
                                        • GetLocaleInfoW.KERNEL32(00000000,00001002,?,00000078,-00000050,00000000,000000D0), ref: 00654980
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: CodeInfoLocalePageValid
                                        • String ID: lVf$utf8
                                        • API String ID: 790303815-1546860302
                                        • Opcode ID: c000864164d9e408fe7007e6c5b7c89acb070917a5eaf08b4f0682a0d0b6b2d8
                                        • Instruction ID: 3299a9347634a6a66083c54793a92f1e16ee0282cbfe756c14330ca0c3ca1022
                                        • Opcode Fuzzy Hash: c000864164d9e408fe7007e6c5b7c89acb070917a5eaf08b4f0682a0d0b6b2d8
                                        • Instruction Fuzzy Hash: BF71DB71600205AAD724AF74CC42BAB73AAEF4970AF1500A9FD05D7285FF70DD89C695
                                        APIs
                                        • GetLocaleInfoW.KERNEL32(?,2000000B,006551ED,00000002,00000000,?,?,?,006551ED,?,00000000), ref: 00654F6E
                                        • GetLocaleInfoW.KERNEL32(?,20001004,006551ED,00000002,00000000,?,?,?,006551ED,?,00000000), ref: 00654F97
                                        • GetACP.KERNEL32(?,?,006551ED,?,00000000), ref: 00654FAC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: InfoLocale
                                        • String ID: ACP$OCP
                                        • API String ID: 2299586839-711371036
                                        • Opcode ID: 709788db1bc7daccef1b38dcc4785701d01fcb97e7fe52abfeff777121df8dbd
                                        • Instruction ID: 3ce6b5883a3471bebdfc62fef06374bc0a4ce6798e77af684de316b39c95bc5d
                                        • Opcode Fuzzy Hash: 709788db1bc7daccef1b38dcc4785701d01fcb97e7fe52abfeff777121df8dbd
                                        • Instruction Fuzzy Hash: 41216032604101AADB348F59D905BDBB3A7ABD4B5AF5680A4ED0ADB204EF32DDC9D350
                                        APIs
                                        • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 0063A1FD
                                        • IsDebuggerPresent.KERNEL32 ref: 0063A2C9
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0063A2E2
                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 0063A2EC
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                        • String ID:
                                        • API String ID: 254469556-0
                                        • Opcode ID: ad9f98e0c7a27acbdcb0edf5e786683ddb77f0f347a0a69239f890aa19d54e3c
                                        • Instruction ID: bbc4ed400cd2794ad008f799edd4d816453ebfc8a8efd9468cbd8bf9b7b94a55
                                        • Opcode Fuzzy Hash: ad9f98e0c7a27acbdcb0edf5e786683ddb77f0f347a0a69239f890aa19d54e3c
                                        • Instruction Fuzzy Hash: C431F5B5D013189BDB21DFA4D9497CDBBB8BF08300F1041AAE44DAB250EB759B849F86
                                        APIs
                                        • GetLocaleInfoEx.KERNEL32(!x-sys-default-locale,20000001,00000000,00000002,?,?,006132C0,?), ref: 006226D5
                                        • FormatMessageA.KERNEL32(00001300,00000000,C1C81EE7,00000000,00000000,00000000,00000000,?,?,?,006132C0,?), ref: 006226FC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: FormatInfoLocaleMessage
                                        • String ID: !x-sys-default-locale
                                        • API String ID: 4235545615-2729719199
                                        • Opcode ID: c148795ee9edb9422d2684b393d00039d5131d2cb789948be168427d2bc135d8
                                        • Instruction ID: 7f4b03605f51d4120225fd5366fac1bfff32da5040f04614cba99466a0bd09fc
                                        • Opcode Fuzzy Hash: c148795ee9edb9422d2684b393d00039d5131d2cb789948be168427d2bc135d8
                                        • Instruction Fuzzy Hash: 3CF06576110615FFFB149B94DC1ADEF77AEEB09391F004029F902D6150E6B0AE00DB70
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5f92108d1559b770655b7c5004e781b0bb4a3dd80ac85cb6c7a0d19db5291400
                                        • Instruction ID: c4e23ee6dce265bfc34aff67ec13de8c1edb07693743871d516e966efd1167de
                                        • Opcode Fuzzy Hash: 5f92108d1559b770655b7c5004e781b0bb4a3dd80ac85cb6c7a0d19db5291400
                                        • Instruction Fuzzy Hash: 73023C71E006199FDF14CFA8D8806EDFBB2FF48314F24826AE916AB345D730A945CB94
                                        APIs
                                        • GetLocaleInfoW.KERNEL32(00000000,00001002,?,00000078), ref: 00654BA7
                                        • GetLocaleInfoW.KERNEL32(00000000,00001001,?,00000078), ref: 00654BEB
                                        • GetLocaleInfoW.KERNEL32(00000000,00001001,?,00000078), ref: 00654CB5
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: InfoLocale
                                        • String ID:
                                        • API String ID: 2299586839-0
                                        • Opcode ID: 966a6b16292954cc707224f95c96228401302f0619d17d706e6f93d6a70f0d56
                                        • Instruction ID: a5e30570d0f9fb477add9f73da82eac5c07f794e94a113470235171d4cbcf6f1
                                        • Opcode Fuzzy Hash: 966a6b16292954cc707224f95c96228401302f0619d17d706e6f93d6a70f0d56
                                        • Instruction Fuzzy Hash: 7F6192715012179FEB289F24CD81BBA77AAEF4430AF1041B9ED05C6245EB34DDC5CB50
                                        APIs
                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 0063E333
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0063E33D
                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 0063E34A
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                        • String ID:
                                        • API String ID: 3906539128-0
                                        • Opcode ID: 5921b971bbcbd85ffe4c48baa737fb9bc5e5994952d0234fd7228089c5bee3db
                                        • Instruction ID: b964b8054b34b3e9c6077d0398d5d257434fc6ae086c4460f557e5e270681853
                                        • Opcode Fuzzy Hash: 5921b971bbcbd85ffe4c48baa737fb9bc5e5994952d0234fd7228089c5bee3db
                                        • Instruction Fuzzy Hash: DC31C2759013289BCB61DF68D9897CDBBB9BF08310F5041EAE41CA7290EB749B818F95
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 2f$(2f$t>f
                                        • API String ID: 0-3916860665
                                        • Opcode ID: 7f407f28150757b46a032d350b69eff9a33c31d3f8fcaaf6c4e90c10d7abd96d
                                        • Instruction ID: 0c92125998c9dd322290a9f707689e0bbb9fc93eff1c8599329860c3cfa83d25
                                        • Opcode Fuzzy Hash: 7f407f28150757b46a032d350b69eff9a33c31d3f8fcaaf6c4e90c10d7abd96d
                                        • Instruction Fuzzy Hash: 6B428E7250824ABFDF169E54DC46EEB3F6BEF49344F144008FE04662A1C772C962EBA0
                                        APIs
                                        • LoadResource.KERNEL32(00000000,00000000,C1C81EE7,00000001,00000000,?,00000000,0065B0C0,000000FF,?,00611D2C,?,?,?,00000000,?), ref: 00611DAB
                                        • LockResource.KERNEL32(00000000,?,00611D2C,?,?,?,00000000,?,-00000010,0065B0A0,000000FF,?,00612048,?,00000000,0065B0ED), ref: 00611DB6
                                        • SizeofResource.KERNEL32(00000000,00000000,?,00611D2C,?,?,?,00000000,?,-00000010,0065B0A0,000000FF,?,00612048,?,00000000), ref: 00611DC4
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Resource$LoadLockSizeof
                                        • String ID:
                                        • API String ID: 2853612939-0
                                        • Opcode ID: 4ebb081748208bd7dfebccd97238e139434b2ffd4cd63fde1904c3fad56e3f2e
                                        • Instruction ID: 008602d218ffca042084c08d7f475c21417ac5987e1885ff042f3934db764631
                                        • Opcode Fuzzy Hash: 4ebb081748208bd7dfebccd97238e139434b2ffd4cd63fde1904c3fad56e3f2e
                                        • Instruction Fuzzy Hash: F711E732E00A149BC7349F69EC44BA7F7E9EB86726F05493AED5AD7340EA359C4086D0
                                        APIs
                                          • Part of subcall function 006395A8: AcquireSRWLockExclusive.KERNEL32(00673B74,?,?,?,00612646,00674714,C1C81EE7,?,?,0065B16D,000000FF,?,00611A07), ref: 006395B3
                                          • Part of subcall function 006395A8: ReleaseSRWLockExclusive.KERNEL32(00673B74,?,?,00612646,00674714,C1C81EE7,?,?,0065B16D,000000FF,?,00611A07,?,?,?,C1C81EE7), ref: 006395ED
                                        • GetProcessHeap.KERNEL32 ref: 006125F5
                                          • Part of subcall function 00639557: AcquireSRWLockExclusive.KERNEL32(00673B74,?,?,006126B7,00674714,0065EC90), ref: 00639561
                                          • Part of subcall function 00639557: ReleaseSRWLockExclusive.KERNEL32(00673B74,?,?,006126B7,00674714,0065EC90), ref: 00639594
                                          • Part of subcall function 00639557: WakeAllConditionVariable.KERNEL32(00673B70,?,?,006126B7,00674714,0065EC90), ref: 0063959F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ExclusiveLock$AcquireRelease$ConditionHeapProcessVariableWake
                                        • String ID: 4Gg
                                        • API String ID: 1755742941-2966272359
                                        • Opcode ID: 38dbe57f1b22e2324da00e72d7d5fb8f52643f3062868f0ed11959ac2f980d21
                                        • Instruction ID: 436ed724f5e01fdadd4ffcee07c0acba25940efc1ef477e594c449a1dfa8d1fa
                                        • Opcode Fuzzy Hash: 38dbe57f1b22e2324da00e72d7d5fb8f52643f3062868f0ed11959ac2f980d21
                                        • Instruction Fuzzy Hash: 2F218BB0940240DFCB1CCF68EC5A7893BA3E746726F115628E429973D0DFB159848FA5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: =d$5
                                        • API String ID: 0-1716947385
                                        • Opcode ID: 80d743ce86f3f7115c781691013d5d710c6c7ccd326cb6f5c66471442a49c31f
                                        • Instruction ID: d4070ba15bbb6b1854b9f63f950009dd88449f77643bf09dc78c3c192363d8d8
                                        • Opcode Fuzzy Hash: 80d743ce86f3f7115c781691013d5d710c6c7ccd326cb6f5c66471442a49c31f
                                        • Instruction Fuzzy Hash: C3C10631F442699FDF18DEA8C8916EEBBF39F98310F288169E851E7381E6348E45C750
                                        APIs
                                        • GetTimeZoneInformation.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0064FBE9,00000000,00000000,00000000), ref: 0064FAA9
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: InformationTimeZone
                                        • String ID:
                                        • API String ID: 565725191-0
                                        • Opcode ID: f82a8123eb9c637d46b8effcc5f016adc54c3f336f7d79b77499fb7f34f4731b
                                        • Instruction ID: ced35c353d0ca52a9066e7879eaca83d7ccd71ccc2c4b1676b5614af2d3ab681
                                        • Opcode Fuzzy Hash: f82a8123eb9c637d46b8effcc5f016adc54c3f336f7d79b77499fb7f34f4731b
                                        • Instruction Fuzzy Hash: DAC12672900215AFDB14BFA4DC02AAE7BBBEF45710F11407AF804EB291EB719E41CB95
                                        APIs
                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,00000008,?,?,?,0065013E,?,?,00000008,?,?,0065A7DE,00000000), ref: 00650398
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ExceptionRaise
                                        • String ID:
                                        • API String ID: 3997070919-0
                                        • Opcode ID: 9af56dbdda33a0e1114dc9f8fe694c68080e80260e269a0eaca2813c3e899ad4
                                        • Instruction ID: 81df4ef68a3df25b05468e039d751fcb96811dadcdc28de339b8856b1a16c174
                                        • Opcode Fuzzy Hash: 9af56dbdda33a0e1114dc9f8fe694c68080e80260e269a0eaca2813c3e899ad4
                                        • Instruction Fuzzy Hash: 58B16A315106099FE719CF28C49ABA57BE1FF45366F248658EC9A8F3A1C335EA85CB40
                                        APIs
                                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00639D02
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: FeaturePresentProcessor
                                        • String ID:
                                        • API String ID: 2325560087-0
                                        • Opcode ID: dcff1c1572b18ee02857df06bac44bc3852e7356d485918d2a6d52635f429209
                                        • Instruction ID: 8a3ff10f160aceb5a3f04c5d258ac93f4886d6484ffe859b70452ead31c90afc
                                        • Opcode Fuzzy Hash: dcff1c1572b18ee02857df06bac44bc3852e7356d485918d2a6d52635f429209
                                        • Instruction Fuzzy Hash: 09A16DB1D106168FDB1CCF68D8926AEBBB2FB48324F14912AD45AE7350D3759990CFA0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0
                                        • API String ID: 0-4108050209
                                        • Opcode ID: b71fcf4a7ddb8ce049ec9badea82592a918ea365e81fd2ef24a598f2e6f8c6df
                                        • Instruction ID: 0f7ac48b6257079f96b330c858d908dd0bf2dff0e24a4f6141ae4a88cbd998e9
                                        • Opcode Fuzzy Hash: b71fcf4a7ddb8ce049ec9badea82592a918ea365e81fd2ef24a598f2e6f8c6df
                                        • Instruction Fuzzy Hash: 1702AD70A046068FCB64CF68C580AEAB7F2FF4A324F244659E4569F791E731ADC6CB14
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0
                                        • API String ID: 0-4108050209
                                        • Opcode ID: c6d2d50194c6a1d4677a1bcad9583a9c04a11625165e70af32857ecb80c36ee8
                                        • Instruction ID: b7dbd15aad76e2761a0dd610d9656c434ef8921dcae32bfd2d29cc955fecdf67
                                        • Opcode Fuzzy Hash: c6d2d50194c6a1d4677a1bcad9583a9c04a11625165e70af32857ecb80c36ee8
                                        • Instruction Fuzzy Hash: 4DE1BC74A0060A8FCB28CF68C594AEABBB7FF4A310F14461DE4569B791D734A9C6CB50
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1710eb820734e5a842f8af9f96482a10cd11ad206d392cdd1e3bc52e1493d1df
                                        • Instruction ID: f834a857a6cc72f4ec08f14366dbfb017e8c3568d3ccee9bebe365af60e33d83
                                        • Opcode Fuzzy Hash: 1710eb820734e5a842f8af9f96482a10cd11ad206d392cdd1e3bc52e1493d1df
                                        • Instruction Fuzzy Hash: 7E310472900219AFCB24DFA8CC98EEBB77EEB81355F144658FC059B244EA319D448A50
                                        APIs
                                        • GetLocaleInfoW.KERNEL32(00000000,00001001,?,00000078), ref: 00654E00
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: InfoLocale
                                        • String ID:
                                        • API String ID: 2299586839-0
                                        • Opcode ID: 8006cae4f33f32a58a5b6bd02da55d3765a2d65df6716e53d384bcb187a9bdba
                                        • Instruction ID: 84def425722c15e38a143ca96dc742a57b0b1e5e5adb336834e642ff3774dfd4
                                        • Opcode Fuzzy Hash: 8006cae4f33f32a58a5b6bd02da55d3765a2d65df6716e53d384bcb187a9bdba
                                        • Instruction Fuzzy Hash: CD218331610206ABEF289B24ED42BBB73AEFF4531AF1000B9FD01D7141EB74AD84C654
                                        APIs
                                        • EnumSystemLocalesW.KERNEL32(00654B50,00000001,00000000,?,-00000050,?,00655193,00000000,?,?,?,00000055,?), ref: 00654A90
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: EnumLocalesSystem
                                        • String ID:
                                        • API String ID: 2099609381-0
                                        • Opcode ID: 4fcde6f6e93194e9b5811ead556d4ac06c5eaff95a134bda55c5e17f941da69c
                                        • Instruction ID: d7c6ee74f8678356c96fdea788017f609e4a5a380b3eda34e333351ab424f19e
                                        • Opcode Fuzzy Hash: 4fcde6f6e93194e9b5811ead556d4ac06c5eaff95a134bda55c5e17f941da69c
                                        • Instruction Fuzzy Hash: 4C11253A6007059FDB18AF38C8916BAB793FF8035EF15442DED8687B40E771A886C740
                                        APIs
                                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00654D6D,00000000,00000000,?), ref: 00655007
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: InfoLocale
                                        • String ID:
                                        • API String ID: 2299586839-0
                                        • Opcode ID: 5d4226545b3ecc362fc199778d26bc91d0a34da42fdb9c8a74daecf4fb19b1ca
                                        • Instruction ID: 0a5c819af4c3e7927fbfca8140cbb0b2d766ed931732dc7f7458f13187dd988c
                                        • Opcode Fuzzy Hash: 5d4226545b3ecc362fc199778d26bc91d0a34da42fdb9c8a74daecf4fb19b1ca
                                        • Instruction Fuzzy Hash: DB01D632B00612EBDB285A64CC19AFA376AEB40366F154428AC43A32C0EE74ED45C6D0
                                        APIs
                                        • EnumSystemLocalesW.KERNEL32(00654DB0,00000001,?,?,-00000050,?,0065515B,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 00654B03
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: EnumLocalesSystem
                                        • String ID:
                                        • API String ID: 2099609381-0
                                        • Opcode ID: 656b7db32960d213e38c22d1854fe3af7229308efbddbc3e975b8a09ea01afb7
                                        • Instruction ID: 57d5271a62ed19203b1764b834f18003cc2e6241fd34c6ce91870c9e7751d1ae
                                        • Opcode Fuzzy Hash: 656b7db32960d213e38c22d1854fe3af7229308efbddbc3e975b8a09ea01afb7
                                        • Instruction Fuzzy Hash: 10F0C2367003045FDB24AF35D881AAA7B96EF8036DF05456DFD058B680DAB1AC858B94
                                        APIs
                                        • GetLocaleInfoEx.KERNEL32(?,00000022,00000000,00000002,?,?,00636A10,00000000,0066A8D9,00000004,00635628,0066A8D9,00000004,00635A57,00000000,00000000), ref: 00638FB9
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: InfoLocale
                                        • String ID:
                                        • API String ID: 2299586839-0
                                        • Opcode ID: 792fef980952edf9980c6fa3e52f674fd7a0f846935f68416e1841842e1b704c
                                        • Instruction ID: 00a3f66e056fe97ae845ebea29427238f138d3009fb466d6906d41cabadce33a
                                        • Opcode Fuzzy Hash: 792fef980952edf9980c6fa3e52f674fd7a0f846935f68416e1841842e1b704c
                                        • Instruction Fuzzy Hash: 04E06532660300AAD7259B79991EFE7769BDB01786F104559B602E62C5DEA0DE049290
                                        APIs
                                        • EnumSystemLocalesW.KERNEL32(00654930,00000001,?,?,?,006551B5,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00654A0A
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: EnumLocalesSystem
                                        • String ID:
                                        • API String ID: 2099609381-0
                                        • Opcode ID: 575b01a980049214f69ae65bcf2da20d97aef42433133bc4ed6269fd36efbeea
                                        • Instruction ID: 227d68199acf05a4cb9ba0dc7c4b99e7facf8960091c9cc26c69d72bf9c8f1a7
                                        • Opcode Fuzzy Hash: 575b01a980049214f69ae65bcf2da20d97aef42433133bc4ed6269fd36efbeea
                                        • Instruction Fuzzy Hash: EBF0E53A30020597CB14AF35D8566ABBF96EFC2716F464099EE09CB251CA719887C790
                                        APIs
                                          • Part of subcall function 006494A1: EnterCriticalSection.KERNEL32(?,?,00652907,00000000,006703B8,0000000C,0065289B,?,?,0064ED86,?,?,0064D0E3,00000001,00000364,00000000), ref: 006494B0
                                        • EnumSystemLocalesW.KERNEL32(0064EDC0,00000001,006702B8,0000000C,0064F277,00000000), ref: 0064EE14
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: CriticalEnterEnumLocalesSectionSystem
                                        • String ID:
                                        • API String ID: 1272433827-0
                                        • Opcode ID: c83e2ac8003561c8de391333d14a11cb5d2d1db69b014178345a47acdfce9354
                                        • Instruction ID: 11324c8a38b12feb0729df090baf960bcada6f5037abe01f6e46a7af3ad41e18
                                        • Opcode Fuzzy Hash: c83e2ac8003561c8de391333d14a11cb5d2d1db69b014178345a47acdfce9354
                                        • Instruction Fuzzy Hash: EBF09036A40710DFE700DF98D446B9D77F1FB49725F00811AE5119B2D0C7BA4900DF50
                                        APIs
                                        • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,0064C6FA,?,20001004,00000000,00000002,?,?,0064BCF8), ref: 0064F344
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: InfoLocale
                                        • String ID:
                                        • API String ID: 2299586839-0
                                        • Opcode ID: fd2a8389be5de6d3ac64f927c84fb4ae61a299767eeea10bdaf43cfede390c12
                                        • Instruction ID: f7a15ff571a731d2c7045ae596bf23347e0a3b5dec8f5faabb1e8a0ac462786c
                                        • Opcode Fuzzy Hash: fd2a8389be5de6d3ac64f927c84fb4ae61a299767eeea10bdaf43cfede390c12
                                        • Instruction Fuzzy Hash: B9E04F36500618BBCF12AF60DC04ADE3E17FF44762F004424FC0566221CB329921AAD9
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(Function_0002A3A0,00639B25), ref: 0063A38A
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled
                                        • String ID:
                                        • API String ID: 3192549508-0
                                        • Opcode ID: 20d94972687486a6b0f741d369890e4823061d9186be25efeac16ee5184d4415
                                        • Instruction ID: 81fc336b70e17a5fb9a3f93926eabfaf229c60619d2f543a0c41ff0972b4222b
                                        • Opcode Fuzzy Hash: 20d94972687486a6b0f741d369890e4823061d9186be25efeac16ee5184d4415
                                        • Instruction Fuzzy Hash:
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: AllocHeap
                                        • String ID:
                                        • API String ID: 4292702814-0
                                        • Opcode ID: 11fe4f66e403a4e7242daaaaa58a954bb6b35cb6a954825ec3dcf2436c072e97
                                        • Instruction ID: fd4b6eb55cdbf15fb574f94182bd569c3d581ec02a902742c0eea24d8b45ce06
                                        • Opcode Fuzzy Hash: 11fe4f66e403a4e7242daaaaa58a954bb6b35cb6a954825ec3dcf2436c072e97
                                        • Instruction Fuzzy Hash: 47424A74D0020ADFCB18CFA8C991AFEBBB6FF55304F24416DD945A7345EA31AA46CB90
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 80d99ff76c9ba567092604a14583e63ea3cc4366a26a2baa83158d72e87e23d3
                                        • Instruction ID: aad240d558d4ddc1a6dd6e1c4a8db208ced41fa0e7bf14fe09221549ef0bf7d5
                                        • Opcode Fuzzy Hash: 80d99ff76c9ba567092604a14583e63ea3cc4366a26a2baa83158d72e87e23d3
                                        • Instruction Fuzzy Hash: 9C919D32C00A089BEB12CF68C8513EEB773AF46321F299395DC557B2D1EB759989C750
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ce90631ccd48a786f0dbaec49c2f70008bc2b08315126eb600449cdff332ad58
                                        • Instruction ID: 92d1282fdcc9a7f0afe6b47323c6c3292d63ecda8cfe9eda3d1f2e7f97fe3714
                                        • Opcode Fuzzy Hash: ce90631ccd48a786f0dbaec49c2f70008bc2b08315126eb600449cdff332ad58
                                        • Instruction Fuzzy Hash: AF518271E00119EFDF05CFA9C991AEEBBB2EF88300F1481A9E815AB341C7349E45DB90
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                        • Instruction ID: 7f66a36ebbfce4c7563b192b2e6fb19ff84ce59f0eb01cd1bf9f1129a1a05376
                                        • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                        • Instruction Fuzzy Hash: 54112B7764004143D604CE3ED8B45FBA397EFC6331F2D637AD2428B758D322D9459680
                                        APIs
                                        • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00618A4D
                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00618AA0
                                        • LocalAlloc.KERNEL32(00000040,00000000,?,?,?,?,?,?,?,00000000,0065BFF5,000000FF), ref: 00618AAF
                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00618ACB
                                        • WriteFile.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,00000000,0065BFF5,000000FF), ref: 00618BAB
                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,00000000,0065BFF5,000000FF), ref: 00618BB7
                                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,?,?,?,?,?,?,?,00000000,0065BFF5,000000FF), ref: 00618BF3
                                        • LocalAlloc.KERNEL32(00000040,00000000,?,?,?,?,?,?,?,00000000,0065BFF5,000000FF), ref: 00618C11
                                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,?,?,?,?,?,?,?,00000000,0065BFF5,000000FF), ref: 00618C2E
                                        • LocalFree.KERNEL32(00000000,?,?,?,?,?,?,?,00000000,0065BFF5,000000FF), ref: 00618CC3
                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000005), ref: 00618D08
                                        • ShellExecuteW.SHELL32(00000000,00000000,00000000,00000000,00000000,00000005), ref: 00618D5A
                                        • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,00000000,0065BFF5,000000FF), ref: 00618D8D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ByteCharLocalMultiWide$AllocExecuteFileFreeShell$CloseCreateHandleWrite
                                        • String ID: -_.~!*'();:@&=+$,/?#[]$URL Shortcut content:$[InternetShortcut]URL=$open
                                        • API String ID: 2199533872-3004881174
                                        • Opcode ID: f141b27bedd757ff21b0ac4857b2fa2d513d4cb18ef7719512cc758096090abd
                                        • Instruction ID: 3a274b90aedc45ef9e0bbb5ec70f6a046867c1f57ce618189cea57b3b87dd9b3
                                        • Opcode Fuzzy Hash: f141b27bedd757ff21b0ac4857b2fa2d513d4cb18ef7719512cc758096090abd
                                        • Instruction Fuzzy Hash: 8DC103B19002459FEB20DF68CC45BEEBBB6EF95700F184129E905AB3D1EB744A85C7A1
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062EB0E
                                        • numpunct.LIBCPMT ref: 0062EEF3
                                          • Part of subcall function 0062B266: __EH_prolog3.LIBCMT ref: 0062B26D
                                          • Part of subcall function 0062B06C: __EH_prolog3.LIBCMT ref: 0062B073
                                          • Part of subcall function 0062B06C: std::_Lockit::_Lockit.LIBCPMT ref: 0062B07D
                                          • Part of subcall function 0062B06C: std::_Lockit::~_Lockit.LIBCPMT ref: 0062B0EE
                                          • Part of subcall function 0061EA80: std::_Lockit::_Lockit.LIBCPMT ref: 0061EAAD
                                          • Part of subcall function 0061EA80: std::_Lockit::_Lockit.LIBCPMT ref: 0061EAD0
                                          • Part of subcall function 0061EA80: std::_Lockit::~_Lockit.LIBCPMT ref: 0061EAF8
                                          • Part of subcall function 0061EA80: std::_Lockit::~_Lockit.LIBCPMT ref: 0061EBA1
                                          • Part of subcall function 006249F5: Concurrency::cancel_current_task.LIBCPMT ref: 00624AB8
                                          • Part of subcall function 0062A55D: __EH_prolog3.LIBCMT ref: 0062A564
                                          • Part of subcall function 0062A55D: std::_Lockit::_Lockit.LIBCPMT ref: 0062A56E
                                          • Part of subcall function 0062A55D: std::_Lockit::~_Lockit.LIBCPMT ref: 0062A5DF
                                        • __Getcoll.LIBCPMT ref: 0062ECC3
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                          • Part of subcall function 00618700: LocalAlloc.KERNEL32(00000040,00000000,0063A1C5,00000000,C1C81EE7,?,00000000,?,FFFFFFFF,?,0065EB28,000000FF,?,006117A4,?,0065FDDA), ref: 00618706
                                          • Part of subcall function 0061BCF0: __Getctype.LIBCPMT ref: 0061BCFB
                                          • Part of subcall function 0062A970: __EH_prolog3.LIBCMT ref: 0062A977
                                          • Part of subcall function 0062A970: std::_Lockit::_Lockit.LIBCPMT ref: 0062A981
                                          • Part of subcall function 0062AA9A: __EH_prolog3.LIBCMT ref: 0062AAA1
                                          • Part of subcall function 0062AA9A: std::_Lockit::_Lockit.LIBCPMT ref: 0062AAAB
                                          • Part of subcall function 0062ACEE: __EH_prolog3.LIBCMT ref: 0062ACF5
                                          • Part of subcall function 0062ACEE: std::_Lockit::_Lockit.LIBCPMT ref: 0062ACFF
                                          • Part of subcall function 0062ACEE: std::_Lockit::~_Lockit.LIBCPMT ref: 0062AD70
                                          • Part of subcall function 0062AC59: __EH_prolog3.LIBCMT ref: 0062AC60
                                          • Part of subcall function 0062AC59: std::_Lockit::_Lockit.LIBCPMT ref: 0062AC6A
                                          • Part of subcall function 0062AC59: std::_Lockit::~_Lockit.LIBCPMT ref: 0062ACDB
                                          • Part of subcall function 006249F5: __EH_prolog3.LIBCMT ref: 006249FC
                                          • Part of subcall function 006249F5: std::_Lockit::_Lockit.LIBCPMT ref: 00624A06
                                          • Part of subcall function 006249F5: std::_Lockit::~_Lockit.LIBCPMT ref: 00624AAD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_$H_prolog3$Lockit::~_$AllocConcurrency::cancel_current_taskGetcollGetctypeLocalnumpunct
                                        • String ID: 9g$@:g$D:g$H:g$L:g$P:g$T:g$X:g$\:g
                                        • API String ID: 1748785662-3887247132
                                        • Opcode ID: 0ea2e6d3cee68d05d27196b1a1aa6a3f2928d4b99e0c6929d1a743b0465ba9e1
                                        • Instruction ID: 49dd312d5f546abad52826cdcfcbadc26e20a2420d21d2bf547d9c295bb3587a
                                        • Opcode Fuzzy Hash: 0ea2e6d3cee68d05d27196b1a1aa6a3f2928d4b99e0c6929d1a743b0465ba9e1
                                        • Instruction Fuzzy Hash: 72D13871D00A359ACB61AFB49C02ABF7AA7EF42360F14452DFC5997382DF7289408F95
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062E63C
                                        • numpunct.LIBCPMT ref: 0062EA21
                                          • Part of subcall function 0062B233: __EH_prolog3.LIBCMT ref: 0062B23A
                                          • Part of subcall function 0062AFD7: __EH_prolog3.LIBCMT ref: 0062AFDE
                                          • Part of subcall function 0062AFD7: std::_Lockit::_Lockit.LIBCPMT ref: 0062AFE8
                                          • Part of subcall function 0062AFD7: std::_Lockit::~_Lockit.LIBCPMT ref: 0062B059
                                          • Part of subcall function 0062B101: __EH_prolog3.LIBCMT ref: 0062B108
                                          • Part of subcall function 0062B101: std::_Lockit::_Lockit.LIBCPMT ref: 0062B112
                                          • Part of subcall function 0062B101: std::_Lockit::~_Lockit.LIBCPMT ref: 0062B183
                                          • Part of subcall function 006249F5: Concurrency::cancel_current_task.LIBCPMT ref: 00624AB8
                                          • Part of subcall function 0062A4C8: __EH_prolog3.LIBCMT ref: 0062A4CF
                                          • Part of subcall function 0062A4C8: std::_Lockit::_Lockit.LIBCPMT ref: 0062A4D9
                                          • Part of subcall function 0062A4C8: std::_Lockit::~_Lockit.LIBCPMT ref: 0062A54A
                                        • __Getcoll.LIBCPMT ref: 0062E7F1
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                          • Part of subcall function 00618700: LocalAlloc.KERNEL32(00000040,00000000,0063A1C5,00000000,C1C81EE7,?,00000000,?,FFFFFFFF,?,0065EB28,000000FF,?,006117A4,?,0065FDDA), ref: 00618706
                                          • Part of subcall function 0062E13A: __Getctype.LIBCPMT ref: 0062E149
                                          • Part of subcall function 0062A8DB: __EH_prolog3.LIBCMT ref: 0062A8E2
                                          • Part of subcall function 0062A8DB: std::_Lockit::_Lockit.LIBCPMT ref: 0062A8EC
                                          • Part of subcall function 0062AA05: __EH_prolog3.LIBCMT ref: 0062AA0C
                                          • Part of subcall function 0062AA05: std::_Lockit::_Lockit.LIBCPMT ref: 0062AA16
                                          • Part of subcall function 0062ABC4: __EH_prolog3.LIBCMT ref: 0062ABCB
                                          • Part of subcall function 0062ABC4: std::_Lockit::_Lockit.LIBCPMT ref: 0062ABD5
                                          • Part of subcall function 0062ABC4: std::_Lockit::~_Lockit.LIBCPMT ref: 0062AC46
                                          • Part of subcall function 0062AB2F: __EH_prolog3.LIBCMT ref: 0062AB36
                                          • Part of subcall function 0062AB2F: std::_Lockit::_Lockit.LIBCPMT ref: 0062AB40
                                          • Part of subcall function 006249F5: __EH_prolog3.LIBCMT ref: 006249FC
                                          • Part of subcall function 006249F5: std::_Lockit::_Lockit.LIBCPMT ref: 00624A06
                                          • Part of subcall function 006249F5: std::_Lockit::~_Lockit.LIBCPMT ref: 00624AAD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$H_prolog3$Lockit::_$Lockit::~_$AllocConcurrency::cancel_current_taskGetcollGetctypeLocalnumpunct
                                        • String ID: `:g$d:g$h:g$l:g$p:g$t:g$x:g$|:g
                                        • API String ID: 3146296281-3119374355
                                        • Opcode ID: c8a96e386f828e20cae5cfb6f66d8241dc4da425d0e666508d47a94d2813c4af
                                        • Instruction ID: da8b56db2602b959fd890725d7bfb043f2bd44f4b8e674f0b21bb177eefa81cc
                                        • Opcode Fuzzy Hash: c8a96e386f828e20cae5cfb6f66d8241dc4da425d0e666508d47a94d2813c4af
                                        • Instruction Fuzzy Hash: B6D11971C00A319EDB61AFB46C026BF7AABEF51360F14452DF845A7382EF7189409F95
                                        APIs
                                        • LocalAlloc.KERNEL32(00000040,00000018,C1C81EE7,00000000,?), ref: 0061F546
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0061F580
                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0061F5E4
                                        • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0061F77B
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0061F82F
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 0061F857
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Locinfo::_Lockit$AllocConcurrency::cancel_current_taskLocalLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                        • String ID: bad locale name$false$true
                                        • API String ID: 975656625-1062449267
                                        • Opcode ID: 885a40504803f32dcf8cb804a344c7ff3f45efa8a6faac6334dcd5c284aed4e8
                                        • Instruction ID: ffc8716bb7c5b1566dd0b432928091e1d8a4394555992eba4721bb2aec6cb1c5
                                        • Opcode Fuzzy Hash: 885a40504803f32dcf8cb804a344c7ff3f45efa8a6faac6334dcd5c284aed4e8
                                        • Instruction Fuzzy Hash: 37B18FB1D01348DEEB50DFA8C945BDEBBF5AF14304F14826DE444EB282E7759A48CBA1
                                        APIs
                                        • OpenProcess.KERNEL32(00000400,00000000,?,C1C81EE7,?,00000000), ref: 00616BA5
                                        • OpenProcess.KERNEL32(00000400,00000000,00000000,?,C1C81EE7,?,00000000), ref: 00616BC6
                                        • GetProcessTimes.KERNEL32(00000000,?,00000000,00000000,00000000,?,C1C81EE7,?,00000000), ref: 00616BF9
                                        • GetProcessTimes.KERNEL32(00000000,?,00000000,00000000,00000000,?,C1C81EE7,?,00000000), ref: 00616C0A
                                        • CloseHandle.KERNEL32(00000000,?,C1C81EE7,?,00000000), ref: 00616C28
                                        • CloseHandle.KERNEL32(00000000,?,C1C81EE7,?,00000000), ref: 00616C4C
                                        • CloseHandle.KERNEL32(00000000,?,C1C81EE7,?,00000000), ref: 00616C78
                                        • CloseHandle.KERNEL32(00000000,?,C1C81EE7,?,00000000), ref: 00616C98
                                        • CloseHandle.KERNEL32(00000000,?,C1C81EE7,?,00000000), ref: 00616CBA
                                        • CloseHandle.KERNEL32(00000000,?,C1C81EE7,?,00000000), ref: 00616CDA
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: CloseHandle$Process$OpenTimes
                                        • String ID:
                                        • API String ID: 1711917922-0
                                        • Opcode ID: d8732b35281fa14c1682ff740c17a467ba6b83b86183e6c34ff65ebf0cc075eb
                                        • Instruction ID: 81a3511ee633beba98cf8f23992bf318999e7e2d3322dbcbcb28d999ae89d205
                                        • Opcode Fuzzy Hash: d8732b35281fa14c1682ff740c17a467ba6b83b86183e6c34ff65ebf0cc075eb
                                        • Instruction Fuzzy Hash: 0C517A74D01218DFDB10CFA8CA487EEBBB6EF08724F288219E951B73D0D7751A408BA5
                                        APIs
                                        • GetTempFileNameW.KERNEL32(?,URL,00000000,?,C1C81EE7,?,00000004), ref: 00615A6A
                                        • LocalFree.KERNEL32(?), ref: 00615B7B
                                        • MoveFileW.KERNEL32(?,00000000), ref: 00615E1B
                                        • DeleteFileW.KERNEL32(?), ref: 00615E63
                                        • LocalFree.KERNEL32(?), ref: 00615EFD
                                        • LocalFree.KERNEL32(?), ref: 00615FB2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: FileFreeLocal$DeleteMoveNameTemp
                                        • String ID: URL$url
                                        • API String ID: 1227976696-346267919
                                        • Opcode ID: 11b6e3ec66966eabe9292d67b67d4f326ae74dbd2b30f0b7999002f7cf2b683e
                                        • Instruction ID: 5a1cff6b04c21e3ed3b3d6a6679f9798ed1884b123a00e9e237c8534e8047ef4
                                        • Opcode Fuzzy Hash: 11b6e3ec66966eabe9292d67b67d4f326ae74dbd2b30f0b7999002f7cf2b683e
                                        • Instruction Fuzzy Hash: E7022770D14669DACB24DF24C998BDDB7B2AF94304F1442D9E44AA7291EB74ABC4CF80
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00637637
                                          • Part of subcall function 0061C840: std::_Lockit::_Lockit.LIBCPMT ref: 0061C86D
                                          • Part of subcall function 0061C840: std::_Lockit::_Lockit.LIBCPMT ref: 0061C890
                                          • Part of subcall function 0061C840: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C8B8
                                          • Part of subcall function 0061C840: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C961
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                        • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                        • API String ID: 1383202999-2891247106
                                        • Opcode ID: 4df80d0333720fcae8fe0cd3b1d95663986d3536d27b90deae2d84396ce267f3
                                        • Instruction ID: c2690baf25290be6b9ec67e138f80469e464402460c2229d402b834a91dfdfd1
                                        • Opcode Fuzzy Hash: 4df80d0333720fcae8fe0cd3b1d95663986d3536d27b90deae2d84396ce267f3
                                        • Instruction Fuzzy Hash: 53C153B250410AABDF28DF58CD55EFA77FAEF09304F140619FA46A7291D6309A10DBA0
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00631AC7
                                          • Part of subcall function 0062A71C: __EH_prolog3.LIBCMT ref: 0062A723
                                          • Part of subcall function 0062A71C: std::_Lockit::_Lockit.LIBCPMT ref: 0062A72D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: H_prolog3$LockitLockit::_std::_
                                        • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                        • API String ID: 2181796688-2891247106
                                        • Opcode ID: a665df344f57011fc4f36a73afa4e1b5015dd2483c83f3b891e29c2d6e4d730d
                                        • Instruction ID: cd99c42cfebeb31e68bd8a6d38e394794b64e37f9c03c9021e0535efc951c802
                                        • Opcode Fuzzy Hash: a665df344f57011fc4f36a73afa4e1b5015dd2483c83f3b891e29c2d6e4d730d
                                        • Instruction Fuzzy Hash: F2C170B6900109ABDB18DF98CD55DFB7BFAEF07704F144219FA42EA251D631DA10DBA0
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00631EC7
                                          • Part of subcall function 0061B7F0: std::_Lockit::_Lockit.LIBCPMT ref: 0061B81D
                                          • Part of subcall function 0061B7F0: std::_Lockit::_Lockit.LIBCPMT ref: 0061B840
                                          • Part of subcall function 0061B7F0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061B868
                                          • Part of subcall function 0061B7F0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061B911
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                        • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                        • API String ID: 1383202999-2891247106
                                        • Opcode ID: f31f4b4106abb155cb6961427467219c3b368001aa0fc600564154e133e91c9b
                                        • Instruction ID: da2fef9137710adead32c498f77389acc38e3afa272fd09217c0ca8b3eb632f2
                                        • Opcode Fuzzy Hash: f31f4b4106abb155cb6961427467219c3b368001aa0fc600564154e133e91c9b
                                        • Instruction Fuzzy Hash: 2DC182B650010BABDB18DFA8CD65DFF7BFAEB09304F154219FA42A7251D630DA05DBA0
                                        APIs
                                          • Part of subcall function 00616150: GetSystemDirectoryW.KERNEL32(?,00000105), ref: 006161B5
                                          • Part of subcall function 00616150: LoadLibraryExW.KERNEL32(?,00000000,00000000,?,?,000000FF,0065B8CD,000000FF), ref: 0061620F
                                          • Part of subcall function 00616150: GetLastError.KERNEL32(?,?,?,000000FF,0065B8CD,000000FF), ref: 0061626B
                                        • GetProcAddress.KERNEL32(?,NtQueryInformationProcess), ref: 00616726
                                        • ReadProcessMemory.KERNEL32(?,?,?,000001D8,00000000), ref: 00616794
                                        • ReadProcessMemory.KERNEL32(?,?,?,00000048,00000000), ref: 006167FB
                                        • GetLastError.KERNEL32 ref: 006169AC
                                        • FreeLibrary.KERNEL32(?), ref: 00616A05
                                        Strings
                                        • NtQueryInformationProcess, xrefs: 00616720
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ErrorLastLibraryMemoryProcessRead$AddressDirectoryFreeLoadProcSystem
                                        • String ID: NtQueryInformationProcess
                                        • API String ID: 1101900967-2781105232
                                        • Opcode ID: 516624140e99c27c4b3eecf9fb5a78b8db2a5d502b49e2e858d39d616591897a
                                        • Instruction ID: 6201b990edcdad3905623e9b5a436d56319e7a6b86709f344ae2ead9559aee4b
                                        • Opcode Fuzzy Hash: 516624140e99c27c4b3eecf9fb5a78b8db2a5d502b49e2e858d39d616591897a
                                        • Instruction Fuzzy Hash: E2B15E709007499BDB20CF64C9497EEBBF1FF48308F144A5DE449A7290D7B5AAC8CB95
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 0062E18F
                                        • _Maklocstr.LIBCPMT ref: 0062E1F8
                                        • _Maklocstr.LIBCPMT ref: 0062E20A
                                        • _Maklocchr.LIBCPMT ref: 0062E222
                                        • _Maklocchr.LIBCPMT ref: 0062E232
                                        • _Getvals.LIBCPMT ref: 0062E254
                                          • Part of subcall function 00627DCC: _Maklocchr.LIBCPMT ref: 00627DFB
                                          • Part of subcall function 00627DCC: _Maklocchr.LIBCPMT ref: 00627E11
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Maklocchr$Maklocstr$GetvalsH_prolog3_
                                        • String ID: false$true
                                        • API String ID: 3549167292-2658103896
                                        • Opcode ID: 80b483b301f053ba21e8190bdb251943f39afa10f55d7eee5f5732d54a7f3c8d
                                        • Instruction ID: b752238663ce266e7c5abd31a00a9e6c9925b368681d3061aab32a22c01765bd
                                        • Opcode Fuzzy Hash: 80b483b301f053ba21e8190bdb251943f39afa10f55d7eee5f5732d54a7f3c8d
                                        • Instruction Fuzzy Hash: 74219171D04718AADF14EFA0E846ECF7B79EF04710F00801AF9059F282DA719644CFA5
                                        APIs
                                        • LocalAlloc.KERNEL32(00000040,?), ref: 0062083F
                                        • LocalAlloc.KERNEL32(00000040,?), ref: 00620881
                                          • Part of subcall function 00620780: LocalFree.KERNEL32(?,00000000,00000000,?,?,C1C81EE7,C1C81EE7,00000000,?), ref: 00620A66
                                        • ___std_exception_copy.LIBVCRUNTIME ref: 006208F4
                                        • LocalFree.KERNEL32(?), ref: 00620931
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Local$AllocFree$___std_exception_copy
                                        • String ID: ios_base::failbit set$iostream
                                        • API String ID: 2276494016-302468714
                                        • Opcode ID: cb07f65f6a41df66a72ca06118388df74cc96d300447cef8f9792b991536f2cb
