Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
flashcenter_pp_ax_inst78ll_cn.exe

Overview

General Information

Sample name:flashcenter_pp_ax_inst78ll_cn.exe
Analysis ID:1567181
MD5:72469bd8f1f59ddf5512635418b4dcfa
SHA1:7319eff3e05f09169e94f68b365f4b765bba4682
SHA256:d21de9b307b41aaab3ca9efdf78d15518fa40158eabeb8a06eca0373cf0068db
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
PE file contains section with special chars
Binary contains a suspicious time stamp
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • flashcenter_pp_ax_inst78ll_cn.exe (PID: 7132 cmdline: "C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exe" MD5: 72469BD8F1F59DDF5512635418B4DCFA)
    • flashcenter_pp_ax_inst78ll_cn.tmp (PID: 4972 cmdline: "C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmp" /SL5="$2042C,19484773,802304,C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exe" MD5: 4AB29A55C7DDA14917A7D3E75504E7E1)
      • 99e5df4d8.exe (PID: 5252 cmdline: "C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exe" -p4f63a7bd -y -o"C:\Users\user\AppData\Local\Temp\is-3DAJ2.tmp\..\76809449335627201121797450\" MD5: 1265F20F7C304FCD1B1E4E92A1C61266)
        • conhost.exe (PID: 1764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • svaulpzg.exe (PID: 4052 cmdline: "C:\Users\user\AppData\Local\Temp\is-3DAJ2.tmp\..\76809449335627201121797450\svaulpzg.exe" MD5: 0A20FE1FA39C704C6292B05F367D634B)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\WXFManager64.dllVirustotal: Detection: 18%Perma Link
Source: flashcenter_pp_ax_inst78ll_cn.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: flashcenter_pp_ax_inst78ll_cn.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\a\Courier\Courier\out\build\windows-release-x64\Release\ZipSendService.pdb source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, svaulpzg.exe, 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmp, svaulpzg.exe, 00000005.00000000.2159327028.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmp, svaulpzg.exe.3.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdb source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, svaulpzg.exe, 00000005.00000002.2190175865.00007FFDA54B5000.00000002.00000001.01000000.0000000B.sdmp, vcruntime140_1.dll.3.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\msvcp140.amd64.pdb source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, svaulpzg.exe, 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmp, msvcp140.dll.3.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\msvcp140.amd64.pdbGCTL source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, svaulpzg.exe, 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmp, msvcp140.dll.3.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, svaulpzg.exe, 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmp, vcruntime140.dll.3.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, svaulpzg.exe, 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmp, vcruntime140.dll.3.dr
Source: Binary string: D:\a\Courier\Courier\out\build\windows-release-x64\Release\ZipSendService.pdbDD0GCTL source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, svaulpzg.exe, 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmp, svaulpzg.exe, 00000005.00000000.2159327028.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmp, svaulpzg.exe.3.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdbGCTL source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, svaulpzg.exe, 00000005.00000002.2190175865.00007FFDA54B5000.00000002.00000001.01000000.0000000B.sdmp, vcruntime140_1.dll.3.dr
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_00405A8D FindFirstFileW,3_2_00405A8D
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD944EA3A0 FindFirstFileExW,FindClose,wcscpy_s,_invalid_parameter_noinfo_noreturn,5_2_00007FFD944EA3A0
Source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drString found in binary or memory: http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0_
Source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drString found in binary or memory: http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0
Source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drString found in binary or memory: http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0
Source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drString found in binary or memory: http://ocsp.digicert.com0A
Source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drString found in binary or memory: http://ocsp.digicert.com0C
Source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drString found in binary or memory: http://ocsp.digicert.com0X
Source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drString found in binary or memory: http://ocsps.ssl.com0
Source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drString found in binary or memory: http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt0
Source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drString found in binary or memory: http://www.winzip.com/authenticode.htm0