                                        • Instruction ID: 8fec4843d9a2941807c673d034962ac1c170999a8d133a558677c8a3a1879380
                                        • Opcode Fuzzy Hash: cb07f65f6a41df66a72ca06118388df74cc96d300447cef8f9792b991536f2cb
                                        • Instruction Fuzzy Hash: 56A1A171D00608DFDB14DF68D984BAEBBB6EF48310F14826EE815AB392D7709984CF91
                                        APIs
                                        • LocalAlloc.KERNEL32(00000040,00000044,C1C81EE7,00000000,?), ref: 0061BD9B
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0061BDD8
                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0061BE45
                                        • __Getctype.LIBCPMT ref: 0061BE8E
                                        • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0061BF02
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0061BFBF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Locinfo::_Lockit$AllocGetctypeLocalLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                        • String ID: bad locale name
                                        • API String ID: 3635123611-1405518554
                                        • Opcode ID: cfbdd28a530e4183b87debea06f0ac9b9a9ca340728d69198a852f6b51477733
                                        • Instruction ID: c0c15c51280306cb23a727580ad2e3b7203b4a6734370ddee1c20b70606459f1
                                        • Opcode Fuzzy Hash: cfbdd28a530e4183b87debea06f0ac9b9a9ca340728d69198a852f6b51477733
                                        • Instruction Fuzzy Hash: 5E814EB0D04388DEEB10CFA8D9457CEBBF5AF14304F188598E444AB392E7759A88DB61
                                        APIs
                                        • LocalAlloc.KERNEL32(00000040,00000018,C1C81EE7,00000000,?,?,?,?,?,?,?,?,00000000,0065C8F5,000000FF), ref: 0061C504
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0061C53E
                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0061C5A2
                                        • __Getctype.LIBCPMT ref: 0061C5EB
                                        • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0061C631
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0061C6E5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Locinfo::_Lockit$AllocGetctypeLocalLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                        • String ID: bad locale name
                                        • API String ID: 3635123611-1405518554
                                        • Opcode ID: 85444ed6a267ae79b105c193e27fe8ea667c23065c386f1c090adc26af70c4df
                                        • Instruction ID: e0ddf5b8a7d0bbefa5b586b7dc7cb3cba9dd6a2f2fc7a8e859d378e41142f493
                                        • Opcode Fuzzy Hash: 85444ed6a267ae79b105c193e27fe8ea667c23065c386f1c090adc26af70c4df
                                        • Instruction Fuzzy Hash: B5614BB0D01288DAEB10CFA8D9057CEBFB5AF15314F188159E454EB381E7B69A48DBA1
                                        APIs
                                        • GetCPInfo.KERNEL32(?,?,?,?,?), ref: 006392A8
                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00639334
                                        • __alloca_probe_16.LIBCMT ref: 0063935E
                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0063939F
                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 006393BB
                                        • __alloca_probe_16.LIBCMT ref: 006393E1
                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0063941E
                                        • CompareStringEx.KERNEL32(?,?,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0063943B
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$__alloca_probe_16$CompareInfoString
                                        • String ID:
                                        • API String ID: 3603178046-0
                                        • Opcode ID: 72f98440bf9815e6718b5ff932f550b339b3b9580a72ecf3dc0a42cbd5ec8c06
                                        • Instruction ID: 8fdd9766556f926905c4ab045a5b9eb172649cd3c15d3167ad716575216ee777
                                        • Opcode Fuzzy Hash: 72f98440bf9815e6718b5ff932f550b339b3b9580a72ecf3dc0a42cbd5ec8c06
                                        • Instruction Fuzzy Hash: FF71AF72D14215ABEF209FA4CC85BEEBBBBAF05710F140159E845A7292D6B58D06CFF0
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,CCCCCCCC,0061C98F,?,00000001,00000000,00000000,?,?,0061C98F,?), ref: 00638D47
                                        • __alloca_probe_16.LIBCMT ref: 00638D73
                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,00000000,?,0061C98F,?,?,00000000,0061CFE3,0000003F,?), ref: 00638DB2
                                        • LCMapStringEx.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0061C98F,?,?,00000000,0061CFE3,0000003F), ref: 00638DCF
                                        • LCMapStringEx.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,0061C98F,?,?,00000000,0061CFE3,0000003F), ref: 00638E0E
                                        • __alloca_probe_16.LIBCMT ref: 00638E2B
                                        • LCMapStringEx.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0061C98F,?,?,00000000,0061CFE3,0000003F), ref: 00638E6D
                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000,?,0061C98F,?,?,00000000,0061CFE3,0000003F,?), ref: 00638E90
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                        • String ID:
                                        • API String ID: 2040435927-0
                                        • Opcode ID: 2504e135085cfaf04cdc17a57c6de1fc22e15855acc1499958beb68dbd2e2917
                                        • Instruction ID: b1aab43f344960a29b08a3ef2cd7a31af2c6690601d6ff0db7bd19432fe9bbfc
                                        • Opcode Fuzzy Hash: 2504e135085cfaf04cdc17a57c6de1fc22e15855acc1499958beb68dbd2e2917
                                        • Instruction Fuzzy Hash: C2518B7290031AAFEF209F64CC45FEB7BBAEF50B40F144529BA05A7290DB758D11CBA0
                                        APIs
                                        • RegOpenKeyExW.ADVAPI32(?,-00000002,00000000,?,?), ref: 006217A2
                                        • RegQueryValueExW.ADVAPI32(?,00000002,00000000,00000000,006747B8,00000800), ref: 006217C2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: OpenQueryValue
                                        • String ID: /DontWait $/EnforcedRunAsAdmin $/HideWindow$/RunAsAdmin
                                        • API String ID: 4153817207-1914306501
                                        • Opcode ID: 0d4ff2886aada759bc92099a4cc81d9cf88b6667050c61a3604664723d033554
                                        • Instruction ID: 643c1ec226089ce5ec2b401568d42c87859587bb676f6931289ed2b38471e2cf
                                        • Opcode Fuzzy Hash: 0d4ff2886aada759bc92099a4cc81d9cf88b6667050c61a3604664723d033554
                                        • Instruction Fuzzy Hash: 6AD1C265A08A728ACB34AF54A8402F672E3EFB7740B5A40A9D8459F351E7718D82CF91
                                        APIs
                                        • type_info::operator==.LIBVCRUNTIME ref: 0063D1A0
                                        • ___TypeMatch.LIBVCRUNTIME ref: 0063D2AE
                                        • CallUnexpected.LIBVCRUNTIME ref: 0063D41B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: CallMatchTypeUnexpectedtype_info::operator==
                                        • String ID: csm$csm$csm
                                        • API String ID: 1206542248-393685449
                                        • Opcode ID: ee807b0c8e423bcc3294f377960d8d5f94174b505a4271ed1911b9583dc8bf46
                                        • Instruction ID: 61866fedffb8f54b8d308324aba2d7e1d036df938cab75320dee2ecdd109c81d
                                        • Opcode Fuzzy Hash: ee807b0c8e423bcc3294f377960d8d5f94174b505a4271ed1911b9583dc8bf46
                                        • Instruction Fuzzy Hash: C4B13671900209EFDF15DFA4E8819AEBBB6EF45310F14456AF8016B312D731EA51CBE6
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00636A4B
                                          • Part of subcall function 00635722: __EH_prolog3_GS.LIBCMT ref: 00635729
                                          • Part of subcall function 00635722: __Getcoll.LIBCPMT ref: 0063578D
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • __Getcoll.LIBCPMT ref: 00636A9A
                                          • Part of subcall function 0063556A: __EH_prolog3.LIBCMT ref: 00635571
                                          • Part of subcall function 0063556A: std::_Lockit::_Lockit.LIBCPMT ref: 0063557B
                                          • Part of subcall function 0063556A: std::_Lockit::~_Lockit.LIBCPMT ref: 006355EC
                                          • Part of subcall function 006249F5: __EH_prolog3.LIBCMT ref: 006249FC
                                          • Part of subcall function 006249F5: std::_Lockit::_Lockit.LIBCPMT ref: 00624A06
                                          • Part of subcall function 006249F5: std::_Lockit::~_Lockit.LIBCPMT ref: 00624AAD
                                        • numpunct.LIBCPMT ref: 00636CCA
                                          • Part of subcall function 00618700: LocalAlloc.KERNEL32(00000040,00000000,0063A1C5,00000000,C1C81EE7,?,00000000,?,FFFFFFFF,?,0065EB28,000000FF,?,006117A4,?,0065FDDA), ref: 00618706
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$H_prolog3Lockit::_Lockit::~_$Getcoll$AllocH_prolog3_Localnumpunct
                                        • String ID: :g$:g$:g
                                        • API String ID: 2516209439-3928327049
                                        • Opcode ID: 31afb7f43d59c7e20c8773661383907ebe67aa3f860257a38b664ce80cf2bc01
                                        • Instruction ID: 40d71faca6afc1747f890f70c71ce658b0d84e3af1fddd4b7e9604ac4ca5d99e
                                        • Opcode Fuzzy Hash: 31afb7f43d59c7e20c8773661383907ebe67aa3f860257a38b664ce80cf2bc01
                                        • Instruction Fuzzy Hash: 8691F471D016257AD761AF74CC026BFBAABDF41360F18C51DF886AB382DE7189408BE5
                                        APIs
                                        • LocalAlloc.KERNEL32(00000040,0000000C,C1C81EE7,00000000,?,00000000,?,?,?,?,00000000,0065CFB1,000000FF,?,0061EB5A,00000000), ref: 0061FB04
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0061FB3A
                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0061FB9E
                                        • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0061FC5E
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0061FD12
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Locinfo::_Lockit$AllocLocalLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                        • String ID: bad locale name
                                        • API String ID: 2968629171-1405518554
                                        • Opcode ID: 814b94e7d9b06c06ae03e7d8c0108ae04319fa7fc4e4abc3fc185d23473ed4ee
                                        • Instruction ID: ca8b15e7538a7b64d03c8a162c4e4c86d1b50fd3a609221220c24289223758e7
                                        • Opcode Fuzzy Hash: 814b94e7d9b06c06ae03e7d8c0108ae04319fa7fc4e4abc3fc185d23473ed4ee
                                        • Instruction Fuzzy Hash: C8719EB0D00349DBEF11CFA8D9447DEBFB5AF10304F184169E814AB381E7B69A04DBA1
                                        APIs
                                        • LocalAlloc.KERNEL32(00000040,00000008,C1C81EE7,00000000,?,00000000,?,?,?,?,0065CEBD,000000FF,?,0061EC9A,?,?), ref: 0061F8D4
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0061F90A
                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0061F96E
                                        • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0061F9DE
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0061FA92
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Locinfo::_Lockit$AllocLocalLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                        • String ID: bad locale name
                                        • API String ID: 2968629171-1405518554
                                        • Opcode ID: 7ebd8c15f541c80606126ae9532c433d1fb00efda784cf7c8e795713bc095818
                                        • Instruction ID: f00bb2601869c6ef8fcc3ca9f5ff93934d08b5f6da254a3af19a2d0dcea899d6
                                        • Opcode Fuzzy Hash: 7ebd8c15f541c80606126ae9532c433d1fb00efda784cf7c8e795713bc095818
                                        • Instruction Fuzzy Hash: EF6171B0D01389EADF10DFA8D5447CEBFB5AF15304F18856CE454AB381D7BA9A44CBA1
                                        APIs
                                        • _ValidateLocalCookies.LIBCMT ref: 0063AD67
                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 0063AD6F
                                        • _ValidateLocalCookies.LIBCMT ref: 0063ADF8
                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 0063AE23
                                        • _ValidateLocalCookies.LIBCMT ref: 0063AE78
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                        • String ID: csm
                                        • API String ID: 1170836740-1018135373
                                        • Opcode ID: 6ca80cd5cc98ff24c4e3e555c407ee4ab08e32d00141ba33607de12c7c587340
                                        • Instruction ID: 3c35f633805b1d56a9ae31c8e61c3d2b24ab4578e5f7b510b6f04650436145f9
                                        • Opcode Fuzzy Hash: 6ca80cd5cc98ff24c4e3e555c407ee4ab08e32d00141ba33607de12c7c587340
                                        • Instruction Fuzzy Hash: CE41D434A00208ABCF10DFA9C884AEEBBB7FF45314F148159E8559B392D735EA15DBD2
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 006351F3
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 006351FD
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • messages.LIBCPMT ref: 00635237
                                        • std::_Facet_Register.LIBCPMT ref: 0063524E
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0063526E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermessages
                                        • String ID: :g
                                        • API String ID: 2750803064-307150366
                                        • Opcode ID: f722f4129ff82da6802039eba2d41a1a767c0df9758aac424a3e94f51481ef68
                                        • Instruction ID: 2c7229f6296639a98185f9e23da2414703a67a35027c0d2c2fdb0a63e80e45a0
                                        • Opcode Fuzzy Hash: f722f4129ff82da6802039eba2d41a1a767c0df9758aac424a3e94f51481ef68
                                        • Instruction Fuzzy Hash: BF01AD31900A259BCB45EBA4C8516AE7B63AF44724F28000CF412AB3D2DB749E419BD5
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062ABCB
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062ABD5
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • moneypunct.LIBCPMT ref: 0062AC0F
                                        • std::_Facet_Register.LIBCPMT ref: 0062AC26
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062AC46
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                        • String ID: |:g
                                        • API String ID: 419941038-1423270564
                                        • Opcode ID: f74feec9244069ee35db91234b718128a3dd576a8c5766cb733aeb5a8d154e22
                                        • Instruction ID: d38a163b56f743e5a505128a95ecfd07eee85a993ea0086dd8c29edd531bd7b9
                                        • Opcode Fuzzy Hash: f74feec9244069ee35db91234b718128a3dd576a8c5766cb733aeb5a8d154e22
                                        • Instruction Fuzzy Hash: 39010431A00A358BCB08EBA4E8516ED7763AF84314F24000CF811673C1CF708E008B96
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062AC60
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062AC6A
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • moneypunct.LIBCPMT ref: 0062ACA4
                                        • std::_Facet_Register.LIBCPMT ref: 0062ACBB
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062ACDB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                        • String ID: X:g
                                        • API String ID: 419941038-1804700824
                                        • Opcode ID: ea3c57658dd3908cefe161b7aaabfef7eb0bdb716d0449f789fc540dd2c455d7
                                        • Instruction ID: 6b5fac965128bcfc92fe25eca56a5d883dece998eb583e7931e7432a012a66ef
                                        • Opcode Fuzzy Hash: ea3c57658dd3908cefe161b7aaabfef7eb0bdb716d0449f789fc540dd2c455d7
                                        • Instruction Fuzzy Hash: CC01C032A00A358BCB45EBA4D9566EE7773AF84714F14000CF411AB3D1CF749A41DF96
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062ACF5
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062ACFF
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • moneypunct.LIBCPMT ref: 0062AD39
                                        • std::_Facet_Register.LIBCPMT ref: 0062AD50
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062AD70
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                        • String ID: T:g
                                        • API String ID: 419941038-1653306876
                                        • Opcode ID: 1f3f33d942e3ba6b1a07c8243682930f3c833f167b5e308673d3ff73a52b5617
                                        • Instruction ID: 352388ae59396f65955d7dfe2e15b4c29ace45ef1056e22f3a93eea51d10d86c
                                        • Opcode Fuzzy Hash: 1f3f33d942e3ba6b1a07c8243682930f3c833f167b5e308673d3ff73a52b5617
                                        • Instruction Fuzzy Hash: B6010431900A358BCB04EBA4E8016EE7763BF44714F14040CF4516B3D1CF708E418F96
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062AF49
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062AF53
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • numpunct.LIBCPMT ref: 0062AF8D
                                        • std::_Facet_Register.LIBCPMT ref: 0062AFA4
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062AFC4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registernumpunct
                                        • String ID: h:g
                                        • API String ID: 743221004-1341810952
                                        • Opcode ID: d5c85765faa571f9f9b127443deff12ef630300b1441799d9c9bff7735d9ae26
                                        • Instruction ID: a057120f8f34d9ba15b3bd68c2caf1ca532177399fecd4d7dad460dbe85af0e9
                                        • Opcode Fuzzy Hash: d5c85765faa571f9f9b127443deff12ef630300b1441799d9c9bff7735d9ae26
                                        • Instruction Fuzzy Hash: 36010072900A39CBCB45EBA4E952AAE7767AF44314F24000CF850AB3D1DF748A04DF9A
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3767a7d6d0192a2467eac590044d3ed76be4238a063b5c23c08e24abd260c763
                                        • Instruction ID: 63654f311620d555ccfb864a6d85aa3e77f6dc201dccaf31c0e29b4d5e129bdb
                                        • Opcode Fuzzy Hash: 3767a7d6d0192a2467eac590044d3ed76be4238a063b5c23c08e24abd260c763
                                        • Instruction Fuzzy Hash: 66B13872E00355AFDB15CF68CC81BEEBBB7EF59310F25415AE804AB382D6749901CBA4
                                        APIs
                                        • #224.MSI(?,00000001,00000000,00000000,00000000), ref: 00612D50
                                        • LocalFree.KERNEL32(?), ref: 00612DBA
                                        • LocalFree.KERNEL32(?), ref: 00612E24
                                        • CertFreeCertificateContext.CRYPT32(00000000), ref: 00612F65
                                          • Part of subcall function 00613DC0: CertGetNameStringW.CRYPT32(00000000,00000004,00000000,00000000,00000000,00000000,C1C81EE7), ref: 00613E03
                                        • LocalFree.KERNEL32(?), ref: 00612F1B
                                        • CertFreeCertificateContext.CRYPT32(00000003,?), ref: 00612FAB
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Free$CertLocal$CertificateContext$#224NameString
                                        • String ID:
                                        • API String ID: 2751787804-0
                                        • Opcode ID: 17756fd39424bee8e325ea6be8a863b6c478fc312455c29eca848cd944e7152c
                                        • Instruction ID: 633c464d578754c6e7b2d857c79db1e146acc7934ee7231f665d4c98f1db8600
                                        • Opcode Fuzzy Hash: 17756fd39424bee8e325ea6be8a863b6c478fc312455c29eca848cd944e7152c
                                        • Instruction Fuzzy Hash: C6916D70D0024ACFDB18CFA8D5687DEBBB2FF44304F144659E415AB391DBB5AA85CB90
                                        APIs
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0061B81D
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0061B840
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0061B868
                                        • std::_Facet_Register.LIBCPMT ref: 0061B8DD
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0061B911
                                        • LocalFree.KERNEL32 ref: 0061B9B0
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_FreeLocalRegister
                                        • String ID:
                                        • API String ID: 1378673503-0
                                        • Opcode ID: d070445d049a96fd184d042aa09cf890a9afd8b0245fb0f5154bcb0f2e14a07f
                                        • Instruction ID: 9a9e20df02f13487c42d38fcc2b61b756e7747d92dee471b17d1eb3f899d08b6
                                        • Opcode Fuzzy Hash: d070445d049a96fd184d042aa09cf890a9afd8b0245fb0f5154bcb0f2e14a07f
                                        • Instruction Fuzzy Hash: B8510071800619DFCB14CF58D940BEEBBBAFB05720F18465DE814A7390E774AA81CB91
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: __freea$__alloca_probe_16
                                        • String ID: a/p$am/pm
                                        • API String ID: 3509577899-3206640213
                                        • Opcode ID: 3df430e1e97c5034aaa3fce9268bc223499343c40827d850f57d11af46804437
                                        • Instruction ID: 2d9e05c4f6aa32bfca68feff2f8fc5032750f6c91e07e0f1e20b55ee68a21714
                                        • Opcode Fuzzy Hash: 3df430e1e97c5034aaa3fce9268bc223499343c40827d850f57d11af46804437
                                        • Instruction Fuzzy Hash: 27C11271914206CECB289F78C954AFE77B3FF45B00F254199EA01AB350EB369D46CBA1
                                        APIs
                                        • GetLastError.KERNEL32(?,?,0063CD41,0063AC5C,0063A3E4), ref: 0063CD58
                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0063CD66
                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0063CD7F
                                        • SetLastError.KERNEL32(00000000,0063CD41,0063AC5C,0063A3E4), ref: 0063CDD1
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ErrorLastValue___vcrt_
                                        • String ID:
                                        • API String ID: 3852720340-0
                                        • Opcode ID: 5259482a9136677834d034a8a069fbed903a0d0743a097965c8560cc789c5a35
                                        • Instruction ID: 65c6a1bb00ac301e14761d5c339a74a7e884b16de070810992e488e01252748b
                                        • Opcode Fuzzy Hash: 5259482a9136677834d034a8a069fbed903a0d0743a097965c8560cc789c5a35
                                        • Instruction Fuzzy Hash: 2001B1725093126EE76827B4BC95AEA2A97EF01B75F20033EF014622F1EF515C81D6F8
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Mpunct$GetvalsH_prolog3
                                        • String ID: $+xv
                                        • API String ID: 2204710431-1686923651
                                        • Opcode ID: e93cfb1e1b68f10a95879efeef0982fa4add815fc0d9a931cdf0b75490d74fab
                                        • Instruction ID: 00d0700b794531941bce99b38174326bf4c222449c5d666a350b884a3cf67e99
                                        • Opcode Fuzzy Hash: e93cfb1e1b68f10a95879efeef0982fa4add815fc0d9a931cdf0b75490d74fab
                                        • Instruction Fuzzy Hash: 6D21CEB1900F616EDB65DF649850B6BBFF9AB08300F04052EE499C7A82D771E612CF94
                                        APIs
                                        • GetCurrentProcess.KERNEL32(C1C81EE7,C1C81EE7,?,?,00000000,0065BF91,000000FF), ref: 006186BB
                                          • Part of subcall function 006395A8: AcquireSRWLockExclusive.KERNEL32(00673B74,?,?,?,00612646,00674714,C1C81EE7,?,?,0065B16D,000000FF,?,00611A07), ref: 006395B3
                                          • Part of subcall function 006395A8: ReleaseSRWLockExclusive.KERNEL32(00673B74,?,?,00612646,00674714,C1C81EE7,?,?,0065B16D,000000FF,?,00611A07,?,?,?,C1C81EE7), ref: 006395ED
                                        • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process), ref: 00618680
                                        • GetProcAddress.KERNEL32(00000000), ref: 00618687
                                          • Part of subcall function 00639557: AcquireSRWLockExclusive.KERNEL32(00673B74,?,?,006126B7,00674714,0065EC90), ref: 00639561
                                          • Part of subcall function 00639557: ReleaseSRWLockExclusive.KERNEL32(00673B74,?,?,006126B7,00674714,0065EC90), ref: 00639594
                                          • Part of subcall function 00639557: WakeAllConditionVariable.KERNEL32(00673B70,?,?,006126B7,00674714,0065EC90), ref: 0063959F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ExclusiveLock$AcquireRelease$AddressConditionCurrentHandleModuleProcProcessVariableWake
                                        • String ID: IsWow64Process$kernel32
                                        • API String ID: 411948497-3789238822
                                        • Opcode ID: b4d90b22c0b282d9a1cf7bbdd0eb731ce64fcada565ed4853565e9fea03930b1
                                        • Instruction ID: a2bd8dbe4b826a13c1c6992927bb6ef92274fcd4e1648a321db1323a52d9280b
                                        • Opcode Fuzzy Hash: b4d90b22c0b282d9a1cf7bbdd0eb731ce64fcada565ed4853565e9fea03930b1
                                        • Instruction Fuzzy Hash: 3921E472944704DFCB19CFA4DC09B9AB7BAF709720F05022AE815D3390DB756940CF91
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062B073
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062B07D
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Facet_Register.LIBCPMT ref: 0062B0CE
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062B0EE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID: \:g
                                        • API String ID: 2854358121-1821910084
                                        • Opcode ID: 0eab1eff1fe17506045b2b0d6a416e646e807568a1df0cc10289ae64ab46860f
                                        • Instruction ID: a95dfd4f73b871882523b5099d966f5ca1167b7c10366faa834033e4c39413ca
                                        • Opcode Fuzzy Hash: 0eab1eff1fe17506045b2b0d6a416e646e807568a1df0cc10289ae64ab46860f
                                        • Instruction Fuzzy Hash: A101C032900A399BCB45EBA4D852AAF7B77AF44724F24000CF861A73D1DF349A459FD5
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062404E
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00624058
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Facet_Register.LIBCPMT ref: 006240A9
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 006240C9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID: 8g
                                        • API String ID: 2854358121-544791708
                                        • Opcode ID: 82f868fa4739ce44c142fa709efda2d965f576737416b6ca5fc35317f1fd1c64
                                        • Instruction ID: 44988ef24f3277803d4289c765fcc525981f5a7cc87960b746b2706223ce1ad1
                                        • Opcode Fuzzy Hash: 82f868fa4739ce44c142fa709efda2d965f576737416b6ca5fc35317f1fd1c64
                                        • Instruction Fuzzy Hash: 7E010031900A3A8BCB18EFA4D841AAE77B3AF44714F14040CF810A73C1CF308A459F96
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0063515E
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00635168
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Facet_Register.LIBCPMT ref: 006351B9
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 006351D9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID: :g
                                        • API String ID: 2854358121-307150366
                                        • Opcode ID: bab9ffb25a7a816da27eed972f6b8cb6cbff47eb3b58b073505ba21d047fcd08
                                        • Instruction ID: 5b49bca726b916615cb9406142862f53b13b780bc22eb07c2b17cb119a675a5d
                                        • Opcode Fuzzy Hash: bab9ffb25a7a816da27eed972f6b8cb6cbff47eb3b58b073505ba21d047fcd08
                                        • Instruction Fuzzy Hash: 1B01AD31900A298BCB45EBA4D9556AEBBB3AF44714F24000CF812A7391DB349E41DBD5
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00635288
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00635292
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Facet_Register.LIBCPMT ref: 006352E3
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00635303
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID: :g
                                        • API String ID: 2854358121-307150366
                                        • Opcode ID: e1a60329a65b5b436ef306dcb62ddb9d4b0cab433384d5925a2774376093e340
                                        • Instruction ID: 23b9004cd82cdb0dd678802591e2bd822a24f9d00012cf43775c8fc343a49991
                                        • Opcode Fuzzy Hash: e1a60329a65b5b436ef306dcb62ddb9d4b0cab433384d5925a2774376093e340
                                        • Instruction Fuzzy Hash: 080100319006258BCB04EBA4C8016EE7B63AF44724F24000DF812AB3D1DF749E00CBD5
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062A5F9
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062A603
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Facet_Register.LIBCPMT ref: 0062A654
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062A674
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID: l:g
                                        • API String ID: 2854358121-1223934420
                                        • Opcode ID: 3a7ffbd376241d2d1f688d629c089c7f8e0f9635c6c3526876b5f362250d4f37
                                        • Instruction ID: 1d00fea6f7c60342736b72ed0fde42d2e72f31ac202d525b92de5d20efe3a41c
                                        • Opcode Fuzzy Hash: 3a7ffbd376241d2d1f688d629c089c7f8e0f9635c6c3526876b5f362250d4f37
                                        • Instruction Fuzzy Hash: D10100359006358BCB04EBA4D8526EE7777BF44714F18001CF851AB3D1DF748A059B96
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062A68E
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062A698
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Facet_Register.LIBCPMT ref: 0062A6E9
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062A709
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID: D:g
                                        • API String ID: 2854358121-2125321868
                                        • Opcode ID: 06f03d31da33a033921f5e2a0c4e14be71f035f85ba0a23a66349a379d06d508
                                        • Instruction ID: 134a060a49b30e38ae013d9ae54e6237d3ca83613fd4f08e80e72d72b2885284
                                        • Opcode Fuzzy Hash: 06f03d31da33a033921f5e2a0c4e14be71f035f85ba0a23a66349a379d06d508
                                        • Instruction Fuzzy Hash: 0301ED35900A398BCB44EFA4D8566AE7773AF44714F14000CF411AB3D1CFB08A418B9A
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062AD8A
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062AD94
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Facet_Register.LIBCPMT ref: 0062ADE5
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062AE05
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID: `:g
                                        • API String ID: 2854358121-1105803440
                                        • Opcode ID: 54fc5f38ac2027ec1492027f031e86059cb52a1a5269fb3cc6ca26b3c7805c55
                                        • Instruction ID: 80f8862b6e68d1f20ef8181aa059c74ca2b5818931c80d04b3852324c9563833
                                        • Opcode Fuzzy Hash: 54fc5f38ac2027ec1492027f031e86059cb52a1a5269fb3cc6ca26b3c7805c55
                                        • Instruction Fuzzy Hash: 9301E1319005398BCB44EBA4D812ABEB763AF44324F14000CF4516B3C1CF708E459B96
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062AE1F
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062AE29
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Facet_Register.LIBCPMT ref: 0062AE7A
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062AE9A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID: @:g
                                        • API String ID: 2854358121-2040823376
                                        • Opcode ID: bbee3d2862166bd78dd930832d89d95edd666ca636ff6d108e3ff9919792004b
                                        • Instruction ID: 02bf41f8402f7bddba6c292590241f09fded53ddcb2450703df2ae0411a35657
                                        • Opcode Fuzzy Hash: bbee3d2862166bd78dd930832d89d95edd666ca636ff6d108e3ff9919792004b
                                        • Instruction Fuzzy Hash: A901E1319006258BCB45EBA4E8126EEBB63AF84714F14040CF490A7391CF708A05AF96
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062AEB4
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062AEBE
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Facet_Register.LIBCPMT ref: 0062AF0F
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062AF2F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID: d:g
                                        • API String ID: 2854358121-1189122156
                                        • Opcode ID: 52bf7e3431be741a6f7a105911e986b749d6645962bd9e6e8345df27473ad3c3
                                        • Instruction ID: a306d705d68c98a6c616ccfcad6cebdf054272b3433f46cafef9ac17b67fd6ba
                                        • Opcode Fuzzy Hash: 52bf7e3431be741a6f7a105911e986b749d6645962bd9e6e8345df27473ad3c3
                                        • Instruction Fuzzy Hash: 7D010471900679DBCB44EFA8D8516EE7763AF44314F14000CF850AB3C1CF748A469F96
                                        APIs
                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,C1C81EE7,?,?,00000001,0065D620,000000FF,?,0064A61D,?,?,0064A5F4,?,?), ref: 0064A65D
                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0064A66F
                                        • FreeLibrary.KERNEL32(00000000,?,00000001,0065D620,000000FF,?,0064A61D,?,?,0064A5F4,?,?), ref: 0064A691
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: AddressFreeHandleLibraryModuleProc
                                        • String ID: CorExitProcess$mscoree.dll
                                        • API String ID: 4061214504-1276376045
                                        • Opcode ID: a32d89328016db33549aae4488f4dac52dd72a3244accbf7b83ca22b3cd6bdc2
                                        • Instruction ID: ccd78a5dca15fd67e07a0c85b85005c5644d13e93536b377f1ab386b9f49b503
                                        • Opcode Fuzzy Hash: a32d89328016db33549aae4488f4dac52dd72a3244accbf7b83ca22b3cd6bdc2
                                        • Instruction Fuzzy Hash: CD016271950725EBDB11CF90DC05FAEBBBAFB05B66F050629E811A2290DB759900CA90
                                        APIs
                                        • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,0064F064,?,?,?,?,?,0064F188,0000001A,AppPolicyGetProcessTerminationMethod,00664848,AppPolicyGetProcessTerminationMethod,?), ref: 0064F109
                                        • GetLastError.KERNEL32(?,0064F064,?,?,?,?,?,0064F188,0000001A,AppPolicyGetProcessTerminationMethod,00664848,AppPolicyGetProcessTerminationMethod,?,?,0065167E,00000000), ref: 0064F113
                                        • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,?,?,?,?), ref: 0064F151
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: LibraryLoad$ErrorLast
                                        • String ID: api-ms-$ext-ms-
                                        • API String ID: 3177248105-537541572
                                        • Opcode ID: e7d384a7d63e2b28ecc8a290a0f1c949c46ecc7d597dc9b1b00cf7ec74e43d14
                                        • Instruction ID: bd1dd9b751c1445a370f22a496043500a242a85978670ebac3b1969e3e1cee35
                                        • Opcode Fuzzy Hash: e7d384a7d63e2b28ecc8a290a0f1c949c46ecc7d597dc9b1b00cf7ec74e43d14
                                        • Instruction Fuzzy Hash: 25F03030680305F7EF211B61EC56F993F579F00B51F642030FE0CE92E1EB62E9619585
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062A7B8
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062A7C2
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • messages.LIBCPMT ref: 0062A7FC
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062A833
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3messages
                                        • String ID: p:g
                                        • API String ID: 50917705-1573886912
                                        • Opcode ID: 533a9d0def195b600ec2fa8bafe94d79950254ead45f4b782f44a694e3a61004
                                        • Instruction ID: a80da95a21d892b21e1b43615df878ccb4c4f592a71c08ce754f60488e872d0b
                                        • Opcode Fuzzy Hash: 533a9d0def195b600ec2fa8bafe94d79950254ead45f4b782f44a694e3a61004
                                        • Instruction Fuzzy Hash: 41F096319009255BCB59FBA0D8526FE3737AF00724F14051CF550AB2D1EF748A459B9A
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062A84D
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062A857
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • messages.LIBCPMT ref: 0062A891
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062A8C8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3messages
                                        • String ID: H:g
                                        • API String ID: 50917705-2008494056
                                        • Opcode ID: ca5ff19217282506308ca4071e4e04261cefc139ff7425cc72c45ca6230ad33d
                                        • Instruction ID: b1696eada0fb281dc64365415d267dddb587250bc2cdd507c2318ba918971b5d
                                        • Opcode Fuzzy Hash: ca5ff19217282506308ca4071e4e04261cefc139ff7425cc72c45ca6230ad33d
                                        • Instruction Fuzzy Hash: 19F0F03180092A9FCB88FBB0D812AEE3323AF00728F14010CF4206B2C1DF398A459F96
                                        APIs
                                        • __alloca_probe_16.LIBCMT ref: 0064EA1F
                                        • __alloca_probe_16.LIBCMT ref: 0064EAE8
                                        • __freea.LIBCMT ref: 0064EB4F
                                          • Part of subcall function 0064D330: HeapAlloc.KERNEL32(00000000,?,?,?,0064CD65,?,00000000,?,0063E0E9,?,?,?,?,?,?,0061163C), ref: 0064D365
                                        • __freea.LIBCMT ref: 0064EB62
                                        • __freea.LIBCMT ref: 0064EB6F
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: __freea$__alloca_probe_16$AllocHeap
                                        • String ID:
                                        • API String ID: 1096550386-0
                                        • Opcode ID: a738876e4d86998fcce5d91cd2fb963ca022693adef7b3960019fe6424d16581
                                        • Instruction ID: 8066e3e3ccb352a85ebd8d5b24496df31bf0d5be974652ac1e766738f09886d2
                                        • Opcode Fuzzy Hash: a738876e4d86998fcce5d91cd2fb963ca022693adef7b3960019fe6424d16581
                                        • Instruction Fuzzy Hash: 0951B472600206AFEB219F60CD81EFB7AABFF44714F25052DFD09D6241EB72DC418669
                                        APIs
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0061C86D
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0061C890
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0061C8B8
                                        • std::_Facet_Register.LIBCPMT ref: 0061C92D
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0061C961
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                        • String ID:
                                        • API String ID: 459529453-0
                                        • Opcode ID: cdb64214d9e5f74aba5bac88edf0616fdc2395117fb06ae42ca8eddb273ebf39
                                        • Instruction ID: 52d07d552b6ad171ec3564e71d8bf2adf5d68750d7183a333fb90c35526f0ba3
                                        • Opcode Fuzzy Hash: cdb64214d9e5f74aba5bac88edf0616fdc2395117fb06ae42ca8eddb273ebf39
                                        • Instruction Fuzzy Hash: A141C1718002299FCB05DF58D940BEEFBB6FF44320F184159E858A7391D774AE85CBA1
                                        APIs
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0061F26D
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0061F290
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0061F2B8
                                        • std::_Facet_Register.LIBCPMT ref: 0061F32D
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0061F361
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                        • String ID:
                                        • API String ID: 459529453-0
                                        • Opcode ID: f31f8e3d9652d434f7096f78276f3d643fb56c20fb952f2b679d2a6e7ebf1515
                                        • Instruction ID: 9ada495500ad54d48332b138357c94136c433e2cb0059785fc349ed5af28c7e5
                                        • Opcode Fuzzy Hash: f31f8e3d9652d434f7096f78276f3d643fb56c20fb952f2b679d2a6e7ebf1515
                                        • Instruction Fuzzy Hash: 3B41C171800619CFCB05DF98D840BEEBBB6FB40320F284269E815A73A1D774AE81CBD1
                                        APIs
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0061EAAD
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0061EAD0
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0061EAF8
                                        • std::_Facet_Register.LIBCPMT ref: 0061EB6D
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0061EBA1
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                        • String ID:
                                        • API String ID: 459529453-0
                                        • Opcode ID: ec27e3054cfaad087d275b8b96dcb50b353686584af42b06c97e6d5193bf7759
                                        • Instruction ID: e95b1c64c11099f3ba41b04c71b18dcc3a667694e3392977bae84ac9c7f3bc6a
                                        • Opcode Fuzzy Hash: ec27e3054cfaad087d275b8b96dcb50b353686584af42b06c97e6d5193bf7759
                                        • Instruction Fuzzy Hash: F941AC7180425ACFCB05DF58D940BEEFBB6FB50320F188159E81AA7391D775AE81CB91
                                        APIs
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0061EBED
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0061EC10
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0061EC38
                                        • std::_Facet_Register.LIBCPMT ref: 0061ECAD
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0061ECE1
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                        • String ID:
                                        • API String ID: 459529453-0
                                        • Opcode ID: 7897eff6ca7da21d3225dbb827e40008656dc63539dc0aeebbcf87a3ed7934da
                                        • Instruction ID: 9e394fd004c07b007f8f77b47a97d4a78848dfeec0520a97d954140f598abcce
                                        • Opcode Fuzzy Hash: 7897eff6ca7da21d3225dbb827e40008656dc63539dc0aeebbcf87a3ed7934da
                                        • Instruction Fuzzy Hash: E341BC71800259DFCB09DF58D980BEEBBB6FB40320F184159E825A7390D775AE81CBD1
                                        APIs
                                        • GetLastError.KERNEL32(00000010,00000010,?,00617ACB,?,?,?), ref: 00617E47
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ErrorLast
                                        • String ID: Call to ShellExecuteEx() returned:$Last error=$false$true
                                        • API String ID: 1452528299-1782174991
                                        • Opcode ID: d5a8002e123045af4b0cd3c52e009ca64256fe1371214f25ee0646bee1de3f88
                                        • Instruction ID: 84219bc8e84d7a103b07a0f0f499fa4ab680c8e26e9ffd40e9232a978711f42b
                                        • Opcode Fuzzy Hash: d5a8002e123045af4b0cd3c52e009ca64256fe1371214f25ee0646bee1de3f88
                                        • Instruction Fuzzy Hash: FF218E49B102628ACB705F7CC4003BAA6F2EF54744F6918AFECC8D7390F6698CC28395
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Maklocstr$Maklocchr
                                        • String ID:
                                        • API String ID: 2020259771-0
                                        • Opcode ID: 6e211074460127c52ec1a77178790c00f142d0109e0532b7552359e3ea49e2ba
                                        • Instruction ID: 7982ed277780ed0047d79902e532136b8d733e7a3b103bac1b38616892473c1c
                                        • Opcode Fuzzy Hash: 6e211074460127c52ec1a77178790c00f142d0109e0532b7552359e3ea49e2ba
                                        • Instruction Fuzzy Hash: 72118CB1908B54BBE3209BA5E881F63B7EDFF09750F044919F185CBA40D264F8508BA8
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00624178
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00624182
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • numpunct.LIBCPMT ref: 006241BC
                                        • std::_Facet_Register.LIBCPMT ref: 006241D3
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 006241F3
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registernumpunct
                                        • String ID:
                                        • API String ID: 743221004-0
                                        • Opcode ID: 5206e7942d93f5a3adf33098fe4a570fb27994fa8d12a9c64d567f68ea88a3e5
                                        • Instruction ID: 33717609983c2e2b1457f91e7407f254781b9e51a89693489835f0bbd8135598
                                        • Opcode Fuzzy Hash: 5206e7942d93f5a3adf33098fe4a570fb27994fa8d12a9c64d567f68ea88a3e5
                                        • Instruction Fuzzy Hash: 9311CE3590063A8BCB48EFA4E855ABE7BA3AF94714F28000CF911A7391DF749E418F95
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 006353B2
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 006353BC
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • moneypunct.LIBCPMT ref: 006353F6
                                        • std::_Facet_Register.LIBCPMT ref: 0063540D
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0063542D
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                        • String ID:
                                        • API String ID: 419941038-0
                                        • Opcode ID: 7c1e1b0947191abf41b33708bd232ee419519624ac8a542e84756b9459d61f8f
                                        • Instruction ID: f9113916c980ccdb546efaf21c956a49e98aa9723bd10b397920ced0d64e35c1
                                        • Opcode Fuzzy Hash: 7c1e1b0947191abf41b33708bd232ee419519624ac8a542e84756b9459d61f8f
                                        • Instruction Fuzzy Hash: 4101C071900A259BCB49EBA4D851AAE77A3BF44725F24000CF812A73D2DF749E819BD5