Source: flashcenter_pp_ax_inst78ll_cn.exeString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: flashcenter_pp_ax_inst78ll_cn.exe, 00000000.00000003.2125986998.000000007F1FB000.00000004.00001000.00020000.00000000.sdmp, flashcenter_pp_ax_inst78ll_cn.exe, 00000000.00000003.2125606246.00000000029B0000.00000004.00001000.00020000.00000000.sdmp, flashcenter_pp_ax_inst78ll_cn.tmp, 00000002.00000000.2127558309.0000000000431000.00000020.00000001.01000000.00000004.sdmp, flashcenter_pp_ax_inst78ll_cn.tmp.0.drString found in binary or memory: https://www.innosetup.com/
Source: flashcenter_pp_ax_inst78ll_cn.exe, 00000000.00000003.2125986998.000000007F1FB000.00000004.00001000.00020000.00000000.sdmp, flashcenter_pp_ax_inst78ll_cn.exe, 00000000.00000003.2125606246.00000000029B0000.00000004.00001000.00020000.00000000.sdmp, flashcenter_pp_ax_inst78ll_cn.tmp, 00000002.00000000.2127558309.0000000000431000.00000020.00000001.01000000.00000004.sdmp, flashcenter_pp_ax_inst78ll_cn.tmp.0.drString found in binary or memory: https://www.remobjects.com/ps
Source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drString found in binary or memory: https://www.ssl.com/repository0

System Summary

barindex
Source: WXFManager64.dll.3.drStatic PE information: section name: . vt
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_00414F303_2_00414F30
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_0040704D3_2_0040704D
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_004240A03_2_004240A0
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_0041E1E03_2_0041E1E0
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_004212C03_2_004212C0
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_004253603_2_00425360
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_004253EC3_2_004253EC
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_004194A93_2_004194A9
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_004266203_2_00426620
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_004226B03_2_004226B0
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_004028663_2_00402866
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_004248E03_2_004248E0
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_0041E9A03_2_0041E9A0
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_00424AB03_2_00424AB0
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_00420CA93_2_00420CA9
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_0041DDB03_2_0041DDB0
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FF7E3BDBC405_2_00007FF7E3BDBC40
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FF7E3BDF4005_2_00007FF7E3BDF400
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FF7E3BD23C05_2_00007FF7E3BD23C0
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FF7E3BDA6805_2_00007FF7E3BDA680
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FF7E3BD59B05_2_00007FF7E3BD59B0
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FF7E3BDF1605_2_00007FF7E3BDF160
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD944FF4CC5_2_00007FFD944FF4CC
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD944F64905_2_00007FFD944F6490
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD944EBDCC5_2_00007FFD944EBDCC
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD94502D605_2_00007FFD94502D60
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD94512E205_2_00007FFD94512E20
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD945135F05_2_00007FFD945135F0
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD944FAEAC5_2_00007FFD944FAEAC
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD945156905_2_00007FFD94515690
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD94517F585_2_00007FFD94517F58
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD9451A7185_2_00007FFD9451A718
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD945117CC5_2_00007FFD945117CC
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD944F67C05_2_00007FFD944F67C0
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD9451A0185_2_00007FFD9451A018
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD945147E05_2_00007FFD945147E0
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD945048985_2_00007FFD94504898
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD945051305_2_00007FFD94505130
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD9450A9C05_2_00007FFD9450A9C0
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD9450096C5_2_00007FFD9450096C
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD944EF2205_2_00007FFD944EF220
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD944EBA485_2_00007FFD944EBA48
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD94503A105_2_00007FFD94503A10
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD944F6B185_2_00007FFD944F6B18
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD944ED3A85_2_00007FFD944ED3A8
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD944F8B785_2_00007FFD944F8B78
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD944F73645_2_00007FFD944F7364
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD944FA38C5_2_00007FFD944FA38C
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD94518BF85_2_00007FFD94518BF8
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFDA37330425_2_00007FFDA3733042
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFDA35610005_2_00007FFDA3561000
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFDA3732EDA5_2_00007FFDA3732EDA
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFDA433635C5_2_00007FFDA433635C