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00635447
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00635451
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • moneypunct.LIBCPMT ref: 0063548B
                                        • std::_Facet_Register.LIBCPMT ref: 006354A2
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 006354C2
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                        • String ID:
                                        • API String ID: 419941038-0
                                        • Opcode ID: 2312e435bb4742002a50f7faeb41db657da5443482924cf29b44cdb088c9172c
                                        • Instruction ID: a4eb495a8781902bb68ce8a7ba1cac174bf72ce5057d8cbfaf29390419c8cc24
                                        • Opcode Fuzzy Hash: 2312e435bb4742002a50f7faeb41db657da5443482924cf29b44cdb088c9172c
                                        • Instruction Fuzzy Hash: BB0104319006259BCB08EBA4C801AAEB7B3AF44715F14000CF516673C2DF348A408BD5
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00623FB9
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00623FC3
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • codecvt.LIBCPMT ref: 00623FFD
                                        • std::_Facet_Register.LIBCPMT ref: 00624014
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00624034
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                        • String ID:
                                        • API String ID: 712880209-0
                                        • Opcode ID: d82e61691b7304d23251989def6832749f32f2702f644937832ea2d3f60c17df
                                        • Instruction ID: 0ab37cdb5685a1a5d8ef067f86b62ff4211f6e998ab9bffe3c9884203b1c2460
                                        • Opcode Fuzzy Hash: d82e61691b7304d23251989def6832749f32f2702f644937832ea2d3f60c17df
                                        • Instruction Fuzzy Hash: D201C4319006399BCB45EBA4E855AEE7B73AF44714F14000CF911AB3D1DF749E819F95
                                        APIs
                                        • GetSystemDirectoryW.KERNEL32(?,00000105), ref: 006161B5
                                        • GetLastError.KERNEL32(?,?,?,000000FF,0065B8CD,000000FF), ref: 0061626B
                                          • Part of subcall function 00611FD0: FindResourceW.KERNEL32(00000000,?,00000006,?,00000000,0065B0ED,000000FF,?,80070057,?,00000000,?,00000010,?,00611B09,?), ref: 0061205C
                                        • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,?,000000FF,0065B8CD,000000FF), ref: 0061620F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: DirectoryErrorFindLastLibraryLoadResourceSystem
                                        • String ID: ntdll.dll
                                        • API String ID: 4113295189-2227199552
                                        • Opcode ID: 774c7eb534931b7f61b6f4ae73260d06a46f370bd947ab67006fc9a271f925a4
                                        • Instruction ID: 60927a343458c834efc0a0b6769ad90a3f6f7008e1775c9adb48b247a7922c53
                                        • Opcode Fuzzy Hash: 774c7eb534931b7f61b6f4ae73260d06a46f370bd947ab67006fc9a271f925a4
                                        • Instruction Fuzzy Hash: 24416E75A002099FDB10DF68CC85BEEBBB6FF08310F184169E915EB2C1DBB49A45CB91
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Mpunct$H_prolog3
                                        • String ID: $+xv
                                        • API String ID: 4281374311-1686923651
                                        • Opcode ID: 588d4fe9944ee4a0cf06ef09de8319c6a8747450d97dfc927a48cadf61c0dec0
                                        • Instruction ID: a1d8cebd579bee13e435cbfbe2588be6a7b3c00a8140d88916af73ea4d3a4a26
                                        • Opcode Fuzzy Hash: 588d4fe9944ee4a0cf06ef09de8319c6a8747450d97dfc927a48cadf61c0dec0
                                        • Instruction Fuzzy Hash: 5421CEB1800B52AEDB65DF64C850B6BBFF9AB08300F04491EF499C7A82D730E601CBD4
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062DF64
                                          • Part of subcall function 00627D3A: _Maklocstr.LIBCPMT ref: 00627D5A
                                          • Part of subcall function 00627D3A: _Maklocstr.LIBCPMT ref: 00627D77
                                          • Part of subcall function 00627D3A: _Maklocstr.LIBCPMT ref: 00627D94
                                          • Part of subcall function 00627D3A: _Maklocchr.LIBCPMT ref: 00627DA6
                                          • Part of subcall function 00627D3A: _Maklocchr.LIBCPMT ref: 00627DB9
                                        • _Mpunct.LIBCPMT ref: 0062DFFC
                                        • _Mpunct.LIBCPMT ref: 0062E016
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Maklocstr$MaklocchrMpunct$H_prolog3
                                        • String ID: $+xv
                                        • API String ID: 2939335142-1686923651
                                        • Opcode ID: a0baf45e5f1f8e54c133a919183d7ba17b564be77684add06580bd1969e5178c
                                        • Instruction ID: e00ed30566c7a9572da8e64a6ff7a02101a4a4a3a130847f67e26edc00bee70c
                                        • Opcode Fuzzy Hash: a0baf45e5f1f8e54c133a919183d7ba17b564be77684add06580bd1969e5178c
                                        • Instruction Fuzzy Hash: 06219EB1904F66AEDB65DF749850BABBBF9AB08300F04091EE499C7A41D770E605CF94
                                        APIs
                                        • _Maklocstr.LIBCPMT ref: 00627E6A
                                        • _Maklocstr.LIBCPMT ref: 00627E83
                                          • Part of subcall function 00627FB2: Concurrency::cancel_current_task.LIBCPMT ref: 00628054
                                        • _Maklocstr.LIBCPMT ref: 00627E92
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Maklocstr$Concurrency::cancel_current_task
                                        • String ID: :AM:am:PM:pm
                                        • API String ID: 980645097-1966799564
                                        • Opcode ID: 23cd73da012e299f7296fddedce4ecfb49396b2d385d3f7cf1b7dbd9af039adf
                                        • Instruction ID: 4a2037933de782faa26c2901b5af7a34219d0d2c9e645a99e1fde77832ce2a6b
                                        • Opcode Fuzzy Hash: 23cd73da012e299f7296fddedce4ecfb49396b2d385d3f7cf1b7dbd9af039adf
                                        • Instruction Fuzzy Hash: F301A772D047187BDB50AFA4EC46C9FB3BDEB85710B01441EF805AB242DA74AD058BA4
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062A8E2
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062A8EC
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062A95D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                        • String ID: t:g
                                        • API String ID: 1383202999-1522938652
                                        • Opcode ID: ee44f3111d0b87a3d7fff4d6cbab29d581337bad3e6099858cb9289f60bfbea1
                                        • Instruction ID: 31bd3daff9e5cabf0cd8aa83fddb7b53cb9c9bab24d3bc41506a580aa35a758c
                                        • Opcode Fuzzy Hash: ee44f3111d0b87a3d7fff4d6cbab29d581337bad3e6099858cb9289f60bfbea1
                                        • Instruction Fuzzy Hash: 61F0C2318009295BCB44EAA0D852AFE2327AF00724F14010CF550672D1DF348A848B95
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062A977
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062A981
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062A9F2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                        • String ID: L:g
                                        • API String ID: 1383202999-1891534644
                                        • Opcode ID: a29cc7fda35b41449d542ad3689fa9bb2d4e8bcd8e8aec6ea9ab064247ccb66c
                                        • Instruction ID: 81c54a1e04211392a507a090283b3cc599cc496f0df4218bf4f66d5837326cc9
                                        • Opcode Fuzzy Hash: a29cc7fda35b41449d542ad3689fa9bb2d4e8bcd8e8aec6ea9ab064247ccb66c
                                        • Instruction Fuzzy Hash: 9DF0F631C009259BCB44FFA0D812BFE2323AF00728F14010CF454672D1EF348A849B99
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062AA0C
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062AA16
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062AA87
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                        • String ID: x:g
                                        • API String ID: 1383202999-1406978680
                                        • Opcode ID: d67f3016b6ca8967e69070829c602708a3bfe68f63eacb02359334d185f8be3c
                                        • Instruction ID: 56c86d15a13659f70f79e3283952fff3a6d845e2e7197d33ef10da2d08569243
                                        • Opcode Fuzzy Hash: d67f3016b6ca8967e69070829c602708a3bfe68f63eacb02359334d185f8be3c
                                        • Instruction Fuzzy Hash: 86F096319009265BCB45FBA0D952AEE2727AF00754F14450CF550A72D1DF748A459B95
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062AAA1
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062AAAB
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062AB1C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                        • String ID: P:g
                                        • API String ID: 1383202999-1703075104
                                        • Opcode ID: 4ce5ed1be8627bd2fc18eddf5408a5cd854ff0e2af600d17eabcd0e924836d83
                                        • Instruction ID: 983cc091f9e4e0561a1c9fc290963a63eb52759b1bdecad74bfe4f38fab50aaa
                                        • Opcode Fuzzy Hash: 4ce5ed1be8627bd2fc18eddf5408a5cd854ff0e2af600d17eabcd0e924836d83
                                        • Instruction Fuzzy Hash: 31F0903190092A9BCB59FFA0D852AFE2723AF04729F14041CF9646B2D2DF748A44DF96
                                        APIs
                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,0063DE33,00000000,?,00673F04,?,?,?,0063DFD6,00000004,InitializeCriticalSectionEx,0066230C,InitializeCriticalSectionEx), ref: 0063DE8F
                                        • GetLastError.KERNEL32(?,0063DE33,00000000,?,00673F04,?,?,?,0063DFD6,00000004,InitializeCriticalSectionEx,0066230C,InitializeCriticalSectionEx,00000000,?,0063DD8D), ref: 0063DE99
                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 0063DEC1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: LibraryLoad$ErrorLast
                                        • String ID: api-ms-
                                        • API String ID: 3177248105-2084034818
                                        • Opcode ID: effdfeae2a21f746efeefd4803df08e66af743be450bbb309e94ad4e74921aad
                                        • Instruction ID: 3cd315368edf66c4b8d9194a96d0dff9b5727369ebaf64bce13065d971dc8ed8
                                        • Opcode Fuzzy Hash: effdfeae2a21f746efeefd4803df08e66af743be450bbb309e94ad4e74921aad
                                        • Instruction Fuzzy Hash: F3E04F70A80305B7EF211B60EC16B9A3F5B9F10B52F241030F90CE81E1D761A95495C8
                                        APIs
                                        • AcquireSRWLockExclusive.KERNEL32(00673B74,?,?,006126B7,00674714,0065EC90), ref: 00639561
                                        • ReleaseSRWLockExclusive.KERNEL32(00673B74,?,?,006126B7,00674714,0065EC90), ref: 00639594
                                        • WakeAllConditionVariable.KERNEL32(00673B70,?,?,006126B7,00674714,0065EC90), ref: 0063959F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ExclusiveLock$AcquireConditionReleaseVariableWake
                                        • String ID: t;g
                                        • API String ID: 1466638765-1138557533
                                        • Opcode ID: 3f754a814b4b7765d3092e723aa4190b7659d56d26209443c11e945b2aa8c5b8
                                        • Instruction ID: 75717f92251b4bbedf2881dae27843b666cdb68a6a5a040e84c8347668dde43e
                                        • Opcode Fuzzy Hash: 3f754a814b4b7765d3092e723aa4190b7659d56d26209443c11e945b2aa8c5b8
                                        • Instruction Fuzzy Hash: 9BF06D75900621DFC318DF58EC58D983BABFB0971AB11102AF90D83320CB706980DBB4
                                        APIs
                                        • AcquireSRWLockExclusive.KERNEL32(00673B74), ref: 00639536
                                        • ReleaseSRWLockExclusive.KERNEL32(00673B74), ref: 00639543
                                        • WakeAllConditionVariable.KERNEL32(00673B70), ref: 0063954E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ExclusiveLock$AcquireConditionReleaseVariableWake
                                        • String ID: t;g
                                        • API String ID: 1466638765-1138557533
                                        • Opcode ID: c09ec6faeebc214dd96efbc4e6f562576e05b9260daabb3e3880ccf2b191adef
                                        • Instruction ID: f2902f1e847262b97252d9be785e8afe06c436a28302a4f7b4de2b32cc9f0dde
                                        • Opcode Fuzzy Hash: c09ec6faeebc214dd96efbc4e6f562576e05b9260daabb3e3880ccf2b191adef
                                        • Instruction Fuzzy Hash: 48D0C932541635EBC350ABA4EC08ADA7BAEEF0A77BF115062F54D82210CB7059408BF6
                                        APIs
                                        • _strcspn.LIBCMT ref: 0061EDA1
                                        • _strcspn.LIBCMT ref: 0061EDC5
                                          • Part of subcall function 0061B410: LocalAlloc.KERNEL32(00000040,C1C81F0B,C1C81EE7,00000000,?,?,C1C81EE7,00000001,?,?,?,?,C1C81EE7,00000000,?), ref: 0061B466
                                          • Part of subcall function 0061B410: LocalFree.KERNEL32(C1C81EE7,?,?,?,?,?,?,C1C81EE7,00000001,?,?,?,?,C1C81EE7,00000000,?), ref: 0061B55D
                                        • LocalFree.KERNEL32(?), ref: 0061F1A5
                                        • LocalFree.KERNEL32(?), ref: 0061F1F1
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Local$Free$_strcspn$Alloc
                                        • String ID:
                                        • API String ID: 3422560186-0
                                        • Opcode ID: 4ec5a7a26690b56e70ccb3831bbbdd1fee02ac04b6039a2361fbd0f6e88e6c57
                                        • Instruction ID: 128e0f4076dd19f8e6b988bc1abd3ece7bf80d7beb7d9a06cacecdd77e3622aa
                                        • Opcode Fuzzy Hash: 4ec5a7a26690b56e70ccb3831bbbdd1fee02ac04b6039a2361fbd0f6e88e6c57
                                        • Instruction Fuzzy Hash: 2D026A75E00249DFDB14CFA4C854AEEBBB6FF88310F184169E815AB351D731AE86CB91
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: _strcspn$H_prolog3_ctype
                                        • String ID:
                                        • API String ID: 838279627-0
                                        • Opcode ID: f60f5b56e68cd79511fc191c607cb0387494fc8dcf4e47939d8bd134ffe33bb1
                                        • Instruction ID: 9bf7b48499bb8349e612700b96264ac769d8835e18a18d4f4eac51168057872a
                                        • Opcode Fuzzy Hash: f60f5b56e68cd79511fc191c607cb0387494fc8dcf4e47939d8bd134ffe33bb1
                                        • Instruction Fuzzy Hash: 56D16771D04629EFDF14DFA4D884AEEBBBAEF08310F144129E815AB251D730AE55CFA4
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: _strcspn$H_prolog3_ctype
                                        • String ID:
                                        • API String ID: 838279627-0
                                        • Opcode ID: 0bf4860722bd9d140460cd06e2d9b8b255775befae5d4bbe29a9264829bfbd33
                                        • Instruction ID: fa823837322616f149ad8654174bf02e075140749f1c882dd1a6e86452d46c46
                                        • Opcode Fuzzy Hash: 0bf4860722bd9d140460cd06e2d9b8b255775befae5d4bbe29a9264829bfbd33
                                        • Instruction Fuzzy Hash: 67D16B71D0061AAFDF55DFA4D890AEEBBB6FF08310F14451AE815AB251D730AE45CFA0
                                        APIs
                                        • GetConsoleOutputCP.KERNEL32(C1C81EE7,00000000,00000000,?), ref: 006582FB
                                          • Part of subcall function 006512CA: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,00000000,?,-00000008,-00000008,00000000,?,?,0064EB45,?,00000000), ref: 00651329
                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00658551
                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00658597
                                        • GetLastError.KERNEL32 ref: 0065863A
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                        • String ID:
                                        • API String ID: 2112829910-0
                                        • Opcode ID: c78fafbf9c4d19573030734dc95f0b0465584ed607cf7614141a6f56e5da0bc8
                                        • Instruction ID: 71200edf28d181491704d417369038fe74a73d86196d0d181c85d94c451437a1
                                        • Opcode Fuzzy Hash: c78fafbf9c4d19573030734dc95f0b0465584ed607cf7614141a6f56e5da0bc8
                                        • Instruction Fuzzy Hash: EFD18C75D002489FCB15CFA8D8909EDBBF6FF48311F28416AE856FB751EA30A946CB50
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: AdjustPointer
                                        • String ID:
                                        • API String ID: 1740715915-0
                                        • Opcode ID: 09877da74207bcd8eaeb04662ed75c8e1ca70b482e86e85795d41224c460fe57
                                        • Instruction ID: 88d0d2ad7907d3554a2ad83c7405615934db1b18a53c87c7eaae7c8803046334
                                        • Opcode Fuzzy Hash: 09877da74207bcd8eaeb04662ed75c8e1ca70b482e86e85795d41224c460fe57
                                        • Instruction Fuzzy Hash: 7751EE72A00602AFDB288F50D845BAAB7A7EF40720F14452DF84AA7391E735EC91D7D4
                                        APIs
                                        • LocalAlloc.KERNEL32(00000040,80000022,?,?,/Ca,?,00000000,?), ref: 006149BA
                                        • LocalAlloc.KERNEL32(00000040,7FFFFFFF,?,?,/Ca,?,00000000,?), ref: 00614A04
                                        • LocalFree.KERNEL32(00000000,?,/Ca,?,00000000,?), ref: 00614A85
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Local$Alloc$Free
                                        • String ID: /Ca
                                        • API String ID: 209276640-766612935
                                        • Opcode ID: 7c0081e033736385e3db2f2afd9b9e71208ede174129c0d26fdc379ecb3f6893
                                        • Instruction ID: 7882ec9daff2d09ab47ce115bb05c1e01bd67a17d46ec4da73b089613502db66
                                        • Opcode Fuzzy Hash: 7c0081e033736385e3db2f2afd9b9e71208ede174129c0d26fdc379ecb3f6893
                                        • Instruction Fuzzy Hash: 0441F0727042568BCB14DF68D8809AEB3D6AF88310F190A3EF856C7385EB31D95587A9
                                        APIs
                                        • LocalAlloc.KERNEL32(00000040,80000022,?,?,?,?,?,0061432F,00000000,?), ref: 006148C9
                                        • LocalAlloc.KERNEL32(00000040,7FFFFFFF,?,?,?,?,?,0061432F,00000000,?), ref: 006148E5
                                        • LocalFree.KERNEL32(?,00000000,?), ref: 0061493B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Local$Alloc$Free
                                        • String ID: /Ca
                                        • API String ID: 209276640-766612935
                                        • Opcode ID: 73a3db2163c8ea9f79be01dab2ccbce3e6a129e26ba77b09d5e0b62e5b98a6f3
                                        • Instruction ID: cf502e22e3486358c26ae3f0312e450f14ba116ae83def02943ef3a62394a9b8
                                        • Opcode Fuzzy Hash: 73a3db2163c8ea9f79be01dab2ccbce3e6a129e26ba77b09d5e0b62e5b98a6f3
                                        • Instruction Fuzzy Hash: 9931D1726002118BD7189F28C985AAF77DBEB813A5F280A6DE526DB3D0EE30DC818651
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a28df73b424b739d6e97a30b6537213f095732ad56528ea8874b39e382971c7d
                                        • Instruction ID: dd76a1727dbd6ccb1a7f7f66d4c32807b31698c849ceb4331da285f5ea60df9f
                                        • Opcode Fuzzy Hash: a28df73b424b739d6e97a30b6537213f095732ad56528ea8874b39e382971c7d
                                        • Instruction Fuzzy Hash: 71219331A44A05AF9B60EF71DC40DAB77ABAF00364B108528F915D7290EB31EC1087B0
                                        APIs
                                        • GetLastError.KERNEL32(00000000,00000000,00000000,00618D7C,00000000,?,?,?,?,?,?,?,00000000,0065BFF5,000000FF), ref: 006192A7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ErrorLast
                                        • String ID: > returned:$Call to ShellExecute() for verb<$Last error=
                                        • API String ID: 1452528299-1781106413
                                        • Opcode ID: b942b7fb504f26f4ec48dee3f70928f4c0dc41bef9a250c739198a9123f9db45
                                        • Instruction ID: 7807b15c9488f66b14b78edf8862c037c3d8ce074e03baafbd78333005197436
                                        • Opcode Fuzzy Hash: b942b7fb504f26f4ec48dee3f70928f4c0dc41bef9a250c739198a9123f9db45
                                        • Instruction Fuzzy Hash: 32218159B2026187CB701F7C84112B9B6F6AF54754F29542FD8D8D7390FA798CC2C3A5
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 006249FC
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00624A06
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00624AAD
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00624AB8
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Concurrency::cancel_current_taskH_prolog3Lockit::_Lockit::~_
                                        • String ID:
                                        • API String ID: 4244582100-0
                                        • Opcode ID: b85df116223be23194530d33a1468108c4d1d7035348b29463924f5f7129e179
                                        • Instruction ID: 33198ef847393cf7c3d9ca459f7c1e1ebe8d2c683f08c6dca8290edc1557149f
                                        • Opcode Fuzzy Hash: b85df116223be23194530d33a1468108c4d1d7035348b29463924f5f7129e179
                                        • Instruction Fuzzy Hash: 3E213B34A40A26AFCB04EF14D891AADB772FF48711F008459E816AB7A1DF30AD10CF99
                                        APIs
                                        • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000004,00000080,00000000,C1C81EE7), ref: 006218FC
                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,40000000,00000001,00000000,00000004,00000080,00000000), ref: 0062191C
                                        • WriteFile.KERNEL32(00000000,?,?,?,00000000,?,40000000,00000001,00000000,00000004,00000080,00000000), ref: 0062194D
                                        • CloseHandle.KERNEL32(00000000,?,?,?,00000000,?,40000000,00000001,00000000,00000004,00000080,00000000), ref: 00621966
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: File$CloseCreateHandlePointerWrite
                                        • String ID:
                                        • API String ID: 3604237281-0
                                        • Opcode ID: 2fce513d6c7e1c17205a550c6d60ab1edce74e715bd1705ba9d7be15c6687b96
                                        • Instruction ID: 8f09daf2a99321fbc1d72e8a248ee5ba4c428a6e93889ea4f57bdfc77b7f0d5f
                                        • Opcode Fuzzy Hash: 2fce513d6c7e1c17205a550c6d60ab1edce74e715bd1705ba9d7be15c6687b96
                                        • Instruction Fuzzy Hash: BB219070A44718AFD720DF54DC0AFAFBBB9FB05B24F10422AF515AB2C0D7B46A458B94
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 006240E3
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 006240ED
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Facet_Register.LIBCPMT ref: 0062413E
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062415E
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID:
                                        • API String ID: 2854358121-0
                                        • Opcode ID: f6fc3aead649d9badf6ec29d00634f75b77abb89a788338ead2a9939e4bbad35
                                        • Instruction ID: 8f60696aef62a26282a4adc3e5ed53efcb5a148f9451f4ac84e26c9746372104
                                        • Opcode Fuzzy Hash: f6fc3aead649d9badf6ec29d00634f75b77abb89a788338ead2a9939e4bbad35
                                        • Instruction Fuzzy Hash: CA01ED71900A3A8BCB44EBA4E8556FE7B63AF84724F14000CF510A7392DF709A418F96
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062B108
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062B112
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Facet_Register.LIBCPMT ref: 0062B163
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062B183
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID:
                                        • API String ID: 2854358121-0
                                        • Opcode ID: 36c4e4f357d64b65d8c5d2cdd90e59aa7ffabde5674b6e2e9717431009a8cc6a
                                        • Instruction ID: 4aa2334db7669a17552ba5b6dee548c74419ff2df5c8cccd4870c421b12ef437
                                        • Opcode Fuzzy Hash: 36c4e4f357d64b65d8c5d2cdd90e59aa7ffabde5674b6e2e9717431009a8cc6a
                                        • Instruction Fuzzy Hash: 6201AD32900A699BCB49EBA4D85A6EE7763AF44724F24010CF850AB392DF349A419F95
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0063531D
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00635327
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Facet_Register.LIBCPMT ref: 00635378
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00635398
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID:
                                        • API String ID: 2854358121-0
                                        • Opcode ID: 921e14dbc1190e3bc36bd2bd54c1e5369d026cd2d2c27cf2acd3100702c68fc3
                                        • Instruction ID: a5ed735d1b0aa181c53dae48986a69d620722faf825b1dccef9108340626d591
                                        • Opcode Fuzzy Hash: 921e14dbc1190e3bc36bd2bd54c1e5369d026cd2d2c27cf2acd3100702c68fc3
                                        • Instruction Fuzzy Hash: 2E0100759006258BCB04EBA4C811AAE7773BF84724F28040CF812AB3D1EFB48A419BD5
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062A4CF
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062A4D9
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Facet_Register.LIBCPMT ref: 0062A52A
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062A54A
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID:
                                        • API String ID: 2854358121-0
                                        • Opcode ID: 901a307eb096ba422fad1d93d9c76a1841e76a11bb14429662ccb5cecfc9ad46
                                        • Instruction ID: e1da5beda9334a7d0e68100d795c6b69f22275101c4239ba3fb48a199b92bc23
                                        • Opcode Fuzzy Hash: 901a307eb096ba422fad1d93d9c76a1841e76a11bb14429662ccb5cecfc9ad46
                                        • Instruction Fuzzy Hash: 4901ED31900A258BCB45EBA4D842AAE7773AF84324F14000CF411AB381CB708A048F96
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 006354DC
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 006354E6
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Facet_Register.LIBCPMT ref: 00635537
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00635557
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID:
                                        • API String ID: 2854358121-0
                                        • Opcode ID: c105414160acfec40e9e378c77bc82c2a019f1ec0c7d684243ab6c602ad710ae
                                        • Instruction ID: 69a7c7b260a76e1882f18b041987ad7462418a1c2b46a5fabbda87ed65972b19
                                        • Opcode Fuzzy Hash: c105414160acfec40e9e378c77bc82c2a019f1ec0c7d684243ab6c602ad710ae
                                        • Instruction Fuzzy Hash: 88010071900625CBCB05EBA4C841AAE7B73AF84724F14000DF812AB3C1CF30DA059BD5
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00635571
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0063557B
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Facet_Register.LIBCPMT ref: 006355CC
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 006355EC
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID:
                                        • API String ID: 2854358121-0
                                        • Opcode ID: 65eac19ebd4ecb6fa57246b98fc79aa71c1692ef0507ad647c68d2b2397ed43b
                                        • Instruction ID: 1047c20448103ca15a687c650916178794140e989f45a8fa674925049d65005d
                                        • Opcode Fuzzy Hash: 65eac19ebd4ecb6fa57246b98fc79aa71c1692ef0507ad647c68d2b2397ed43b
                                        • Instruction Fuzzy Hash: 1D01C075900A298BCB45EBA4D8516FE7BB3AF84724F14010CF412A73D1CF349A419BD5
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062A564
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062A56E
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Facet_Register.LIBCPMT ref: 0062A5BF
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062A5DF
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID:
                                        • API String ID: 2854358121-0
                                        • Opcode ID: 8f9340ca15b7e26d1966549f8735670f326544ae2b0387b4dd002b03c16256af
                                        • Instruction ID: ad9bdd3ba48f0170ecbaa20a3892076d4a4e236d357b56b5a9aa412fb458ca97
                                        • Opcode Fuzzy Hash: 8f9340ca15b7e26d1966549f8735670f326544ae2b0387b4dd002b03c16256af
                                        • Instruction Fuzzy Hash: FF01AD369009258FCB45EBA4D8526AE7B67AF84724F24000CF850A7392DF749A45DF96
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062AFDE
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062AFE8
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • std::_Facet_Register.LIBCPMT ref: 0062B039
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062B059
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID:
                                        • API String ID: 2854358121-0
                                        • Opcode ID: 9416eb356411ca5db31c7a6de78bb6ef790ae720cd45b322aa55a0a5618ba612
                                        • Instruction ID: a1f09e8e7be6312267da7459aab4ef4bacfc1da0ca422b4d2de6b7f98fd09437
                                        • Opcode Fuzzy Hash: 9416eb356411ca5db31c7a6de78bb6ef790ae720cd45b322aa55a0a5618ba612
                                        • Instruction Fuzzy Hash: 2C01C031900A359BCB5AEFA4D8926EE7767EF44724F24000CF821A73D1DF349A419B99
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062662B
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00626636
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 006266A4
                                          • Part of subcall function 00626787: std::locale::_Locimp::_Locimp.LIBCPMT ref: 0062679F
                                        • std::locale::_Setgloballocale.LIBCPMT ref: 00626651
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                        • String ID:
                                        • API String ID: 677527491-0
                                        • Opcode ID: 8318c8f1531970801029c8a23ba038b2a4ba63e3d9ff93f5defd790eeefa2e77
                                        • Instruction ID: b1a2da34f25fadd15ed2e251e6750516a12a1aaed37e24ff5e217bb10f75a71b
                                        • Opcode Fuzzy Hash: 8318c8f1531970801029c8a23ba038b2a4ba63e3d9ff93f5defd790eeefa2e77
                                        • Instruction Fuzzy Hash: 1F01BCB5A00A209BCB49EB60E84597C7B63BF84344F14001CF80257391DF74AE42DFCA
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062A723
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062A72D
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • ctype.LIBCPMT ref: 0062A767
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062A79E
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3ctype
                                        • String ID:
                                        • API String ID: 3358926169-0
                                        • Opcode ID: 213b5f24b568f32a7e962f8bc32070b7bb35ecf35eb60935bfb9e8a366a838e8
                                        • Instruction ID: 27fa7ef356d304c71fdc4ae3c038b855fee017a4bf556b8f108c71fa6b2b0e26
                                        • Opcode Fuzzy Hash: 213b5f24b568f32a7e962f8bc32070b7bb35ecf35eb60935bfb9e8a366a838e8
                                        • Instruction Fuzzy Hash: CAF0F6359009299BCB45FBA0D852BFE3733AF44718F14000CF6106B3C2DF748A458B9A
                                        APIs
                                        • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,006594C1,00000000,00000001,00000000,?,?,0065868E,?,00000000,00000000), ref: 00659BDE
                                        • GetLastError.KERNEL32(?,006594C1,00000000,00000001,00000000,?,?,0065868E,?,00000000,00000000,?,?,?,00658C31,00000000), ref: 00659BEA
                                          • Part of subcall function 00659BB0: CloseHandle.KERNEL32(FFFFFFFE,00659BFA,?,006594C1,00000000,00000001,00000000,?,?,0065868E,?,00000000,00000000,?,?), ref: 00659BC0
                                        • ___initconout.LIBCMT ref: 00659BFA
                                          • Part of subcall function 00659B71: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00659BA0,006594AE,?,?,0065868E,?,00000000,00000000,?), ref: 00659B84
                                        • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,006594C1,00000000,00000001,00000000,?,?,0065868E,?,00000000,00000000,?), ref: 00659C0F
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                        • String ID:
                                        • API String ID: 2744216297-0
                                        • Opcode ID: 97a59b0b7691f7888cf092c98ab057471f041312c4ba4fb6721ed11681d8b83a
                                        • Instruction ID: fec097114ea95d3dc62175f0acb75066fd62aca37484a9cbdc56c72398d45a5a
                                        • Opcode Fuzzy Hash: 97a59b0b7691f7888cf092c98ab057471f041312c4ba4fb6721ed11681d8b83a
                                        • Instruction Fuzzy Hash: B2F01C36000219FBCF625F91EC14E9A3F67FB093A2F044120FE0986160D6328860EBE4
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0062AB36
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0062AB40
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                        • moneypunct.LIBCPMT ref: 0062AB7A
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0062ABB1
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3moneypunct
                                        • String ID:
                                        • API String ID: 3160146232-0
                                        • Opcode ID: 00d941003f736d3e2c3f4a5e1cb3ee525f29d6581c870e8d2971a494d544d049
                                        • Instruction ID: 134363ce132d5fca44c50fa36d1b2672102f2881a1255b00ff47625d97769283
                                        • Opcode Fuzzy Hash: 00d941003f736d3e2c3f4a5e1cb3ee525f29d6581c870e8d2971a494d544d049
                                        • Instruction Fuzzy Hash: 2AF05831A409399BCB45EFA0D812AEE7727AB40709F14001CF8816B282DF748A059B9A
                                        APIs
                                          • Part of subcall function 00658298: GetConsoleOutputCP.KERNEL32(C1C81EE7,00000000,00000000,?), ref: 006582FB
                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,00000000,00000000,00000000,?,?,00000000,?,?,00652C3F,?), ref: 00658CD4
                                        • GetLastError.KERNEL32(?,?,00652C3F,?,00652AD3,00000000,?,00000000,00652AD3,?,?,?,006703F8,0000002C,00652B44,?), ref: 00658CDE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ConsoleErrorFileLastOutputWrite
                                        • String ID: ?,e
                                        • API String ID: 2915228174-3567224262
                                        • Opcode ID: 61306b262799830aee4163c7e355d2b991b860881f11db2e6000a7b25fff9f83
                                        • Instruction ID: 161b3b9b95c6148466e72201fe32644e08a270d69cc35cefd38d91eed9ecd086
                                        • Opcode Fuzzy Hash: 61306b262799830aee4163c7e355d2b991b860881f11db2e6000a7b25fff9f83
                                        • Instruction Fuzzy Hash: 4961A4B1900119AFDF15DFA8C844AFEBBBBAF19305F140149ED04B7652DB32D90ACB60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: H_prolog3___cftoe
                                        • String ID: !%x
                                        • API String ID: 855520168-1893981228
                                        • Opcode ID: e35da16d2d1d42d1aa802c1c5fe286f41bc6bf57334c96de3870205470cdbdb3
                                        • Instruction ID: 5002dc8bef7a64909164ed256bfde02e663fb35fb3621ff5e5d3c0d72f2803e6
                                        • Opcode Fuzzy Hash: e35da16d2d1d42d1aa802c1c5fe286f41bc6bf57334c96de3870205470cdbdb3
                                        • Instruction Fuzzy Hash: 15717A71D00108AFDF18EFA8E881AEEB7B6EF09314F144529F415A7351EB35AE51CB94
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: H_prolog3___cftoe
                                        • String ID: !%x
                                        • API String ID: 855520168-1893981228
                                        • Opcode ID: 762ed906a62aa00894e8fa8d9d58289b0b28852878d3ce31ba2aeb700ceaa411
                                        • Instruction ID: f90f3d03fc4e87c06293a4a45ac23e722fa2e4c972e2ae97def04b453725e1cd
                                        • Opcode Fuzzy Hash: 762ed906a62aa00894e8fa8d9d58289b0b28852878d3ce31ba2aeb700ceaa411
                                        • Instruction Fuzzy Hash: 42718C71D00218AFDF05DFA8D881AEEBBB6FF09304F180529F855A7342EA31AD45CB94
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00624B91
                                          • Part of subcall function 0061BFF0: std::_Lockit::_Lockit.LIBCPMT ref: 0061C020
                                          • Part of subcall function 0061BFF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C048
                                          • Part of subcall function 00618700: LocalAlloc.KERNEL32(00000040,00000000,0063A1C5,00000000,C1C81EE7,?,00000000,?,FFFFFFFF,?,0065EB28,000000FF,?,006117A4,?,0065FDDA), ref: 00618706
                                          • Part of subcall function 0061C3C0: __Getctype.LIBCPMT ref: 0061C3CA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$AllocGetctypeH_prolog3LocalLockit::_Lockit::~_
                                        • String ID: $9g$8g
                                        • API String ID: 3791111190-2548076957
                                        • Opcode ID: eb0f201d129c8b38da705444ea8aa69b6cf6da011514af4f35f29aa75124f63d
                                        • Instruction ID: e820dd1ae01d7955da8f64d602236e4a24f82ea477a3661e5544dca6f3bad7a9
                                        • Opcode Fuzzy Hash: eb0f201d129c8b38da705444ea8aa69b6cf6da011514af4f35f29aa75124f63d
                                        • Instruction Fuzzy Hash: 335107B1D01A36ABD7616FA59C42ABF7A6BEF05360F04452DFD049B282DF3089409FA5
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 00633647
                                        • _swprintf.LIBCMT ref: 006336BF
                                          • Part of subcall function 0062A71C: __EH_prolog3.LIBCMT ref: 0062A723
                                          • Part of subcall function 0062A71C: std::_Lockit::_Lockit.LIBCPMT ref: 0062A72D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: H_prolog3H_prolog3_LockitLockit::__swprintfstd::_
                                        • String ID: %.0Lf
                                        • API String ID: 3614004578-1402515088
                                        • Opcode ID: 672d14124bb184f1c9c2756a3083c8ae9f096fb8427d6ebffd4f82831636a91c
                                        • Instruction ID: 5576fde3666edd2b65b3c59e127e488b9187d53813d90cb97c8ff3c6afda858a
                                        • Opcode Fuzzy Hash: 672d14124bb184f1c9c2756a3083c8ae9f096fb8427d6ebffd4f82831636a91c
                                        • Instruction Fuzzy Hash: CA616CB1D00228AFDF05DFE4D855AEDBBBAFF08300F104519E402AB395EB359A55CB94
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 00633977
                                        • _swprintf.LIBCMT ref: 006339EF
                                          • Part of subcall function 0061B7F0: std::_Lockit::_Lockit.LIBCPMT ref: 0061B81D
                                          • Part of subcall function 0061B7F0: std::_Lockit::_Lockit.LIBCPMT ref: 0061B840
                                          • Part of subcall function 0061B7F0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061B868
                                          • Part of subcall function 0061B7F0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061B911
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3__swprintf
                                        • String ID: %.0Lf
                                        • API String ID: 1487807907-1402515088
                                        • Opcode ID: a240b82bb2e42e8f23aa0a672b4e77e19c371661ccbd88fdaf30ef93bfce4062
                                        • Instruction ID: 30b036e7da9a3018eb6efffa882f7cfc35850bf42f159d842ac82424e0a2c1ee
                                        • Opcode Fuzzy Hash: a240b82bb2e42e8f23aa0a672b4e77e19c371661ccbd88fdaf30ef93bfce4062
                                        • Instruction Fuzzy Hash: 80617C71D00228AFCF09DFE4D844AEDBBBAFF48300F14451AE542AB395EB359A55CB94
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: __aulldiv
                                        • String ID: -$0123456789abcdefghijklmnopqrstuvwxyz
                                        • API String ID: 3732870572-1956417402
                                        • Opcode ID: c46638e37d3bd029f09d82e648fa70ac9b1c36275ce30754558eafdc319be723
                                        • Instruction ID: c9e04c0a8542294a3f968a85be91e6e251eccad699f4ff2f50234f531680bb0b
                                        • Opcode Fuzzy Hash: c46638e37d3bd029f09d82e648fa70ac9b1c36275ce30754558eafdc319be723
                                        • Instruction Fuzzy Hash: D3518470A0434A9FDF25CEA988917EEFBF7AF45310F18446AF492D7341DA7489428BD1
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 00638297
                                        • _swprintf.LIBCMT ref: 0063830F
                                          • Part of subcall function 0061C840: std::_Lockit::_Lockit.LIBCPMT ref: 0061C86D
                                          • Part of subcall function 0061C840: std::_Lockit::_Lockit.LIBCPMT ref: 0061C890
                                          • Part of subcall function 0061C840: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C8B8
                                          • Part of subcall function 0061C840: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C961
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3__swprintf
                                        • String ID: %.0Lf
                                        • API String ID: 1487807907-1402515088
                                        • Opcode ID: 165026bb76fb9a5e54baba3aaeeacf1937b405e4c6ddda5beca1e8140150ec97
                                        • Instruction ID: 2ce806c17e35f6ae994bb2ff35b1063f72b3f0c333f438e50bf0b78245d68843
                                        • Opcode Fuzzy Hash: 165026bb76fb9a5e54baba3aaeeacf1937b405e4c6ddda5beca1e8140150ec97
                                        • Instruction Fuzzy Hash: 6E618B71D00218AFCF09DFE4C845AEEBBBAFF08300F244519F406AB296EB359955CB94
                                        APIs
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 0061FF1C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Concurrency::cancel_current_task
                                        • String ID: false$true
                                        • API String ID: 118556049-2658103896
                                        • Opcode ID: ad2ce93b91889a3e3666e4671df5d0c052423420ea0e9b5954a235568aeea817
                                        • Instruction ID: 781b54a8cdd998c968d8a42b18da39d1bfabe0e98d13ee65c82ea85daeace3a6
                                        • Opcode Fuzzy Hash: ad2ce93b91889a3e3666e4671df5d0c052423420ea0e9b5954a235568aeea817
                                        • Instruction Fuzzy Hash: BF5183B1D007489FDB10DFA4C841BEEB7B9FF45304F14826EE845AB242E775A985CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: \\?\$\\?\UNC\
                                        • API String ID: 0-3019864461
                                        • Opcode ID: ad7e86aae1cc10f3b9bc7f49c29c37ff70e794cd2f017710d5275f6417c1a8b4
                                        • Instruction ID: 2db7da9a917a1ffdedf90826548bc208b9ec29a603e2e30c3f87290b20bb7053
                                        • Opcode Fuzzy Hash: ad7e86aae1cc10f3b9bc7f49c29c37ff70e794cd2f017710d5275f6417c1a8b4
                                        • Instruction Fuzzy Hash: 9C518EB0D002059BDB24DF68C8A5BEEBBF6FF55314F18491DE441B7680D775AA88CBA0
                                        APIs
                                          • Part of subcall function 0064CCB0: HeapFree.KERNEL32(00000000,00000000,?,00653726,?,00000000,?,?,006539C7,?,00000007,?,?,00653E96,?,?), ref: 0064CCC6
                                          • Part of subcall function 0064CCB0: GetLastError.KERNEL32(?,?,00653726,?,00000000,?,?,006539C7,?,00000007,?,?,00653E96,?,?), ref: 0064CCD1
                                        • ___free_lconv_mon.LIBCMT ref: 00653D41
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ErrorFreeHeapLast___free_lconv_mon
                                        • String ID: ("g$D!g
                                        • API String ID: 4068849827-130177928
                                        • Opcode ID: bc5435321ec5d2454a630c68ab38f27dd88e2a79db51ea211d5677f63447c70a
                                        • Instruction ID: 6cee27f4c617128f3d495eae47a245829a0e4ae63c80cf5ebf125f63d9f23013
                                        • Opcode Fuzzy Hash: bc5435321ec5d2454a630c68ab38f27dd88e2a79db51ea211d5677f63447c70a
                                        • Instruction Fuzzy Hash: 88318F715007119FEB61AB78E945B9673FBAF007A1F10451EE859C7351EF31EE448B28
                                        APIs
                                        • EncodePointer.KERNEL32(00000000,?), ref: 0063D44B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: EncodePointer
                                        • String ID: MOC$RCC
                                        • API String ID: 2118026453-2084237596
                                        • Opcode ID: 5fcfec15dcf6485889bc12b5547fbc0949ed65f83499c4d120252730e113aa77
                                        • Instruction ID: 312afd6fa257d09fd93c4d572e5238253429da9a87f5381d6da4e623375b0fa1
                                        • Opcode Fuzzy Hash: 5fcfec15dcf6485889bc12b5547fbc0949ed65f83499c4d120252730e113aa77
                                        • Instruction Fuzzy Hash: D1417C71900209AFCF16DF98ED81AEE7BB6FF48318F148199F905A7212D335EA50DB91
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 00638167
                                          • Part of subcall function 0061C840: std::_Lockit::_Lockit.LIBCPMT ref: 0061C86D
                                          • Part of subcall function 0061C840: std::_Lockit::_Lockit.LIBCPMT ref: 0061C890
                                          • Part of subcall function 0061C840: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C8B8
                                          • Part of subcall function 0061C840: std::_Lockit::~_Lockit.LIBCPMT ref: 0061C961
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3_
                                        • String ID: 0123456789-$0123456789-
                                        • API String ID: 2088892359-2494171821
                                        • Opcode ID: 018edd25fe4a4a50197f9683d4c8152adc708d9cb011d31aea491cfd73dda364
                                        • Instruction ID: 14d5606a8bb5270f3f243aa597683a332eeb2a1799822506f8a46ac16a17f22a
                                        • Opcode Fuzzy Hash: 018edd25fe4a4a50197f9683d4c8152adc708d9cb011d31aea491cfd73dda364
                                        • Instruction Fuzzy Hash: 92418C31D00219EFCF15EFA4D8819EEBBB6BF08310F10005AF811AB251DB30AE46CB95
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 00633517
                                          • Part of subcall function 0062A71C: __EH_prolog3.LIBCMT ref: 0062A723
                                          • Part of subcall function 0062A71C: std::_Lockit::_Lockit.LIBCPMT ref: 0062A72D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: H_prolog3H_prolog3_LockitLockit::_std::_
                                        • String ID: %.0Lf$0123456789-
                                        • API String ID: 79917597-3094241602
                                        • Opcode ID: 8b27967aa2be584fe7cb137ff23e8ef4c1668f15346dc37c57de417ebae546d3
                                        • Instruction ID: de79563a2ac750f7afa11430e7e591b699ee909fd89cff661b68776c8acfa185
                                        • Opcode Fuzzy Hash: 8b27967aa2be584fe7cb137ff23e8ef4c1668f15346dc37c57de417ebae546d3
                                        • Instruction Fuzzy Hash: F4413871900228DFCF15EFE4D9819EEBBB6FF08324F100169E811AB355DB309A56CB95
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 00633847
                                          • Part of subcall function 0061B7F0: std::_Lockit::_Lockit.LIBCPMT ref: 0061B81D
                                          • Part of subcall function 0061B7F0: std::_Lockit::_Lockit.LIBCPMT ref: 0061B840
                                          • Part of subcall function 0061B7F0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061B868
                                          • Part of subcall function 0061B7F0: std::_Lockit::~_Lockit.LIBCPMT ref: 0061B911
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3_
                                        • String ID: 0123456789-$0123456789-
                                        • API String ID: 2088892359-2494171821
                                        • Opcode ID: fe57e02c5c0ef3931913cd7c98f2f2d9a554dc4735180c1abea987fd3a5f452f
                                        • Instruction ID: f745fbdf64f06c855935a287435100d7a76db6aba8b53fab64c8a9f7c89d9764
                                        • Opcode Fuzzy Hash: fe57e02c5c0ef3931913cd7c98f2f2d9a554dc4735180c1abea987fd3a5f452f
                                        • Instruction Fuzzy Hash: 3C414771900229DFCF55EFE4D9819EDBBB6BF08314F14006AF811AB351DB30AA55CB95
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: _swprintf
                                        • String ID: %$+
                                        • API String ID: 589789837-2626897407
                                        • Opcode ID: 6acd36a89160e31c879e0e668bdf7e43ba476d3047189623385b83df250e570f
                                        • Instruction ID: 2cbbec5d35e2c265e0ceb5c39d590b49db79bd3512ecd7e23b6f0e21594acd12
                                        • Opcode Fuzzy Hash: 6acd36a89160e31c879e0e668bdf7e43ba476d3047189623385b83df250e570f
                                        • Instruction Fuzzy Hash: 6E2124720082859FD715CF18CC85BDBBBEAAF99304F088519F99557292C739D918C7A2
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: _swprintf
                                        • String ID: %$+
                                        • API String ID: 589789837-2626897407
                                        • Opcode ID: 1bb55f2305f11ec564d02fcc4ad59b645a5a2c6b02d70eb5dddd9763efa58177
                                        • Instruction ID: 80049f0bc955820727569a7fe403acf130d005c02dc9f44563006c5e0a766efd
                                        • Opcode Fuzzy Hash: 1bb55f2305f11ec564d02fcc4ad59b645a5a2c6b02d70eb5dddd9763efa58177
                                        • Instruction Fuzzy Hash: 9821F2312083449FD711CE28CC45BDBBBEAAF89314F08855DF98587381C775E91ACBA2
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: _swprintf
                                        • String ID: %$+
                                        • API String ID: 589789837-2626897407
                                        • Opcode ID: d27ca3064327963ffc647acdb8d0d7d530c5afc139bd726904e00bd12137c82a
                                        • Instruction ID: 3db852e39d87024d2b60c58ff5888a7abb61cf0a0189d08fb2a50897671f27ef
                                        • Opcode Fuzzy Hash: d27ca3064327963ffc647acdb8d0d7d530c5afc139bd726904e00bd12137c82a
                                        • Instruction Fuzzy Hash: 032104712083459FD711CE28CC85BDBBBEBAB99314F08851DF98687381C775D91ACBA2
                                        APIs
                                        • ConvertSidToStringSidW.ADVAPI32(?,00000000), ref: 00618356
                                        • LocalFree.KERNEL32(00000000,Invalid SID,0000000B,?,00000000,C1C81EE7), ref: 006183C5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ConvertFreeLocalString
                                        • String ID: Invalid SID
                                        • API String ID: 3201929900-130637731
                                        • Opcode ID: 57bfdbffe18ed27c26608d9a709dcc3098c39cf97932f778dc998e879aa074bd
                                        • Instruction ID: 82abc4ec5a6606d8bc0c234d1955242d4e5efaeadf040bc814543a9c0b3cd0c8
                                        • Opcode Fuzzy Hash: 57bfdbffe18ed27c26608d9a709dcc3098c39cf97932f778dc998e879aa074bd
                                        • Instruction Fuzzy Hash: A9218175A047059BDB14CF94C8157EFBBBAFF44B14F18461EE812A7380DBB56A848BD0
                                        APIs
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0061C40B
                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0061C46E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                        • String ID: bad locale name
                                        • API String ID: 3988782225-1405518554
                                        • Opcode ID: b4384143a07f7113a681204ed873cd03691c53ed0c58dd0d7124db069951b476
                                        • Instruction ID: 4825311cfabec3302ef7b0caabe7caa9cfd543fcc643bbda61ff58c2b3c05e13
                                        • Opcode Fuzzy Hash: b4384143a07f7113a681204ed873cd03691c53ed0c58dd0d7124db069951b476
                                        • Instruction Fuzzy Hash: 1C210270804B84EED721CF68C90478BBFF4EF15714F10869DE49597B81D3B9A604CBA1
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: H_prolog3_
                                        • String ID: false$true
                                        • API String ID: 2427045233-2658103896
                                        • Opcode ID: 96f2781bc80bca2465d0e511220c75ea5e0d9f2ecdeea9ae074df882f2ae7ca1
                                        • Instruction ID: 8b713ee107f142a55d65f3b40bd66b9f84773aae0228caa93f2c56db9fe067c9
                                        • Opcode Fuzzy Hash: 96f2781bc80bca2465d0e511220c75ea5e0d9f2ecdeea9ae074df882f2ae7ca1
                                        • Instruction Fuzzy Hash: F411D071900B40AED761EFB4E811B8ABBF5AF09300F00851EF0A29B342EB30E508DF95
                                        APIs
                                        • AcquireSRWLockExclusive.KERNEL32(00673B74,?,?,?,00612646,00674714,C1C81EE7,?,?,0065B16D,000000FF,?,00611A07), ref: 006395B3
                                        • ReleaseSRWLockExclusive.KERNEL32(00673B74,?,?,00612646,00674714,C1C81EE7,?,?,0065B16D,000000FF,?,00611A07,?,?,?,C1C81EE7), ref: 006395ED
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: ExclusiveLock$AcquireRelease
                                        • String ID: t;g
                                        • API String ID: 17069307-1138557533
                                        • Opcode ID: 583d9b446258a028004b3be30f5b013784e240b62a7d96cf98a90ff6dc5f48a3
                                        • Instruction ID: 221a1713986beb14b5e31c46114c4a4398434fa80283be37267990839abf85ae
                                        • Opcode Fuzzy Hash: 583d9b446258a028004b3be30f5b013784e240b62a7d96cf98a90ff6dc5f48a3
                                        • Instruction Fuzzy Hash: 76F0A031900211DBC7259F19D844A68BBBBFB45735F24022EE86A833A0C7B058C2DEB1
                                        APIs
                                          • Part of subcall function 00621020: InitializeCriticalSectionEx.KERNEL32(?,00000000,00000000,C1C81EE7,?,0065B110,000000FF), ref: 00621047
                                          • Part of subcall function 00621020: GetLastError.KERNEL32(?,00000000,00000000,C1C81EE7,?,0065B110,000000FF), ref: 00621051
                                        • IsDebuggerPresent.KERNEL32(?,?,0066ECF8), ref: 00622378
                                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,0066ECF8), ref: 00622387
                                        Strings
                                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00622382
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: CriticalDebugDebuggerErrorInitializeLastOutputPresentSectionString
                                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                        • API String ID: 3511171328-631824599
                                        • Opcode ID: cf314d2438863e5e6969549f9ce6926bb5c753ec108a5ddbbce8bfab297555c4
                                        • Instruction ID: 3e8ac36bf114a8d1cc748433d2ab5ade2d5fd7386784625425d90c0eaabbe8e2
                                        • Opcode Fuzzy Hash: cf314d2438863e5e6969549f9ce6926bb5c753ec108a5ddbbce8bfab297555c4
                                        • Instruction Fuzzy Hash: 11E06D70200B628FD360DF24E5187467BE2AF05341F00892CE885CB650EBB4D4888F51
                                        APIs
                                        • LocalAlloc.KERNEL32(00000040,00000028,C1C81EE7,?,00000000,?,?,?,0065BB00,000000FF,?,006164FE,00000000,?), ref: 00616DD4
                                        • LocalFree.KERNEL32(?,?,?,?,?,00000000,?,?,?,0065BB00,000000FF,?,006164FE,00000000), ref: 00616E8A
                                        • LocalFree.KERNEL32(?,C1C81EE7,00000000,0065B110,000000FF,?,00000000,00000000,0065BB00,?,C1C81EE7), ref: 00616F1D
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Local$Free$Alloc
                                        • String ID:
                                        • API String ID: 3098330729-0
                                        • Opcode ID: a1ca54649a2b0d9ef22be8d5017ea92335228d48bff8e4c3827b0c19ad62cb82
                                        • Instruction ID: ebdefe28c6254e85d07c821ba8dedb5ff8a567f9bf894c07e519f43191a82afa
                                        • Opcode Fuzzy Hash: a1ca54649a2b0d9ef22be8d5017ea92335228d48bff8e4c3827b0c19ad62cb82
                                        • Instruction Fuzzy Hash: 455192B9A006059FDB18CF68C985AEEBBB6FB48310F14872DF815E7380D731A941CB90
                                        APIs
                                        • LocalAlloc.KERNEL32(00000040,80000022,?,?,?,00000000,?,?,00000000,?), ref: 00614B56
                                        • LocalAlloc.KERNEL32(00000040,7FFFFFFF,?,?,?,00000000,?,?,00000000,?), ref: 00614BA0
                                        • LocalFree.KERNEL32(7FFFFFFE,?,?,?,?,?,00000000,?,?,00000000,?), ref: 00614C22
                                        • LocalFree.KERNEL32(00000000,C1C81EE7,00000000,00000000,Function_0004B020,000000FF,?,?,00000000,?,?,00000000,?), ref: 00614CAD
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2101438624.0000000000611000.00000020.00000001.01000000.00000003.sdmp, Offset: 00610000, based on PE: true
                                        • Associated: 00000005.00000002.2101408919.0000000000610000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101487234.000000000065F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101512688.0000000000672000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000005.00000002.2101538256.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_610000_MSICE10.jbxd
                                        Similarity
                                        • API ID: Local$AllocFree
                                        • String ID:
                                        • API String ID: 2012307162-0
                                        • Opcode ID: 151f35342c8c465cb82c1be3aa71550e92b5223cedd148046338d9c2440f592e
                                        • Instruction ID: 9dadd57a6c725d33d0be025101f42cfd9a954e2dc961eff3ade17bd147f9f217
                                        • Opcode Fuzzy Hash: 151f35342c8c465cb82c1be3aa71550e92b5223cedd148046338d9c2440f592e
                                        • Instruction Fuzzy Hash: AC51E2726052159FC714EF28DC81AAAB7EAEB89710F14066EF855D7390EB30ED44CB91

                                        Execution Graph

                                        Execution Coverage:2.8%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:19.5%
                                        Total number of Nodes:1612
                                        Total number of Limit Nodes:14
                                        execution_graph 52116 731066 SetWindowsHookExW 52119 766f5a 52116->52119 52122 766f2d 42 API calls 52119->52122 52121 731085 52122->52121 52123 767060 52124 76706c __FrameHandler3::FrameUnwindToState 52123->52124 52151 766d94 52124->52151 52126 767073 52127 7671c6 52126->52127 52135 76709d ___scrt_is_nonwritable_in_current_image __InternalCxxFrameHandler ___scrt_release_startup_lock 52126->52135 52605 767836 4 API calls 2 library calls 52127->52605 52129 7671cd 52606 78feb2 21 API calls __InternalCxxFrameHandler 52129->52606 52131 7671d3 52607 78fe76 21 API calls __InternalCxxFrameHandler 52131->52607 52133 7671db 52134 7670bc 52135->52134 52136 76713e 52135->52136 52139 767136 52135->52139 52159 76794b 52136->52159 52138 767143 52163 74b210 52138->52163 52601 78f5f0 44 API calls 4 library calls 52139->52601 52142 76713d 52142->52136 52145 76715f 52145->52129 52146 767163 52145->52146 52147 76716c 52146->52147 52603 78fe67 21 API calls __InternalCxxFrameHandler 52146->52603 52604 766f05 75 API calls ___scrt_uninitialize_crt 52147->52604 52150 767174 52150->52134 52152 766d9d 52151->52152 52608 7672bf IsProcessorFeaturePresent 52152->52608 52154 766da9 52609 7817ae 10 API calls 2 library calls 52154->52609 52156 766dae 52157 766db2 52156->52157 52610 7817cd 7 API calls 2 library calls 52156->52610 52157->52126 52611 780d80 52159->52611 52161 76795e GetStartupInfoW 52162 767971 52161->52162 52162->52138 52613 748a60 52163->52613 52165 74b2d4 52639 7486a0 52165->52639 52167 74b2e5 52168 7486a0 43 API calls 52167->52168 52169 74b2f8 52168->52169 52170 7486a0 43 API calls 52169->52170 52171 74b30f 52170->52171 52172 7486a0 43 API calls 52171->52172 52173 74b326 52172->52173 52174 7486a0 43 API calls 52173->52174 52175 74b33d 52174->52175 52649 747ec0 52175->52649 52177 74b354 52178 747ec0 42 API calls 52177->52178 52179 74b369 52178->52179 52662 74e000 52179->52662 52183 74b3a6 52184 74b3b3 MessageBoxW 52183->52184 52185 74b54e 52183->52185 53076 744800 39 API calls 2 library calls 52184->53076 52801 74dd90 52185->52801 52188 74b55e 52835 73d440 52188->52835 52190 74d830 53142 78454f 39 API calls 3 library calls 52190->53142 52191 74b581 52196 74bb91 52191->52196 52197 74b5cd 52191->52197 52194 74d82a 52602 767981 GetModuleHandleW 52194->52602 52195 74d835 53143 742f10 41 API calls 52195->53143 52200 74bb99 52196->52200 52201 74c864 52196->52201 52199 74b5d5 52197->52199 52197->52200 52204 74b62f 52199->52204 52205 74b5da 52199->52205 52202 74bc74 52200->52202 52203 74bba2 52200->52203 52206 74c876 52201->52206 52207 74c9bc 52201->52207 52862 744110 52202->52862 53081 73c0e0 39 API calls 2 library calls 52203->53081 52215 744110 41 API calls 52204->52215 53077 73c0e0 39 API calls 2 library calls 52205->53077 52212 74c8a4 DialogBoxParamW 52206->52212 52224 744e00 41 API calls 52206->52224 52987 744e00 52207->52987 52220 74c8c2 52212->52220 52221 74c8ec 52212->52221 52222 74b63b lstrcpyW PathRemoveFileSpecW 52215->52222 52219 74bc80 lstrcpyW PathRemoveFileSpecW 52233 744110 41 API calls 52219->52233 53091 74ff90 106 API calls 3 library calls 52220->53091 53092 73c0e0 39 API calls 2 library calls 52221->53092 52228 744110 41 API calls 52222->52228 52223 73af90 std::_Throw_Cpp_error 41 API calls 52230 74ca10 52223->52230 52231 74c899 52224->52231 52290 74b684 _Yarn collate 52228->52290 52236 74f8c0 102 API calls 52230->52236 52231->52212 52414 74bcc9 collate 52233->52414 52241 74ca71 52236->52241 52991 744db0 52241->52991 52253 747690 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 52253->52414 52256 74ca87 52256->52190 52267 74cabb collate 52256->52267 52257 745760 41 API calls SimpleUString::operator= 52257->52290 52259 74cb3c 53000 748080 52259->53000 52260 744110 41 API calls 52260->52290 52261 74b549 collate 53135 766ca1 52261->53135 52263 74a020 70 API calls 52263->52414 52266 74c611 52269 74c626 ShellExecuteW 52266->52269 52270 74c620 52266->52270 52267->52259 52267->52267 52274 745760 SimpleUString::operator= 41 API calls 52267->52274 52268 74cb82 52271 74cb94 FindWindowExW 52268->52271 53093 73bfb0 52268->53093 52273 744450 39 API calls 52269->52273 52270->52269 52278 74cbda 52271->52278 52277 74c64d 52273->52277 52274->52259 52279 744450 39 API calls 52277->52279 53098 74db40 102 API calls 4 library calls 52278->53098 52282 74c658 52279->52282 52281 74b9ae 52284 74b9c3 ShellExecuteW 52281->52284 52285 74b9bd 52281->52285 53090 73c0e0 39 API calls 2 library calls 52282->53090 52283 74cbec 52287 74ccea 52283->52287 52288 74cbfa 52283->52288 52289 744450 39 API calls 52284->52289 52285->52284 53100 744070 52287->53100 52293 74cc3d 52288->52293 52294 74cbfe DialogBoxParamW 52288->52294 52295 74b9ea 52289->52295 52290->52190 52290->52195 52290->52257 52290->52260 52290->52281 52291 7455e0 41 API calls SimpleUString::operator= 52290->52291 53078 7435a0 41 API calls 4 library calls 52290->53078 53079 746e20 lstrcpyW SHFileOperationW 52290->53079 52291->52290 52298 744450 39 API calls 52293->52298 52294->52293 52299 744450 39 API calls 52295->52299 52302 74cc45 52298->52302 52303 74b9f5 52299->52303 52301 74f8c0 102 API calls 52306 74ce37 52301->52306 52308 744450 39 API calls 52302->52308 53080 73c0e0 39 API calls 2 library calls 52303->53080 52310 744db0 39 API calls 52306->52310 52307 744db0 39 API calls 52307->52414 52311 74cc4d 52308->52311 52312 74ce43 52310->52312 53099 73c0e0 39 API calls 2 library calls 52311->53099 52315 744450 39 API calls 52312->52315 52321 74ce4e 52315->52321 52324 73bfb0 std::_Throw_Cpp_error 39 API calls 52321->52324 52326 74ce5d 52324->52326 52328 744070 std::_Throw_Cpp_error 41 API calls 52326->52328 52329 74ce6d 52328->52329 52331 74f8c0 102 API calls 52329->52331 52332 74ce8a 52331->52332 52335 73bfb0 std::_Throw_Cpp_error 39 API calls 52332->52335 52337 74ce99 52335->52337 52340 74ceb2 52337->52340 53104 744e30 41 API calls SimpleUString::operator= 52337->53104 52343 744070 std::_Throw_Cpp_error 41 API calls 52340->52343 52345 74cec2 52343->52345 52348 74f8c0 102 API calls 52345->52348 52351 74cedf 52348->52351 52350 74c7f1 52356 744450 39 API calls 52350->52356 52355 73bfb0 std::_Throw_Cpp_error 39 API calls 52351->52355 52354 7455e0 41 API calls SimpleUString::operator= 52354->52414 52357 74ceee 52355->52357 52358 74c7f6 52356->52358 52360 74cf07 52357->52360 52361 74cef7 52357->52361 52362 744450 39 API calls 52358->52362 52359 74c053 PathFindFileNameW 52359->52414 53106 748de0 59 API calls 3 library calls 52360->53106 53105 744e30 41 API calls SimpleUString::operator= 52361->53105 52366 74c801 52362->52366 52365 744450 39 API calls 52365->52414 52368 744450 39 API calls 52366->52368 52367 74cf1a 52385 74cf36 _Yarn 52367->52385 53107 743a40 41 API calls 3 library calls 52367->53107 52369 74c80c 52368->52369 52370 744450 39 API calls 52369->52370 52372 74c817 52370->52372 52374 744450 39 API calls 52372->52374 52373 74c092 PathFindExtensionW lstrcmpW 52373->52414 52375 74c822 52374->52375 52378 744450 39 API calls 52375->52378 52376 74c0d0 PathFindFileNameW 52376->52414 52380 74c82d 52378->52380 52379 74bff6 MoveFileW 52379->52414 52382 744450 39 API calls 52380->52382 52386 74c838 52382->52386 52383 74d000 52387 744450 39 API calls 52383->52387 52384 745760 41 API calls SimpleUString::operator= 52384->52414 53108 744e60 41 API calls SimpleUString::operator= 52385->53108 52388 744450 39 API calls 52386->52388 52389 74d00b 52387->52389 52391 74c843 52388->52391 52392 744450 39 API calls 52389->52392 52393 744450 39 API calls 52391->52393 52394 74d01a 52392->52394 52393->52261 52396 744070 std::_Throw_Cpp_error 41 API calls 52394->52396 52397 74d02a 52396->52397 52398 74f8c0 102 API calls 52397->52398 52399 74d047 52398->52399 52400 73bfb0 std::_Throw_Cpp_error 39 API calls 52399->52400 52401 74d056 52400->52401 52402 74d06f 52401->52402 53109 744e30 41 API calls SimpleUString::operator= 52401->53109 53110 7434e0 41 API calls 52402->53110 52403 744110 41 API calls 52403->52414 52406 74d084 53111 744e60 41 API calls SimpleUString::operator= 52406->53111 52408 74d097 52410 744450 39 API calls 52408->52410 52411 74d0a6 52410->52411 53112 7434e0 41 API calls 52411->53112 52414->52190 52414->52195 52414->52253 52414->52263 52414->52266 52414->52307 52414->52350 52414->52354 52414->52359 52414->52365 52414->52373 52414->52376 52414->52379 52414->52384 52414->52403 52422 74bff0 52414->52422 52867 745020 41 API calls SimpleUString::operator= 52414->52867 52868 747800 104 API calls 4 library calls 52414->52868 52869 73af90 52414->52869 52884 74f8c0 52414->52884 52904 7444b0 39 API calls 2 library calls 52414->52904 52905 745970 52414->52905 53082 744220 52414->53082 53086 746e20 lstrcpyW SHFileOperationW 52414->53086 53087 746f40 141 API calls 5 library calls 52414->53087 52415 74d0be 53113 744e60 41 API calls SimpleUString::operator= 52415->53113 52418 74d0d1 52419 744450 39 API calls 52418->52419 52420 74d0e0 52419->52420 53114 7434e0 41 API calls 52420->53114 52421 74c4d4 MoveFileW 52421->52422 52422->52379 52422->52414 52422->52421 52424 73af90 std::_Throw_Cpp_error 41 API calls 52422->52424 52427 74c498 DeleteFileW 52422->52427 52429 74f8c0 102 API calls 52422->52429 52436 745760 SimpleUString::operator= 41 API calls 52422->52436 52438 74c408 MessageBoxW 52422->52438 52443 744450 39 API calls 52422->52443 52445 74c456 MoveFileW 52422->52445 53089 746e20 lstrcpyW SHFileOperationW 52422->53089 52424->52422 52425 74d0f8 53115 744e60 41 API calls SimpleUString::operator= 52425->53115 52427->52422 52429->52422 52430 74d10b 52431 744450 39 API calls 52430->52431 52432 74d11a 52431->52432 52433 744e00 41 API calls 52432->52433 52434 74d12c 52433->52434 52435 744070 std::_Throw_Cpp_error 41 API calls 52434->52435 52437 74d13c 52435->52437 52436->52422 52440 74f8c0 102 API calls 52437->52440 53088 746e20 lstrcpyW SHFileOperationW 52438->53088 52441 74d159 52440->52441 52442 744db0 39 API calls 52441->52442 52444 74d165 52442->52444 52443->52422 52446 744450 39 API calls 52444->52446 52445->52422 52447 74d170 52446->52447 52448 73bfb0 std::_Throw_Cpp_error 39 API calls 52447->52448 52449 74d17f 52448->52449 52450 744070 std::_Throw_Cpp_error 41 API calls 52449->52450 52451 74d18f 52450->52451 52452 74f8c0 102 API calls 52451->52452 52453 74d1ac 52452->52453 52454 744db0 39 API calls 52453->52454 52455 74d1b8 52454->52455 52456 744450 39 API calls 52455->52456 52457 74d1c3 52456->52457 52458 73bfb0 std::_Throw_Cpp_error 39 API calls 52457->52458 52459 74d1d2 52458->52459 52460 744070 std::_Throw_Cpp_error 41 API calls 52459->52460 52461 74d1e2 52460->52461 52462 74f8c0 102 API calls 52461->52462 52463 74d1ff 52462->52463 52464 744db0 39 API calls 52463->52464 52465 74d20b 52464->52465 52466 744450 39 API calls 52465->52466 52467 74d216 52466->52467 52468 73bfb0 std::_Throw_Cpp_error 39 API calls 52467->52468 52469 74d225 52468->52469 52470 744070 std::_Throw_Cpp_error 41 API calls 52469->52470 52471 74d235 52470->52471 52472 74f8c0 102 API calls 52471->52472 52473 74d252 52472->52473 52474 744db0 39 API calls 52473->52474 52475 74d25e 52474->52475 52476 744450 39 API calls 52475->52476 52477 74d269 52476->52477 52478 73bfb0 std::_Throw_Cpp_error 39 API calls 52477->52478 52479 74d278 DialogBoxParamW 52478->52479 52480 74d692 52479->52480 52481 74d29f 52479->52481 52482 744450 39 API calls 52480->52482 52483 74d2a4 52481->52483 52484 74d2c1 52481->52484 52485 74d69d 52482->52485 52483->52480 52486 74d2ac SendMessageW 52483->52486 52487 74d2d5 52484->52487 53116 744e30 41 API calls SimpleUString::operator= 52484->53116 52488 744450 39 API calls 52485->52488 52486->52480 53117 747800 104 API calls 4 library calls 52487->53117 52491 74d6a8 52488->52491 52493 744450 39 API calls 52491->52493 52492 74d2ef 52494 74d47a 52492->52494 53118 744e80 41 API calls SimpleUString::operator= 52492->53118 52496 74d6b3 52493->52496 52495 744450 39 API calls 52494->52495 52498 74d485 52495->52498 53133 744af0 39 API calls 2 library calls 52496->53133 52501 744450 39 API calls 52498->52501 52500 74d313 52505 74d31b PathFindFileNameW 52500->52505 52503 74d490 52501->52503 52502 74d6be 52504 744450 39 API calls 52502->52504 52506 744450 39 API calls 52503->52506 52507 74d6c6 52504->52507 53119 744e80 41 API calls SimpleUString::operator= 52505->53119 52510 74d49b 52506->52510 52511 744450 39 API calls 52507->52511 52509 74d330 52514 74d338 PathFindExtensionW lstrcmpW 52509->52514 52512 744450 39 API calls 52510->52512 52513 74d6ce 52511->52513 52515 74d4a6 52512->52515 53134 73c0e0 39 API calls 2 library calls 52513->53134 52517 74d35f 52514->52517 52518 74d34f 52514->52518 53128 744af0 39 API calls 2 library calls 52515->53128 52524 74d367 PathFindFileNameW 52517->52524 53120 744e80 41 API calls SimpleUString::operator= 52518->53120 52522 74d4b1 52525 744450 39 API calls 52522->52525 53121 744e30 41 API calls SimpleUString::operator= 52524->53121 52528 74d4b9 52525->52528 52531 744450 39 API calls 52528->52531 52530 74d375 52533 744070 std::_Throw_Cpp_error 41 API calls 52530->52533 52534 74d4c1 52531->52534 52535 74d385 52533->52535 53129 73c0e0 39 API calls 2 library calls 52534->53129 52538 74f8c0 102 API calls 52535->52538 52542 74d3a2 52538->52542 52545 73bfb0 std::_Throw_Cpp_error 39 API calls 52542->52545 52553 74d3b1 52545->52553 52546 74d4d7 52550 744110 41 API calls 52546->52550 52554 74d4ee 52550->52554 52552 74d3d9 53123 7441d0 41 API calls 52552->53123 52553->52552 53122 744e30 41 API calls SimpleUString::operator= 52553->53122 52558 744070 std::_Throw_Cpp_error 41 API calls 52554->52558 52561 74d502 52558->52561 52560 74d3f5 53124 743290 41 API calls 52560->53124 52563 74f8c0 102 API calls 52561->52563 52565 74d51f 52563->52565 52564 74d412 53125 7432f0 41 API calls 52564->53125 52567 73bfb0 std::_Throw_Cpp_error 39 API calls 52565->52567 52572 74d52e 52567->52572 52568 74d435 53126 746f40 141 API calls 5 library calls 52568->53126 52570 74d44c 53127 7444b0 39 API calls 2 library calls 52570->53127 52571 74d556 53131 744e60 41 API calls SimpleUString::operator= 52571->53131 52572->52571 53130 744e30 41 API calls SimpleUString::operator= 52572->53130 52576 74d45c 52578 744450 39 API calls 52576->52578 52577 74d568 53132 7441d0 41 API calls 52577->53132 52579 74d46b 52578->52579 52579->52546 52580 744450 39 API calls 52579->52580 52580->52494 52582 74d57f 52583 74d61d ShellExecuteW 52582->52583 52584 74d5a1 FindWindowExW 52582->52584 52587 74d65b 52583->52587 52584->52583 52585 74d5b0 MessageBoxW 52584->52585 52585->52587 52590 74d5ea 52585->52590 52589 744450 39 API calls 52587->52589 52591 74d666 52589->52591 52593 74d5f0 SendMessageW 52590->52593 52595 74d60e FindWindowExW 52590->52595 52592 744450 39 API calls 52591->52592 52594 74d671 52592->52594 52593->52590 52593->52595 52596 744450 39 API calls 52594->52596 52595->52583 52595->52593 52597 74d67c 52596->52597 52598 744450 39 API calls 52597->52598 52599 74d687 52598->52599 52600 744450 39 API calls 52599->52600 52600->52480 52601->52142 52602->52145 52603->52147 52604->52150 52605->52129 52606->52131 52607->52133 52608->52154 52609->52156 52610->52157 52612 780d97 52611->52612 52612->52161 52612->52612 52614 748a93 lstrlenW 52613->52614 52633 748cf1 collate 52613->52633 53144 766ced 52614->53144 52633->52165 52640 748715 52639->52640 52642 7486ca 52639->52642 52640->52167 52641 74873c 53146 7455d0 41 API calls 52641->53146 52642->52640 52642->52641 52643 7486fb lstrcmpW 52642->52643 52643->52642 52646 74871e 52643->52646 53145 7475f0 39 API calls 52646->53145 52648 748733 52648->52167 52650 745760 SimpleUString::operator= 41 API calls 52649->52650 52653 747ed6 52650->52653 52651 747f97 52651->52177 52652 747fa0 53148 7455d0 41 API calls 52652->53148 52653->52651 52653->52652 52656 747f33 lstrlenW 52653->52656 52657 747f57 52653->52657 52656->52653 52658 745760 SimpleUString::operator= 41 API calls 52657->52658 52659 747f79 52658->52659 53147 7475f0 39 API calls 52659->53147 52661 747f8e 52661->52177 52663 74e044 52662->52663 53149 743600 52663->53149 52665 74e199 53155 74d840 52665->53155 52667 74e1a8 53194 74e830 52667->53194 52669 74e1da 52670 73d440 76 API calls 52669->52670 52672 74e1f2 collate 52670->52672 52671 74e737 53219 78454f 39 API calls 3 library calls 52671->53219 52672->52671 52674 74e270 collate 52672->52674 52758 74e363 52674->52758 53199 73d360 52674->53199 52677 74e2f0 52679 73d360 72 API calls 52677->52679 52678 74e749 53221 78113d RaiseException 52678->53221 52686 74e2fc 52679->52686 52682 74e757 52683 74e353 52684 73d360 72 API calls 52683->52684 52691 74e35f 52684->52691 52685 744070 std::_Throw_Cpp_error 41 API calls 52687 74e2bf 52685->52687 52686->52683 52689 744070 std::_Throw_Cpp_error 41 API calls 52686->52689 52688 74f9b0 74 API calls 52687->52688 52690 74e2d0 52688->52690 52692 74e31f 52689->52692 52693 744db0 39 API calls 52690->52693 52698 744070 std::_Throw_Cpp_error 41 API calls 52691->52698 52691->52758 52694 74f9b0 74 API calls 52692->52694 52695 74e2dc 52693->52695 52696 74e330 52694->52696 52697 744450 39 API calls 52695->52697 52699 744db0 39 API calls 52696->52699 52700 74e2e4 52697->52700 52701 74e39b 52698->52701 52702 74e33f 52699->52702 52703 73bfb0 std::_Throw_Cpp_error 39 API calls 52700->52703 53203 74f9b0 52701->53203 52705 744450 39 API calls 52702->52705 52703->52677 52707 74e347 52705->52707 52709 73bfb0 std::_Throw_Cpp_error 39 API calls 52707->52709 52708 744db0 39 API calls 52710 74e3bb 52708->52710 52709->52683 52711 744450 39 API calls 52710->52711 52712 74e3c3 52711->52712 52713 73bfb0 std::_Throw_Cpp_error 39 API calls 52712->52713 52714 74e3cf 52713->52714 52715 73d360 72 API calls 52714->52715 52719 74e3db 52715->52719 52716 74e432 52717 73d360 72 API calls 52716->52717 52718 74e43e 52717->52718 52720 74e5c0 52718->52720 52723 74e49b 52718->52723 52730 744070 std::_Throw_Cpp_error 41 API calls 52718->52730 52719->52716 52722 744070 std::_Throw_Cpp_error 41 API calls 52719->52722 52721 73d360 72 API calls 52720->52721 52733 74e5cc 52721->52733 52724 74e3fe 52722->52724 52729 74e4d1 52723->52729 53212 792382 39 API calls 2 library calls 52723->53212 52726 74f9b0 74 API calls 52724->52726 52725 74e601 52728 73d360 72 API calls 52725->52728 52727 74e40f 52726->52727 52731 744db0 39 API calls 52727->52731 52748 74e614 52728->52748 52729->52758 53213 73c9b0 42 API calls 52729->53213 52735 74e467 52730->52735 52738 74e41e 52731->52738 52733->52725 53216 792382 39 API calls 2 library calls 52733->53216 52737 74f9b0 74 API calls 52735->52737 52736 74e4ff 53214 73c9b0 42 API calls 52736->53214 52741 74e478 52737->52741 52742 744450 39 API calls 52738->52742 52739 74e66b 52743 73d360 72 API calls 52739->52743 52740 74e4c6 52740->52729 53217 792382 39 API calls 2 library calls 52740->53217 52745 744db0 39 API calls 52741->52745 52747 74e426 52742->52747 52762 74e677 52743->52762 52751 74e487 52745->52751 52753 73bfb0 std::_Throw_Cpp_error 39 API calls 52747->52753 52748->52739 52757 744070 std::_Throw_Cpp_error 41 API calls 52748->52757 52750 74e5f6 52750->52725 53218 792382 39 API calls 2 library calls 52750->53218 52755 744450 39 API calls 52751->52755 52752 74e52c 53215 73c9b0 42 API calls 52752->53215 52753->52716 52754 74e6ca 52756 766ca1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 52754->52756 52759 74e48f 52755->52759 52761 74b37c 52756->52761 52763 74e637 52757->52763 53220 74e760 40 API calls ___std_exception_copy 52758->53220 52765 73bfb0 std::_Throw_Cpp_error 39 API calls 52759->52765 52793 745760 52761->52793 52762->52754 52768 744070 std::_Throw_Cpp_error 41 API calls 52762->52768 52766 74f9b0 74 API calls 52763->52766 52765->52723 52769 74e648 52766->52769 52767 74e71e 52767->52725 52767->52758 52770 74e69a 52768->52770 52771 744db0 39 API calls 52769->52771 52774 74f9b0 74 API calls 52770->52774 52772 74e657 52771->52772 52775 744450 39 API calls 52772->52775 52773 74e559 52773->52720 52779 744070 std::_Throw_Cpp_error 41 API calls 52773->52779 52776 74e6ab 52774->52776 52778 74e65f 52775->52778 52777 744db0 39 API calls 52776->52777 52780 74e6ba 52777->52780 52781 73bfb0 std::_Throw_Cpp_error 39 API calls 52778->52781 52782 74e58c 52779->52782 52784 744450 39 API calls 52780->52784 52781->52739 52783 74f9b0 74 API calls 52782->52783 52785 74e59d 52783->52785 52786 74e6c2 52784->52786 52787 744db0 39 API calls 52785->52787 52788 73bfb0 std::_Throw_Cpp_error 39 API calls 52786->52788 52789 74e5ac 52787->52789 52788->52754 52790 744450 39 API calls 52789->52790 52791 74e5b4 52790->52791 52792 73bfb0 std::_Throw_Cpp_error 39 API calls 52791->52792 52792->52720 52795 7457a8 52793->52795 52797 745773 _Yarn 52793->52797 52794 745854 52795->52794 53334 7435a0 41 API calls 4 library calls 52795->53334 52797->52183 52798 7457e9 _Yarn 52800 745833 collate 52798->52800 53335 78454f 39 API calls 3 library calls 52798->53335 52800->52183 52802 74ddd4 52801->52802 52803 743600 41 API calls 52802->52803 52804 74de39 52803->52804 52805 74d840 74 API calls 52804->52805 52806 74de48 52805->52806 52807 74e830 39 API calls 52806->52807 52808 74de7a 52807->52808 52809 73d440 76 API calls 52808->52809 52810 74de92 collate 52809->52810 52811 74dff9 52810->52811 52813 74df10 collate 52810->52813 53337 78454f 39 API calls 3 library calls 52811->53337 52814 74dfd0 52813->52814 52817 73d360 72 API calls 52813->52817 52816 766ca1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 52814->52816 52815 74dffe 52818 74dff3 52816->52818 52819 74df3a 52817->52819 52818->52188 52819->52814 52820 73d360 72 API calls 52819->52820 52823 74df50 52820->52823 52821 74dfa4 52822 73d360 72 API calls 52821->52822 52825 74dfb0 52822->52825 52823->52821 52824 744070 std::_Throw_Cpp_error 41 API calls 52823->52824 52826 74df73 52824->52826 52825->52814 53336 78dd86 42 API calls __vswprintf_c_l 52825->53336 52827 74f9b0 74 API calls 52826->52827 52829 74df84 52827->52829 52830 744db0 39 API calls 52829->52830 52831 74df90 52830->52831 52832 744450 39 API calls 52831->52832 52833 74df98 52832->52833 52834 73bfb0 std::_Throw_Cpp_error 39 API calls 52833->52834 52834->52821 52836 73d47a 52835->52836 53338 7849f3 52836->53338 52843 766ca1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 52845 73d645 52843->52845 52844 784f20 66 API calls 52846 73d501 52844->52846 52845->52191 52847 73d516 52846->52847 52848 73d508 52846->52848 53353 73f6c0 52847->53353 52850 7846c5 69 API calls 52848->52850 52852 73d50e collate 52850->52852 52851 73d555 52853 73d5b5 52851->52853 53359 73eed0 52851->53359 52852->52843 53371 7846c5 52853->53371 52857 73d5dd 52857->52852 52858 73d64b 52857->52858 53385 78454f 39 API calls 3 library calls 52858->53385 52860 73d650 52864 744136 52862->52864 52863 744148 52863->52219 52864->52863 53747 7435a0 41 API calls 4 library calls 52864->53747 52866 74419b _Yarn 52866->52219 52867->52414 52868->52414 52870 73afa5 52869->52870 52871 73af9e 52869->52871 52872 73afd0 52870->52872 52873 73afac 52870->52873 52871->52414 52876 766caf ctype 16 API calls 52872->52876 52874 73afb3 52873->52874 52875 73afde 52873->52875 52877 766caf ctype 16 API calls 52874->52877 53748 73ee80 RaiseException Concurrency::cancel_current_task 52875->53748 52878 73afd6 52876->52878 52880 73afb9 52877->52880 52878->52414 52881 73afc2 52880->52881 53749 78454f 39 API calls 3 library calls 52880->53749 52881->52414 52883 73afe8 52885 74f91c 52884->52885 52886 74f8fa 52884->52886 52888 73d360 72 API calls 52885->52888 52887 743600 41 API calls 52886->52887 52889 74f91a 52887->52889 52890 74f926 52888->52890 52892 766ca1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 52889->52892 52890->52886 52891 74f92a 52890->52891 52893 73d360 72 API calls 52891->52893 52894 74f9a4 52892->52894 52895 74f93a 52893->52895 52894->52414 52896 74f97f 52895->52896 52898 74f958 52895->52898 53750 7441d0 41 API calls 52896->53750 52899 744070 std::_Throw_Cpp_error 41 API calls 52898->52899 52900 74f961 52899->52900 52901 74f9b0 74 API calls 52900->52901 52902 74f972 52901->52902 52903 73bfb0 std::_Throw_Cpp_error 39 API calls 52902->52903 52903->52889 52904->52414 52906 74598b __wsopen_s 52905->52906 52907 7459c6 PathFileExistsW 52906->52907 52908 7459f1 52907->52908 52909 7459d3 52907->52909 53751 7503e0 52908->53751 52910 7459dd CreateDirectoryW 52909->52910 52911 7459db 52909->52911 52910->52908 52913 7459ea 52910->52913 52911->52910 52926 746d93 collate 52913->52926 52914 766ca1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 52915 746db7 52914->52915 52915->52422 52918 745a5e 53764 757680 111 API calls 2 library calls 52918->53764 52920 745a75 52921 73bfb0 std::_Throw_Cpp_error 39 API calls 52920->52921 52985 745a87 std::ios_base::_Ios_base_dtor _Yarn __fread_nolock collate 52921->52985 52922 746c16 PathFindFileNameW 52924 746c54 52922->52924 52924->52924 52928 743600 41 API calls 52924->52928 52926->52914 52927 745a9c 52927->52926 52929 746e0f 52927->52929 52931 746c70 52928->52931 53814 78454f 39 API calls 3 library calls 52929->53814 53807 743480 41 API calls 52931->53807 52932 746e14 52934 746c86 53808 743380 41 API calls SimpleUString::operator= 52934->53808 52935 74f9b0 74 API calls 52935->52985 52937 746c9e 53809 743400 41 API calls SimpleUString::operator= 52937->53809 52939 746cb4 52940 744450 39 API calls 52939->52940 52941 746cc2 52940->52941 52942 744450 39 API calls 52941->52942 52943 746cd1 52942->52943 52945 746ce6 PathFileExistsW 52943->52945 52946 746ce0 52943->52946 52944 745760 41 API calls SimpleUString::operator= 52944->52985 52948 746cf1 MessageBoxW 52945->52948 52949 746ced 52945->52949 52946->52945 52947 746dc0 53812 73bcc0 41 API calls 5 library calls 52947->53812 53810 746e20 lstrcpyW SHFileOperationW 52948->53810 52954 744450 39 API calls 52949->52954 52952 746dfe 53813 78113d RaiseException 52952->53813 52953 746dbb 53811 742f10 41 API calls 52953->53811 52957 746d1b 52954->52957 52957->52927 52959 7455e0 41 API calls SimpleUString::operator= 52959->52985 52960 7435a0 41 API calls SimpleUString::operator= 52960->52985 52961 7460d3 PathFileExistsW 52972 7460cd collate 52961->52972 52963 74627e OutputDebugStringW 52963->52985 52965 746110 OutputDebugStringW 52965->52972 52965->52985 52969 767f8d 45 API calls 52969->52985 52970 7461df PathIsDirectoryW 52970->52972 52971 74620e CreateDirectoryW 52971->52972 52972->52929 52972->52961 52972->52970 52972->52971 52972->52985 53794 74b1e0 43 API calls __vswprintf_c_l 52972->53794 53795 745020 41 API calls SimpleUString::operator= 52972->53795 53796 746e20 lstrcpyW SHFileOperationW 52972->53796 52975 766caf 16 API calls ctype 52975->52985 52976 7465ac PathIsDirectoryW 52979 7465b7 52976->52979 52976->52985 52977 7465db CreateDirectoryW 52977->52985 52978 744110 41 API calls 52978->52985 52979->52977 52979->52985 53798 746e20 lstrcpyW SHFileOperationW 52979->53798 52985->52922 52985->52927 52985->52929 52985->52935 52985->52944 52985->52947 52985->52953 52985->52959 52985->52960 52985->52961 52985->52969 52985->52972 52985->52975 52985->52976 52985->52977 52985->52978 52985->52979 53765 753a80 101 API calls ctype 52985->53765 53766 74a0b0 52985->53766 53797 74b1e0 43 API calls __vswprintf_c_l 52985->53797 53799 73f430 72 API calls 3 library calls 52985->53799 53800 748770 99 API calls 2 library calls 52985->53800 53801 7497c0 70 API calls Concurrency::cancel_current_task 52985->53801 53802 74abc0 55 API calls 3 library calls 52985->53802 53803 73f2b0 41 API calls Concurrency::cancel_current_task 52985->53803 53804 745870 70 API calls 52985->53804 53805 7443a0 70 API calls collate 52985->53805 53806 7436a0 39 API calls 2 library calls 52985->53806 52988 744e22 52987->52988 52989 744e0d 52987->52989 52988->52223 52990 745760 SimpleUString::operator= 41 API calls 52989->52990 52990->52988 52992 744dbe 52991->52992 52993 744dc3 52991->52993 52994 744450 39 API calls 52992->52994 52995 744450 52993->52995 52994->52993 52996 74445b 52995->52996 52997 74447c collate 52995->52997 52996->52997 53855 78454f 39 API calls 3 library calls 52996->53855 52997->52256 52999 7444a2 53001 780d80 __fread_nolock 53000->53001 53002 7480e2 curl_easy_init 53001->53002 53003 7480f4 53002->53003 53004 748569 53002->53004 53005 7485b4 53003->53005 53008 744220 41 API calls 53003->53008 53006 74856d 53004->53006 53007 748580 MessageBoxA 53004->53007 53865 78454f 39 API calls 3 library calls 53005->53865 53011 766ca1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 53006->53011 53007->53006 53010 748137 53008->53010 53856 7455e0 53010->53856 53013 7485b0 53011->53013 53012 7485be 53866 78454f 39 API calls 3 library calls 53012->53866 53013->52268 53015 7485c3 53867 78454f 39 API calls 3 library calls 53015->53867 53018 748176 53020 7482bc 53018->53020 53021 748189 53018->53021 53019 7485c8 53022 7485eb 53019->53022 53025 73eed0 std::_Throw_Cpp_error 41 API calls 53019->53025 53046 748242 collate 53020->53046 53864 7441d0 41 API calls 53020->53864 53023 743600 41 API calls 53021->53023 53022->52268 53027 7481c1 53023->53027 53025->53022 53026 7503e0 74 API calls 53028 748265 curl_easy_setopt 53026->53028 53031 7455e0 SimpleUString::operator= 41 API calls 53027->53031 53032 74828e 53028->53032 53033 74834b curl_easy_setopt curl_easy_setopt curl_easy_setopt 53028->53033 53029 7482db 53035 7455e0 SimpleUString::operator= 41 API calls 53029->53035 53034 7481e1 53031->53034 53032->53012 53036 7482b7 collate 53032->53036 53037 744110 41 API calls 53033->53037 53039 7455e0 SimpleUString::operator= 41 API calls 53034->53039 53038 748306 53035->53038 53036->53033 53040 74838b 53037->53040 53041 7455e0 SimpleUString::operator= 41 API calls 53038->53041 53042 748208 53039->53042 53043 7455e0 SimpleUString::operator= 41 API calls 53040->53043 53044 74832d 53041->53044 53042->53005 53042->53046 53048 7483a0 53043->53048 53045 744450 39 API calls 53044->53045 53045->53046 53046->53026 53047 748456 53049 7503e0 74 API calls 53047->53049 53048->53047 53050 7455e0 SimpleUString::operator= 41 API calls 53048->53050 53052 748467 curl_easy_setopt 53049->53052 53051 7483ce 53050->53051 53054 7455e0 SimpleUString::operator= 41 API calls 53051->53054 53055 74848c 53052->53055 53056 7484bb curl_easy_setopt 53052->53056 53057 7483e7 53054->53057 53055->53015 53058 7484b1 collate 53055->53058 53059 748535 curl_easy_setopt curl_easy_perform curl_easy_cleanup 53056->53059 53060 7484dc 53056->53060 53062 7455e0 SimpleUString::operator= 41 API calls 53057->53062 53058->53056 53061 744450 39 API calls 53059->53061 53060->53059 53065 7503e0 74 API calls 53060->53065 53063 74855e 53061->53063 53064 7483f9 53062->53064 53066 744450 39 API calls 53063->53066 53068 7455e0 SimpleUString::operator= 41 API calls 53064->53068 53067 7484f5 curl_easy_setopt 53065->53067 53066->53004 53070 73bfb0 std::_Throw_Cpp_error 39 API calls 53067->53070 53071 74841e 53068->53071 53072 74851a curl_easy_setopt curl_easy_setopt 53070->53072 53073 7455e0 SimpleUString::operator= 41 API calls 53071->53073 53072->53059 53074 748430 53073->53074 53075 745760 SimpleUString::operator= 41 API calls 53074->53075 53075->53047 53078->52290 53079->52290 53083 74424d 53082->53083 53084 744277 _Yarn 53082->53084 53870 7435a0 41 API calls 4 library calls 53083->53870 53084->52414 53086->52414 53087->52414 53088->52422 53089->52422 53091->52221 53094 73bfbb 53093->53094 53095 73bfd6 collate 53093->53095 53094->53095 53871 78454f 39 API calls 3 library calls 53094->53871 53095->52271 53097 73bffa 53097->52271 53098->52283 53101 744092 53100->53101 53101->53101 53102 73b020 std::_Throw_Cpp_error 41 API calls 53101->53102 53103 7440a4 53102->53103 53103->52301 53104->52340 53105->52360 53106->52367 53107->52385 53108->52383 53109->52402 53110->52406 53111->52408 53112->52415 53113->52418 53114->52425 53115->52430 53116->52487 53117->52492 53118->52500 53119->52509 53120->52517 53121->52530 53122->52552 53123->52560 53124->52564 53125->52568 53126->52570 53127->52576 53128->52522 53130->52571 53131->52577 53132->52582 53133->52502 53136 766caa IsProcessorFeaturePresent 53135->53136 53137 766ca9 53135->53137 53139 767629 53136->53139 53137->52194 53872 7675ec SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 53139->53872 53141 76770c 53141->52194 53142->52195 53145->52648 53147->52661 53150 743690 53149->53150 53152 743612 53149->53152 53151 743617 _Yarn 53151->52665 53152->53151 53222 7435a0 41 API calls 4 library calls 53152->53222 53154 743667 _Yarn 53154->52665 53223 767f8d 53155->53223 53157 74d884 53235 766caf 53157->53235 53160 74da0c 53247 7680f0 53160->53247 53165 74da36 53168 74da77 53165->53168 53171 767bfa std::_Lockit::_Lockit 7 API calls 53165->53171 53175 74dac5 _Yarn 53165->53175 53166 74d942 53260 768699 39 API calls 4 library calls 53166->53260 53275 76ab18 72 API calls 7 library calls 53168->53275 53170 74d94e 53261 7680d6 66 API calls std::_Locinfo::_Locinfo_dtor 53170->53261 53174 74da56 53171->53174 53172 74da85 53172->53175 53178 74daa3 53172->53178 53276 78cd6a 14 API calls ___free_lconv_mon 53172->53276 53177 767c52 std::_Lockit::~_Lockit 2 API calls 53174->53177 53175->52667 53176 74d977 53179 74d987 53176->53179 53262 78cd6a 14 API calls ___free_lconv_mon 53176->53262 53177->53168 53277 78f5e5 53178->53277 53180 74d99e 53179->53180 53263 78cd6a 14 API calls ___free_lconv_mon 53179->53263 53184 74d9b5 53180->53184 53264 78cd6a 14 API calls ___free_lconv_mon 53180->53264 53186 74d9cc 53184->53186 53265 78cd6a 14 API calls ___free_lconv_mon 53184->53265 53189 74d9e3 53186->53189 53266 78cd6a 14 API calls ___free_lconv_mon 53186->53266 53190 74d9fa 53189->53190 53267 78cd6a 14 API calls ___free_lconv_mon 53189->53267 53268 767c52 53190->53268 53195 74e841 collate 53194->53195 53197 74e8a7 collate 53195->53197 53297 78454f 39 API calls 3 library calls 53195->53297 53197->52669 53198 74e8e4 collate 53198->52669 53200 73d36d 53199->53200 53201 73d383 53200->53201 53298 73d660 72 API calls 4 library calls 53200->53298 53201->52677 53201->52685 53204 74d840 74 API calls 53203->53204 53205 74f9eb 53204->53205 53299 74f310 53205->53299 53208 74e830 39 API calls 53209 74fa14 53208->53209 53210 766ca1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 53209->53210 53211 74e3ac 53210->53211 53211->52708 53212->52740 53213->52736 53214->52752 53215->52773 53216->52750 53217->52729 53218->52767 53219->52758 53220->52678 53221->52682 53222->53154 53224 767f99 __EH_prolog3 53223->53224 53225 767bfa std::_Lockit::_Lockit 7 API calls 53224->53225 53226 767fa4 53225->53226 53231 767fd5 53226->53231 53284 768120 16 API calls 2 library calls 53226->53284 53228 767c52 std::_Lockit::~_Lockit 2 API calls 53232 768012 ctype 53228->53232 53229 767fb7 53285 768143 41 API calls std::locale::_Setgloballocale 53229->53285 53231->53228 53232->53157 53233 767fbf 53286 767ee5 15 API calls _Yarn 53233->53286 53237 766cb4 53235->53237 53236 78f5e5 _Yarn 15 API calls 53236->53237 53237->53236 53238 74d8d5 53237->53238 53240 766cd0 53237->53240 53288 78f9c9 EnterCriticalSection LeaveCriticalSection