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\msvcp140.dll A4C2229BDC2A2A630ACDC095B4D86008E5C3E3BC7773174354F3DA4F5BEB9CDE
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: String function: 00425A80 appears 186 times
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: String function: 00403BA5 appears 61 times
Source: flashcenter_pp_ax_inst78ll_cn.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: flashcenter_pp_ax_inst78ll_cn.exeStatic PE information: Number of sections : 11 > 10
Source: flashcenter_pp_ax_inst78ll_cn.tmp.0.drStatic PE information: Number of sections : 11 > 10
Source: flashcenter_pp_ax_inst78ll_cn.exe, 00000000.00000000.2123366862.00000000002E9000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs flashcenter_pp_ax_inst78ll_cn.exe
Source: flashcenter_pp_ax_inst78ll_cn.exe, 00000000.00000003.2125986998.000000007F4EB000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs flashcenter_pp_ax_inst78ll_cn.exe
Source: flashcenter_pp_ax_inst78ll_cn.exe, 00000000.00000003.2125606246.0000000002ABF000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs flashcenter_pp_ax_inst78ll_cn.exe
Source: flashcenter_pp_ax_inst78ll_cn.exeBinary or memory string: OriginalFileName vs flashcenter_pp_ax_inst78ll_cn.exe
Source: flashcenter_pp_ax_inst78ll_cn.exeBinary or memory string: OriginalFilename7z.sfx.exe, vs flashcenter_pp_ax_inst78ll_cn.exe
Source: flashcenter_pp_ax_inst78ll_cn.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal52.winEXE@8/11@0/0
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD944EA880 GetDiskFreeSpaceExW,_invalid_parameter_noinfo_noreturn,5_2_00007FFD944EA880
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FF7E3BDB970 CoCreateInstance,GetModuleFileNameW,5_2_00007FF7E3BDB970
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpFile created: C:\Users\user\AppData\Roaming\9430dadJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1764:120:WilError_03
Source: C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exeFile created: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmpJump to behavior
Source: C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
Source: flashcenter_pp_ax_inst78ll_cn.exeString found in binary or memory: /LOADINF="filename"
Source: C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exeFile read: C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exe "C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exe"
Source: C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exeProcess created: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmp "C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmp" /SL5="$2042C,19484773,802304,C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exe"
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpProcess created: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exe "C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exe" -p4f63a7bd -y -o"C:\Users\user\AppData\Local\Temp\is-3DAJ2.tmp\..\76809449335627201121797450\"
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpProcess created: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exe "C:\Users\user\AppData\Local\Temp\is-3DAJ2.tmp\..\76809449335627201121797450\svaulpzg.exe"
Source: C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exeProcess created: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmp "C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmp" /SL5="$2042C,19484773,802304,C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpProcess created: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exe "C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exe" -p4f63a7bd -y -o"C:\Users\user\AppData\Local\Temp\is-3DAJ2.tmp\..\76809449335627201121797450\"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpProcess created: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exe "C:\Users\user\AppData\Local\Temp\is-3DAJ2.tmp\..\76809449335627201121797450\svaulpzg.exe"Jump to behavior
Source: C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: iconcodecservice.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeSection loaded: wxfmanager64.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpWindow found: window name: TMainFormJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: flashcenter_pp_ax_inst78ll_cn.exeStatic file information: File size 20442024 > 1048576
Source: flashcenter_pp_ax_inst78ll_cn.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\a\Courier\Courier\out\build\windows-release-x64\Release\ZipSendService.pdb source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, svaulpzg.exe, 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmp, svaulpzg.exe, 00000005.00000000.2159327028.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmp, svaulpzg.exe.3.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdb source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, svaulpzg.exe, 00000005.00000002.2190175865.00007FFDA54B5000.00000002.00000001.01000000.0000000B.sdmp, vcruntime140_1.dll.3.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\msvcp140.amd64.pdb source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, svaulpzg.exe, 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmp, msvcp140.dll.3.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\msvcp140.amd64.pdbGCTL source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, svaulpzg.exe, 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmp, msvcp140.dll.3.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, svaulpzg.exe, 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmp, vcruntime140.dll.3.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, svaulpzg.exe, 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmp, vcruntime140.dll.3.dr