ctype 53237->53288 53238->53160 53253 767bfa 53238->53253 53241 73ee80 Concurrency::cancel_current_task 53240->53241 53242 766cda Concurrency::cancel_current_task 53240->53242 53287 78113d RaiseException 53241->53287 53289 78113d RaiseException 53242->53289 53244 73ee9c 53246 767820 53248 7680fc __EH_prolog3 53247->53248 53249 766caf ctype 16 API calls 53248->53249 53250 768103 53249->53250 53251 76811a ctype 53250->53251 53290 767db7 72 API calls 4 library calls 53250->53290 53251->53165 53254 767c09 53253->53254 53257 767c10 53253->53257 53291 792534 6 API calls 2 library calls 53254->53291 53256 74d8fa 53259 76808b 67 API calls 2 library calls 53256->53259 53257->53256 53292 76cac1 EnterCriticalSection 53257->53292 53259->53166 53260->53170 53261->53176 53262->53179 53263->53180 53264->53184 53265->53186 53266->53189 53267->53190 53269 767c5c 53268->53269 53270 792542 53268->53270 53271 767c6f 53269->53271 53293 76cacf LeaveCriticalSection 53269->53293 53294 79251d LeaveCriticalSection 53270->53294 53271->53160 53274 792549 53274->53160 53275->53172 53276->53178 53282 79751e __Getcoll 53277->53282 53278 79755c 53296 792df6 14 API calls __Strcoll 53278->53296 53279 797547 RtlAllocateHeap 53281 79755a 53279->53281 53279->53282 53281->53175 53282->53278 53282->53279 53295 78f9c9 EnterCriticalSection LeaveCriticalSection ctype 53282->53295 53284->53229 53285->53233 53286->53231 53287->53244 53288->53237 53289->53246 53290->53251 53291->53256 53292->53256 53293->53271 53294->53274 53295->53282 53296->53281 53297->53198 53298->53200 53300 74f3a0 53299->53300 53321 74eae0 53300->53321 53302 74f783 collate 53305 766ca1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 53302->53305 53303 74f6f5 53303->53302 53304 74f8ad 53303->53304 53331 78454f 39 API calls 3 library calls 53304->53331 53307 74f893 53305->53307 53307->53208 53308 74f8b2 53309 74f792 53312 74f8a3 53309->53312 53315 744110 41 API calls 53309->53315 53310 74f6fd 53310->53312 53316 744110 41 API calls 53310->53316 53311 74eae0 41 API calls 53320 74f3b6 _Yarn collate 53311->53320 53330 74e950 41 API calls 2 library calls 53312->53330 53313 74f899 53329 78454f 39 API calls 3 library calls 53313->53329 53319 74f718 collate 53315->53319 53316->53319 53318 7435a0 41 API calls SimpleUString::operator= 53318->53320 53319->53302 53319->53313 53320->53303 53320->53309 53320->53310 53320->53311 53320->53313 53320->53318 53322 74eaff 53321->53322 53323 74eb4f 53321->53323 53322->53320 53326 74ebaa _Yarn 53323->53326 53332 7435a0 41 API calls 4 library calls 53323->53332 53328 74ec25 _Yarn collate 53326->53328 53333 78454f 39 API calls 3 library calls 53326->53333 53327 74ec89 53327->53320 53328->53320 53329->53312 53331->53308 53332->53326 53333->53327 53334->52798 53335->52794 53336->52814 53337->52815 53386 784859 53338->53386 53341 784f20 53342 784f33 __vswprintf_c_l 53341->53342 53441 784c77 53342->53441 53347 785644 53348 785657 __vswprintf_c_l 53347->53348 53520 784f5a 53348->53520 53351 78427b __vswprintf_c_l 39 API calls 53352 73d4f5 53351->53352 53352->52844 53354 73f6db 53353->53354 53357 73f781 _Yarn collate 53353->53357 53355 73af90 std::_Throw_Cpp_error 41 API calls 53354->53355 53356 73f73f _Yarn 53354->53356 53354->53357 53355->53356 53356->53357 53571 78454f 39 API calls 3 library calls 53356->53571 53357->52851 53360 73ef1f 53359->53360 53361 73af90 std::_Throw_Cpp_error 41 API calls 53360->53361 53364 73ef75 _Yarn 53360->53364 53361->53364 53363 73f028 53365 73f043 _Yarn 53363->53365 53366 73af90 std::_Throw_Cpp_error 41 API calls 53363->53366 53367 73efd5 _Yarn collate 53364->53367 53572 78454f 39 API calls 3 library calls 53364->53572 53365->52851 53368 73f0b5 _Yarn 53366->53368 53367->52851 53369 73f0f5 collate 53368->53369 53573 78454f 39 API calls 3 library calls 53368->53573 53369->52851 53372 7846d8 __vswprintf_c_l 53371->53372 53574 7845a0 53372->53574 53374 7846e4 53375 78427b __vswprintf_c_l 39 API calls 53374->53375 53376 73d5bb 53375->53376 53377 740ac0 53376->53377 53378 740ae5 53377->53378 53379 740b4e 53378->53379 53641 741cc0 53378->53641 53379->52857 53379->53379 53382 740b45 53382->53379 53645 73fe60 53382->53645 53671 740c40 53382->53671 53696 78df80 42 API calls __Getcoll 53382->53696 53385->52860 53389 784865 __FrameHandler3::FrameUnwindToState 53386->53389 53387 78486c 53411 792df6 14 API calls __Strcoll 53387->53411 53389->53387 53391 78488c 53389->53391 53390 784871 53412 78453f 39 API calls __cftoe 53390->53412 53392 78489e 53391->53392 53393 784891 53391->53393 53403 795db6 53392->53403 53413 792df6 14 API calls __Strcoll 53393->53413 53398 73d4d8 53398->52852 53398->53341 53399 7848bb 53415 7848f9 LeaveCriticalSection __fread_nolock 53399->53415 53400 7848ae 53414 792df6 14 API calls __Strcoll 53400->53414 53404 795dc2 __FrameHandler3::FrameUnwindToState 53403->53404 53416 7924d5 EnterCriticalSection 53404->53416 53406 795dd0 53417 795e5a 53406->53417 53411->53390 53412->53398 53413->53398 53414->53398 53415->53398 53416->53406 53426 795e7d 53417->53426 53418 795ed5 53436 798567 14 API calls 3 library calls 53418->53436 53420 795ede 53437 795b51 14 API calls 2 library calls 53420->53437 53423 795ee7 53425 795ddd 53423->53425 53438 798edf 6 API calls _unexpected 53423->53438 53431 795e16 53425->53431 53426->53418 53426->53425 53434 78e3b2 EnterCriticalSection 53426->53434 53435 78e3c6 LeaveCriticalSection 53426->53435 53428 795f06 53439 78e3b2 EnterCriticalSection 53428->53439 53430 795f19 53430->53425 53440 79251d LeaveCriticalSection 53431->53440 53433 7848a7 53433->53399 53433->53400 53434->53426 53435->53426 53436->53420 53437->53423 53438->53428 53439->53430 53440->53433 53443 784c83 __FrameHandler3::FrameUnwindToState 53441->53443 53442 784c89 53468 7844c2 39 API calls 3 library calls 53442->53468 53443->53442 53445 784ccc 53443->53445 53458 78e3b2 EnterCriticalSection 53445->53458 53446 784ca4 53452 78427b 53446->53452 53448 784cd8 53459 784dfa 53448->53459 53450 784cee 53469 784d17 LeaveCriticalSection __fread_nolock 53450->53469 53453 784287 53452->53453 53454 78429e 53453->53454 53518 784326 39 API calls 2 library calls 53453->53518 53456 73d4ef 53454->53456 53519 784326 39 API calls 2 library calls 53454->53519 53456->53347 53458->53448 53460 784e0d 53459->53460 53461 784e20 53459->53461 53460->53450 53470 784d21 53461->53470 53463 784e43 53467 784ed1 53463->53467 53474 78e613 53463->53474 53467->53450 53468->53446 53469->53446 53471 784d32 53470->53471 53473 784d8a 53470->53473 53471->53473 53483 796b40 41 API calls 2 library calls 53471->53483 53473->53463 53475 78e62c 53474->53475 53476 784e71 53474->53476 53475->53476 53484 795b8b 53475->53484 53480 796b80 53476->53480 53478 78e648 53491 799ac7 64 API calls 3 library calls 53478->53491 53494 796a5f 53480->53494 53482 796b99 53482->53467 53483->53473 53485 795bac 53484->53485 53486 795b97 53484->53486 53485->53478 53492 792df6 14 API calls __Strcoll 53486->53492 53488 795b9c 53493 78453f 39 API calls __cftoe 53488->53493 53490 795ba7 53490->53478 53491->53476 53492->53488 53493->53490 53500 79c701 53494->53500 53496 796a71 53497 796a8d SetFilePointerEx 53496->53497 53499 796a79 __wsopen_s 53496->53499 53498 796aa5 GetLastError 53497->53498 53497->53499 53498->53499 53499->53482 53501 79c70e 53500->53501 53502 79c723 53500->53502 53513 792de3 14 API calls __Strcoll 53501->53513 53507 79c748 53502->53507 53515 792de3 14 API calls __Strcoll 53502->53515 53504 79c713 53514 792df6 14 API calls __Strcoll 53504->53514 53507->53496 53508 79c753 53516 792df6 14 API calls __Strcoll 53508->53516 53510 79c71b 53510->53496 53511 79c75b 53517 78453f 39 API calls __cftoe 53511->53517 53513->53504 53514->53510 53515->53508 53516->53511 53517->53510 53518->53454 53519->53456 53521 784f66 __FrameHandler3::FrameUnwindToState 53520->53521 53522 784f6d 53521->53522 53523 784f8e 53521->53523 53535 7844c2 39 API calls 3 library calls 53522->53535 53531 78e3b2 EnterCriticalSection 53523->53531 53526 784f99 53532 785069 53526->53532 53527 784f86 53527->53351 53531->53526 53537 78509b 53532->53537 53534 784fa8 53536 784fd0 LeaveCriticalSection __fread_nolock 53534->53536 53535->53527 53536->53527 53538 7850aa 53537->53538 53539 7850d2 53537->53539 53554 7844c2 39 API calls 3 library calls 53538->53554 53541 795b8b __fread_nolock 39 API calls 53539->53541 53542 7850db 53541->53542 53551 796b22 53542->53551 53545 785185 53555 785407 44 API calls 4 library calls 53545->53555 53547 785194 53550 7850c5 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 53547->53550 53548 78519c 53548->53550 53556 78523c 43 API calls 2 library calls 53548->53556 53550->53534 53557 79693a 53551->53557 53554->53550 53555->53547 53556->53550 53558 796946 __FrameHandler3::FrameUnwindToState 53557->53558 53559 796989 53558->53559 53561 7969cf 53558->53561 53567 7850f9 53558->53567 53569 7844c2 39 API calls 3 library calls 53559->53569 53568 79c485 EnterCriticalSection 53561->53568 53563 7969d5 53564 7969f6 53563->53564 53565 796a5f __fread_nolock 41 API calls 53563->53565 53570 796a57 LeaveCriticalSection __wsopen_s 53564->53570 53565->53564 53567->53545 53567->53548 53567->53550 53568->53563 53569->53567 53570->53567 53571->53357 53572->53363 53573->53365 53575 7845ac __FrameHandler3::FrameUnwindToState 53574->53575 53576 7845d9 53575->53576 53577 7845b6 53575->53577 53580 7845d1 53576->53580 53585 78e3b2 EnterCriticalSection 53576->53585 53600 7844c2 39 API calls 3 library calls 53577->53600 53580->53374 53581 7845f7 53586 784637 53581->53586 53583 784604 53601 78462f LeaveCriticalSection __fread_nolock 53583->53601 53585->53581 53587 784644 53586->53587 53588 784667 53586->53588 53613 7844c2 39 API calls 3 library calls 53587->53613 53590 78e613 ___scrt_uninitialize_crt 64 API calls 53588->53590 53598 78465f 53588->53598 53591 78467f 53590->53591 53602 795f1c 53591->53602 53594 795b8b __fread_nolock 39 API calls 53595 784693 53594->53595 53606 795c43 53595->53606 53598->53583 53600->53580 53601->53580 53603 784687 53602->53603 53604 795f33 53602->53604 53603->53594 53604->53603 53615 795b51 14 API calls 2 library calls 53604->53615 53607 795c6c 53606->53607 53612 78469a 53606->53612 53608 795cbb 53607->53608 53610 795c93 53607->53610 53624 7844c2 39 API calls 3 library calls 53608->53624 53616 795bb2 53610->53616 53612->53598 53614 795b51 14 API calls 2 library calls 53612->53614 53613->53598 53614->53598 53615->53603 53617 795bbe __FrameHandler3::FrameUnwindToState 53616->53617 53625 79c485 EnterCriticalSection 53617->53625 53619 795bcc 53622 795bfd 53619->53622 53626 795d16 53619->53626 53639 795c37 LeaveCriticalSection __wsopen_s 53622->53639 53623 795c20 53623->53612 53624->53612 53625->53619 53627 79c701 __wsopen_s 39 API calls 53626->53627 53629 795d26 53627->53629 53628 795d2c 53640 79c670 15 API calls 3 library calls 53628->53640 53629->53628 53631 79c701 __wsopen_s 39 API calls 53629->53631 53638 795d5e 53629->53638 53634 795d55 53631->53634 53632 79c701 __wsopen_s 39 API calls 53635 795d6a CloseHandle 53632->53635 53633 795d84 __wsopen_s 53633->53622 53636 79c701 __wsopen_s 39 API calls 53634->53636 53635->53628 53637 795d76 GetLastError 53635->53637 53636->53638 53637->53628 53638->53628 53638->53632 53639->53623 53640->53633 53642 741cf5 53641->53642 53644 741ccb 53641->53644 53642->53382 53644->53642 53697 78df80 42 API calls __Getcoll 53644->53697 53646 7400d2 53645->53646 53647 73fe96 53645->53647 53646->53382 53647->53646 53649 73fec5 53647->53649 53719 78df80 42 API calls __Getcoll 53647->53719 53649->53646 53650 741cc0 42 API calls 53649->53650 53651 73fef0 53650->53651 53651->53646 53698 78e192 53651->53698 53654 78e192 43 API calls 53658 73ff1e 53654->53658 53655 73ffd6 53702 78de60 53655->53702 53657 73ffe0 53660 740054 53657->53660 53663 73ffed 53657->53663 53658->53655 53659 73ff4e 53658->53659 53661 766caf ctype 16 API calls 53659->53661 53662 766caf ctype 16 API calls 53660->53662 53668 73ff58 53661->53668 53662->53668 53711 742b90 53663->53711 53666 740002 53670 766caf ctype 16 API calls 53666->53670 53667 74002b 53669 766caf ctype 16 API calls 53667->53669 53668->53382 53669->53668 53670->53668 53674 740c81 53671->53674 53680 740cee collate 53671->53680 53673 766ca1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 53675 74127b 53673->53675 53676 740cb5 53674->53676 53674->53680 53741 78df80 42 API calls __Getcoll 53674->53741 53675->53382 53677 741cc0 42 API calls 53676->53677 53676->53680 53678 740d6b 53677->53678 53724 741590 53678->53724 53680->53673 53680->53680 53681 740d7b 53681->53680 53682 73eed0 std::_Throw_Cpp_error 41 API calls 53681->53682 53683 740dda 53682->53683 53684 73eed0 std::_Throw_Cpp_error 41 API calls 53683->53684 53694 740de9 53684->53694 53686 741281 53743 78454f 39 API calls 3 library calls 53686->53743 53688 741286 53689 741003 53733 741970 53689->53733 53691 766caf ctype 16 API calls 53691->53694 53692 741013 53693 742b90 43 API calls 53692->53693 53695 740eff 53692->53695 53693->53695 53694->53689 53694->53691 53694->53695 53742 78df80 42 API calls __Getcoll 53694->53742 53695->53680 53695->53686 53696->53382 53697->53644 53699 73ff15 53698->53699 53700 78e1a0 53698->53700 53699->53654 53720 78e094 43 API calls 2 library calls 53700->53720 53703 78de93 53702->53703 53707 78de77 53702->53707 53721 795866 39 API calls 3 library calls 53703->53721 53705 78de98 53722 79756c 39 API calls __Getcoll 53705->53722 53707->53657 53708 78dea8 53708->53707 53723 79849c 42 API calls 3 library calls 53708->53723 53710 78deda 53710->53657 53712 742b9d 53711->53712 53716 73fff9 53711->53716 53713 78e192 43 API calls 53712->53713 53712->53716 53714 742bac 53713->53714 53715 78e192 43 API calls 53714->53715 53717 742bba 53715->53717 53716->53666 53716->53667 53717->53716 53718 78e192 43 API calls 53717->53718 53718->53717 53719->53647 53720->53699 53721->53705 53722->53708 53723->53710 53725 7415a9 53724->53725 53726 78de60 42 API calls 53725->53726 53728 741710 53725->53728 53730 7415c7 _Yarn collate 53726->53730 53728->53681 53729 73af90 std::_Throw_Cpp_error 41 API calls 53729->53730 53730->53728 53730->53729 53731 741721 53730->53731 53744 78ddd0 42 API calls __Getcoll 53730->53744 53745 78454f 39 API calls 3 library calls 53731->53745 53735 7419a2 53733->53735 53734 766caf ctype 16 API calls 53734->53735 53735->53734 53736 741b7d 53735->53736 53737 73fe60 46 API calls 53735->53737 53739 78e192 43 API calls 53735->53739 53740 78df80 42 API calls 53735->53740 53746 741290 43 API calls 53735->53746 53736->53692 53737->53735 53739->53735 53740->53735 53741->53674 53742->53694 53743->53688 53744->53730 53745->53728 53746->53735 53747->52866 53749->52883 53750->52889 53752 74d840 74 API calls 53751->53752 53753 75041b 53752->53753 53754 74e830 39 API calls 53753->53754 53755 750445 53754->53755 53756 766ca1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 53755->53756 53757 7459fe 53756->53757 53758 73b020 53757->53758 53759 73b032 53758->53759 53760 73b0a8 53758->53760 53761 73b037 _Yarn 53759->53761 53762 73af90 std::_Throw_Cpp_error 41 API calls 53759->53762 53761->52918 53763 73b083 _Yarn 53762->53763 53763->52918 53764->52920 53765->52985 53783 74a118 collate 53766->53783 53767 74a2f5 53769 766ca1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 53767->53769 53768 74a314 53816 742f10 41 API calls 53768->53816 53771 74a310 53769->53771 53771->52985 53772 74a319 53817 78454f 39 API calls 3 library calls 53772->53817 53774 743600 41 API calls 53774->53783 53776 74a31e 53778 74a3c7 53776->53778 53779 74a3b1 53776->53779 53784 74a365 collate 53776->53784 53777 766ca1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 53782 74a638 53777->53782 53781 78e784 41 API calls 53778->53781 53818 78e784 53779->53818 53791 74a3eb _Yarn collate 53781->53791 53782->52985 53783->53767 53783->53768 53783->53772 53783->53774 53815 743870 41 API calls 53783->53815 53784->53777 53785 74a598 53785->53784 53786 74a63c 53785->53786 53839 78454f 39 API calls 3 library calls 53786->53839 53787 73af90 std::_Throw_Cpp_error 41 API calls 53787->53791 53789 74a641 53789->52985 53791->53785 53791->53786 53791->53787 53791->53789 53792 74a5d9 53791->53792 53793 78e784 41 API calls 53791->53793 53792->53785 53838 78f34c 41 API calls 4 library calls 53792->53838 53793->53791 53794->52965 53795->52972 53796->52972 53797->52963 53798->52979 53799->52985 53800->52985 53801->52985 53802->52985 53803->52985 53804->52985 53805->52985 53806->52985 53807->52934 53808->52937 53809->52939 53810->52949 53812->52952 53813->52929 53814->52932 53817->53776 53819 78e790 __FrameHandler3::FrameUnwindToState 53818->53819 53820 78e79a 53819->53820 53821 78e7b2 53819->53821 53848 792df6 14 API calls __Strcoll 53820->53848 53840 78e3b2 EnterCriticalSection 53821->53840 53824 78e79f 53849 78453f 39 API calls __cftoe 53824->53849 53825 78e7bd 53828 795b8b __fread_nolock 39 API calls 53825->53828 53831 78e7d5 53825->53831 53827 78e7aa 53827->53784 53828->53831 53829 78e83d 53850 792df6 14 API calls __Strcoll 53829->53850 53830 78e865 53841 78e73d 53830->53841 53831->53829 53831->53830 53834 78e86b 53852 78e895 LeaveCriticalSection __fread_nolock 53834->53852 53835 78e842 53851 78453f 39 API calls __cftoe 53835->53851 53838->53792 53839->53789 53840->53825 53842 78e749 53841->53842 53846 78e75e __fread_nolock 53841->53846 53853 792df6 14 API calls __Strcoll 53842->53853 53844 78e74e 53854 78453f 39 API calls __cftoe 53844->53854 53846->53834 53847 78e759 53847->53834 53848->53824 53849->53827 53850->53835 53851->53827 53852->53827 53853->53844 53854->53847 53855->52999 53857 7455ff _Yarn 53856->53857 53858 745641 53856->53858 53857->53018 53862 74568b _Yarn 53858->53862 53868 7435a0 41 API calls 4 library calls 53858->53868 53861 745754 53863 745700 _Yarn collate 53862->53863 53869 78454f 39 API calls 3 library calls 53862->53869 53863->53018 53864->53029 53865->53012 53866->53015 53867->53019 53868->53862 53869->53861 53870->53084 53871->53097 53872->53141 53873 7965e3 53878 79614e 53873->53878 53877 796622 53879 79616d 53878->53879 53880 796180 53879->53880 53884 796195 53879->53884 53898 792df6 14 API calls __Strcoll 53880->53898 53882 796185 53899 78453f 39 API calls __cftoe 53882->53899 53893 7962b5 53884->53893 53900 7a06f4 39 API calls 2 library calls 53884->53900 53885 796190 53885->53877 53895 7a0f5f 53885->53895 53887 796366 53904 78453f 39 API calls __cftoe 53887->53904 53890 796305 53890->53893 53901 7a06f4 39 API calls 2 library calls 53890->53901 53892 796323 53892->53893 53902 7a06f4 39 API calls 2 library calls 53892->53902 53893->53885 53903 792df6 14 API calls __Strcoll 53893->53903 53905 7a082c 53895->53905 53898->53882 53899->53885 53900->53890 53901->53892 53902->53893 53903->53887 53904->53885 53907 7a0838 __FrameHandler3::FrameUnwindToState 53905->53907 53906 7a083f 53925 792df6 14 API calls __Strcoll 53906->53925 53907->53906 53909 7a086a 53907->53909 53916 7a0ef1 53909->53916 53910 7a0844 53926 78453f 39 API calls __cftoe 53910->53926 53915 7a084e 53915->53877 53928 78f8e8 53916->53928 53921 7a0f27 53923 7a088e 53921->53923 53983 795b51 14 API calls 2 library calls 53921->53983 53927 7a08c1 LeaveCriticalSection __wsopen_s 53923->53927 53925->53910 53926->53915 53927->53915 53984 78a33e 53928->53984 53931 78f90c 53933 78f8cb 53931->53933 53996 78f819 53933->53996 53936 7a0f7f 54021 7a0ccd 53936->54021 53939 7a0fca 54039 79c55d 53939->54039 53940 7a0fb1 54053 792de3 14 API calls __Strcoll 53940->54053 53943 7a0fb6 54054 792df6 14 API calls __Strcoll 53943->54054 53945 7a0fd8 54055 792de3 14 API calls __Strcoll 53945->54055 53946 7a0fef 54052 7a0c38 CreateFileW 53946->54052 53950 7a0fc3 53950->53921 53951 7a0fdd 54056 792df6 14 API calls __Strcoll 53951->54056 53953 7a10a5 GetFileType 53955 7a10b0 GetLastError 53953->53955 53956 7a10f7 53953->53956 53954 7a107a GetLastError 54058 792d9c 14 API calls 2 library calls 53954->54058 54059 792d9c 14 API calls 2 library calls 53955->54059 54061 79c4a8 15 API calls 3 library calls 53956->54061 53957 7a1028 53957->53953 53957->53954 54057 7a0c38 CreateFileW 53957->54057 53961 7a10be CloseHandle 53961->53943 53964 7a10e7 53961->53964 53963 7a106d 53963->53953 53963->53954 54060 792df6 14 API calls __Strcoll 53964->54060 53965 7a1118 53967 7a1164 53965->53967 54062 7a0e47 73 API calls 4 library calls 53965->54062 53972 7a116b 53967->53972 54064 7a09e2 73 API calls 4 library calls 53967->54064 53968 7a10ec 53968->53943 53971 7a1199 53971->53972 53973 7a11a7 53971->53973 54063 795ce6 42 API calls 2 library calls 53972->54063 53973->53950 53975 7a1223 CloseHandle 53973->53975 54065 7a0c38 CreateFileW 53975->54065 53977 7a124e 53978 7a1258 GetLastError 53977->53978 53982 7a1284 53977->53982 54066 792d9c 14 API calls 2 library calls 53978->54066 53980 7a1264 54067 79c670 15 API calls 3 library calls 53980->54067 53982->53950 53983->53923 53985 78a35c 53984->53985 53991 78a355 53984->53991 53985->53991 53993 795866 39 API calls 3 library calls 53985->53993 53987 78a37d 53994 79756c 39 API calls __Getcoll 53987->53994 53989 78a393 53995 7975ca 39 API calls __cftoe 53989->53995 53991->53931 53992 798bf9 5 API calls std::_Locinfo::_Locinfo_dtor 53991->53992 53992->53931 53993->53987 53994->53989 53995->53991 53997 78f841 53996->53997 53998 78f827 53996->53998 54000 78f848 53997->54000 54001 78f867 53997->54001 54014 78f927 14 API calls ___free_lconv_mon 53998->54014 54002 78f831 54000->54002 54015 78f941 15 API calls __wsopen_s 54000->54015 54016 79ab62 MultiByteToWideChar __wsopen_s 54001->54016 54002->53921 54002->53936 54005 78f876 54006 78f87d GetLastError 54005->54006 54012 78f8a3 54005->54012 54019 78f941 15 API calls __wsopen_s 54005->54019 54017 792d9c 14 API calls 2 library calls 54006->54017 54008 78f889 54018 792df6 14 API calls __Strcoll 54008->54018 54012->54002 54020 79ab62 MultiByteToWideChar __wsopen_s 54012->54020 54013 78f8ba 54013->54002 54013->54006 54014->54002 54015->54002 54016->54005 54017->54008 54018->54002 54019->54012 54020->54013 54022 7a0cee 54021->54022 54023 7a0d08 54021->54023 54022->54023 54075 792df6 14 API calls __Strcoll 54022->54075 54068 7a0c5d 54023->54068 54025 7a0d40 54029 7a0d6f 54025->54029 54077 792df6 14 API calls __Strcoll 54025->54077 54027 7a0cfd 54076 78453f 39 API calls __cftoe 54027->54076 54038 7a0dc2 54029->54038 54079 790a87 39 API calls 2 library calls 54029->54079 54032 7a0dbd 54034 7a0e3a 54032->54034 54032->54038 54033 7a0d64 54078 78453f 39 API calls __cftoe 54033->54078 54080 78456c 11 API calls __InternalCxxFrameHandler 54034->54080 54037 7a0e46 54038->53939 54038->53940 54040 79c569 __FrameHandler3::FrameUnwindToState 54039->54040 54083 7924d5 EnterCriticalSection 54040->54083 54042 79c570 54044 79c595 54042->54044 54048 79c604 EnterCriticalSection 54042->54048 54051 79c5b7 54042->54051 54087 79c337 15 API calls 3 library calls 54044->54087 54047 79c59a 54047->54051 54088 79c485 EnterCriticalSection 54047->54088 54050 79c611 LeaveCriticalSection 54048->54050 54048->54051 54050->54042 54084 79c667 54051->54084 54052->53957 54053->53943 54054->53950 54055->53951 54056->53943 54057->53963 54058->53943 54059->53961 54060->53968 54061->53965 54062->53967 54063->53950 54064->53971 54065->53977 54066->53980 54067->53982 54070 7a0c75 54068->54070 54069 7a0c90 54069->54025 54070->54069 54081 792df6 14 API calls __Strcoll 54070->54081 54072 7a0cb4 54082 78453f 39 API calls __cftoe 54072->54082 54074 7a0cbf 54074->54025 54075->54027 54076->54023 54077->54033 54078->54029 54079->54032 54080->54037 54081->54072 54082->54074 54083->54042 54089 79251d LeaveCriticalSection 54084->54089 54086 79c5d7 54086->53945 54086->53946 54087->54047 54088->54051 54089->54086 54090 6bed3eb0 54095 6bed78d0 54090->54095 54093 6bed3f0e 54094 6bed3efa CloseHandle CloseHandle 54094->54093 54096 6bed3eca CreateProcessW 54095->54096 54096->54093 54096->54094 54097 6bed4a80 RegCreateKeyExW 54098 6bed4ad5 54097->54098 54099 6bed4ab2 RegSetValueExW RegCloseKey 54097->54099 54099->54098 54100 7846f5 54101 784701 __FrameHandler3::FrameUnwindToState 54100->54101 54102 784721 54101->54102 54105 784741 54101->54105 54122 792df6 14 API calls __Strcoll 54102->54122 54104 784726 54123 78453f 39 API calls __cftoe 54104->54123 54107 784731 54105->54107 54113 78e3b2 EnterCriticalSection 54105->54113 54109 784752 54114 7847c7 54109->54114 54112 78475e 54124 7847bd LeaveCriticalSection __fread_nolock 54112->54124 54113->54109 54115 7847db 54114->54115 54121 784845 54114->54121 54116 795b8b __fread_nolock 39 API calls 54115->54116 54117 7847e2 54116->54117 54117->54121 54125 792df6 14 API calls __Strcoll 54117->54125 54119 78483a 54126 78453f 39 API calls __cftoe 54119->54126 54121->54112 54122->54104 54123->54107 54124->54107 54125->54119 54126->54121 54127 799df4 54128 799e01 54127->54128 54132 799e19 54127->54132 54177 792df6 14 API calls __Strcoll 54128->54177 54130 799e06 54178 78453f 39 API calls __cftoe 54130->54178 54133 799e78 54132->54133 54141 799e11 54132->54141 54179 79a1e6 14 API calls 2 library calls 54132->54179 54135 795b8b __fread_nolock 39 API calls 54133->54135 54136 799e91 54135->54136 54147 79707a 54136->54147 54139 795b8b __fread_nolock 39 API calls 54140 799eca 54139->54140 54140->54141 54142 795b8b __fread_nolock 39 API calls 54140->54142 54143 799ed8 54142->54143 54143->54141 54144 795b8b __fread_nolock 39 API calls 54143->54144 54145 799ee6 54144->54145 54146 795b8b __fread_nolock 39 API calls 54145->54146 54146->54141 54148 797086 __FrameHandler3::FrameUnwindToState 54147->54148 54149 79708e 54148->54149 54152 7970a9 54148->54152 54246 792de3 14 API calls __Strcoll 54149->54246 54151 797093 54247 792df6 14 API calls __Strcoll 54151->54247 54153 7970c0 54152->54153 54156 7970fb 54152->54156 54248 792de3 14 API calls __Strcoll 54153->54248 54158 797119 54156->54158 54159 797104 54156->54159 54157 7970c5 54249 792df6 14 API calls __Strcoll 54157->54249 54180 79c485 EnterCriticalSection 54158->54180 54251 792de3 14 API calls __Strcoll 54159->54251 54163 79711f 54166 79713e 54163->54166 54167 797153 54163->54167 54164 7970cd 54250 78453f 39 API calls __cftoe 54164->54250 54165 797109 54252 792df6 14 API calls __Strcoll 54165->54252 54253 792df6 14 API calls __Strcoll 54166->54253 54181 797193 54167->54181 54172 797143 54254 792de3 14 API calls __Strcoll 54172->54254 54173 79714e 54255 79718b LeaveCriticalSection __wsopen_s 54173->54255 54176 79709b 54176->54139 54176->54141 54177->54130 54178->54141 54179->54133 54180->54163 54182 7971bd 54181->54182 54183 7971a5 54181->54183 54185 7974ff 54182->54185 54195 797200 54182->54195 54265 792de3 14 API calls __Strcoll 54183->54265 54284 792de3 14 API calls __Strcoll 54185->54284 54186 7971aa 54266 792df6 14 API calls __Strcoll 54186->54266 54189 797504 54285 792df6 14 API calls __Strcoll 54189->54285 54190 79720b 54267 792de3 14 API calls __Strcoll 54190->54267 54191 7971b2 54191->54173 54194 797210 54268 792df6 14 API calls __Strcoll 54194->54268 54195->54190 54195->54191 54198 79723b 54195->54198 54196 797218 54286 78453f 39 API calls __cftoe 54196->54286 54200 797254 54198->54200 54201 79728f 54198->54201 54202 797261 54198->54202 54200->54202 54207 79727d 54200->54207 54272 79751e 15 API calls 3 library calls 54201->54272 54269 792de3 14 API calls __Strcoll 54202->54269 54205 797266 54270 792df6 14 API calls __Strcoll 54205->54270 54256 7a12c9 54207->54256 54208 7972a0 54273 795b51 14 API calls 2 library calls 54208->54273 54210 7973db 54214 79744f 54210->54214 54217 7973f4 GetConsoleMode 54210->54217 54212 79726d 54271 78453f 39 API calls __cftoe 54212->54271 54216 797453 ReadFile 54214->54216 54215 7972a9 54274 795b51 14 API calls 2 library calls 54215->54274 54219 79746b 54216->54219 54220 7974c7 GetLastError 54216->54220 54217->54214 54221 797405 54217->54221 54219->54220 54225 797444 54219->54225 54223 79742b 54220->54223 54224 7974d4 54220->54224 54221->54216 54226 79740b ReadConsoleW 54221->54226 54222 7972b0 54227 7972ba 54222->54227 54228 7972d5 54222->54228 54243 797278 __fread_nolock 54223->54243 54278 792d9c 14 API calls 2 library calls 54223->54278 54282 792df6 14 API calls __Strcoll 54224->54282 54239 797490 54225->54239 54240 7974a7 54225->54240 54225->54243 54226->54225 54231 797425 GetLastError 54226->54231 54275 792df6 14 API calls __Strcoll 54227->54275 54277 796b40 41 API calls 2 library calls 54228->54277 54231->54223 54234 7974d9 54283 792de3 14 API calls __Strcoll 54234->54283 54236 7972bf 54276 792de3 14 API calls __Strcoll 54236->54276 54280 796ea5 44 API calls 4 library calls 54239->54280 54242 7974c0 54240->54242 54240->54243 54281 796ceb 42 API calls __fread_nolock 54242->54281 54279 795b51 14 API calls 2 library calls 54243->54279 54245 7974c5 54245->54243 54246->54151 54247->54176 54248->54157 54249->54164 54250->54176 54251->54165 54252->54164 54253->54172 54254->54173 54255->54176 54257 7a12e3 54256->54257 54258 7a12d6 54256->54258 54260 7a12ef 54257->54260 54288 792df6 14 API calls __Strcoll 54257->54288 54287 792df6 14 API calls __Strcoll 54258->54287 54260->54210 54262 7a12db 54262->54210 54263 7a1310 54289 78453f 39 API calls __cftoe 54263->54289 54265->54186 54266->54191 54267->54194 54268->54196 54269->54205 54270->54212 54271->54243 54272->54208 54273->54215 54274->54222 54275->54236 54276->54243 54277->54207 54278->54243 54279->54191 54280->54243 54281->54245 54282->54234 54283->54243 54284->54189 54285->54196 54286->54191 54287->54262 54288->54263 54289->54262
                                        APIs
                                          • Part of subcall function 00748A60: lstrlenW.KERNEL32(?,FFBCC9E0), ref: 00748A9A
                                          • Part of subcall function 00748A60: lstrcpyW.KERNEL32(00000000,?), ref: 00748ABC
                                          • Part of subcall function 00748A60: lstrlenW.KERNEL32(?), ref: 00748ACA
                                          • Part of subcall function 007486A0: lstrcmpW.KERNEL32(?), ref: 007486FF
                                          • Part of subcall function 007486A0: DialogBoxParamW.USER32(000003E9,00000000,007493C0,00000000), ref: 00748764
                                          • Part of subcall function 00747EC0: lstrlenW.KERNEL32(?,007AA988,00000000,00000000,?,?), ref: 00747F34
                                        • MessageBoxW.USER32(00000000,Usage :gup --helpgup -optionsgup [-verbose] [-vVERSION_VALUE] [-pCUSTOM_PARAM]gup -clean FOLDER_TO_ACTIONgup -unzipTo [-clea,GUP Command Argument Help,00000000), ref: 0074B3C1
                                        • DialogBoxParamW.USER32(000003EA,00000000,Function_00019580,00000000,gupOptions.xml), ref: 0074C8B8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: lstrlen$DialogParam$Messagelstrcmplstrcpy
                                        • String ID: is opened.Updater will close it in order to process the installation.Continue?$(:|$(:|$--help$-clean$-options$-unzipTo$-verbose$.backup4RestoreInCaseOfFailed$.exe$.zip$/closeRunningNpp /S /runNppAfterSilentInstall$0.0.0.0$<$@$@:|$@:|$An update package is available, do you want to download and install it?$Available version is :$Can't unzip:Operation not permitted or decompression failed$Current version is :$Download is stopped by user. Update is aborted.$GUP Command Argument Help$GUP_NativeLangue$MSGID_ABORTORNOT$MSGID_CLOSEAPP$MSGID_DOWNLOADSTOPPED$MSGID_UNZIPFAILED$MSGID_UPDATEAVAILABLE$MSGID_UPDATENEVER$MSGID_UPDATENo$MSGID_UPDATETITLE$MSGID_UPDATEYES$MSGID_UPDATEYESSILENT$MSGID_VERSIONCURRENT$MSGID_VERSIONNEW$Usage :gup --helpgup -optionsgup [-verbose] [-vVERSION_VALUE] [-pCUSTOM_PARAM]gup -clean FOLDER_TO_ACTIONgup -unzipTo [-clea$X:|$explorer.exe$gup.xml$gupOptions.xml$nativeLang.xml$open$p:|$^t
                                        • API String ID: 550644434-3411580215
                                        • Opcode ID: 454cb4ad4da23a2f15b1f769ae9930d3b49434f8ae1d0770787920921877ba06
                                        • Instruction ID: 68f8a7583d89595917a0c79d4264f94d8f1ceded05823d3856285f4d9ddd5d0a
                                        • Opcode Fuzzy Hash: 454cb4ad4da23a2f15b1f769ae9930d3b49434f8ae1d0770787920921877ba06
                                        • Instruction Fuzzy Hash: B9236DB0D01268DBDB25EB24CD99BEDB7B8AF54304F5041D9E509A3292DB386F88CF51
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ccfd59cbac37008b382aa5f69d17f215cbe88755c862350af0fab43e58b4431c
                                        • Instruction ID: 4bcb6ad1812098b442cbef348b0650aa77f87dda1091390c42e3bde439518ee5
                                        • Opcode Fuzzy Hash: ccfd59cbac37008b382aa5f69d17f215cbe88755c862350af0fab43e58b4431c
                                        • Instruction Fuzzy Hash: AD414E322102049FDF14DF1CE885A99BBA5EF4A371B199158F959CF3A2C739DD82CB90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 868 748080-7480ee call 780d80 curl_easy_init 871 7480f4-74810c 868->871 872 748571 868->872 873 7485b4 call 73eec0 871->873 874 748112-748118 871->874 875 748577-74857e 872->875 881 7485b9 call 78454f 873->881 877 74811c-748143 call 744220 874->877 878 74811a 874->878 879 748596 875->879 880 748580-748590 MessageBoxA 875->880 888 748145-74814b 877->888 889 748151-748161 877->889 878->877 883 748598-7485b3 call 766ca1 879->883 880->879 887 7485be call 78454f 881->887 896 7485c3-7485e0 call 78454f 887->896 892 74814d-74814f 888->892 893 748169-748183 call 7455e0 888->893 894 748166 889->894 895 748163 889->895 892->893 901 7482bc-7482c9 893->901 902 748189-7481c9 call 743600 893->902 894->893 895->894 905 7485e2-7485e6 call 73eed0 896->905 906 7485eb-7485ef 896->906 903 748252-74826c call 7503e0 901->903 904 7482cb-7482ec call 7441d0 901->904 913 7481cd-7481ee call 7455e0 902->913 914 7481cb 902->914 916 748270-748288 curl_easy_setopt 903->916 917 74826e 903->917 919 7482f4-748313 call 7455e0 904->919 920 7482ee 904->920 905->906 927 7481f6-748215 call 7455e0 913->927 928 7481f0 913->928 914->913 921 74828e-74829d 916->921 922 74834b-7483b6 curl_easy_setopt * 3 call 744110 call 7455e0 call 743320 916->922 917->916 935 748315 919->935 936 74831b-74833c call 7455e0 call 744450 919->936 920->919 925 748341-748348 call 766cdf 921->925 926 7482a3-7482b1 921->926 953 748456-74846e call 7503e0 922->953 954 7483bc-7483d4 call 7455e0 922->954 925->922 926->887 932 7482b7 926->932 942 748217-74822c 927->942 943 74824c 927->943 928->927 932->925 935->936 936->903 946 748242-748249 call 766cdf 942->946 947 74822e-74823c 942->947 943->903 946->943 947->881 947->946 961 748470 953->961 962 748472-74848a curl_easy_setopt 953->962 959 7483d6 954->959 960 7483d8-748405 call 7455e0 * 2 954->960 959->960 980 748407 960->980 981 74840c-74843d call 7455e0 * 2 960->981 961->962 964 74848c-74849b 962->964 965 7484bb-7484da curl_easy_setopt 962->965 967 7484b1-7484b8 call 766cdf 964->967 968 74849d-7484ab 964->968 969 748535-748559 curl_easy_setopt curl_easy_perform curl_easy_cleanup call 744450 965->969 970 7484dc-7484e3 965->970 967->965 968->896 968->967 975 74855e-74856b call 744450 969->975 970->969 974 7484e5-7484fc call 7503e0 970->974 985 748500-748532 curl_easy_setopt call 73bfb0 curl_easy_setopt * 2 974->985 986 7484fe 974->986 975->875 988 74856d-74856f 975->988 980->981 993 748445-748451 call 745760 981->993 994 74843f 981->994 985->969 986->985 988->883 993->953 994->993
                                        APIs
                                        • curl_easy_init.LIBCURL ref: 007480E5
                                        • curl_easy_setopt.LIBCURL(00000000,00002712,00000000,?version=,00000009), ref: 00748277
                                        • curl_easy_setopt.LIBCURL(00000000,00000034,00000001,?,?,?,?version=,00000009), ref: 00748350
                                        • curl_easy_setopt.LIBCURL(00000000,00004E2B,007485D0,00000000,00000034,00000001,?,?,?,?version=,00000009), ref: 00748360
                                        • curl_easy_setopt.LIBCURL(00000000,00002711,?,00000000,00004E2B,007485D0,00000000,00000034,00000001,?,?,?,?version=,00000009), ref: 00748371
                                        • curl_easy_setopt.LIBCURL(00000000,00002722,00000000,?,?,00000003,?), ref: 00748479
                                        • curl_easy_setopt.LIBCURL(00000000,0000271A,?,?,?,?,?,?,00000003,?), ref: 007484C8
                                        • curl_easy_setopt.LIBCURL(00000000,00002714,00000000,?,?,?,?,?,?,?,?,?,?,00000003,?), ref: 00748507
                                        • curl_easy_setopt.LIBCURL(00000000,0000003B,000000FF), ref: 00748523
                                        • curl_easy_setopt.LIBCURL(00000000,0000006F,000000EF,00000000,0000003B,000000FF), ref: 0074852D
                                        • curl_easy_setopt.LIBCURL(00000000,000000D8,00000003,?,?,?,?,?,?,?,?,00000003,?), ref: 0074853D
                                        • curl_easy_perform.LIBCURL(00000000,00000000,000000D8,00000003,?,?,?,?,?,?,?,?,00000003,?), ref: 00748543
                                        • curl_easy_cleanup.LIBCURL(00000000,00000000,00000000,000000D8,00000003,?,?,?,?,?,?,?,?,00000003,?), ref: 0074854B
                                        • MessageBoxA.USER32(00000000,?,curl error,00000000), ref: 00748590
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: curl_easy_setopt$Messagecurl_easy_cleanupcurl_easy_initcurl_easy_perform
                                        • String ID: &param=$5.3$?version=$curl error
                                        • API String ID: 118074606-4088956901
                                        • Opcode ID: 508a8ff07aea1b1699b5d909ceed3626688284c883364e212a5a106f2a336cf9
                                        • Instruction ID: 4d1f3ea45307b7f634b1fc4c75ce6d31a7646b50cd958223205247e4d1994fa7
                                        • Opcode Fuzzy Hash: 508a8ff07aea1b1699b5d909ceed3626688284c883364e212a5a106f2a336cf9
                                        • Instruction Fuzzy Hash: D2E1B471900218DBCB65DF64CC89FEDB3B4AB45700F004199FA49AB292EB789E94CF61

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1216 7a0f7f-7a0faf call 7a0ccd 1219 7a0fca-7a0fd6 call 79c55d 1216->1219 1220 7a0fb1-7a0fbc call 792de3 1216->1220 1226 7a0fd8-7a0fed call 792de3 call 792df6 1219->1226 1227 7a0fef-7a1038 call 7a0c38 1219->1227 1225 7a0fbe-7a0fc5 call 792df6 1220->1225 1234 7a12a4-7a12a8 1225->1234 1226->1225 1236 7a103a-7a1043 1227->1236 1237 7a10a5-7a10ae GetFileType 1227->1237 1238 7a107a-7a10a0 GetLastError call 792d9c 1236->1238 1239 7a1045-7a1049 1236->1239 1240 7a10b0-7a10e1 GetLastError call 792d9c CloseHandle 1237->1240 1241 7a10f7-7a10fa 1237->1241 1238->1225 1239->1238 1243 7a104b-7a1078 call 7a0c38 1239->1243 1240->1225 1255 7a10e7-7a10f2 call 792df6 1240->1255 1246 7a10fc-7a1101 1241->1246 1247 7a1103-7a1109 1241->1247 1243->1237 1243->1238 1248 7a110d-7a115b call 79c4a8 1246->1248 1247->1248 1249 7a110b 1247->1249 1258 7a117a-7a11a2 call 7a09e2 1248->1258 1259 7a115d-7a1169 call 7a0e47 1248->1259 1249->1248 1255->1225 1266 7a11a7-7a11e8 1258->1266 1267 7a11a4-7a11a5 1258->1267 1259->1258 1265 7a116b 1259->1265 1268 7a116d-7a1175 call 795ce6 1265->1268 1269 7a11ea-7a11ee 1266->1269 1270 7a1209-7a1217 1266->1270 1267->1268 1268->1234 1269->1270 1271 7a11f0-7a1204 1269->1271 1272 7a121d-7a1221 1270->1272 1273 7a12a2 1270->1273 1271->1270 1272->1273 1275 7a1223-7a1256 CloseHandle call 7a0c38 1272->1275 1273->1234 1279 7a128a-7a129e 1275->1279 1280 7a1258-7a1284 GetLastError call 792d9c call 79c670 1275->1280 1279->1273 1280->1279
                                        APIs
                                          • Part of subcall function 007A0C38: CreateFileW.KERNEL32(?,00000000,?,007A1028,?,?,00000000,?,007A1028,?,0000000C), ref: 007A0C55
                                        • GetLastError.KERNEL32 ref: 007A1093
                                        • __dosmaperr.LIBCMT ref: 007A109A
                                        • GetFileType.KERNEL32(00000000), ref: 007A10A6
                                        • GetLastError.KERNEL32 ref: 007A10B0
                                        • __dosmaperr.LIBCMT ref: 007A10B9
                                        • CloseHandle.KERNEL32(00000000), ref: 007A10D9
                                        • CloseHandle.KERNEL32(?), ref: 007A1226
                                        • GetLastError.KERNEL32 ref: 007A1258
                                        • __dosmaperr.LIBCMT ref: 007A125F
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                        • String ID:
                                        • API String ID: 4237864984-0
                                        • Opcode ID: 9c7c7cabb9f2392fff27d6e80199664fdcb2b617804f49e59daa5fc27903a0bc
                                        • Instruction ID: eff437937b4db03278e6e1281c0b2c8e9359225759203c4106358f0479a97074
                                        • Opcode Fuzzy Hash: 9c7c7cabb9f2392fff27d6e80199664fdcb2b617804f49e59daa5fc27903a0bc
                                        • Instruction Fuzzy Hash: 36A13732A141549FDF199F68EC55BAE3BB1AB87320F18024DF811EB391D7398C52CB95

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1285 797193-7971a3 1286 7971bd-7971bf 1285->1286 1287 7971a5-7971b8 call 792de3 call 792df6 1285->1287 1289 7974ff-79750c call 792de3 call 792df6 1286->1289 1290 7971c5-7971cb 1286->1290 1304 797517 1287->1304 1309 797512 call 78453f 1289->1309 1290->1289 1293 7971d1-7971fa 1290->1293 1293->1289 1296 797200-797209 1293->1296 1297 79720b-79721e call 792de3 call 792df6 1296->1297 1298 797223-797225 1296->1298 1297->1309 1302 7974fb-7974fd 1298->1302 1303 79722b-79722f 1298->1303 1306 79751a-79751d 1302->1306 1303->1302 1308 797235-797239 1303->1308 1304->1306 1308->1297 1311 79723b-797252 1308->1311 1309->1304 1314 797254-797257 1311->1314 1315 797287-79728d 1311->1315 1318 797259-79725f 1314->1318 1319 79727d-797285 1314->1319 1316 79728f-797296 1315->1316 1317 797261-797278 call 792de3 call 792df6 call 78453f 1315->1317 1321 797298 1316->1321 1322 79729a-7972b8 call 79751e call 795b51 * 2 1316->1322 1348 797432 1317->1348 1318->1317 1318->1319 1320 7972fa-797319 1319->1320 1324 79731f-79732b 1320->1324 1325 7973d5-7973de call 7a12c9 1320->1325 1321->1322 1358 7972ba-7972d0 call 792df6 call 792de3 1322->1358 1359 7972d5-7972f8 call 796b40 1322->1359 1324->1325 1329 797331-797333 1324->1329 1337 79744f 1325->1337 1338 7973e0-7973f2 1325->1338 1329->1325 1333 797339-79735a 1329->1333 1333->1325 1339 79735c-797372 1333->1339 1341 797453-797469 ReadFile 1337->1341 1338->1337 1343 7973f4-797403 GetConsoleMode 1338->1343 1339->1325 1344 797374-797376 1339->1344 1346 79746b-797471 1341->1346 1347 7974c7-7974d2 GetLastError 1341->1347 1343->1337 1349 797405-797409 1343->1349 1344->1325 1350 797378-79739b 1344->1350 1346->1347 1354 797473 1346->1354 1352 7974eb-7974ee 1347->1352 1353 7974d4-7974e6 call 792df6 call 792de3 1347->1353 1356 797435-79743f call 795b51 1348->1356 1349->1341 1355 79740b-797423 ReadConsoleW 1349->1355 1350->1325 1357 79739d-7973b3 1350->1357 1365 79742b-797431 call 792d9c 1352->1365 1366 7974f4-7974f6 1352->1366 1353->1348 1361 797476-797488 1354->1361 1363 797425 GetLastError 1355->1363 1364 797444-79744d 1355->1364 1356->1306 1357->1325 1368 7973b5-7973b7 1357->1368 1358->1348 1359->1320 1361->1356 1371 79748a-79748e 1361->1371 1363->1365 1364->1361 1365->1348 1366->1356 1368->1325 1375 7973b9-7973d0 1368->1375 1379 797490-7974a0 call 796ea5 1371->1379 1380 7974a7-7974b4 1371->1380 1375->1325 1390 7974a3-7974a5 1379->1390 1385 7974c0-7974c5 call 796ceb 1380->1385 1386 7974b6 call 796ffc 1380->1386 1391 7974bb-7974be 1385->1391 1386->1391 1390->1356 1391->1390
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 22ae94140f657551f066c40bb49fa46a1bc6bf5380c6164ddbc17645d9ee6174
                                        • Instruction ID: 85a295df3babe40df313d0a49f877457b36b47fd1f643a14d39ab2df267259b4
                                        • Opcode Fuzzy Hash: 22ae94140f657551f066c40bb49fa46a1bc6bf5380c6164ddbc17645d9ee6174
                                        • Instruction Fuzzy Hash: ADB10570A18288AFDF19DFA8E881BBE7BB1BF46310F144158E4009B292D7799D42CB64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1393 6bed3eb0-6bed3ef8 call 6bed78d0 CreateProcessW 1396 6bed3f0e-6bed3f11 1393->1396 1397 6bed3efa-6bed3f08 CloseHandle * 2 1393->1397 1397->1396
                                        APIs
                                        • CreateProcessW.KERNEL32(00000000,cmd.exe /C echo HiddenProcess,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 6BED3EEB
                                        • CloseHandle.KERNEL32(?), ref: 6BED3EFE
                                        • CloseHandle.KERNEL32(?), ref: 6BED3F08
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2292258011.000000006BEB1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BEB0000, based on PE: true
                                        • Associated: 00000006.00000002.2292241036.000000006BEB0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292289619.000000006BEE6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292309996.000000006BEF4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292425687.000000006C109000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292558037.000000006C35B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292594857.000000006C35C000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_6beb0000_GUP.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseHandle$CreateProcess
                                        • String ID: D$cmd.exe /C echo HiddenProcess
                                        • API String ID: 2922976086-260405473
                                        • Opcode ID: d40c3cd9822c6279a114857f3d8efebb75619760a0eb1a2666786a91c65dc2fa
                                        • Instruction ID: b702ac21adb8482f7e3798f85ef364c29e40c65a22fb8986e99430a55fc49721
                                        • Opcode Fuzzy Hash: d40c3cd9822c6279a114857f3d8efebb75619760a0eb1a2666786a91c65dc2fa
                                        • Instruction Fuzzy Hash: 4AF01DB1A40308AFEB20DBE09C0AFAD7738AB04B05F200104F7067A1C0D7B4B605CB65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1398 6bed4a80-6bed4ab0 RegCreateKeyExW 1399 6bed4ad5-6bed4ad8 1398->1399 1400 6bed4ab2-6bed4acf RegSetValueExW RegCloseKey 1398->1400 1400->1399
                                        APIs
                                        • RegCreateKeyExW.KERNEL32(80000001,Software\MyApp\TempKey,00000000,00000000,00000000,00020006,00000000,?,00000000), ref: 6BED4AA3
                                        • RegSetValueExW.KERNEL32(?,TempValue,00000000,00000004,00000000,00000004), ref: 6BED4AC5
                                        • RegCloseKey.ADVAPI32(?), ref: 6BED4ACF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2292258011.000000006BEB1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BEB0000, based on PE: true
                                        • Associated: 00000006.00000002.2292241036.000000006BEB0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292289619.000000006BEE6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292309996.000000006BEF4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292425687.000000006C109000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292558037.000000006C35B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292594857.000000006C35C000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_6beb0000_GUP.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseCreateValue
                                        • String ID: Software\MyApp\TempKey$TempValue
                                        • API String ID: 1818849710-1576047821
                                        • Opcode ID: aa7b8a1b15455c4adf8a40eb352558a6465efd76273f82f9d1fc29762ca33529
                                        • Instruction ID: 79a7d793e09726f1c544c24f137bba36b4d01fe302986449b4bfcbd58df48a41
                                        • Opcode Fuzzy Hash: aa7b8a1b15455c4adf8a40eb352558a6465efd76273f82f9d1fc29762ca33529
                                        • Instruction Fuzzy Hash: 1BF01274A80318BFEF20DB908C4AF997779A704B15F200544BB02761C4D7F47A558769

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1401 796a5f-796a77 call 79c701 1404 796a79-796a80 1401->1404 1405 796a8d-796aa3 SetFilePointerEx 1401->1405 1406 796a87-796a8b 1404->1406 1407 796ab8-796ac2 1405->1407 1408 796aa5-796ab6 GetLastError call 792dbf 1405->1408 1410 796ade-796ae1 1406->1410 1407->1406 1409 796ac4-796ad9 1407->1409 1408->1406 1409->1410
                                        APIs
                                        • SetFilePointerEx.KERNEL32(00000000,00000000,007846E4,00000000,00000002,00000000,00000000,00000000,00000000,Fx,00796B99,00000000,?,Fx,00000002,00000000), ref: 00796A9B