Source: Binary string: D:\a\Courier\Courier\out\build\windows-release-x64\Release\ZipSendService.pdbDD0GCTL source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, svaulpzg.exe, 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmp, svaulpzg.exe, 00000005.00000000.2159327028.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmp, svaulpzg.exe.3.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdbGCTL source: 99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, svaulpzg.exe, 00000005.00000002.2190175865.00007FFDA54B5000.00000002.00000001.01000000.0000000B.sdmp, vcruntime140_1.dll.3.dr
Source: msvcp140.dll.3.drStatic PE information: 0xB3DF2F63 [Mon Aug 17 15:25:23 2065 UTC]
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FF7E3BDBC40 RegOpenKeyExW,RegQueryInfoKeyW,RegCloseKey,malloc,RegEnumValueW,memcpy,GetFileVersionInfoSizeW,malloc,GetFileVersionInfoW,VerQueryValueW,memcpy,free,free,RegCloseKey,RegOpenKeyExW,memset,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,LoadLibraryW,GetProcAddress,FreeLibrary,SHDeleteKeyW,RegSetValueExW,RegCloseKey,5_2_00007FF7E3BDBC40
Source: flashcenter_pp_ax_inst78ll_cn.exeStatic PE information: section name: .didata
Source: flashcenter_pp_ax_inst78ll_cn.tmp.0.drStatic PE information: section name: .didata
Source: is-URMQG.tmp.2.drStatic PE information: section name: .sxdata
Source: vcruntime140.dll.3.drStatic PE information: section name: fothk
Source: vcruntime140.dll.3.drStatic PE information: section name: _RDATA
Source: WXFManager64.dll.3.drStatic PE information: section name: .00cfg
Source: WXFManager64.dll.3.drStatic PE information: section name: .gxfg
Source: WXFManager64.dll.3.drStatic PE information: section name: .retplne
Source: WXFManager64.dll.3.drStatic PE information: section name: _RDATA
Source: WXFManager64.dll.3.drStatic PE information: section name: . vt
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_00425A80 push eax; ret 3_2_00425A9E
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_00425E10 push eax; ret 3_2_00425E3E
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFDA356613F push r14; iretd 5_2_00007FFDA3566168
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFDA3562853 push rcx; iretd 5_2_00007FFDA3562854
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFDA35627E5 push rsi; ret 5_2_00007FFDA35627E6
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFDA3564FF7 push rsp; retf 5_2_00007FFDA3565009
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFDA35686A2 pushfq ; ret 5_2_00007FFDA35686AA
Source: WXFManager64.dll.3.drStatic PE information: section name: .text entropy: 7.221036407638945
Source: WXFManager64.dll.3.drStatic PE information: section name: . vt entropy: 7.917881220510166
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpFile created: C:\Users\user\AppData\Local\Temp\is-3DAJ2.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeFile created: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\vcruntime140.dllJump to dropped file
Source: C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exeFile created: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpJump to dropped file
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeFile created: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpFile created: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeFile created: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\msvcp140.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeFile created: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\vcruntime140_1.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeFile created: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\WXFManager64.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpFile created: C:\Users\user\AppData\Roaming\9430dad\is-URMQG.tmpJump to dropped file
Source: C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-3DAJ2.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeAPI coverage: 1.1 %
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_00405A8D FindFirstFileW,3_2_00405A8D
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD944EA3A0 FindFirstFileExW,FindClose,wcscpy_s,_invalid_parameter_noinfo_noreturn,5_2_00007FFD944EA3A0
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_0040736E GetSystemInfo,3_2_0040736E
Source: flashcenter_pp_ax_inst78ll_cn.exe, is-URMQG.tmp.2.drBinary or memory string: hgfS]
Source: C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmpProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FF7E3BE20F0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FF7E3BE20F0
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FF7E3BE24C0 GetLastError,IsDebuggerPresent,OutputDebugStringW,5_2_00007FF7E3BE24C0
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FF7E3BDBC40 RegOpenKeyExW,RegQueryInfoKeyW,RegCloseKey,malloc,RegEnumValueW,memcpy,GetFileVersionInfoSizeW,malloc,GetFileVersionInfoW,VerQueryValueW,memcpy,free,free,RegCloseKey,RegOpenKeyExW,memset,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,LoadLibraryW,GetProcAddress,FreeLibrary,SHDeleteKeyW,RegSetValueExW,RegCloseKey,5_2_00007FF7E3BDBC40