                                        • GetLastError.KERNEL32(00000000,?,00799C7D,00000000,00000000,00000000,00000002,007846E4,00000000,00000000,?,0073E60C,?,00784604,0073E60C,?), ref: 00796AA8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: ErrorFileLastPointer
                                        • String ID: Fx
                                        • API String ID: 2976181284-483165457
                                        • Opcode ID: 9938175cdc8b00ea7f253a991898fda17c3dd0372318be0ab3464f00c360f736
                                        • Instruction ID: a6d4a715810a36e52a4cf8164b01bc995a9950247894ebf288c4f0c099a2bf6e
                                        • Opcode Fuzzy Hash: 9938175cdc8b00ea7f253a991898fda17c3dd0372318be0ab3464f00c360f736
                                        • Instruction Fuzzy Hash: AC01D272610515AFCF05CF69EC09DAE3B69EB85320B288208F811AB291E679ED51CBD0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1482 795d16-795d2a call 79c701 1485 795d2c-795d2e 1482->1485 1486 795d30-795d38 1482->1486 1487 795d7e-795d9e call 79c670 1485->1487 1488 795d3a-795d41 1486->1488 1489 795d43-795d46 1486->1489 1497 795db0 1487->1497 1498 795da0-795dae call 792dbf 1487->1498 1488->1489 1490 795d4e-795d62 call 79c701 * 2 1488->1490 1491 795d48-795d4c 1489->1491 1492 795d64-795d74 call 79c701 CloseHandle 1489->1492 1490->1485 1490->1492 1491->1490 1491->1492 1492->1485 1504 795d76-795d7c GetLastError 1492->1504 1502 795db2-795db5 1497->1502 1498->1502 1504->1487
                                        APIs
                                        • CloseHandle.KERNEL32(00000000,00000000,CF830579,?,00795BFD,00000000,CF830579,007BFF10,0000000C,00795CB9,0078469A,?), ref: 00795D6C
                                        • GetLastError.KERNEL32(?,00795BFD,00000000,CF830579,007BFF10,0000000C,00795CB9,0078469A,?), ref: 00795D76
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: CloseErrorHandleLast
                                        • String ID: 06e
                                        • API String ID: 918212764-1877882912
                                        • Opcode ID: f11b569432eea38fb1c4477e77b1cc1ccaea021b4e96f9d1f5c47de351aed4ba
                                        • Instruction ID: 31256e7d687211a81787aa9631464c99c44c5ee3a783504346aca1a4ddd6b4c1
                                        • Opcode Fuzzy Hash: f11b569432eea38fb1c4477e77b1cc1ccaea021b4e96f9d1f5c47de351aed4ba
                                        • Instruction Fuzzy Hash: 1111293270493067DE236674BCCD76D27559B83734F290249F8048B1D2DB2D9C818355

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1575 78509b-7850a8 1576 7850aa-7850cd call 7844c2 1575->1576 1577 7850d2-7850e6 call 795b8b 1575->1577 1582 785239-78523b 1576->1582 1583 7850e8 1577->1583 1584 7850eb-7850f4 call 796b22 1577->1584 1583->1584 1586 7850f9-785108 1584->1586 1587 785118-785121 1586->1587 1588 78510a 1586->1588 1591 785123-785130 1587->1591 1592 785135-785169 1587->1592 1589 785110-785112 1588->1589 1590 7851e2-7851e7 1588->1590 1589->1587 1589->1590 1593 785237-785238 1590->1593 1594 785235 1591->1594 1595 78516b-785175 1592->1595 1596 7851c6-7851d2 1592->1596 1593->1582 1594->1593 1597 78519c-7851a8 1595->1597 1598 785177-785183 1595->1598 1599 7851e9-7851ec 1596->1599 1600 7851d4-7851db 1596->1600 1597->1599 1602 7851aa-7851c4 call 7855b2 1597->1602 1598->1597 1601 785185-785197 call 785407 1598->1601 1603 7851ef-7851f7 1599->1603 1600->1590 1601->1593 1602->1603 1606 7851f9-7851ff 1603->1606 1607 785233 1603->1607 1610 785201-785215 call 78523c 1606->1610 1611 785217-78521b 1606->1611 1607->1594 1610->1593 1612 78521d-78522b call 7a5930 1611->1612 1613 78522e-785230 1611->1613 1612->1613 1613->1607
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: cVx
                                        • API String ID: 0-133148599
                                        • Opcode ID: 157d5542b766162758047ecbf84cafd18d09039370da79f05eee85f888635f5d
                                        • Instruction ID: 25b77752bd6bc2b1fef718113d556d545a53fce5e8c6d17d8865e1d3111ae9f3
                                        • Opcode Fuzzy Hash: 157d5542b766162758047ecbf84cafd18d09039370da79f05eee85f888635f5d
                                        • Instruction Fuzzy Hash: CC519374A40608EFDF14EF58CC89AA97FB2EF49324F288158E8499B252D775DE41CB90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1618 7965e3-796609 call 79614e 1621 79660b-79661d call 7a0f5f 1618->1621 1622 796662-796665 1618->1622 1624 796622-796627 1621->1624 1624->1622 1625 796629-796661 1624->1625
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: __wsopen_s
                                        • String ID:
                                        • API String ID: 3347428461-0
                                        • Opcode ID: 4844ae01fd0b260788dee2d70dbc29f4758d96f24b20a56041b7a2c541f609e1
                                        • Instruction ID: e98f09cea1558874bd5ab4eacd2ec907f78f703d04128d4b1e66e9a460ad8d2c
                                        • Opcode Fuzzy Hash: 4844ae01fd0b260788dee2d70dbc29f4758d96f24b20a56041b7a2c541f609e1
                                        • Instruction Fuzzy Hash: 60112A71A0410AAFCF05DF58E945D9B7BF9EF48304F054159F809EB251D634EE25CB64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1626 79751e-79752a 1627 79755c-797567 call 792df6 1626->1627 1628 79752c-79752e 1626->1628 1636 797569-79756b 1627->1636 1629 797530-797531 1628->1629 1630 797547-797558 RtlAllocateHeap 1628->1630 1629->1630 1632 79755a 1630->1632 1633 797533-79753a call 7922e7 1630->1633 1632->1636 1633->1627 1638 79753c-797545 call 78f9c9 1633->1638 1638->1627 1638->1630
                                        APIs
                                        • RtlAllocateHeap.NTDLL(00000000,?,?,?,007311B0,?), ref: 00797550
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: AllocateHeap
                                        • String ID:
                                        • API String ID: 1279760036-0
                                        • Opcode ID: 60c1899d2bc212eed1a50dce630413f8c65bd4eb52dd4f607812c261099c1a96
                                        • Instruction ID: 2f73bbe1a0116ed47d940ed9b70f469a9579006604f191b4ab1b39476c8fde9c
                                        • Opcode Fuzzy Hash: 60c1899d2bc212eed1a50dce630413f8c65bd4eb52dd4f607812c261099c1a96
                                        • Instruction Fuzzy Hash: 67E06521169212BBDF6537697C05B5B3A49DF413B0F578121FC0596192DB1CDC20D6E5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1641 7a0c38-7a0c5c CreateFileW
                                        APIs
                                        • CreateFileW.KERNEL32(?,00000000,?,007A1028,?,?,00000000,?,007A1028,?,0000000C), ref: 007A0C55
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: CreateFile
                                        • String ID:
                                        • API String ID: 823142352-0
                                        • Opcode ID: 6856c38a86113bd51940b4eca1f2692a4871111905d85dc4133bfe24fef40186
                                        • Instruction ID: de0effdef972f9d367878281f2a15580849257586b83a3145e1952032e8fe161
                                        • Opcode Fuzzy Hash: 6856c38a86113bd51940b4eca1f2692a4871111905d85dc4133bfe24fef40186
                                        • Instruction Fuzzy Hash: 1AD06C3200010DBBDF128F84DD06EDA3BAAFB88714F018000BA1856020D736E821EB95

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1642 731066-731080 SetWindowsHookExW call 766f5a 1644 731085-731086 1642->1644
                                        APIs
                                        • SetWindowsHookExW.USER32(00000004,Function_00014FE0,00000000), ref: 00731070
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: HookWindows
                                        • String ID:
                                        • API String ID: 2559412058-0
                                        • Opcode ID: 5fbc8ed7bd69d4086af814a0920ebae06f2233c54e93683453cdb047fce32710
                                        • Instruction ID: 8a38ee09642367994f6306250d9e115a6867c7df73823353eaa0cd74e6b80ec6
                                        • Opcode Fuzzy Hash: 5fbc8ed7bd69d4086af814a0920ebae06f2233c54e93683453cdb047fce32710
                                        • Instruction Fuzzy Hash: E3C08CF0280300AAD60017603C0BF9422106380B02F204105B70A480D0C7BC5028821C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 'z$'z
                                        • API String ID: 0-1980562239
                                        • Opcode ID: 45468e45ab8a165942ea38b9536c6f797f4e9bb33eac9e20965c121ace4b64dc
                                        • Instruction ID: c664da69a1e59ae9ad020d4a3bf9b3db4bd50e3b2be5df91bcc76d3b4909c18d
                                        • Opcode Fuzzy Hash: 45468e45ab8a165942ea38b9536c6f797f4e9bb33eac9e20965c121ace4b64dc
                                        • Instruction Fuzzy Hash: 25025A71E412199BDF15DFA9D8806AEBBF1FF48314F248269D919E7340D735A9018BA0
                                        APIs
                                          • Part of subcall function 00795866: GetLastError.KERNEL32(00000000,00000000,0079C1C3), ref: 0079586A
                                          • Part of subcall function 00795866: SetLastError.KERNEL32(00000000,00000000,00000004,00000008,000000FF), ref: 0079590C
                                        • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 0079EA0F
                                        • IsValidCodePage.KERNEL32(00000000), ref: 0079EA4D
                                        • IsValidLocale.KERNEL32(?,00000001), ref: 0079EA60
                                        • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 0079EAA8
                                        • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 0079EAC3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                        • String ID: LW{
                                        • API String ID: 415426439-3035418257
                                        • Opcode ID: 6bfcdc4f65796b69e647a20a48cee57d8df607c44ff2bfe2fdaa687e6e9e3907
                                        • Instruction ID: 37b829623869f71e4ca87412334f6315e15ac9563802751671edba2f4e0ea9a8
                                        • Opcode Fuzzy Hash: 6bfcdc4f65796b69e647a20a48cee57d8df607c44ff2bfe2fdaa687e6e9e3907
                                        • Instruction Fuzzy Hash: 0B516D71A00615EFDF20DFA5EC45ABA77B8FF44700F048529F901E7191E778A944CB62
                                        APIs
                                        • GetLocaleInfoW.KERNEL32(?,2000000B,=y,00000002,00000000,?,?,?,0079EA3D,?,00000000), ref: 0079E7C4
                                        • GetLocaleInfoW.KERNEL32(?,20001004,=y,00000002,00000000,?,?,?,0079EA3D,?,00000000), ref: 0079E7ED
                                        • GetACP.KERNEL32(?,?,0079EA3D,?,00000000), ref: 0079E802
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: InfoLocale
                                        • String ID: =y$ACP$OCP
                                        • API String ID: 2299586839-1416475334
                                        • Opcode ID: 22e6692e84fd18e3a6f759793de69c494803ee4c8ee72271f93b08afcb080057
                                        • Instruction ID: af180c62d2fdff07a5d6f07fca0565526463e51e8e8ef252ead9ec10e81c6f0f
                                        • Opcode Fuzzy Hash: 22e6692e84fd18e3a6f759793de69c494803ee4c8ee72271f93b08afcb080057
                                        • Instruction Fuzzy Hash: 41219526600100FAEF34CFE4E905FA773A7EB54B61B568474E909D7204E73ADD81C352
                                        APIs
                                          • Part of subcall function 00795866: GetLastError.KERNEL32(00000000,00000000,0079C1C3), ref: 0079586A
                                          • Part of subcall function 00795866: SetLastError.KERNEL32(00000000,00000000,00000004,00000008,000000FF), ref: 0079590C
                                        • GetACP.KERNEL32(?,?,?,?,?,?,00791367,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 0079E051
                                        • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00791367,?,?,?,00000055,?,-00000050,?,?), ref: 0079E088
                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 0079E1EB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: ErrorLast$CodeInfoLocalePageValid
                                        • String ID: LW{$utf8
                                        • API String ID: 607553120-3162132393
                                        • Opcode ID: 6c00886cdce27b2c41e7c8d19bd0675263bc4bd0a23815147c6321e871cc28aa
                                        • Instruction ID: c32948cfda0f9529990c536034639f13890de844fa119c60a3f0b273beef9943
                                        • Opcode Fuzzy Hash: 6c00886cdce27b2c41e7c8d19bd0675263bc4bd0a23815147c6321e871cc28aa
                                        • Instruction Fuzzy Hash: F0711472A00606EADF25EB74EC4ABAA73A8EF45710F240529F615D7181FBBCED408761
                                        APIs
                                        • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00767842
                                        • IsDebuggerPresent.KERNEL32 ref: 0076790E
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00767927
                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 00767931
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                        • String ID:
                                        • API String ID: 254469556-0
                                        • Opcode ID: a3b3a1884eb5b8124e5b3fcec157c8ea34e9c1b7c054352de566018fe70e9a93
                                        • Instruction ID: f6d3dc413879b3c13d7a6a71987c01cc1b5913c07a44c60a07732a8be1f70048
                                        • Opcode Fuzzy Hash: a3b3a1884eb5b8124e5b3fcec157c8ea34e9c1b7c054352de566018fe70e9a93
                                        • Instruction Fuzzy Hash: E1310575D05218EADB61EFA4D8497CDBBB8BF08304F1081AAE40DAB250EB749A84CF45
                                        APIs
                                        • std::_Xinvalid_argument.LIBCPMT ref: 0074F8A8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Xinvalid_argumentstd::_
                                        • String ID: bad conversion$^t
                                        • API String ID: 909987262-827438407
                                        • Opcode ID: eafb0a16b86a806a9c6823dcfaa699804106209098181a07e14c4a57bbf02e76
                                        • Instruction ID: 8e0add34065421746edaf971f8415ec03612940122e2f0433af152e471e67703
                                        • Opcode Fuzzy Hash: eafb0a16b86a806a9c6823dcfaa699804106209098181a07e14c4a57bbf02e76
                                        • Instruction Fuzzy Hash: 0E026C71E00219DFCB04DFA8C885AEDBBB5FF49314F24412AE515EB751E738A985CB90
                                        APIs
                                        • curl_easy_init.LIBCURL ref: 00746FD1
                                        • CreateThread.KERNEL32(00000000,00000000,00748750,00000000,00000000,00000000), ref: 00746FE7
                                        • curl_easy_setopt.LIBCURL(00000000,00002712,00000000), ref: 00747019
                                        • curl_easy_setopt.LIBCURL(00000000,00000034,00000001), ref: 00747031
                                        • curl_easy_setopt.LIBCURL(00000000,00004E2B,00747B70,00000000,00000034,00000001), ref: 00747041
                                        • curl_easy_setopt.LIBCURL(00000000,00002711,00000000,00000000,00004E2B,00747B70,00000000,00000034,00000001), ref: 0074704D
                                        • curl_easy_setopt.LIBCURL(00000000,0000002B,00000000,00000000,00002711,00000000,00000000,00004E2B,00747B70,00000000,00000034,00000001), ref: 00747057
                                        • curl_easy_setopt.LIBCURL(00000000,00004E58,00749D20,00000000,0000002B,00000000,00000000,00002711,00000000,00000000,00004E2B,00747B70,00000000,00000034,00000001), ref: 00747067
                                        • curl_easy_setopt.LIBCURL(00000000,00002749,00000000,00004E58,00749D20,00000000,0000002B,00000000,00000000,00002711,00000000,00000000,00004E2B,00747B70,00000000,00000034), ref: 00747078
                                        • curl_easy_setopt.LIBCURL(00000000,00002722,00000000), ref: 007470A3
                                        • curl_easy_setopt.LIBCURL(00000000,0000271A,?), ref: 007470C3
                                        • curl_easy_setopt.LIBCURL(00000000,00002714,00000000), ref: 007470F9
                                        • curl_easy_setopt.LIBCURL(00000000,0000003B,000000FF), ref: 00747112
                                        • curl_easy_setopt.LIBCURL(00000000,0000006F,000000EF,00000000,0000003B,000000FF), ref: 0074711C
                                        • curl_easy_setopt.LIBCURL(00000000,000000D8,00000003), ref: 0074712C
                                        • curl_easy_perform.LIBCURL(00000000,00000000,000000D8,00000003), ref: 00747132
                                        • curl_easy_cleanup.LIBCURL(00000000,00000000,00000000,000000D8,00000003), ref: 0074713A
                                        • MessageBoxW.USER32(?,The plugin package is not found.,Plugin cannot be found,?), ref: 007471DA
                                        • PathFindFileNameW.SHLWAPI(?,?,?), ref: 007473AB
                                        • MessageBoxW.USER32(00000000,?,Plugin package hash mismatched,00000000), ref: 00747506
                                        • MessageBoxA.USER32(00000000,?,curl error,00000000), ref: 00747551
                                        • MessageBoxW.USER32(00000000,?,?,00000000), ref: 0074757B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: curl_easy_setopt$Message$CreateFileFindNamePathThreadcurl_easy_cleanupcurl_easy_initcurl_easy_perform
                                        • String ID: <> Found:$This plugin won't be installed.$" is not correct. Expected:$%02x$Plugin cannot be found$Plugin package hash mismatched$The hash of plugin package "$The plugin package is not found.$curl error
                                        • API String ID: 729063368-1193151834
                                        • Opcode ID: 5830479304e62a3198805bc18ec5baa936fc15d24bb67b71742dbe11209b878d
                                        • Instruction ID: c0a0721dcc9c34d65e0895db764288a6e5bfa306f7ced3f4b754c2d48d8a915b
                                        • Opcode Fuzzy Hash: 5830479304e62a3198805bc18ec5baa936fc15d24bb67b71742dbe11209b878d
                                        • Instruction Fuzzy Hash: A40270B1D44258EBDB24EF24CD49BEDB7B4AB55304F0041D9E909A7282EB785F84CFA1
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00775958
                                        • int.LIBCPMT ref: 00775B4B
                                        • int.LIBCPMT ref: 00775BA1
                                        • int.LIBCPMT ref: 00775BE6
                                        • int.LIBCPMT ref: 00775C29
                                        • int.LIBCPMT ref: 00775C95
                                        • int.LIBCPMT ref: 00775D16
                                          • Part of subcall function 00774B78: __Getctype.LIBCPMT ref: 00774B87
                                          • Part of subcall function 00770EDC: __EH_prolog3.LIBCMT ref: 00770EE3
                                          • Part of subcall function 00770EDC: std::_Lockit::_Lockit.LIBCPMT ref: 00770EED
                                          • Part of subcall function 00770EDC: int.LIBCPMT ref: 00770F04
                                          • Part of subcall function 00771006: __EH_prolog3.LIBCMT ref: 0077100D
                                          • Part of subcall function 00771006: std::_Lockit::_Lockit.LIBCPMT ref: 00771017
                                          • Part of subcall function 00771006: int.LIBCPMT ref: 0077102E
                                          • Part of subcall function 0077125A: __EH_prolog3.LIBCMT ref: 00771261
                                          • Part of subcall function 0077125A: std::_Lockit::_Lockit.LIBCPMT ref: 0077126B
                                          • Part of subcall function 0077125A: int.LIBCPMT ref: 00771282
                                          • Part of subcall function 0077125A: std::_Lockit::~_Lockit.LIBCPMT ref: 007712DC
                                          • Part of subcall function 007711C5: __EH_prolog3.LIBCMT ref: 007711CC
                                          • Part of subcall function 007711C5: std::_Lockit::_Lockit.LIBCPMT ref: 007711D6
                                          • Part of subcall function 007711C5: int.LIBCPMT ref: 007711ED
                                          • Part of subcall function 007711C5: std::_Lockit::~_Lockit.LIBCPMT ref: 00771247
                                          • Part of subcall function 0076AB18: __EH_prolog3.LIBCMT ref: 0076AB1F
                                          • Part of subcall function 0076AB18: std::_Lockit::_Lockit.LIBCPMT ref: 0076AB29
                                          • Part of subcall function 0076AB18: std::_Lockit::~_Lockit.LIBCPMT ref: 0076ABD0
                                        • numpunct.LIBCPMT ref: 00775D3D
                                          • Part of subcall function 007719E5: __EH_prolog3.LIBCMT ref: 007719EC
                                          • Part of subcall function 00771702: __EH_prolog3.LIBCMT ref: 00771709
                                          • Part of subcall function 00771702: std::_Lockit::_Lockit.LIBCPMT ref: 00771713
                                          • Part of subcall function 00771702: int.LIBCPMT ref: 0077172A
                                          • Part of subcall function 00771702: std::_Lockit::~_Lockit.LIBCPMT ref: 00771784
                                          • Part of subcall function 0077182C: __EH_prolog3.LIBCMT ref: 00771833
                                          • Part of subcall function 0077182C: std::_Lockit::_Lockit.LIBCPMT ref: 0077183D
                                          • Part of subcall function 0077182C: int.LIBCPMT ref: 00771854
                                          • Part of subcall function 0077182C: std::_Lockit::~_Lockit.LIBCPMT ref: 007718AE
                                          • Part of subcall function 0076AB18: Concurrency::cancel_current_task.LIBCPMT ref: 0076ABDB
                                          • Part of subcall function 0076AB18: __EH_prolog3.LIBCMT ref: 0076ABE8
                                          • Part of subcall function 00770A34: __EH_prolog3.LIBCMT ref: 00770A3B
                                          • Part of subcall function 00770A34: std::_Lockit::_Lockit.LIBCPMT ref: 00770A45
                                          • Part of subcall function 00770A34: int.LIBCPMT ref: 00770A5C
                                          • Part of subcall function 00770A34: std::_Lockit::~_Lockit.LIBCPMT ref: 00770AB6
                                        • int.LIBCPMT ref: 00775D65
                                        • int.LIBCPMT ref: 00775975
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • int.LIBCPMT ref: 007759DB
                                        • int.LIBCPMT ref: 00775A20
                                        • int.LIBCPMT ref: 00775A63
                                        • int.LIBCPMT ref: 00775AE7
                                        • __Getcoll.LIBCPMT ref: 00775B0D
                                        • int.LIBCPMT ref: 00775DC9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$H_prolog3$Lockit::_$Lockit::~_$Concurrency::cancel_current_taskGetcollGetctypenumpunct
                                        • String ID: \A|$`A|$dA|$hA|$lA|$pA|$tA|$xA|$|A|
                                        • API String ID: 2958531307-1867378249
                                        • Opcode ID: c4e098c3fb54a9e6830c3744563ea207737525455c9e91b165faaf628fc21958
                                        • Instruction ID: 5193d945cf14d66f5f741e3d8832ecaaa6e59d67fb8050b046b17672ae608ac8
                                        • Opcode Fuzzy Hash: c4e098c3fb54a9e6830c3744563ea207737525455c9e91b165faaf628fc21958
                                        • Instruction Fuzzy Hash: EDD1F6B1D00715EBDF216BA4885AA7F7AA5EF81390F14C92DF85D67241EBBC8D0087E1
                                        APIs
                                        • SetWindowTextW.USER32(?,?), ref: 0074A73A
                                        • lstrcmpW.KERNEL32(?,id_download), ref: 0074AB35
                                        • lstrcmpW.KERNEL32(?,id_moreinfo), ref: 0074AB52
                                        • ShellExecuteW.SHELL32(00000000,open,https://npp-user-manual.org/docs/upgrading/#new-version-available-but-auto-updater-find-nothing,00000000,00000000,00000001), ref: 0074AB68
                                        • EndDialog.USER32(?,?), ref: 0074AB70
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: lstrcmp$DialogExecuteShellTextWindow
                                        • String ID: $MSGID_DOWNLOADPAGE$$$MSGID_MOREINFO$$</a>$<a id="id_download">$<a id="id_moreinfo">$MSGID_DOWNLOADPAGE$MSGID_GOTODOWNLOADPAGETEXT$MSGID_MOREINFO$https://notepad-plus-plus.org/downloads/$https://npp-user-manual.org/docs/upgrading/#new-version-available-but-auto-updater-find-nothing$id_download$id_moreinfo$open
                                        • API String ID: 1981440648-1039618901
                                        • Opcode ID: 17160f3c7f2dca0e7c1faced2da600825d79ff8698d2ab080fbd49a4bb5ddcce
                                        • Instruction ID: bfaf32da213a6509c3edfaf845c0caba7ce5ab6ede55cf75a36746401f3b1175
                                        • Opcode Fuzzy Hash: 17160f3c7f2dca0e7c1faced2da600825d79ff8698d2ab080fbd49a4bb5ddcce
                                        • Instruction Fuzzy Hash: E1E192B0D00208EFDB14DFA4DD85BEDBBB8EF49300F10416AE515E7292D7789A84CB61
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0077DF27
                                          • Part of subcall function 0077CBFE: __EH_prolog3_GS.LIBCMT ref: 0077CC05
                                          • Part of subcall function 0077CBFE: __Getcoll.LIBCPMT ref: 0077CC69
                                        • __Getcoll.LIBCPMT ref: 0077DF76
                                          • Part of subcall function 0077CA62: __EH_prolog3.LIBCMT ref: 0077CA69
                                          • Part of subcall function 0077CA62: std::_Lockit::_Lockit.LIBCPMT ref: 0077CA73
                                          • Part of subcall function 0077CA62: int.LIBCPMT ref: 0077CA8A
                                          • Part of subcall function 0077CA62: std::_Lockit::~_Lockit.LIBCPMT ref: 0077CAE4
                                          • Part of subcall function 0076AB18: __EH_prolog3.LIBCMT ref: 0076AB1F
                                          • Part of subcall function 0076AB18: std::_Lockit::_Lockit.LIBCPMT ref: 0076AB29
                                          • Part of subcall function 0076AB18: std::_Lockit::~_Lockit.LIBCPMT ref: 0076ABD0
                                        • int.LIBCPMT ref: 0077DF50
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • int.LIBCPMT ref: 0077DFB4
                                        • int.LIBCPMT ref: 0077E00A
                                        • int.LIBCPMT ref: 0077E04F
                                        • int.LIBCPMT ref: 0077E092
                                        • int.LIBCPMT ref: 0077E0FE
                                        • int.LIBCPMT ref: 0077E17F
                                        • numpunct.LIBCPMT ref: 0077E1A6
                                        • int.LIBCPMT ref: 0077E1CE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$H_prolog3Lockit::_Lockit::~_$Getcoll$H_prolog3_numpunct
                                        • String ID: B|$$B|$(B|$,B|$0B|$4B|$8B|
                                        • API String ID: 3873313002-1485173696
                                        • Opcode ID: 99ed7485f2f6b0eaa808a4c8a8b19acbddeacc631ac374bf6119a9e66a00e14e
                                        • Instruction ID: eb3f4c3cec23ff65d055a6676ac259a0e2329d2dfef64e622c2f1a855b46663a
                                        • Opcode Fuzzy Hash: 99ed7485f2f6b0eaa808a4c8a8b19acbddeacc631ac374bf6119a9e66a00e14e
                                        • Instruction Fuzzy Hash: 8F91FCB1D00215EEDF216BB4481AA7F76B9FF853A0F10C56DF85EA7241DA7C8D0087A2
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00775486
                                        • int.LIBCPMT ref: 00775679
                                        • int.LIBCPMT ref: 007756CF
                                        • int.LIBCPMT ref: 00775714
                                        • int.LIBCPMT ref: 00775757
                                        • int.LIBCPMT ref: 007757C3
                                        • int.LIBCPMT ref: 00775844
                                          • Part of subcall function 00774B78: __Getctype.LIBCPMT ref: 00774B87
                                          • Part of subcall function 00770E47: __EH_prolog3.LIBCMT ref: 00770E4E
                                          • Part of subcall function 00770E47: std::_Lockit::_Lockit.LIBCPMT ref: 00770E58
                                          • Part of subcall function 00770E47: int.LIBCPMT ref: 00770E6F
                                          • Part of subcall function 00770F71: __EH_prolog3.LIBCMT ref: 00770F78
                                          • Part of subcall function 00770F71: std::_Lockit::_Lockit.LIBCPMT ref: 00770F82
                                          • Part of subcall function 00770F71: int.LIBCPMT ref: 00770F99
                                          • Part of subcall function 00771130: __EH_prolog3.LIBCMT ref: 00771137
                                          • Part of subcall function 00771130: std::_Lockit::_Lockit.LIBCPMT ref: 00771141
                                          • Part of subcall function 00771130: int.LIBCPMT ref: 00771158
                                          • Part of subcall function 00771130: std::_Lockit::~_Lockit.LIBCPMT ref: 007711B2
                                          • Part of subcall function 0077109B: __EH_prolog3.LIBCMT ref: 007710A2
                                          • Part of subcall function 0077109B: std::_Lockit::_Lockit.LIBCPMT ref: 007710AC
                                          • Part of subcall function 0077109B: int.LIBCPMT ref: 007710C3
                                          • Part of subcall function 0076AB18: __EH_prolog3.LIBCMT ref: 0076AB1F
                                          • Part of subcall function 0076AB18: std::_Lockit::_Lockit.LIBCPMT ref: 0076AB29
                                          • Part of subcall function 0076AB18: std::_Lockit::~_Lockit.LIBCPMT ref: 0076ABD0
                                        • numpunct.LIBCPMT ref: 0077586B
                                          • Part of subcall function 007719B2: __EH_prolog3.LIBCMT ref: 007719B9
                                          • Part of subcall function 0077166D: __EH_prolog3.LIBCMT ref: 00771674
                                          • Part of subcall function 0077166D: std::_Lockit::_Lockit.LIBCPMT ref: 0077167E
                                          • Part of subcall function 0077166D: int.LIBCPMT ref: 00771695
                                          • Part of subcall function 0077166D: std::_Lockit::~_Lockit.LIBCPMT ref: 007716EF
                                          • Part of subcall function 00771797: __EH_prolog3.LIBCMT ref: 0077179E
                                          • Part of subcall function 00771797: std::_Lockit::_Lockit.LIBCPMT ref: 007717A8
                                          • Part of subcall function 00771797: int.LIBCPMT ref: 007717BF
                                          • Part of subcall function 00771797: std::_Lockit::~_Lockit.LIBCPMT ref: 00771819
                                          • Part of subcall function 0076AB18: Concurrency::cancel_current_task.LIBCPMT ref: 0076ABDB
                                          • Part of subcall function 0076AB18: __EH_prolog3.LIBCMT ref: 0076ABE8
                                          • Part of subcall function 0077099F: __EH_prolog3.LIBCMT ref: 007709A6
                                          • Part of subcall function 0077099F: std::_Lockit::_Lockit.LIBCPMT ref: 007709B0
                                          • Part of subcall function 0077099F: int.LIBCPMT ref: 007709C7
                                          • Part of subcall function 0077099F: std::_Lockit::~_Lockit.LIBCPMT ref: 00770A21
                                        • int.LIBCPMT ref: 00775893
                                        • int.LIBCPMT ref: 007754A3
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • int.LIBCPMT ref: 00775509
                                        • int.LIBCPMT ref: 0077554E
                                        • int.LIBCPMT ref: 00775591
                                        • int.LIBCPMT ref: 00775615
                                        • __Getcoll.LIBCPMT ref: 0077563B
                                        • int.LIBCPMT ref: 007758F7
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$H_prolog3$Lockit::_$Lockit::~_$Concurrency::cancel_current_taskGetcollGetctypenumpunct
                                        • String ID:
                                        • API String ID: 2958531307-0
                                        • Opcode ID: 54582613772d3cb153265deea8112badabddea343f57c881713596284facfc80
                                        • Instruction ID: 355f6dbe7f99e52edeea5d8508ecc4c0c9073f759952e179b95f276bb2ab42e1
                                        • Opcode Fuzzy Hash: 54582613772d3cb153265deea8112badabddea343f57c881713596284facfc80
                                        • Instruction Fuzzy Hash: 7ED1F8B1D00615EBDF116BB4881AA7F7BA6EF907A0F54C41DF85E67241EABC8D0087D2
                                        APIs
                                        • PathFileExistsW.SHLWAPI(?,\Notepad++,0000000A), ref: 0074795D
                                        • SimpleUString::operator=.MSOBJ140-MSVCRT ref: 00747AD2
                                        • MessageBoxW.USER32(00000000,?,?,00000010), ref: 00747AFA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: ExistsFileMessagePathSimpleString::operator=
                                        • String ID: AppData$Can't find any folder for downloading.Please check your environment variables"%TMP%", "%TEMP%" and "%APPDATA%"$MSGID_NODOWNLOADFOLDER$TEMP$TMP$\Notepad++$^t
                                        • API String ID: 1960100283-1928378560
                                        • Opcode ID: 87a709ff76dfe1f30a28c5f8f04a5aabadbdeb7f0133ef85306f5c7e4aa621e6
                                        • Instruction ID: c0e635505414036f6583b051b95eda7f92106e2666d536b1a8f6c8a66f700970
                                        • Opcode Fuzzy Hash: 87a709ff76dfe1f30a28c5f8f04a5aabadbdeb7f0133ef85306f5c7e4aa621e6
                                        • Instruction Fuzzy Hash: B3B16DB1D00208DFCB18DFA8D855BAEBBF5BF88310F14852DE45AE7641E738A945CB61
                                        APIs
                                        • GetCurrentThreadId.KERNEL32 ref: 6BECDF29
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2292258011.000000006BEB1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BEB0000, based on PE: true
                                        • Associated: 00000006.00000002.2292241036.000000006BEB0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292289619.000000006BEE6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292309996.000000006BEF4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292425687.000000006C109000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292558037.000000006C35B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292594857.000000006C35C000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_6beb0000_GUP.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentThread
                                        • String ID: 4$9$H$L.$N$P$d$t
                                        • API String ID: 2882836952-3246358163
                                        • Opcode ID: ecf5a35b2e81a17f7d2c0b433ac65e776b65fe46d51b056defd758c49a0e68ae
                                        • Instruction ID: 5a6831937ee15d0fc1caae4858da2db9aee9dbb17f2e3f29005bcb2bbdfeb021
                                        • Opcode Fuzzy Hash: ecf5a35b2e81a17f7d2c0b433ac65e776b65fe46d51b056defd758c49a0e68ae
                                        • Instruction Fuzzy Hash: 91516AB0D052A88EDB11CF68D9543DEBFB5BF9A304F1080EAE158AB341D3794A85CF56
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0077876A
                                          • Part of subcall function 00770BF3: __EH_prolog3.LIBCMT ref: 00770BFA
                                          • Part of subcall function 00770BF3: std::_Lockit::_Lockit.LIBCPMT ref: 00770C04
                                          • Part of subcall function 00770BF3: int.LIBCPMT ref: 00770C1B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: H_prolog3$LockitLockit::_std::_
                                        • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                        • API String ID: 2181796688-2891247106
                                        • Opcode ID: e5a8fd0b7fbedefb86b158c4991ec272591d7ad52951c1a68aae9d8ba53a50b3
                                        • Instruction ID: 3ac1aa0549040cf96075c958721ee18ee14940ea05568710354815fff1e4414f
                                        • Opcode Fuzzy Hash: e5a8fd0b7fbedefb86b158c4991ec272591d7ad52951c1a68aae9d8ba53a50b3
                                        • Instruction Fuzzy Hash: 9DC194B2540109EFCF58DF98CD5DDFA77B8FB09340F15811AFA0AA6151EA34DA10CB62
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0077EAD4
                                          • Part of subcall function 0073B390: std::_Lockit::_Lockit.LIBCPMT ref: 0073B3BD
                                          • Part of subcall function 0073B390: std::_Lockit::_Lockit.LIBCPMT ref: 0073B3E0
                                          • Part of subcall function 0073B390: std::_Lockit::~_Lockit.LIBCPMT ref: 0073B400
                                          • Part of subcall function 0073B390: std::_Lockit::~_Lockit.LIBCPMT ref: 0073B48D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                        • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                        • API String ID: 1383202999-2891247106
                                        • Opcode ID: 009017c3b6ac86ebef4322f55e3ad4b6a1ec1c74c020704462e2f8fc59ccb154
                                        • Instruction ID: 64056dd1041d56e3abb98907eb19b38d7f1304a07dacd514eb9b0d63c10f45f3
                                        • Opcode Fuzzy Hash: 009017c3b6ac86ebef4322f55e3ad4b6a1ec1c74c020704462e2f8fc59ccb154
                                        • Instruction Fuzzy Hash: 9CC1A2B6500109AFDF19DF58CD95DFE3BE8EB0D380F148559FA0AA6251D638DE10CB21
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00778B5A
                                          • Part of subcall function 00770C88: __EH_prolog3.LIBCMT ref: 00770C8F
                                          • Part of subcall function 00770C88: std::_Lockit::_Lockit.LIBCPMT ref: 00770C99
                                          • Part of subcall function 00770C88: int.LIBCPMT ref: 00770CB0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: H_prolog3$LockitLockit::_std::_
                                        • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                        • API String ID: 2181796688-2891247106
                                        • Opcode ID: e24d8d6b2c784ef32d69d589417f4dd821dd12309bf8236f4187ac880ea56a58
                                        • Instruction ID: c0b2aea51619069b7bb25253cc188d4d0e569095946043cbdce07182c4c0b9ff
                                        • Opcode Fuzzy Hash: e24d8d6b2c784ef32d69d589417f4dd821dd12309bf8236f4187ac880ea56a58
                                        • Instruction Fuzzy Hash: 27C1A37294010AEBCF68DF58CD5DDFB37A9EB09340F148519FA4AE6151DA38DE10CB62
                                        APIs
                                        • _ValidateLocalCookies.LIBCMT ref: 6BED7AF7
                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 6BED7AFF
                                        • _ValidateLocalCookies.LIBCMT ref: 6BED7B88
                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 6BED7BB3
                                        • _ValidateLocalCookies.LIBCMT ref: 6BED7C08
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2292258011.000000006BEB1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BEB0000, based on PE: true
                                        • Associated: 00000006.00000002.2292241036.000000006BEB0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292289619.000000006BEE6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292309996.000000006BEF4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292425687.000000006C109000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292558037.000000006C35B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292594857.000000006C35C000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_6beb0000_GUP.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                        • String ID: 5mk$csm$csm
                                        • API String ID: 1170836740-1169753632
                                        • Opcode ID: a26419bb06e15eae5397556dec9b0e989170e37890d44d51014dc3775200fd8b
                                        • Instruction ID: 1b3f878ec9b057237793774c6e3d10ae0cb69ea40ab2b00fc956e483ef8f48c5
                                        • Opcode Fuzzy Hash: a26419bb06e15eae5397556dec9b0e989170e37890d44d51014dc3775200fd8b
                                        • Instruction Fuzzy Hash: 3D517334A002099FCF04DF68C844B9E7BB6FF45319F6081A9E9259B391D7B9DA13CB91
                                        APIs
                                        • Sleep.KERNEL32(000003E8), ref: 00749D48
                                        • SendMessageW.USER32(00000403,00000000,00000000), ref: 00749D69
                                        • SendMessageW.USER32(00000404,?,00000000), ref: 00749DEA
                                        • SendMessageW.USER32(00000405,00000000,00000000), ref: 00749DFB
                                        • SetWindowTextW.USER32(?), ref: 00749E3C
                                        • SendMessageW.USER32(00000111,00000001,00000000), ref: 00749E57
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: MessageSend$SleepTextWindow
                                        • String ID: (:|$Downloading %s: %Iu %%
                                        • API String ID: 3045854461-888542592
                                        • Opcode ID: 9800e9cb2e34273f241f399e52c82ccbf83531db283bfb8d16fa56d2fd756451
                                        • Instruction ID: 936fd0aeff8be5cf6c2bb4796b460f9ad4d1c2a2fa15de9db6347061176ce9da
                                        • Opcode Fuzzy Hash: 9800e9cb2e34273f241f399e52c82ccbf83531db283bfb8d16fa56d2fd756451
                                        • Instruction Fuzzy Hash: 78314F71E40228B7DB21AF21ED05F9A7BB8FB44710F11C099F784665A0DB795AA4CF88
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 00774BCD
                                        • _Maklocstr.LIBCPMT ref: 00774C36
                                        • _Maklocstr.LIBCPMT ref: 00774C48
                                        • _Maklocchr.LIBCPMT ref: 00774C60
                                        • _Maklocchr.LIBCPMT ref: 00774C70
                                        • _Getvals.LIBCPMT ref: 00774C92
                                          • Part of subcall function 0076E2A3: _Maklocchr.LIBCPMT ref: 0076E2D2
                                          • Part of subcall function 0076E2A3: _Maklocchr.LIBCPMT ref: 0076E2E8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Maklocchr$Maklocstr$GetvalsH_prolog3_
                                        • String ID: false$true
                                        • API String ID: 3549167292-2658103896
                                        • Opcode ID: 31084af4b23d38a610b780df0ed9bce30f5400b86ffa54c2eb5c31c6ab532629
                                        • Instruction ID: f068891baeb249c779e5d2c6ab0d9bbd2c44ea373b3f47355f2246b8f3982f72
                                        • Opcode Fuzzy Hash: 31084af4b23d38a610b780df0ed9bce30f5400b86ffa54c2eb5c31c6ab532629
                                        • Instruction Fuzzy Hash: 1E216DB2D00358EADF15AFA4D849ADE7B78AF05710F00815AB9099F182DF788940CBB1
                                        APIs
                                        • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00780022
                                        • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 00780030
                                        • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00780041
                                        • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 00780052
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: AddressProc$HandleModule
                                        • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                        • API String ID: 667068680-1247241052
                                        • Opcode ID: d5f7d53b2f65d7a4a844cdb05d3084e65b77b32e516470341e9438475d335ce7
                                        • Instruction ID: 048b82c6b31eb4d295b1c20929cdee0d7d21fe446398ba443388e7a61b836a04
                                        • Opcode Fuzzy Hash: d5f7d53b2f65d7a4a844cdb05d3084e65b77b32e516470341e9438475d335ce7
                                        • Instruction Fuzzy Hash: CEE0ECB15463A4BB87009FB1FC2EDE63BB8FB8A721780C016B401D2160D77C5440CB9A
                                        APIs
                                        • EndDialog.USER32(?,?), ref: 007495B9
                                        • GetDlgItemTextW.USER32(?,000003EB,?,00000104), ref: 007495D6
                                        • GetDlgItemInt.USER32(?,000003EC,00000000,00000000), ref: 00749610
                                        • EndDialog.USER32(?,00000001), ref: 0074961E
                                        • SetDlgItemTextW.USER32(?,000003EB,0.0.0.0), ref: 00749653
                                        • SetDlgItemInt.USER32(?,000003EC,00000000), ref: 00749667
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Item$DialogText
                                        • String ID: 0.0.0.0
                                        • API String ID: 1417051379-3771769585
                                        • Opcode ID: 75f8e05bb8408cf1e5a1b27b6d6c8962520315a8122c39f4c657267d6f28d025
                                        • Instruction ID: 1bd9987e1ef5375cb90d4d4eacd3f53fa5c583a0f83d399868d2fd09da656a94
                                        • Opcode Fuzzy Hash: 75f8e05bb8408cf1e5a1b27b6d6c8962520315a8122c39f4c657267d6f28d025
                                        • Instruction Fuzzy Hash: C721B071600108ABDB11EF68DC4AFEF3768EB45300F008259FA06965D1DBBEAA10CB5A
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: MaklocchrMaklocstr$H_prolog3_
                                        • String ID: false$true
                                        • API String ID: 2404127365-2658103896
                                        • Opcode ID: b6daaa8e223c0c1459c259461bb7348067f3417e1412544585bc993d317d8c12
                                        • Instruction ID: 6cec3a3b627d5e83e4af3543ed87b2e67152f90d251b0b8e42b686afd2adfa41
                                        • Opcode Fuzzy Hash: b6daaa8e223c0c1459c259461bb7348067f3417e1412544585bc993d317d8c12
                                        • Instruction Fuzzy Hash: 2A213DB5D00388EADF14EFA5D84999EBBB8AF45700F00815AF9159F252EB78D540CB71
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0076A1AE
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0076A1B8
                                        • int.LIBCPMT ref: 0076A1CF
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • numpunct.LIBCPMT ref: 0076A1F2