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FF7E3BE18DC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00007FF7E3BE18DC
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FF7E3BE20F0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FF7E3BE20F0
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FF7E3BE22D0 SetUnhandledExceptionFilter,5_2_00007FF7E3BE22D0
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFD945323A0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00007FFD945323A0
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFDA4340C18 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00007FFDA4340C18
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: 5_2_00007FFDA54B4738 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00007FFDA54B4738
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_00426100 cpuid 3_2_00426100
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: ___lc_locale_name_func,GetLocaleInfoEx,5_2_00007FFD9450D830
Source: C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exeCode function: GetLocaleInfoEx,FormatMessageA,5_2_00007FFD944F207C
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_00407455 GetSystemTimeAsFileTime,3_2_00407455
Source: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exeCode function: 3_2_00426040 GetVersion,3_2_00426040
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory121
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
Obfuscated Files or Information
NTDS2
System Owner/User Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Software Packing
LSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Timestomp
Cached Domain Credentials25
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
flashcenter_pp_ax_inst78ll_cn.exe4%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\76809449335627201121797450\WXFManager64.dll18%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\76809449335627201121797450\msvcp140.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\76809449335627201121797450\msvcp140.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\76809449335627201121797450\vcruntime140.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\76809449335627201121797450\vcruntime140_1.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-3DAJ2.tmp\_isetup\_setup64.tmp0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl099e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drfalse
    high
    https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUflashcenter_pp_ax_inst78ll_cn.exefalse
      high
      http://ocsps.ssl.com099e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drfalse
        high
        http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl099e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drfalse
          high
          http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0_99e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drfalse
            high
            http://www.winzip.com/authenticode.htm099e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drfalse
              high
              http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt099e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drfalse
                high
                https://www.remobjects.com/psflashcenter_pp_ax_inst78ll_cn.exe, 00000000.00000003.2125986998.000000007F1FB000.00000004.00001000.00020000.00000000.sdmp, flashcenter_pp_ax_inst78ll_cn.exe, 00000000.00000003.2125606246.00000000029B0000.00000004.00001000.00020000.00000000.sdmp, flashcenter_pp_ax_inst78ll_cn.tmp, 00000002.00000000.2127558309.0000000000431000.00000020.00000001.01000000.00000004.sdmp, flashcenter_pp_ax_inst78ll_cn.tmp.0.drfalse
                  high
                  https://www.innosetup.com/flashcenter_pp_ax_inst78ll_cn.exe, 00000000.00000003.2125986998.000000007F1FB000.00000004.00001000.00020000.00000000.sdmp, flashcenter_pp_ax_inst78ll_cn.exe, 00000000.00000003.2125606246.00000000029B0000.00000004.00001000.00020000.00000000.sdmp, flashcenter_pp_ax_inst78ll_cn.tmp, 00000002.00000000.2127558309.0000000000431000.00000020.00000001.01000000.00000004.sdmp, flashcenter_pp_ax_inst78ll_cn.tmp.0.drfalse
                    high
                    https://www.ssl.com/repository099e5df4d8.exe, 00000003.00000003.2152499649.0000000002590000.00000004.00001000.00020000.00000000.sdmp, WXFManager64.dll.3.dr, svaulpzg.exe.3.drfalse
                      high
                      No contacted IP infos
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1567181
                      Start date and time:2024-12-03 08:53:46 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 3m 58s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:6
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:flashcenter_pp_ax_inst78ll_cn.exe
                      Detection:MAL
                      Classification:mal52.winEXE@8/11@0/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 85%
                      • Number of executed functions: 86
                      • Number of non-executed functions: 246
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Stop behavior analysis, all processes terminated