                                        • std::_Facet_Register.LIBCPMT ref: 0076A209
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0076A229
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registernumpunct
                                        • String ID: d?|
                                        • API String ID: 743221004-2985471429
                                        • Opcode ID: 902c444c8b8282d1990a366c9b4a7e1af642f3b4a62bc4c103a27a7b90cbebac
                                        • Instruction ID: 4843025f2943e941f63580c3762e9541b1e97ff69f03b73a3add299743eaded4
                                        • Opcode Fuzzy Hash: 902c444c8b8282d1990a366c9b4a7e1af642f3b4a62bc4c103a27a7b90cbebac
                                        • Instruction Fuzzy Hash: 1F01A132D00116EBCB05EB64D859AAD77B6BFC5310F24850CE81267291DF3C9E02CB52
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00771261
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0077126B
                                        • int.LIBCPMT ref: 00771282
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • moneypunct.LIBCPMT ref: 007712A5
                                        • std::_Facet_Register.LIBCPMT ref: 007712BC
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 007712DC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                        • String ID: |A|
                                        • API String ID: 419941038-310053749
                                        • Opcode ID: 758b40487340c573506d48a2dd2326f12fb7dfee24b6a5e52767a2e0dc295471
                                        • Instruction ID: 53177a94326bd3a444a4512e7f9a38b4b52368c49b5f317c5659dbc887856d60
                                        • Opcode Fuzzy Hash: 758b40487340c573506d48a2dd2326f12fb7dfee24b6a5e52767a2e0dc295471
                                        • Instruction Fuzzy Hash: C5012672A00115DBCF05EBA4C859ABD77A6BFC4310F648409F816A7282DF3C9E01CB81
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 007715DF
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 007715E9
                                        • int.LIBCPMT ref: 00771600
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • numpunct.LIBCPMT ref: 00771623
                                        • std::_Facet_Register.LIBCPMT ref: 0077163A
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0077165A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registernumpunct
                                        • String ID: hA|
                                        • API String ID: 743221004-156500185
                                        • Opcode ID: 85dc940abb0c93d72c13be06fcb19c58d3d404692c9da696185c187029f1da9d
                                        • Instruction ID: d8c6bcd433845d7848e51d63bba4e577aeb6d71b29330a6bd17178bdb83a0078
                                        • Opcode Fuzzy Hash: 85dc940abb0c93d72c13be06fcb19c58d3d404692c9da696185c187029f1da9d
                                        • Instruction Fuzzy Hash: C4010031900119DFCF05EBA4C869AAD77B2BF81350F688508E815A7281DF3D9E01CB81
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0077C6EB
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0077C6F5
                                        • int.LIBCPMT ref: 0077C70C
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • messages.LIBCPMT ref: 0077C72F
                                        • std::_Facet_Register.LIBCPMT ref: 0077C746
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0077C766
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermessages
                                        • String ID: B|
                                        • API String ID: 2750803064-1559269218
                                        • Opcode ID: 1c726cfaf21e1cdce51706330dd00426378917eb69e57b2c7e6482efb1ec11e2
                                        • Instruction ID: 80af84a0ed1d756ea41b812fe067d6d02bb2816ff3b3619d4ec3f0cb170e2945
                                        • Opcode Fuzzy Hash: 1c726cfaf21e1cdce51706330dd00426378917eb69e57b2c7e6482efb1ec11e2
                                        • Instruction Fuzzy Hash: 4001C435900115DBDF0AEB64D85AAADB7B6FF84750F24850CF815A7291DF3C9E01CB91
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0077C8AA
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0077C8B4
                                        • int.LIBCPMT ref: 0077C8CB
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • moneypunct.LIBCPMT ref: 0077C8EE
                                        • std::_Facet_Register.LIBCPMT ref: 0077C905
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0077C925
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                        • String ID: 0B|
                                        • API String ID: 419941038-1087777810
                                        • Opcode ID: a577b47879bfa7d68e032713f000d10e7e18f6bb0e4da28641973cb190f9ed06
                                        • Instruction ID: 51279b83acf80cdfbe8f0aa4294cebeeb543c91918c5eab67b7e910aec55d36f
                                        • Opcode Fuzzy Hash: a577b47879bfa7d68e032713f000d10e7e18f6bb0e4da28641973cb190f9ed06
                                        • Instruction Fuzzy Hash: E5012231900515DBCF06EB60D85AAADB7B6BFC8320F24850CF816A7281DF3C9E01CB81
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0077C93F
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0077C949
                                        • int.LIBCPMT ref: 0077C960
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • moneypunct.LIBCPMT ref: 0077C983
                                        • std::_Facet_Register.LIBCPMT ref: 0077C99A
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0077C9BA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                        • String ID: ,B|
                                        • API String ID: 419941038-1441428998
                                        • Opcode ID: 52f428a045b6e9ff9de7f609093825091fb59504a2ffcd92dbd8d2a6e99c5226
                                        • Instruction ID: a021d260065b63ac7e948f298bcc38a48a2de156a9def673c78e68ad663dea51
                                        • Opcode Fuzzy Hash: 52f428a045b6e9ff9de7f609093825091fb59504a2ffcd92dbd8d2a6e99c5226
                                        • Instruction Fuzzy Hash: 52010432900115DBCF06EBA4C85AABD77A2BF88350F24850DF81567291DF3C9E01CB91
                                        APIs
                                        • GetConsoleOutputCP.KERNEL32(FFBCC9E0,00000000,00000000,007846E4), ref: 00799351
                                          • Part of subcall function 0079B90B: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,007987C2,?,00000000,-00000008), ref: 0079B96C
                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 007995A3
                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 007995E9
                                        • GetLastError.KERNEL32 ref: 0079968C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                        • String ID: Fx$Fx
                                        • API String ID: 2112829910-1866101241
                                        • Opcode ID: ff4ddb90ddacb1254c2599d92c0027c9ee830a162eaf4de95aa87c263d753dfb
                                        • Instruction ID: fa3767ab0bb60d182422fc2ec91c7670995a2462a6885fc736952860bf832d2a
                                        • Opcode Fuzzy Hash: ff4ddb90ddacb1254c2599d92c0027c9ee830a162eaf4de95aa87c263d753dfb
                                        • Instruction Fuzzy Hash: FBD18BB5D00258DFDF15CFA8E8809EDBBB4FF49300F24856EE556EB251D634A942CB50
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: _strrchr
                                        • String ID:
                                        • API String ID: 3213747228-0
                                        • Opcode ID: 1292b4344b8cbd0f9a7173a655dd7d6fcee73348a648dd9e1cdd4dc8e59592c4
                                        • Instruction ID: 689dda64e13294b14b4e6f73b815a2803cd31571f902e595329f5fb2d55433bc
                                        • Opcode Fuzzy Hash: 1292b4344b8cbd0f9a7173a655dd7d6fcee73348a648dd9e1cdd4dc8e59592c4
                                        • Instruction Fuzzy Hash: 23B16932A28355DFDF19CF68DC86BAE7BA5EF55320F148155E904AF382D278AD01C7A0
                                        APIs
                                        • type_info::operator==.LIBVCRUNTIME ref: 00783373
                                        • ___TypeMatch.LIBVCRUNTIME ref: 00783481
                                        • CallUnexpected.LIBVCRUNTIME ref: 007835EE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: CallMatchTypeUnexpectedtype_info::operator==
                                        • String ID: csm$csm$csm
                                        • API String ID: 1206542248-393685449
                                        • Opcode ID: 7e95d5370dd3cdac2540ea5bd74b5bcfb7c69d0aa5cf23b68b5a647996bac622
                                        • Instruction ID: 2198cd768fdd05a0ed13900e93b3bb709030bb79e6b3dd897d54b8f6cdcc00f4
                                        • Opcode Fuzzy Hash: 7e95d5370dd3cdac2540ea5bd74b5bcfb7c69d0aa5cf23b68b5a647996bac622
                                        • Instruction Fuzzy Hash: D0B18C71880209EFCF15FFA8C8899AEBBB5FF04B11F14415AE8156B212D739DB61CB91
                                        APIs
                                          • Part of subcall function 00767F8D: __EH_prolog3.LIBCMT ref: 00767F94
                                          • Part of subcall function 00767F8D: std::_Lockit::_Lockit.LIBCPMT ref: 00767F9F
                                          • Part of subcall function 00767F8D: std::locale::_Setgloballocale.LIBCPMT ref: 00767FBA
                                          • Part of subcall function 00767F8D: _Yarn.LIBCPMT ref: 00767FD0
                                          • Part of subcall function 00767F8D: std::_Lockit::~_Lockit.LIBCPMT ref: 0076800D
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0074D8F5
                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0074D93D
                                          • Part of subcall function 0076808B: _Yarn.LIBCPMT ref: 007680AA
                                          • Part of subcall function 0076808B: _Yarn.LIBCPMT ref: 007680CE
                                        • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0074D972
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0074DA07
                                        • std::locale::_Locimp::_New_Locimp.LIBCPMT ref: 0074DA31
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0074DA51
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0074DA72
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_Yarn$Locinfo::_std::locale::_$H_prolog3LocimpLocimp::_Locinfo_ctorLocinfo_dtorNew_Setgloballocale
                                        • String ID:
                                        • API String ID: 3466485411-0
                                        • Opcode ID: f33df2cfb4743208b6dbe7799ef55b184f403c2fae18d27002553f425b3821b6
                                        • Instruction ID: 505fa258c251e7f56839889f2271e8c19d67d93ffed5d17346f2acfc0d6b4027
                                        • Opcode Fuzzy Hash: f33df2cfb4743208b6dbe7799ef55b184f403c2fae18d27002553f425b3821b6
                                        • Instruction Fuzzy Hash: 55914BB0A04245DFDB15DFA4C889B9ABBF4FF14304F148169E849AB282E779DD44CBA1
                                        APIs
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0073EBB1
                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0073EBFD
                                        • __Getctype.LIBCPMT ref: 0073EC1A
                                        • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0073EC5B
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0073ECF0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                        • String ID: bad locale name
                                        • API String ID: 1840309910-1405518554
                                        • Opcode ID: a801cae393665a2308a4f9ca3b147b6ead1941ddb5c1c3f097e618075d8157dc
                                        • Instruction ID: 331d68d62225b7c65643e651aa44aab0c9101f967b49cd981afe00bef60ad257
                                        • Opcode Fuzzy Hash: a801cae393665a2308a4f9ca3b147b6ead1941ddb5c1c3f097e618075d8157dc
                                        • Instruction Fuzzy Hash: 7F512AB1D00258DFEF11DFA4C949B8EBBB4BF04314F148565E809A7382E779A909CBA1
                                        APIs
                                        • _ValidateLocalCookies.LIBCMT ref: 00781687
                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 0078168F
                                        • _ValidateLocalCookies.LIBCMT ref: 00781718
                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00781743
                                        • _ValidateLocalCookies.LIBCMT ref: 00781798
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                        • String ID: csm
                                        • API String ID: 1170836740-1018135373
                                        • Opcode ID: b957cf7a86e9f551547f4ce90a88c5f4edf5a724564cfbb4a42e2fdd5cc6d155
                                        • Instruction ID: b3c59b79d8654d9eb4836a53abe8233e0dc178b844e24b2890e82d0d9f62ecb6
                                        • Opcode Fuzzy Hash: b957cf7a86e9f551547f4ce90a88c5f4edf5a724564cfbb4a42e2fdd5cc6d155
                                        • Instruction Fuzzy Hash: E941D634A40209DBCF10EF68C884A9E7BB9FF45324F548159E815AB352D739EE12CB91
                                        APIs
                                        • SetDlgItemTextW.USER32(?,000003F0,?), ref: 0074B140
                                        • SetWindowTextW.USER32(?,?), ref: 0074B154
                                        • SetDlgItemTextW.USER32(?,00000002,?), ref: 0074B16F
                                        • SetDlgItemTextW.USER32(?,00000006,?), ref: 0074B186
                                        • SetDlgItemTextW.USER32(?,00000001,?), ref: 0074B19D
                                        • SetDlgItemTextW.USER32(?,00000007,?), ref: 0074B1B7
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Text$Item$Window
                                        • String ID:
                                        • API String ID: 820206838-0
                                        • Opcode ID: ffd9c9b42d85b41fa678ac0d6d48d81da7b078a453581bd76cfc24cdc4db7ea6
                                        • Instruction ID: 2bcd1a807a08d86d8bb9dc04974c4cdd3cd1bd52ade2e71ec8a339a335ce6161
                                        • Opcode Fuzzy Hash: ffd9c9b42d85b41fa678ac0d6d48d81da7b078a453581bd76cfc24cdc4db7ea6
                                        • Instruction Fuzzy Hash: AE316871500618EFD731CF68DC98B7A73F8EB41709F04092AE496865A1C7B9FC95CBA1
                                        APIs
                                        • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,FFBCC9E0,?,00798B38,?,?,00000000,?), ref: 00798AEA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: FreeLibrary
                                        • String ID: api-ms-$ext-ms-
                                        • API String ID: 3664257935-537541572
                                        • Opcode ID: 33f3ec16f146782fa2eb6c38e8bfba5a54de7ba94329dea828e22c1d029a6446
                                        • Instruction ID: ba93b7123fc0816b696450512eba09310f708c44a2f64427db058cd802b3ddfd
                                        • Opcode Fuzzy Hash: 33f3ec16f146782fa2eb6c38e8bfba5a54de7ba94329dea828e22c1d029a6446
                                        • Instruction Fuzzy Hash: 5C210531A01651ABCF629B24FC45F6A3768EB43364F258112ED16E7290EF3CED01C796
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0076A084
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0076A08E
                                        • int.LIBCPMT ref: 0076A0A5
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Facet_Register.LIBCPMT ref: 0076A0DF
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0076A0FF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID: \?|
                                        • API String ID: 2854358121-2609519085
                                        • Opcode ID: 916db1290deb6ba6aed07e3f0305a2bcdaadad2cc13c64071c6ba29d4220f74f
                                        • Instruction ID: 805a699a600e36154e87e35a5222c41757e1ef657a171e02e9f24b3142b4d129
                                        • Opcode Fuzzy Hash: 916db1290deb6ba6aed07e3f0305a2bcdaadad2cc13c64071c6ba29d4220f74f
                                        • Instruction Fuzzy Hash: EB01C431900116EBDB05EB64C859AAD77B2AFC5310F24850DEC16772D1DF3C9E41CB52
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0076A119
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0076A123
                                        • int.LIBCPMT ref: 0076A13A
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Facet_Register.LIBCPMT ref: 0076A174
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0076A194
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID: `?|
                                        • API String ID: 2854358121-3069904153
                                        • Opcode ID: 382d3949da7710d814e4a604617a35172ef2ab9b24f649c465249cb6e976a14b
                                        • Instruction ID: fb18f0993894a1b36f0755490d8e78a18f6133267dacdfc3dbebe02eb6ae7c13
                                        • Opcode Fuzzy Hash: 382d3949da7710d814e4a604617a35172ef2ab9b24f649c465249cb6e976a14b
                                        • Instruction Fuzzy Hash: D801C071900119EBDF09EB68C859AAD77B6AFC5310F24850DEC1677291DF3C9E01CB92
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0077138B
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00771395
                                        • int.LIBCPMT ref: 007713AC
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Facet_Register.LIBCPMT ref: 007713E6
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00771406
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID: `A|
                                        • API String ID: 2854358121-122114401
                                        • Opcode ID: 0f7260447580fa5db1cdde5b5291545503fedae3a1ab6e512776433487a81f40
                                        • Instruction ID: abeb0890c84568caf9b252f20bbd665220665003cb9a77282866bfb6929106d7
                                        • Opcode Fuzzy Hash: 0f7260447580fa5db1cdde5b5291545503fedae3a1ab6e512776433487a81f40
                                        • Instruction Fuzzy Hash: A2012271800219DFCF05EB64D859AAD77B2BFC0720F698408E815672C1DF3C9E02CB81
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 007714B5
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 007714BF
                                        • int.LIBCPMT ref: 007714D6
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Facet_Register.LIBCPMT ref: 00771510
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00771530
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID: dA|
                                        • API String ID: 2854358121-5175741
                                        • Opcode ID: 2df3293763905d46ed3e74631cab23ac57654872d444f3769661d9a5c40dbd09
                                        • Instruction ID: ba93049335b5d513d8fe939d9b6bc28c157b10cf0addc07f26a887c3cf8fc1a3
                                        • Opcode Fuzzy Hash: 2df3293763905d46ed3e74631cab23ac57654872d444f3769661d9a5c40dbd09
                                        • Instruction Fuzzy Hash: EC01DB72900115DBCF09EB64C859AAD77B6BFC4350F54850DE81667291DF3CDE01CB81
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0077C780
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0077C78A
                                        • int.LIBCPMT ref: 0077C7A1
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Facet_Register.LIBCPMT ref: 0077C7DB
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0077C7FB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID: $B|
                                        • API String ID: 2854358121-1543055294
                                        • Opcode ID: 5c0ad8f4dfdbd765f9ec5416cb40c3738a1339a44f5b00a636e2c4422f3c08ce
                                        • Instruction ID: ac77e146489a35a7f589b2a1e143c91645556693825130dade3405dc7cdcc2fa
                                        • Opcode Fuzzy Hash: 5c0ad8f4dfdbd765f9ec5416cb40c3738a1339a44f5b00a636e2c4422f3c08ce
                                        • Instruction Fuzzy Hash: AF01D231900116DBDF0AEB64C89AAAD77A6FF89350F24850DF81977291DF3C9E02CB81
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00771833
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0077183D
                                        • int.LIBCPMT ref: 00771854
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Facet_Register.LIBCPMT ref: 0077188E
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 007718AE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID: \A|
                                        • API String ID: 2854358121-708201877
                                        • Opcode ID: 6b4c0c5b9c643a6270867f38f23476cb6a893b859153dce21da03aa9ef12c71d
                                        • Instruction ID: 10110cbb1402fcb36c59a81727c8362e2cdda88948d9e1b5c4318513ef052490
                                        • Opcode Fuzzy Hash: 6b4c0c5b9c643a6270867f38f23476cb6a893b859153dce21da03aa9ef12c71d
                                        • Instruction Fuzzy Hash: 90012635C00119DFCF05EB68D859AAD77B2BF84360F648509E81567391DF3C9E01CB82
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0077C815
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0077C81F
                                        • int.LIBCPMT ref: 0077C836
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Facet_Register.LIBCPMT ref: 0077C870
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0077C890
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID: (B|
                                        • API String ID: 2854358121-1390665434
                                        • Opcode ID: 0fd6831cceb9d3a81f90dde521af3ee86fcf7c7a0d1f5130c0da88d8c925ae1a
                                        • Instruction ID: 631c03f8119a8632f84b5aec79e41e699c3d0eb6577766b39ae8b33f69a80138
                                        • Opcode Fuzzy Hash: 0fd6831cceb9d3a81f90dde521af3ee86fcf7c7a0d1f5130c0da88d8c925ae1a
                                        • Instruction Fuzzy Hash: F701C435900115DBCF0AEB64D85AAAD77A2FF84350F25851DF81567291DF3C9E01CB82
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0077C9D4
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0077C9DE
                                        • int.LIBCPMT ref: 0077C9F5
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Facet_Register.LIBCPMT ref: 0077CA2F
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0077CA4F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID: 4B|
                                        • API String ID: 2854358121-1205830862
                                        • Opcode ID: 2f5f9f5dfead726e36af52bcb5e416c989ba2262343e960f18a0890b33aaaa91
                                        • Instruction ID: 4925edc4370e30a99d86de7b2a4835683b3b96c0c14d5f60da5058361f02580a
                                        • Opcode Fuzzy Hash: 2f5f9f5dfead726e36af52bcb5e416c989ba2262343e960f18a0890b33aaaa91
                                        • Instruction Fuzzy Hash: 4301A131900119DBDF06EB64C859AAD77A6BF88350F25C50CF8196B291DF3C9E058B91
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0077CA69
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0077CA73
                                        • int.LIBCPMT ref: 0077CA8A
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Facet_Register.LIBCPMT ref: 0077CAC4
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0077CAE4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID: 8B|
                                        • API String ID: 2854358121-1321565610
                                        • Opcode ID: 8559204d09d53772b66464b6e3a5c2548f4e37feb697b33b001ba8f53b9f7ee9
                                        • Instruction ID: ef22f788bd1eb4aa4a6e841892da379b94ddcd553902400bb6a74d071612ca60
                                        • Opcode Fuzzy Hash: 8559204d09d53772b66464b6e3a5c2548f4e37feb697b33b001ba8f53b9f7ee9
                                        • Instruction Fuzzy Hash: B901C431900119DBCF06EB64C85AAAD77A6BFC4350F26C54DF815AB291DF7C9E01CB81
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00770B65
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00770B6F
                                        • int.LIBCPMT ref: 00770B86
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Facet_Register.LIBCPMT ref: 00770BC0
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00770BE0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID: lA|
                                        • API String ID: 2854358121-241018885
                                        • Opcode ID: 3c66cdb5aa622cbefab7ebd2603251e0af1173522fed07eeabd365e57f57b1de
                                        • Instruction ID: b37fb9211c6d922f9c21cbfedcc7415ec38760b14fcdebb53578de5716979632
                                        • Opcode Fuzzy Hash: 3c66cdb5aa622cbefab7ebd2603251e0af1173522fed07eeabd365e57f57b1de
                                        • Instruction Fuzzy Hash: BB010071804119DBCF05EB64C859AADB7A2BFC4314F688508E856672E1DF3C9E01CB81
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00770DB9
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00770DC3
                                        • int.LIBCPMT ref: 00770DDA
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • messages.LIBCPMT ref: 00770DFD
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00770E34
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3messages
                                        • String ID: pA|
                                        • API String ID: 50917705-459403793
                                        • Opcode ID: 6d1b09e1e09e3ea65336e7c43692319c1c0f2b769424196356d71230f77a629d
                                        • Instruction ID: ebe36820c0204834463e9c43057e7e0152f6afef0a7f40309529768d4e82e2c4
                                        • Opcode Fuzzy Hash: 6d1b09e1e09e3ea65336e7c43692319c1c0f2b769424196356d71230f77a629d
                                        • Instruction Fuzzy Hash: E3F09631900206DFDF15F7A0C86AA6E2366AF50760F648518F8156B2D1EF7C9E058791
                                        APIs
                                        • GetCPInfo.KERNEL32(?,?,?,?,?), ref: 00780579
                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00780605
                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00780670
                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 0078068C
                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007806EF
                                        • CompareStringEx.KERNEL32(?,?,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0078070C
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$CompareInfoString
                                        • String ID:
                                        • API String ID: 2984826149-0
                                        • Opcode ID: c192e3a5dbfb280b7ba99f960162cbd232bfad41e50a9ca434f823bdaa13d017
                                        • Instruction ID: 37baecabb8eb75144e2f48adde170467e19d214a03c999a3fb30737508ef7de5
                                        • Opcode Fuzzy Hash: c192e3a5dbfb280b7ba99f960162cbd232bfad41e50a9ca434f823bdaa13d017
                                        • Instruction Fuzzy Hash: E571DE72A80259AFEF61AF64CC45BEE7BB5AF05710F190015E845A7191E73D9C18CFE0
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 0076CBD6
                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 0076CC41
                                        • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0076CC5E
                                        • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0076CC9D
                                        • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0076CCFC
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 0076CD1F
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiStringWide
                                        • String ID:
                                        • API String ID: 2829165498-0
                                        • Opcode ID: e1da4ca8bb2a138c97fc24a656284795ed1619f23d8c0d0897195e145970e768
                                        • Instruction ID: b9e9384751a334f4e9042cda83a76ba55ad2f33fefb92ca78733c423c312d2b3
                                        • Opcode Fuzzy Hash: e1da4ca8bb2a138c97fc24a656284795ed1619f23d8c0d0897195e145970e768
                                        • Instruction Fuzzy Hash: 33517CB260020ABBEB225F64CC45FBA7BA9EF45740F154529FD4AE6190DB3C9D10DB60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: __freea
                                        • String ID: SQy$a/p$am/pm
                                        • API String ID: 240046367-2249958009
                                        • Opcode ID: 218dee6d563bd2aa04b97f99b7b55dfcca3b5e1e2511a0fb0420481655762362
                                        • Instruction ID: fac353e258f927b860061148993c6208657437ffb769a14aa354b28e3ce444c5
                                        • Opcode Fuzzy Hash: 218dee6d563bd2aa04b97f99b7b55dfcca3b5e1e2511a0fb0420481655762362
                                        • Instruction Fuzzy Hash: FDC1DEB5900216DBCF248FA8E899FBAB7B0FF5A700F244159E901AB254D33D9D43CB61
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                        • API String ID: 0-1866435925
                                        • Opcode ID: 3a90997295b74ea9de6fff7564eac5d67e942e40cada1a441ca4390d0f1893ee
                                        • Instruction ID: b7b4f64ba65431d00c5c46743659d5126da6b60f3115640e666a158be25cc4ea
                                        • Opcode Fuzzy Hash: 3a90997295b74ea9de6fff7564eac5d67e942e40cada1a441ca4390d0f1893ee
                                        • Instruction Fuzzy Hash: 19B1AA72B4021AEFDB14CF68C881AAAB7B5FF48310F14826AE815DB751D738ED50CB91
                                        APIs
                                        • GetLastError.KERNEL32(?,?,00782EDD,007810A9,00767A13), ref: 00782EF4
                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00782F02
                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00782F1B
                                        • SetLastError.KERNEL32(00000000,00782EDD,007810A9,00767A13), ref: 00782F6D
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: ErrorLastValue___vcrt_
                                        • String ID:
                                        • API String ID: 3852720340-0
                                        • Opcode ID: ec8f756e31565125c462c868cdb3e1a0303de67c683d155f94dba59eb2183d10
                                        • Instruction ID: f72265a15dd41b7ef66d88a5b57c8852f9b69d2d0e59c1bd8301a4f2a103d5cb
                                        • Opcode Fuzzy Hash: ec8f756e31565125c462c868cdb3e1a0303de67c683d155f94dba59eb2183d10
                                        • Instruction Fuzzy Hash: C801B536248726AD97253674BC8D92B2BA4FB16772720427EF614810E3EB5D4C02D35C
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00771137
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00771141
                                        • int.LIBCPMT ref: 00771158
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • moneypunct.LIBCPMT ref: 0077117B
                                        • std::_Facet_Register.LIBCPMT ref: 00771192
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 007711B2
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                        • String ID:
                                        • API String ID: 419941038-0
                                        • Opcode ID: 62a79f9e5bc53fbb085f6666964fbfdfc251d01b7f4f4a5a643af9b6cc0e3861
                                        • Instruction ID: dfca1e71a991b283f1198184a6b838cfbfd35c5cb7800b021283234e6c9ba16c
                                        • Opcode Fuzzy Hash: 62a79f9e5bc53fbb085f6666964fbfdfc251d01b7f4f4a5a643af9b6cc0e3861
                                        • Instruction Fuzzy Hash: 1701D63190011ADBDF05EB64C859AAD77A2BF85350F658509F9196B391DF3C9E01CB81
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 007711CC
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 007711D6
                                        • int.LIBCPMT ref: 007711ED
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • moneypunct.LIBCPMT ref: 00771210
                                        • std::_Facet_Register.LIBCPMT ref: 00771227
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00771247
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                        • String ID:
                                        • API String ID: 419941038-0
                                        • Opcode ID: c2396ebc7a9191338f79c870e0cfd223b8a0f7e60ba25975edf71e92036a070b
                                        • Instruction ID: 69c4358dd08976f49621d390a618d5a0b527d8a18a6e2779c9775790aeaa37b9
                                        • Opcode Fuzzy Hash: c2396ebc7a9191338f79c870e0cfd223b8a0f7e60ba25975edf71e92036a070b
                                        • Instruction Fuzzy Hash: 99012631900119DFCF05EBA4C859ABD77B6BFC0310F658509E829A7282DF3C9E01CB41
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0077154A
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00771554
                                        • int.LIBCPMT ref: 0077156B
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • numpunct.LIBCPMT ref: 0077158E
                                        • std::_Facet_Register.LIBCPMT ref: 007715A5
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 007715C5
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registernumpunct
                                        • String ID:
                                        • API String ID: 743221004-0
                                        • Opcode ID: d80575e5fbae247653c9c32c5824cf96ae9fdf5d46c8cadce779bcb0151ecf94
                                        • Instruction ID: de7717bbc6d2fc2cca1dc348bcaf89022c950b2af73c8885cd6d8b1308cc57af
                                        • Opcode Fuzzy Hash: d80575e5fbae247653c9c32c5824cf96ae9fdf5d46c8cadce779bcb0151ecf94
                                        • Instruction Fuzzy Hash: 2501263190011ADFDF09EB64C859AAD77B2BFD0710F688408E8166B281DF3C9E12CB91
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Mpunct$GetvalsH_prolog3
                                        • String ID: $+xv
                                        • API String ID: 2204710431-1686923651
                                        • Opcode ID: df3898b1cd4ee81cf8c8041db26010539f56f720b065ee2d97e35e389ff18d21
                                        • Instruction ID: 1a6dd081bcd0ae96cb9619aa147334284af67bc8b9b0bd0c7a4a6ac906ae436d
                                        • Opcode Fuzzy Hash: df3898b1cd4ee81cf8c8041db26010539f56f720b065ee2d97e35e389ff18d21
                                        • Instruction Fuzzy Hash: 2621B1B1804B56AFDF21DF74C84476BBAF8AB09340F04861AE55DC7A41D778EA01CB94
                                        APIs
                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,FFBCC9E0,00000002,?,00000000,007A66D0,000000FF,?,0078FDA3,?,?,0078FD77,00000016), ref: 0078FDFC
                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0078FE0E
                                        • FreeLibrary.KERNEL32(00000000,?,00000000,007A66D0,000000FF,?,0078FDA3,?,?,0078FD77,00000016), ref: 0078FE30
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: AddressFreeHandleLibraryModuleProc
                                        • String ID: CorExitProcess$mscoree.dll
                                        • API String ID: 4061214504-1276376045
                                        • Opcode ID: a4ed85f8e377493c8ca4fab39fbacad90c9291b4e6243b89f5afcc5ea805a0a7
                                        • Instruction ID: eb59b5472c09720ff62eed0bcd66b03dc13288ac3ad6a8434cf6a35b9324222d
                                        • Opcode Fuzzy Hash: a4ed85f8e377493c8ca4fab39fbacad90c9291b4e6243b89f5afcc5ea805a0a7
                                        • Instruction Fuzzy Hash: AF018F71940629BBDB129F50DC09FAFBBB8FB85B11F004129F811A22A0DB7C9940CB91
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0077100D
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00771017
                                        • int.LIBCPMT ref: 0077102E
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00771088
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                        • String ID: xA|
                                        • API String ID: 1383202999-359834537
                                        • Opcode ID: 522e43c0062b64f1bb5553308872b5f6ec6f55cc17312bd989597518e230f77c
                                        • Instruction ID: 5ec105dc4040247b9e4d3dcbb940fc8805833da1b3f0ba513859ea5ce9e49173
                                        • Opcode Fuzzy Hash: 522e43c0062b64f1bb5553308872b5f6ec6f55cc17312bd989597518e230f77c
                                        • Instruction Fuzzy Hash: C5F09071800509DBDF09E7A4C86ABBE2366BF50750FA88518F815AB1D1EF3C9E55C742
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00770EE3
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00770EED
                                        • int.LIBCPMT ref: 00770F04
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00770F5E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                        • String ID: tA|
                                        • API String ID: 1383202999-476601037
                                        • Opcode ID: 0f041944d564b0ac0d049176fabc54bbf5e158e750183c0011bba3f09bd3d3b2
                                        • Instruction ID: 0d216f4aae205c1820a985499a3451fcf46bef4fe4b0dee5ce059b546cb4fcee
                                        • Opcode Fuzzy Hash: 0f041944d564b0ac0d049176fabc54bbf5e158e750183c0011bba3f09bd3d3b2
                                        • Instruction Fuzzy Hash: 0DF0B43290051AEBDF19E7B0C86ABBD7366AF40750F64C618F8196B1D1EF3C9E058781
                                        APIs
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00743ED1
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00743EEF
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00743F0F
                                        • std::_Facet_Register.LIBCPMT ref: 00743FD6
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00743FEE
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                        • String ID:
                                        • API String ID: 459529453-0
                                        • Opcode ID: 8b6b1dd9a15f7a7616008144c407dc9c48e753507d73fc1f6883a5cb87da99c2
                                        • Instruction ID: 8d7d9c2039302b6c27528ba11a71f9b99f7befe5827e87e0c2901dccea9560cd
                                        • Opcode Fuzzy Hash: 8b6b1dd9a15f7a7616008144c407dc9c48e753507d73fc1f6883a5cb87da99c2
                                        • Instruction Fuzzy Hash: 8741BAB1E01215CFDB14DF58D885AAEBBB4FB04754F148269E85AAB381D738EE05CBD0
                                        APIs
                                        • GetCurrentThreadId.KERNEL32 ref: 0076C712
                                        • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00000000,?,ios_base::failbit set), ref: 0076C731
                                        • AcquireSRWLockExclusive.KERNEL32(?,?,74E15EE0,?,?,?,?,?,?,00000000,?,ios_base::failbit set), ref: 0076C75F
                                        • TryAcquireSRWLockExclusive.KERNEL32(?,?,74E15EE0,?,?,?,?,?,?,00000000,?,ios_base::failbit set), ref: 0076C7BA
                                        • TryAcquireSRWLockExclusive.KERNEL32(?,?,74E15EE0,?,?,?,?,?,?,00000000,?,ios_base::failbit set), ref: 0076C7D1
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: AcquireExclusiveLock$CurrentThread
                                        • String ID:
                                        • API String ID: 66001078-0
                                        • Opcode ID: a6ba3c1ba11cbd88fc49b47ce9c86fd9fde95b915e9360bc90821144ad841814
                                        • Instruction ID: 05fdf7df01a386569b127c7467e55e2ba809f1dd3ab148a3ce58b5a022785767
                                        • Opcode Fuzzy Hash: a6ba3c1ba11cbd88fc49b47ce9c86fd9fde95b915e9360bc90821144ad841814
                                        • Instruction Fuzzy Hash: BB41377190060AEBCB22DF65C48597AB3F8FB09350B50892AD89797A40E738F984CF65
                                        APIs
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0073B3BD
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0073B3E0
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0073B400
                                        • std::_Facet_Register.LIBCPMT ref: 0073B475
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0073B48D
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                        • String ID:
                                        • API String ID: 459529453-0
                                        • Opcode ID: f4fa049ded75eba5000a47ef659838dfb3da3461b13fd5fddb16e85af60756f6
                                        • Instruction ID: 77fdaf5d0a0ec0ff54760766f25e9c1f00db23962f9f87842656924c2e4d5af6
                                        • Opcode Fuzzy Hash: f4fa049ded75eba5000a47ef659838dfb3da3461b13fd5fddb16e85af60756f6
                                        • Instruction Fuzzy Hash: A531F071900259DFDB14CF58D885AAEBBB4FB04324F14861DE906AB392D779AE40CBD4
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0076AB1F
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0076AB29
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0076ABD0
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 0076ABDB
                                        • __EH_prolog3.LIBCMT ref: 0076ABE8
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: H_prolog3Lockitstd::_$Concurrency::cancel_current_taskLockit::_Lockit::~_
                                        • String ID:
                                        • API String ID: 845066630-0
                                        • Opcode ID: adcc54a0f456c4a9ffd9ed12111f9075a3d087303e4585fbab8ba471ac6bf93b
                                        • Instruction ID: e7fe1a14bf809d7d01b4b5e56125ee2246f705e536e12495c798b8706f1231a7
                                        • Opcode Fuzzy Hash: adcc54a0f456c4a9ffd9ed12111f9075a3d087303e4585fbab8ba471ac6bf93b
                                        • Instruction Fuzzy Hash: 68318B71A00616EFCF08EF54C895AACB776FF85310F408559E816AB2A1DB78EE10CF91
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Maklocstr$Maklocchr
                                        • String ID:
                                        • API String ID: 2020259771-0
                                        • Opcode ID: 8448704dd7f48b9c3d8b2284b863b27a7160c6b4a9371c245447fe220523da4e
                                        • Instruction ID: fb6c6e6aaf31af4901af8918713f563cb4312f4f53af74d7d17f516d5a9277b5
                                        • Opcode Fuzzy Hash: 8448704dd7f48b9c3d8b2284b863b27a7160c6b4a9371c245447fe220523da4e
                                        • Instruction Fuzzy Hash: BF118FB5500B84BFE720DBA5D845F12BBACFF08710F04452AFA4A8BA40D669F85487B4
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 007712F6
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00771300
                                        • int.LIBCPMT ref: 00771317
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Facet_Register.LIBCPMT ref: 00771351
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00771371
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID:
                                        • API String ID: 2854358121-0
                                        • Opcode ID: 90a607ebfc6f8a1f6dda44e77ed68a5b0787d8aa39b15586789c860630c7b970
                                        • Instruction ID: 065c146d3b25d395ccf0ec82e33549a99b9105bc2a74b313965e6a0a8bc240ea
                                        • Opcode Fuzzy Hash: 90a607ebfc6f8a1f6dda44e77ed68a5b0787d8aa39b15586789c860630c7b970
                                        • Instruction Fuzzy Hash: A6016235900109DBCF08EBA8C859ABD73B6BF80310F69C108F81567281EF3C8E02CB81
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00771420
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0077142A
                                        • int.LIBCPMT ref: 00771441
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Facet_Register.LIBCPMT ref: 0077147B
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0077149B
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID:
                                        • API String ID: 2854358121-0
                                        • Opcode ID: 1c2392a483da56a5057f295c6433c5677f0a8d0c6eb12d704f375a2a2601a009
                                        • Instruction ID: f280184d158f05c302c31653400f2a31735b365f1ddc8901051bd1dace87e7a6
                                        • Opcode Fuzzy Hash: 1c2392a483da56a5057f295c6433c5677f0a8d0c6eb12d704f375a2a2601a009
                                        • Instruction Fuzzy Hash: C001003190011ADBDF05EB68D85AABD77B6BFC4710F688108E82967291DF3C9E02CB91
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00771674
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0077167E
                                        • int.LIBCPMT ref: 00771695
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Facet_Register.LIBCPMT ref: 007716CF
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 007716EF
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID:
                                        • API String ID: 2854358121-0
                                        • Opcode ID: 5010aefc5979f0e7781f2863ad2ac10ae654ae135af2d22fffb4bfaf5f0c5259
                                        • Instruction ID: d6cb5f93ed05888c45b53478dbf8deab46dd34e791b922abc49ce7fda2c3e9a2
                                        • Opcode Fuzzy Hash: 5010aefc5979f0e7781f2863ad2ac10ae654ae135af2d22fffb4bfaf5f0c5259
                                        • Instruction Fuzzy Hash: 2B012276800115DBDF05EBA8D859AADB7B6BF84310F68C508F815A7292DF3C9E05CB81
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0077C656
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0077C660
                                        • int.LIBCPMT ref: 0077C677
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Facet_Register.LIBCPMT ref: 0077C6B1
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0077C6D1
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID:
                                        • API String ID: 2854358121-0
                                        • Opcode ID: bb01a913fe08ef625b702a5370cbbac0f3c24d2122aa5b52b1da80a355fb41fb
                                        • Instruction ID: c8104cf0a26b862908e2996d1d2ad39205ae43dee339b9a88cdc34b51f83966b
                                        • Opcode Fuzzy Hash: bb01a913fe08ef625b702a5370cbbac0f3c24d2122aa5b52b1da80a355fb41fb
                                        • Instruction Fuzzy Hash: F701D636900115DBCF06EBA4C89AABD77B6BF88750F24851DF815A7291DF3C9E01DB81
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00771709
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00771713
                                        • int.LIBCPMT ref: 0077172A
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Facet_Register.LIBCPMT ref: 00771764
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00771784
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID:
                                        • API String ID: 2854358121-0
                                        • Opcode ID: 71f7f5271310e2868dd530fc16ed2d1642f06914324cd44910de98d3c66247fc
                                        • Instruction ID: 87feed39435ce34c1eda95ba803320fbdc0dd6fb246e1eece01110ceb5842a60
                                        • Opcode Fuzzy Hash: 71f7f5271310e2868dd530fc16ed2d1642f06914324cd44910de98d3c66247fc
                                        • Instruction Fuzzy Hash: E1010471800115DFCF09EB64C859ABDB7A2AF80350F68C518E81567281EF3C9E01CB81