                      • Exclude process from analysis (whitelisted): dllhost.exe
                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, otelrules.azureedge.net
                      • Not all processes where analyzed, report is missing behavior information
                      TimeTypeDescription
                      02:54:40API Interceptor1x Sleep call for process: svaulpzg.exe modified
                      No context
                      No context
                      No context
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      C:\Users\user\AppData\Local\Temp\76809449335627201121797450\msvcp140.dlliDvmIRCPBw.exeGet hashmaliciousUnknownBrowse
                        ZdXUGLQpoL.exeGet hashmaliciousUnknownBrowse
                          jaPB8q3WL1.exeGet hashmaliciousUnknownBrowse
                            yx7VCK1nxU.exeGet hashmaliciousUnknownBrowse
                              https://cdn-fastly.obsproject.com/downloads/OBS-Studio-30.2.3-Windows-Installer.exeGet hashmaliciousUnknownBrowse
                                https://github.com/GPSBabel/gpsbabel/releases/download/Continuous-Windows/GPSBabel-20240815T1150Z-e9b2084-Setup.exeGet hashmaliciousUnknownBrowse
                                  https://cdn-fastly.obsproject.com/downloads/OBS-Studio-30.2.0-Windows-Installer.exeGet hashmaliciousUnknownBrowse
                                    Process:C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):16491806
                                    Entropy (8bit):7.999988289903242
                                    Encrypted:true
                                    SSDEEP:196608:h0eR4R1zsUUUsTVwYq5IN4pNT//KAiLGXbrTUEv1u4oNnbCgqioJBAsGAu0XB9kG:h0e+IUUpTCyy/ukUq1lmOgqvMeXL4Bxk
                                    MD5:BFFE2D81B725B67C3B0BACA57724D31E
                                    SHA1:95C8FF27C508D42D4DC44C9D5D24A00A83E8A1AE
                                    SHA-256:17C546B857F8BD9C6AB5C42F80697CA4681C3574057DE9EB05C005A1BACE06DD
                                    SHA-512:841AFB92EB7E6EF28E87E9CC51B3BB3A362EEBD1501436B7B0191D4F268D409F4A0628B8F0F2D9645ABDA71122A6805FFFE4D31CB6166DF4A7F8E948A0F568C4
                                    Malicious:false
                                    Reputation:low
                                    Preview:..>.'.<...Z...G...H......>.........M:.....l!?JU..{.....ooo.dooxcooh..of....YKOoooooooo-X][+WW\.X_\V-)]WWV..V^V_-YoooooooooooooooooooooooooooooooooH..(H...$........H..(.@UATH.l$.H..h...D..H..$`...L..3.I..$eH..%`...L.d$PH.H.H......H.A0.x8....t H..H..u.....H..$`...H..h...A\].H.X.H..u..C.H..$`...H..h...A\].HcC<H..$P...D.......L..A.H H..A9P.........H..H......H.......8GuuH.......x.euhH.......x.tu[H.......x.PuNH.......x.ruAH.......x.ou4H.......x.cu'H.......x.Au.H.......x.du.H.......x.dt...H...A;P...c.........V...A.@$Hc.H.....HA.@.H....<.H..H.}.t..E.L.E.o.E.a.E.d.E.L.E.i.E.b.E.r.E.a.E.r.E.y.E.AH.U.H...E..H..$X.....H..H.E.H..u..F.......D$pV.D$qi.D$rr.D$st.D$tu.D$ua.D$vl.D$wA.D$xl.D$yl.D$zo.D${cH.T$pH...D$|.L..$@.....L..H..u.A.F..g....D$XV.D$Yi.D$Zr.D$[t.D$\u.D$]a.D$^l.D$_F.D$`r.D$ae.D$beH.T$XH...D$c...H.E.H..u............E.n.E.t.E.d.E.l.E.l.E...E.d.E.l.E.lH.M..E....H..H..u..C.......E.m.E.e.E.m.E.c.E.p.E.yH.U.H...E..L..$H.....L..H..u.A.E......D$0R.D$1t.D$2l.D$3D.D$4e.D$5c.D$6o.D$7m.D$8p.D$9r
                                    Process:C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exe
                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                    Category:dropped
                                    Size (bytes):1929632
                                    Entropy (8bit):7.8296508043954764
                                    Encrypted:false
                                    SSDEEP:49152:WCDxnjhRW1rrAFJ9XGE+5vXF+jIcfB8/oJE:VLRg3mJpGE+5vaIcp8/oJE
                                    MD5:8843FCEF19B3259B56510D7B8C597A4A
                                    SHA1:8C9700AEE7CA03AE7DD5A28F52FDAD4E7AE97B81
                                    SHA-256:5B638D5706D1502A2B0A994C5F24D94431C8CDC409B2A4DF61EEC9DE44835667
                                    SHA-512:913413949FFB47D493F5F90CD0EB01AEE89AEE226F8298872FB7B23D037169DC5E642B283708619766DEF074FD317FA78098958DDC35F19F620F5A55A764408B
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Virustotal, Detection: 18%, Browse
                                    Reputation:low
                                    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d.....Ig.........." ................PU....................................................`..........................................Z......rc..<...........p........H...).......................................... ...@...........Pf...............................text............................... ..`.rdata..D...........................@..@.data...p!...........t..............@....pdata..`...........................@..@.00cfg..8...........................@..@.gxfg...............................@..@.retplne................................_RDATA....... ......................@..@. vt.........0...................... ..h.reloc...............<..............@..B........................................................................................................................................................................................................................