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 0077179E
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 007717A8
                                        • int.LIBCPMT ref: 007717BF
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Facet_Register.LIBCPMT ref: 007717F9
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00771819
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID:
                                        • API String ID: 2854358121-0
                                        • Opcode ID: 37f4097a4439b2c61b95df47c0e3aec6bc3e8c01ff574e14e5ddaeab6c68db45
                                        • Instruction ID: 7e2fa3d2bc1f3bd39353e36e686d7baa4786dab00ccfbdca178045ef2be6d198
                                        • Opcode Fuzzy Hash: 37f4097a4439b2c61b95df47c0e3aec6bc3e8c01ff574e14e5ddaeab6c68db45
                                        • Instruction Fuzzy Hash: 65012672800115DFCF05EB64D859AAD77B2BF80760F64840CF81A67292EF3C9E01CB92
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 007709A6
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 007709B0
                                        • int.LIBCPMT ref: 007709C7
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Facet_Register.LIBCPMT ref: 00770A01
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00770A21
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID:
                                        • API String ID: 2854358121-0
                                        • Opcode ID: 8ebd2c974c3287bf030581d18ae746a11cfc29715ea210d3f51607c9f6100e71
                                        • Instruction ID: 323b90243211e31936d129e4806ae7633680e5f0b85a53f7c2076532c2d3d63f
                                        • Opcode Fuzzy Hash: 8ebd2c974c3287bf030581d18ae746a11cfc29715ea210d3f51607c9f6100e71
                                        • Instruction Fuzzy Hash: 6101C431904219DBDF05EB64C859AAD77B2BFC4750F25C508F8156B291DF3C9E41CB91
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00770A3B
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00770A45
                                        • int.LIBCPMT ref: 00770A5C
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Facet_Register.LIBCPMT ref: 00770A96
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00770AB6
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID:
                                        • API String ID: 2854358121-0
                                        • Opcode ID: 4169bbe816420b37fd1b5501e28cfe87a222cf0b7b75712482301762b0e9c2db
                                        • Instruction ID: 6d1a26b085a2d841def15b3d4386cc80f0c03a6aad0015b8830377d55b1f1f2b
                                        • Opcode Fuzzy Hash: 4169bbe816420b37fd1b5501e28cfe87a222cf0b7b75712482301762b0e9c2db
                                        • Instruction Fuzzy Hash: 4001D236D00219DBCF05EB64C869AAE77B2BFC5350F2AC509E81567291DF7C9E01CB91
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00770AD0
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00770ADA
                                        • int.LIBCPMT ref: 00770AF1
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Facet_Register.LIBCPMT ref: 00770B2B
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00770B4B
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                        • String ID:
                                        • API String ID: 2854358121-0
                                        • Opcode ID: d41fa9e7e8b02a1321ba88d2db0c1800f958eed16f3898bb41bf19291f83c402
                                        • Instruction ID: cc73bfecac6cac4175fd92429f85f8cf9ba58cbb7e8a5094a14e9a2a4b790f48
                                        • Opcode Fuzzy Hash: d41fa9e7e8b02a1321ba88d2db0c1800f958eed16f3898bb41bf19291f83c402
                                        • Instruction Fuzzy Hash: 70010471900119DBDF05EB64C859AADB7A2BF94314F258408F82967291DF3C9F02CB81
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00767F94
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00767F9F
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0076800D
                                          • Part of subcall function 00768120: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00768138
                                        • std::locale::_Setgloballocale.LIBCPMT ref: 00767FBA
                                        • _Yarn.LIBCPMT ref: 00767FD0
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                        • String ID:
                                        • API String ID: 1088826258-0
                                        • Opcode ID: a0eedd08056cf901480bcdfe5e27cf73d4d588ad11c8f2f0948a882586cac9b8
                                        • Instruction ID: f849f2deb29c17f135d8dcc9d5901724bf8285e0ac72404e74255b61a037b470
                                        • Opcode Fuzzy Hash: a0eedd08056cf901480bcdfe5e27cf73d4d588ad11c8f2f0948a882586cac9b8
                                        • Instruction Fuzzy Hash: F7019A76A05111DBCB0AEB20E86997C7762BFC6340B18810DEC1217381DF7CAE46CBC6
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00770BFA
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00770C04
                                        • int.LIBCPMT ref: 00770C1B
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • ctype.LIBCPMT ref: 00770C3E
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00770C75
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3ctype
                                        • String ID:
                                        • API String ID: 3358926169-0
                                        • Opcode ID: 11e25daac32d7f9e296601add8403f7f77b34ec45af369680d30e3cf28bec76c
                                        • Instruction ID: 1215c843a8705808a16dc437c56369d74865b618831172d79d135db79726db1a
                                        • Opcode Fuzzy Hash: 11e25daac32d7f9e296601add8403f7f77b34ec45af369680d30e3cf28bec76c
                                        • Instruction Fuzzy Hash: B7F09631800115DBDF05E760C86AABD3366AF41750F658618F515671D2EF3C9E058791
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00770C8F
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00770C99
                                        • int.LIBCPMT ref: 00770CB0
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • ctype.LIBCPMT ref: 00770CD3
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00770D0A
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3ctype
                                        • String ID:
                                        • API String ID: 3358926169-0
                                        • Opcode ID: c7ef2ebcab9c503abad1bb3bded58c1d91bf4fa18ec860e54082ed0a1eeafce0
                                        • Instruction ID: bc0c81d98f4dc8ef472a6a3430cd6182a325a1fde0ed7f97eb0018987dbc3f54
                                        • Opcode Fuzzy Hash: c7ef2ebcab9c503abad1bb3bded58c1d91bf4fa18ec860e54082ed0a1eeafce0
                                        • Instruction Fuzzy Hash: DEF09631900205DBDF05E7A0C85AABE2366AF40750F658518F8156B1D1EF3C9E058791
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00770D24
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00770D2E
                                        • int.LIBCPMT ref: 00770D45
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • messages.LIBCPMT ref: 00770D68
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00770D9F
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3messages
                                        • String ID:
                                        • API String ID: 50917705-0
                                        • Opcode ID: 64b1ff6bd35e18479b98c9d3b805157ae67f47973335297a23df3a062bb333c7
                                        • Instruction ID: 7e5755f65159617b47c85eba7287dc0bb2131f974edbad5936f0cb86205fc71f
                                        • Opcode Fuzzy Hash: 64b1ff6bd35e18479b98c9d3b805157ae67f47973335297a23df3a062bb333c7
                                        • Instruction Fuzzy Hash: A8F0BB31900605DBDF15E7A0C86ABBD3366AF50754F548518F8156B2D1EF3C9E058781
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 007710A2
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 007710AC
                                        • int.LIBCPMT ref: 007710C3
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • moneypunct.LIBCPMT ref: 007710E6
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0077111D
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3moneypunct
                                        • String ID:
                                        • API String ID: 3160146232-0
                                        • Opcode ID: b806c040d098050e48c7549b3069c84e02c86d053c559f2000f00d3981ef8448
                                        • Instruction ID: 5c38942a262d943d4c234e522931065143fa1e14c2cc21dd7a55125c09ca859b
                                        • Opcode Fuzzy Hash: b806c040d098050e48c7549b3069c84e02c86d053c559f2000f00d3981ef8448
                                        • Instruction Fuzzy Hash: 70F08271900109DBDF05EBA4C86ABAD7366BF90740F95C018F8156B281DF3C9E05CB51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2292258011.000000006BEB1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BEB0000, based on PE: true
                                        • Associated: 00000006.00000002.2292241036.000000006BEB0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292289619.000000006BEE6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292309996.000000006BEF4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292425687.000000006C109000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292558037.000000006C35B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292594857.000000006C35C000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_6beb0000_GUP.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: >$E$k
                                        • API String ID: 0-2864373710
                                        • Opcode ID: b4cf61d3dbd2c2fb8546ed99db491a40c5771d8bba3a6465a9ac2eacee50f42e
                                        • Instruction ID: 33b5fa2a6d8800cf6ae27ae4b470c48dd396983b23540a1416d62c0aa248173c
                                        • Opcode Fuzzy Hash: b4cf61d3dbd2c2fb8546ed99db491a40c5771d8bba3a6465a9ac2eacee50f42e
                                        • Instruction Fuzzy Hash: 39714870D052A88FDB15CFA9D9817DDBBB9BF9A300F1480DAD488A7351E7748A85CF11
                                        APIs
                                        • std::ios_base::_Addstd.LIBCPMT ref: 0073F54D
                                          • Part of subcall function 00767F8D: __EH_prolog3.LIBCMT ref: 00767F94
                                          • Part of subcall function 00767F8D: std::_Lockit::_Lockit.LIBCPMT ref: 00767F9F
                                          • Part of subcall function 00767F8D: std::locale::_Setgloballocale.LIBCPMT ref: 00767FBA
                                          • Part of subcall function 00767F8D: _Yarn.LIBCPMT ref: 00767FD0
                                          • Part of subcall function 00767F8D: std::_Lockit::~_Lockit.LIBCPMT ref: 0076800D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$AddstdH_prolog3Lockit::_Lockit::~_SetgloballocaleYarnstd::ios_base::_std::locale::_
                                        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                        • API String ID: 90104431-1866435925
                                        • Opcode ID: 43c89af48e7a2abb1706aea5466534d24af8fd1206e6dce656ed029b801a1685
                                        • Instruction ID: 68574d26f9ec4108f75f76f64ffeb9651ce7327120cec060a9b7b178be6a01dc
                                        • Opcode Fuzzy Hash: 43c89af48e7a2abb1706aea5466534d24af8fd1206e6dce656ed029b801a1685
                                        • Instruction Fuzzy Hash: 7941AFB19007049FEB20DF14C449B5AFBF4FF44314F14862DE8569B682E7B9E904CB91
                                        APIs
                                        • ___std_exception_copy.LIBVCRUNTIME ref: 0073BDCE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: ___std_exception_copy
                                        • String ID: ]s$]s$ios_base::failbit set
                                        • API String ID: 2659868963-3138870619
                                        • Opcode ID: 459c784194e8295dd00a9d8033b0ce842defeaa273f3146cfad6c59780ae3e0d
                                        • Instruction ID: 9b4ecb1c400649a3fb577cf022e0b0de342ea6bec4770054fe18e015cf0b3f89
                                        • Opcode Fuzzy Hash: 459c784194e8295dd00a9d8033b0ce842defeaa273f3146cfad6c59780ae3e0d
                                        • Instruction Fuzzy Hash: FA3152B1A002089FDB04DF68D845AEEBBF8EF49710F54822EE515E7741E774A944CBA4
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 007749A2
                                          • Part of subcall function 0076E211: _Maklocstr.LIBCPMT ref: 0076E231
                                          • Part of subcall function 0076E211: _Maklocstr.LIBCPMT ref: 0076E24E
                                          • Part of subcall function 0076E211: _Maklocstr.LIBCPMT ref: 0076E26B
                                          • Part of subcall function 0076E211: _Maklocchr.LIBCPMT ref: 0076E27D
                                          • Part of subcall function 0076E211: _Maklocchr.LIBCPMT ref: 0076E290
                                        • _Mpunct.LIBCPMT ref: 00774A3A
                                        • _Mpunct.LIBCPMT ref: 00774A54
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Maklocstr$MaklocchrMpunct$H_prolog3
                                        • String ID: $+xv
                                        • API String ID: 2939335142-1686923651
                                        • Opcode ID: 1c10217a0915d5863ab0711b672167b41fe0b243f1159122e396cb0b5307173b
                                        • Instruction ID: 445da595c4dbc28955ce69f5139d0d4340f8b36e58010515a29f2e379b70b290
                                        • Opcode Fuzzy Hash: 1c10217a0915d5863ab0711b672167b41fe0b243f1159122e396cb0b5307173b
                                        • Instruction Fuzzy Hash: 6D21B1B1904B56AFDB21DF74C844B6BBAF8AB09340F04861AE55DD7A41E778EA01CB90
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Mpunct$H_prolog3
                                        • String ID: $+xv
                                        • API String ID: 4281374311-1686923651
                                        • Opcode ID: 8fad970cc637572bd68ed70b035bb732b10dda5ea81dc6159973bca404ef2ffa
                                        • Instruction ID: 0ae0801cecfe4054aa535218996fa3b740eb747144ffc7381ae2fcf763c42965
                                        • Opcode Fuzzy Hash: 8fad970cc637572bd68ed70b035bb732b10dda5ea81dc6159973bca404ef2ffa
                                        • Instruction Fuzzy Hash: 0721B1B1904B55AFDB22DF74C844B6BBAF8AF09740F04461AE49DCBA41D778EA01CB90
                                        APIs
                                          • Part of subcall function 00772BF1: _Yarn.LIBCPMT ref: 00772C04
                                        • _Maklocstr.LIBCPMT ref: 0076E341
                                          • Part of subcall function 007748DB: _Yarn.LIBCPMT ref: 007748EE
                                        • _Maklocstr.LIBCPMT ref: 0076E35A
                                          • Part of subcall function 0076E489: Concurrency::cancel_current_task.LIBCPMT ref: 0076E52B
                                        • _Maklocstr.LIBCPMT ref: 0076E369
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Maklocstr$Yarn$Concurrency::cancel_current_task
                                        • String ID: :AM:am:PM:pm
                                        • API String ID: 3924990383-1966799564
                                        • Opcode ID: 53eabd9f1bdec8631f42c1ec987a26171d71f441f0056cf343d10f924b7cf4ee
                                        • Instruction ID: cf55062043663a021091705847ae90a144307e37ce61f2c3fdf7e3f1d9b4abec
                                        • Opcode Fuzzy Hash: 53eabd9f1bdec8631f42c1ec987a26171d71f441f0056cf343d10f924b7cf4ee
                                        • Instruction Fuzzy Hash: 5F0184B2D00208BBDB00EFB5AC8AD9F77ACEB85754B10441AF905A7242DA78AD0187A0
                                        APIs
                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00783FE3,00000000,?,007C4298,?,?,?,00784186,00000004,InitializeCriticalSectionEx,007B24CC,InitializeCriticalSectionEx), ref: 0078403F
                                        • GetLastError.KERNEL32(?,00783FE3,00000000,?,007C4298,?,?,?,00784186,00000004,InitializeCriticalSectionEx,007B24CC,InitializeCriticalSectionEx,00000000,?,00783F3D), ref: 00784049
                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00784071
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: LibraryLoad$ErrorLast
                                        • String ID: api-ms-
                                        • API String ID: 3177248105-2084034818
                                        • Opcode ID: a50f9a06bcfc44365dd76f469e7e5326c9ba3e8e5a23a574fc79c60f13591a6a
                                        • Instruction ID: 713a8b550f8ac569ff031ce639e04f78bff158dd0401ada77aabde2198a84a62
                                        • Opcode Fuzzy Hash: a50f9a06bcfc44365dd76f469e7e5326c9ba3e8e5a23a574fc79c60f13591a6a
                                        • Instruction Fuzzy Hash: 68E01230280609BAEA212B71EC06B6A3B65AB41B44F108060FA4DE44E1D7AA9851C78A
                                        APIs
                                        • AcquireSRWLockExclusive.KERNEL32(007C3AEC,?,?,?,0075429C,007C3AA8,00753E63,00000000,FFBCC9E0,?,?,74E15EE0), ref: 00767242
                                        • ReleaseSRWLockExclusive.KERNEL32(007C3AEC,?,0075429C,007C3AA8,00753E63,00000000,FFBCC9E0,?,?,74E15EE0), ref: 0076727C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: ExclusiveLock$AcquireRelease
                                        • String ID: c>u$:|
                                        • API String ID: 17069307-1875169475
                                        • Opcode ID: 24566802696e5b38b344151b894a24407d651fc19c761d6236cdda1e931cce6e
                                        • Instruction ID: 63e0fe5102f9e32e31a66db1ed74b3f3f8915cbd775f990b02b6acbb77dc0623
                                        • Opcode Fuzzy Hash: 24566802696e5b38b344151b894a24407d651fc19c761d6236cdda1e931cce6e
                                        • Instruction Fuzzy Hash: C5F0A031504105EFC724EF15D855E69BBB8FB867B4F21822EFDA7832A1D73C5882CA61
                                        APIs
                                        • AcquireSRWLockExclusive.KERNEL32(007C3AEC,?,?,007542BC,007C3AA8,00000000,FFBCC9E0,?,?,74E15EE0), ref: 007671F0
                                        • ReleaseSRWLockExclusive.KERNEL32(007C3AEC,?,007542BC,007C3AA8,00000000,FFBCC9E0,?,?,74E15EE0), ref: 00767223
                                        • WakeAllConditionVariable.KERNEL32(007C3AE8,?,007542BC,007C3AA8,00000000,FFBCC9E0,?,?,74E15EE0), ref: 0076722E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: ExclusiveLock$AcquireConditionReleaseVariableWake
                                        • String ID: :|
                                        • API String ID: 1466638765-2552985586
                                        • Opcode ID: 39f67654f28926fdde40f4a685446b6cb6b013916728dc949f0a3cdda24b295e
                                        • Instruction ID: dd3ca152fba340508ad91cf449d2e3e81855254b99271f88d2fe0f10faa77cf8
                                        • Opcode Fuzzy Hash: 39f67654f28926fdde40f4a685446b6cb6b013916728dc949f0a3cdda24b295e
                                        • Instruction Fuzzy Hash: B1F0C075900214EFC305DF58E849D5977A8FB4A740B15C47DF90687311D77D9910CBA9
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: _strcspn$H_prolog3_ctype
                                        • String ID:
                                        • API String ID: 838279627-0
                                        • Opcode ID: 3c3c59af042038109731589ff269b009d020e5ed0582ca51725bb792a49d3eb7
                                        • Instruction ID: b9ee066ccd73084cf25e5fa1168cb91e82978924805333839f44a0ad9e2a9252
                                        • Opcode Fuzzy Hash: 3c3c59af042038109731589ff269b009d020e5ed0582ca51725bb792a49d3eb7
                                        • Instruction Fuzzy Hash: D1D19B71E10259DFDF24DFA4C884AEEBBB9FF08310F144119E816AB251D738AE45CBA1
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: _strcspn$H_prolog3_ctype
                                        • String ID:
                                        • API String ID: 838279627-0
                                        • Opcode ID: f39928ae571f5c3130b05f96f719007dd9b2b6bf287c2afb9577b77e73b91650
                                        • Instruction ID: cadc6a711a81e160ba9cd6dd599af25356142cc4a1d5a94a7cb09fb79b0f3308
                                        • Opcode Fuzzy Hash: f39928ae571f5c3130b05f96f719007dd9b2b6bf287c2afb9577b77e73b91650
                                        • Instruction Fuzzy Hash: 48D19E75E10209DFDF25DFA8C884AEEBBB5FF08310F144119E816AB251D738AD45CBA1
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: _strcspn$H_prolog3_ctype
                                        • String ID:
                                        • API String ID: 838279627-0
                                        • Opcode ID: 22983cb95d84cc1f911a9b11deacb31f3f837d97e6374ca9dc3b68cc19acd0ae
                                        • Instruction ID: 0dc17d4e203c7b64aa0da30bccb9119b330826fdc64b9fce10d235e408803dd6
                                        • Opcode Fuzzy Hash: 22983cb95d84cc1f911a9b11deacb31f3f837d97e6374ca9dc3b68cc19acd0ae
                                        • Instruction Fuzzy Hash: 4BD13CB1D00649EFDF55DFA4C884AEEBBB5FF08310F14411AE856AB241DB38AD45CBA1
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: AdjustPointer
                                        • String ID:
                                        • API String ID: 1740715915-0
                                        • Opcode ID: 8f365940f19f406f187efd5acbce8f33bfcb334827f194f5d1f5cbb6a9e1fb36
                                        • Instruction ID: a4293a49f08322a400af2eecebf3417c0cc14341d6d52e42f4c9927779dfa357
                                        • Opcode Fuzzy Hash: 8f365940f19f406f187efd5acbce8f33bfcb334827f194f5d1f5cbb6a9e1fb36
                                        • Instruction Fuzzy Hash: 6051F371A80A4AEFDB29AF58D849B7AB7A5EF00F10F10402DE80547291E73DEE81C790
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1a4a0f80b19523bb74eb9433d4e2f7cee984f38b686b9f4b5f3d42608807c321
                                        • Instruction ID: 1f3239261624777a3fe87fb825bf898975b43a25f316195177adac9741b0fd16
                                        • Opcode Fuzzy Hash: 1a4a0f80b19523bb74eb9433d4e2f7cee984f38b686b9f4b5f3d42608807c321
                                        • Instruction Fuzzy Hash: 2721DE31200609FFCF20AFA5FD8486B77A9FF453647104519F925C7122E738EE008BA0
                                        APIs
                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000010), ref: 00749CCA
                                        • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00749CE1
                                        • SendMessageW.USER32(00000110,00000080,00000001,00000000), ref: 00749CFF
                                        • SendMessageW.USER32(00000110,00000080,00000000,00000000), ref: 00749D0A
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: ImageLoadMessageSend
                                        • String ID:
                                        • API String ID: 2779929661-0
                                        • Opcode ID: 45b5d874ed723ddaa44486602e36fc7d75f1e4b4702d20a7649464ca3f2fe656
                                        • Instruction ID: 7e33218309f491d3b716221c2a63cc60a3468210a3770600a2f57289f154911b
                                        • Opcode Fuzzy Hash: 45b5d874ed723ddaa44486602e36fc7d75f1e4b4702d20a7649464ca3f2fe656
                                        • Instruction Fuzzy Hash: 4A016231780314B7E6305A559C86FA777E8AB89F58F000515F7846F5C1C7E5BC84CBA9
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00770E4E
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00770E58
                                        • int.LIBCPMT ref: 00770E6F
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00770EC9
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                        • String ID:
                                        • API String ID: 1383202999-0
                                        • Opcode ID: 15573f93979c0a7b8b98a18dd6cea8332461e76cf830dca95624e966ee9462e9
                                        • Instruction ID: 687178fdc26e06de0d9e59510e404b0dcc1778ca9fb34b0ff7aedab4a35f816d
                                        • Opcode Fuzzy Hash: 15573f93979c0a7b8b98a18dd6cea8332461e76cf830dca95624e966ee9462e9
                                        • Instruction Fuzzy Hash: 02F09031800606EBDF09F7A0D86AAAE2366BF50751F648A18F8256B1D1EF3C9E058781
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 00770F78
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00770F82
                                        • int.LIBCPMT ref: 00770F99
                                          • Part of subcall function 0076A296: std::_Lockit::_Lockit.LIBCPMT ref: 0076A2A7
                                          • Part of subcall function 0076A296: std::_Lockit::~_Lockit.LIBCPMT ref: 0076A2C1
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00770FF3
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                        • String ID:
                                        • API String ID: 1383202999-0
                                        • Opcode ID: 64beeb72b5c221137ea541a5cf1e16cfe15d8772f347ad27875c0f288d680339
                                        • Instruction ID: f930934489d04038fdac5130ddf17dbe1d2010bc2603107a055269d685707e2d
                                        • Opcode Fuzzy Hash: 64beeb72b5c221137ea541a5cf1e16cfe15d8772f347ad27875c0f288d680339
                                        • Instruction Fuzzy Hash: A1F09631800505DFDF05E760C86ABAD2366AF41750F548518F915671D1EF3C9E058B91
                                        APIs
                                        • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,00000000,?,007A33BB,00000000,00000001,?,007846E4,?,007996E0,007846E4,00000000,00000000), ref: 007A4580
                                        • GetLastError.KERNEL32(?,007A33BB,00000000,00000001,?,007846E4,?,007996E0,007846E4,00000000,00000000,007846E4,007846E4,?,00799CBA,0073E60C), ref: 007A458C
                                          • Part of subcall function 007A4552: CloseHandle.KERNEL32(FFFFFFFE,007A459C,?,007A33BB,00000000,00000001,?,007846E4,?,007996E0,007846E4,00000000,00000000,007846E4,007846E4), ref: 007A4562
                                        • ___initconout.LIBCMT ref: 007A459C
                                          • Part of subcall function 007A4514: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,007A4543,007A33A8,007846E4,?,007996E0,007846E4,00000000,00000000,007846E4), ref: 007A4527
                                        • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,?,007A33BB,00000000,00000001,?,007846E4,?,007996E0,007846E4,00000000,00000000,007846E4), ref: 007A45B1
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                        • String ID:
                                        • API String ID: 2744216297-0
                                        • Opcode ID: 1913a7eb892437c597aef6850917618c415ab08c5db2df8199fcbdb70c441504
                                        • Instruction ID: 53ad6a4c89a7bf3b5f7ef46e2faa109c461feb5ac0e032983b6fd762f2015c9d
                                        • Opcode Fuzzy Hash: 1913a7eb892437c597aef6850917618c415ab08c5db2df8199fcbdb70c441504
                                        • Instruction Fuzzy Hash: A3F01C36540128BBCF222F95DC0899A3F66FB8B3A0F048124FA1986131DB768831DB95
                                        APIs
                                        • GetDC.USER32(00000000), ref: 00731093
                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 007310A2
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007310B0
                                        • ReleaseDC.USER32(00000000,00000000), ref: 007310BE
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: CapsDevice$Release
                                        • String ID:
                                        • API String ID: 1035833867-0
                                        • Opcode ID: 6589928c6f4b095b87dbec05cd7e0107c067d6e4f6aaba251812cd7a5faee9e6
                                        • Instruction ID: 7ee14734c41651f1704627b3281c373c0bb7265aa6c6449bd1c0111943873fc4
                                        • Opcode Fuzzy Hash: 6589928c6f4b095b87dbec05cd7e0107c067d6e4f6aaba251812cd7a5faee9e6
                                        • Instruction Fuzzy Hash: 71E0EC36540681B7D2511B75AC0DF5B7B74B7C6B02F00C019F2069A5E0DB7C8085CF1A
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: H_prolog3___cftoe
                                        • String ID: !%x
                                        • API String ID: 855520168-1893981228
                                        • Opcode ID: bb411082a65a871c3739a8d53d83e6c704f31ba8bf2f9610bc421f155625e50c
                                        • Instruction ID: ad5901e4ede91c4a24a694d59d6712adaa2418d4d30b03f6cb1f49eb73e6503d
                                        • Opcode Fuzzy Hash: bb411082a65a871c3739a8d53d83e6c704f31ba8bf2f9610bc421f155625e50c
                                        • Instruction Fuzzy Hash: 5E716871D00109EFDF18EFA8E885AEDB7B5FF48344F108529F919A7251EB39A941CB50
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 0077A1EF
                                        • swprintf.LIBCMT ref: 0077A267
                                          • Part of subcall function 00770BF3: __EH_prolog3.LIBCMT ref: 00770BFA
                                          • Part of subcall function 00770BF3: std::_Lockit::_Lockit.LIBCPMT ref: 00770C04
                                          • Part of subcall function 00770BF3: int.LIBCPMT ref: 00770C1B
                                          • Part of subcall function 0076D0F1: _wmemset.LIBCMT ref: 0076D11A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: H_prolog3H_prolog3_LockitLockit::__wmemsetstd::_swprintf
                                        • String ID: %.0Lf
                                        • API String ID: 2528782737-1402515088
                                        • Opcode ID: 134a20cd0d2a10a795c212ac6f997de2d83c4908c6575c95669ea0aa567d1434
                                        • Instruction ID: ef5abc887bf6a7423fdd1269c148223d3ff953ffd6d995577a1f6fb5aaec3f6f
                                        • Opcode Fuzzy Hash: 134a20cd0d2a10a795c212ac6f997de2d83c4908c6575c95669ea0aa567d1434
                                        • Instruction Fuzzy Hash: E5617971D00218EFDF09DFE4C854AEDBBB9FF88340F208519E406AB295EB399915CB91
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 0077A51C
                                        • swprintf.LIBCMT ref: 0077A594
                                          • Part of subcall function 00770C88: __EH_prolog3.LIBCMT ref: 00770C8F
                                          • Part of subcall function 00770C88: std::_Lockit::_Lockit.LIBCPMT ref: 00770C99
                                          • Part of subcall function 00770C88: int.LIBCPMT ref: 00770CB0
                                          • Part of subcall function 0076D0F1: _wmemset.LIBCMT ref: 0076D11A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: H_prolog3H_prolog3_LockitLockit::__wmemsetstd::_swprintf
                                        • String ID: %.0Lf
                                        • API String ID: 2528782737-1402515088
                                        • Opcode ID: beb36f58484c42bf0763b9a8b2656e88cae227f4c764fd3467360182f22b29b6
                                        • Instruction ID: 500841f9fad8448b906fb273db2620ce45d58057d366beaa31db562e9b608f98
                                        • Opcode Fuzzy Hash: beb36f58484c42bf0763b9a8b2656e88cae227f4c764fd3467360182f22b29b6
                                        • Instruction Fuzzy Hash: 94616E71D00218EFDF09DFE4C854AEDBBB5FF88340F208519E506AB295EB399915CB91
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: __aulldiv
                                        • String ID: -$0123456789abcdefghijklmnopqrstuvwxyz
                                        • API String ID: 3732870572-1956417402
                                        • Opcode ID: c010679d29f9655bc12a8e97adec78f3d4dd17cf2024504a2a462cf27fbb48bf
                                        • Instruction ID: 121257431593824823585c4cffaa14d8046c5f3d371b0217b848b893d82c498a
                                        • Opcode Fuzzy Hash: c010679d29f9655bc12a8e97adec78f3d4dd17cf2024504a2a462cf27fbb48bf
                                        • Instruction Fuzzy Hash: 4B512530A04289AFDF25CE7C85417BEBBF5AF46380F54847AE488D7292D6BC8941CB61
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 0077F6F9
                                        • swprintf.LIBCMT ref: 0077F771
                                          • Part of subcall function 0073B390: std::_Lockit::_Lockit.LIBCPMT ref: 0073B3BD
                                          • Part of subcall function 0073B390: std::_Lockit::_Lockit.LIBCPMT ref: 0073B3E0
                                          • Part of subcall function 0073B390: std::_Lockit::~_Lockit.LIBCPMT ref: 0073B400
                                          • Part of subcall function 0073B390: std::_Lockit::~_Lockit.LIBCPMT ref: 0073B48D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3_swprintf
                                        • String ID: %.0Lf
                                        • API String ID: 898875175-1402515088
                                        • Opcode ID: 93a4162822ddd4187072e9da22c8076a5d64227b5d2b77ba178c1bcd88d7b543
                                        • Instruction ID: f160c492c02ad3d82b4910a0e388afbd22058a588a639ec850c6f1d94b4b8ed8
                                        • Opcode Fuzzy Hash: 93a4162822ddd4187072e9da22c8076a5d64227b5d2b77ba178c1bcd88d7b543
                                        • Instruction Fuzzy Hash: ED617D71D00218EFCF09DFE4C955AEDBBB9FF48340F108529E506AB291EB39A915CB91
                                        APIs
                                        • EncodePointer.KERNEL32(00000000,?), ref: 0078361E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: EncodePointer
                                        • String ID: MOC$RCC
                                        • API String ID: 2118026453-2084237596
                                        • Opcode ID: aba62d10cd0a4648ebe97a358dbe6ebfeda22035a14ff324f20a90d820fc22f1
                                        • Instruction ID: a9f70edca925edbc1ee42b6fba9b6e86babd41bf0f1697aadacef666786c1209
                                        • Opcode Fuzzy Hash: aba62d10cd0a4648ebe97a358dbe6ebfeda22035a14ff324f20a90d820fc22f1
                                        • Instruction Fuzzy Hash: DA4159B1A40209EFCF15EF98CC85AAEBBB5FF48700F188059F90566261E3399A51DB50
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 0077A0C1
                                          • Part of subcall function 00770BF3: __EH_prolog3.LIBCMT ref: 00770BFA
                                          • Part of subcall function 00770BF3: std::_Lockit::_Lockit.LIBCPMT ref: 00770C04
                                          • Part of subcall function 00770BF3: int.LIBCPMT ref: 00770C1B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: H_prolog3H_prolog3_LockitLockit::_std::_
                                        • String ID: %.0Lf$0123456789-
                                        • API String ID: 79917597-3094241602
                                        • Opcode ID: 71a5ced580ddb92974de68be31d7da1fd985d4e026019e9c21ccb05fce9958e5
                                        • Instruction ID: 222a87a687ba745a729ae17b8f5e1d6cae0218b39315839b5ef3b9ca89202bd8
                                        • Opcode Fuzzy Hash: 71a5ced580ddb92974de68be31d7da1fd985d4e026019e9c21ccb05fce9958e5
                                        • Instruction Fuzzy Hash: 32419C71A0011DEFDF05EFE8C8949EEBBB5BF48310F504129E809AB251DB389D46CB91
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 0077A3EE
                                          • Part of subcall function 00770C88: __EH_prolog3.LIBCMT ref: 00770C8F
                                          • Part of subcall function 00770C88: std::_Lockit::_Lockit.LIBCPMT ref: 00770C99
                                          • Part of subcall function 00770C88: int.LIBCPMT ref: 00770CB0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: H_prolog3H_prolog3_LockitLockit::_std::_
                                        • String ID: 0123456789-$0123456789-
                                        • API String ID: 79917597-2494171821
                                        • Opcode ID: 19203cefdc03691654e55aee394032d6354a7c09344e96dde7803eb00b133f60
                                        • Instruction ID: 4bd1cd2ad2a731751c9b2cfdcc0ff09117150150bf64c905ddc94d10c6c385bb
                                        • Opcode Fuzzy Hash: 19203cefdc03691654e55aee394032d6354a7c09344e96dde7803eb00b133f60
                                        • Instruction Fuzzy Hash: 3841CD31D00258EFCF15DFE8C8849EEBBB1BF48310F104129E805AB251DB399D55CB66
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 0077F5CD
                                          • Part of subcall function 0073B390: std::_Lockit::_Lockit.LIBCPMT ref: 0073B3BD
                                          • Part of subcall function 0073B390: std::_Lockit::_Lockit.LIBCPMT ref: 0073B3E0
                                          • Part of subcall function 0073B390: std::_Lockit::~_Lockit.LIBCPMT ref: 0073B400
                                          • Part of subcall function 0073B390: std::_Lockit::~_Lockit.LIBCPMT ref: 0073B48D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3_
                                        • String ID: 0123456789-$0123456789-
                                        • API String ID: 2088892359-2494171821
                                        • Opcode ID: a0113320e4a37a7a6cb549b8cf327b221003991b348dc75ffa4e6c27c28c0a21
                                        • Instruction ID: 738ed31785c29c1af7875284c0857503e4f31c583fe9464d786e0379fe97158d
                                        • Opcode Fuzzy Hash: a0113320e4a37a7a6cb549b8cf327b221003991b348dc75ffa4e6c27c28c0a21
                                        • Instruction Fuzzy Hash: F1418B31E00219EFCF05EFA4D9959EEBBB5BF08310F108069F915AB262DB389E15CB51
                                        APIs
                                        • std::_Throw_Cpp_error.LIBCPMT ref: 0076C90F
                                        • GetCurrentThreadId.KERNEL32 ref: 0076C940
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Cpp_errorCurrentThreadThrow_std::_
                                        • String ID: x?|
                                        • API String ID: 350343453-2765027281
                                        • Opcode ID: c5902ec3fd4b208ad89f243786abf58cbddf79cb23baeb0aae43710ef9b2443d
                                        • Instruction ID: 2a1c9aad46b7e4c453c05449383d81ae9cc105b63bde5951a344241fff617d3f
                                        • Opcode Fuzzy Hash: c5902ec3fd4b208ad89f243786abf58cbddf79cb23baeb0aae43710ef9b2443d
                                        • Instruction Fuzzy Hash: 3821CF31600B06DBDB269B95D816BBAB3A4EF45760F00052EEDD797681DB7DBC008A94
                                        APIs
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 007442FB
                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0074434A
                                          • Part of subcall function 0076808B: _Yarn.LIBCPMT ref: 007680AA
                                          • Part of subcall function 0076808B: _Yarn.LIBCPMT ref: 007680CE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Yarnstd::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                        • String ID: bad locale name
                                        • API String ID: 1908188788-1405518554
                                        • Opcode ID: 7694b1b9affbce199d3ab9c839e1ebde364beed857df23edb3c85a4ae0db695d
                                        • Instruction ID: d6b59c9cd54e11ee7dab5c5b1b6382ce4c2287b45fcb9df515feee532e3933cd
                                        • Opcode Fuzzy Hash: 7694b1b9affbce199d3ab9c839e1ebde364beed857df23edb3c85a4ae0db695d
                                        • Instruction Fuzzy Hash: C1117CB1904B84EFD720CF68C805B46BBE4EF19714F048A5EE84A87A41D77AA604CB92
                                        APIs
                                        • GetStdHandle.KERNEL32(000000F6), ref: 0079605E
                                        • GetFileType.KERNEL32(00000000), ref: 00796070
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: FileHandleType
                                        • String ID: @Le
                                        • API String ID: 3000768030-4006592780
                                        • Opcode ID: f55cddc32c6e65112c70349715ae87a42f6eb7fad3e52b4627f351cfdbd4581d
                                        • Instruction ID: d10a1e1b1ba3baff20e77225ec8abb02ddd9d0314683596a22a28eff69ce7f32
                                        • Opcode Fuzzy Hash: f55cddc32c6e65112c70349715ae87a42f6eb7fad3e52b4627f351cfdbd4581d
                                        • Instruction Fuzzy Hash: 931103311047418ACF308F3EAED8E227A95A792370B38070ED2F6865F5D33DD986D245
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: H_prolog3_
                                        • String ID: false$true
                                        • API String ID: 2427045233-2658103896
                                        • Opcode ID: 1a6cd49d776f5900fc4d8789363cdb3fabaa652aef3c4f298ee64308a2703645
                                        • Instruction ID: bd1f7a8865322b53587dca99473321fc5fe7665391009c8d378ba491ab4060a7
                                        • Opcode Fuzzy Hash: 1a6cd49d776f5900fc4d8789363cdb3fabaa652aef3c4f298ee64308a2703645
                                        • Instruction Fuzzy Hash: C4118175900745EEC725EF74D405E8ABBF4AF05300F04862AF592DB642EB78A504CB61
                                        APIs
                                        • MessageBoxA.USER32(00000000,00000000,Xml Exception,00000000), ref: 0074D785
                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 0074D79C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Message___std_exception_destroy
                                        • String ID: Xml Exception
                                        • API String ID: 1031581076-3835875383
                                        • Opcode ID: 05f70b2be547f2622f30e33094713aecb575e0b5ebda34d2d79f7fc1f3e5c258
                                        • Instruction ID: 602d929f8ea949bee35e4e283be5f2c0f7298e724f89fd3a4fd07ec455aa61a5
                                        • Opcode Fuzzy Hash: 05f70b2be547f2622f30e33094713aecb575e0b5ebda34d2d79f7fc1f3e5c258
                                        • Instruction Fuzzy Hash: F9E0C2B4E4324D6EFBB0A7108C1AFA87278ABE1700F4000F0F08462091DBBD2E948F12
                                        APIs
                                        • MessageBoxA.USER32(00000000,Unknown,Unknown Exception,00000000), ref: 0074D7C1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: Message
                                        • String ID: Unknown$Unknown Exception
                                        • API String ID: 2030045667-3978676936
                                        • Opcode ID: 48950a4bb603a81466ffcf2c5dc08dab21718873605cd531f203a1fb89124325
                                        • Instruction ID: 8968832e1667b4e7e4465a9e805812968bcc288fdd6e91e459ceaf77a274e0bd
                                        • Opcode Fuzzy Hash: 48950a4bb603a81466ffcf2c5dc08dab21718873605cd531f203a1fb89124325
                                        • Instruction Fuzzy Hash: DAC09B657893497FF77113508C07B18192057D3F15F444190F1C4741C18BEC3C408A05
                                        APIs
                                        • SetEnvironmentVariableW.KERNEL32(TEMP,C:\NonExistentPath), ref: 6BED4AED
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2292258011.000000006BEB1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BEB0000, based on PE: true
                                        • Associated: 00000006.00000002.2292241036.000000006BEB0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292289619.000000006BEE6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292309996.000000006BEF4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292425687.000000006C109000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292558037.000000006C35B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000006.00000002.2292594857.000000006C35C000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_6beb0000_GUP.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: EnvironmentVariable
                                        • String ID: C:\NonExistentPath$TEMP
                                        • API String ID: 1431749950-4013690577
                                        • Opcode ID: 2fa9dc6567dad3a3970d881007e942ad6a72eeb228ca50e039fb6e0c34df3ae0
                                        • Instruction ID: b9a689e1c357150181ad338e608716a936c44da8be828d31bf94377230143439
                                        • Opcode Fuzzy Hash: 2fa9dc6567dad3a3970d881007e942ad6a72eeb228ca50e039fb6e0c34df3ae0
                                        • Instruction Fuzzy Hash: 47A0223200022CBF0E002FCABC08C003B0CF282838F308000F30E00000BB0AB00300BB
                                        APIs
                                          • Part of subcall function 00766BE0: WaitForSingleObject.KERNEL32(00000001,000000FF,?,00766A37,?,?,007531AE,00000000,?,?,007668CB,?,?,?), ref: 00766BE8
                                          • Part of subcall function 00766B70: SetEvent.KERNEL32(007668E1,?,007668E1,007531AE), ref: 00766B78
                                        • EnterCriticalSection.KERNEL32(?), ref: 00765D61
                                        • EnterCriticalSection.KERNEL32(?), ref: 00765D6E
                                        • LeaveCriticalSection.KERNEL32(?), ref: 00765DA8
                                        • LeaveCriticalSection.KERNEL32(?), ref: 00765DAB
                                          • Part of subcall function 00766C30: ReleaseSemaphore.KERNEL32(00000001,00000001,00000000,?,00766A2F,?,007531AE,00000000,?,?,007668CB,?,?,?), ref: 00766C3C
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2291694030.0000000000731000.00000020.00000001.01000000.00000005.sdmp, Offset: 00730000, based on PE: true
                                        • Associated: 00000006.00000002.2291675530.0000000000730000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291749166.00000000007AA000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291774463.00000000007C1000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291791096.00000000007C2000.00000008.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291807812.00000000007C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000006.00000002.2291825173.00000000007C5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_730000_GUP.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave$EventObjectReleaseSemaphoreSingleWait
                                        • String ID:
                                        • API String ID: 3648152314-0
                                        • Opcode ID: 4654bd09cd81b6537577db0727db09b3f8f05d90bdf475bb652a5e77a2dc5c18
                                        • Instruction ID: e70da259e04214e8c550fd59e398f661ad86a9f855d1dceee67c32d6b3d3e54d
                                        • Opcode Fuzzy Hash: 4654bd09cd81b6537577db0727db09b3f8f05d90bdf475bb652a5e77a2dc5c18
                                        • Instruction Fuzzy Hash: 9B519071A00A09EFC700DF74C888ADAB7B8FF05304F544569E85A87211EB39FA65DB90