                                    Process:C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exe
                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                    Category:dropped
                                    Size (bytes):575056
                                    Entropy (8bit):6.529434803175356
                                    Encrypted:false
                                    SSDEEP:12288:rSTTigI46Bb3SUPvRgrKtzL4oaQEKZm+jWodEEVPLwtQB:rUStZaQEKZm+jWodEE9CQB
                                    MD5:72F3D84384E888BF0D38852EB863026B
                                    SHA1:8E6A0257591EB913AE7D0E975C56306B3F680B3F
                                    SHA-256:A4C2229BDC2A2A630ACDC095B4D86008E5C3E3BC7773174354F3DA4F5BEB9CDE
                                    SHA-512:6D53634BC51BD383358E0D55988D70AEE6ED3897BC6AE5E0D2413BED27ECFF4C8092020682CD089859023B02D9A1858AC42E64D59C38BA90FBAF89B656C539A6
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                    Joe Sandbox View:
                                    • Filename: iDvmIRCPBw.exe, Detection: malicious, Browse
                                    • Filename: ZdXUGLQpoL.exe, Detection: malicious, Browse
                                    • Filename: jaPB8q3WL1.exe, Detection: malicious, Browse
                                    • Filename: yx7VCK1nxU.exe, Detection: malicious, Browse
                                    • Filename: , Detection: malicious, Browse
                                    • Filename: , Detection: malicious, Browse
                                    • Filename: , Detection: malicious, Browse
                                    Reputation:moderate, very likely benign file
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........)...H...H...H...0...H...0...H...H...H......H......H......H....._H......H....w..H......H..Rich.H..................PE..d...c/..........." ...(.6...X......0...............................................J,....`A.........................................2..h...X...,............p.. :...v..PP..............p...........................`...@............P..x............................text....4.......6.................. ..`.rdata.......P.......:..............@..@.data...p8...0......................@....pdata.. :...p...<...,..............@..@.rsrc................h..............@..@.reloc...............l..............@..B........................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exe
                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                    Category:dropped
                                    Size (bytes):148384
                                    Entropy (8bit):6.06949151748684
                                    Encrypted:false
                                    SSDEEP:3072:9zYLxFZzHKtlCa9SobrnEWXu7m2mySvl1Y/VP:nlCe/brnEWXuDSvLYF
                                    MD5:0A20FE1FA39C704C6292B05F367D634B
                                    SHA1:208F24227E53A01045E254497B6E5BAF3C312DD2
                                    SHA-256:802D983C1076B5D42555BC340178130113C35DE533956EE87346E56854382DF3
                                    SHA-512:B67D721CF502B20A4F7BBA130C09EF6879AE949F0D0B10357406F9D6F1F3AAAB16753079215E03D39B12947264541025B057044FA185F3CAD2B825606B8F2CC7
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........^h..0;..0;..0;..;..0;.(3:..0;.(4:..0;.(5:..0;.(1:..0;..4:..0;.)1:..0;..1:..0;..1;#.0;.)9:..0;.).;..0;...;..0;.)2:..0;Rich..0;........................PE..d......g.........."....).".....................@.............................p.......e....`.............................................................`R......X........)...`..h...p]..p...........................0\..@............@...............................text.... .......".................. ..`.rdata...r...@...t...&..............@..@.data...............................@....pdata..X...........................@..@.rsrc...`R.......T..................@..@.reloc..h....`......................@..B........................................................................................................................................................................................................................
                                    Process:C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exe
                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                    Category:dropped
                                    Size (bytes):119888
                                    Entropy (8bit):6.600983758182253
                                    Encrypted:false
                                    SSDEEP:1536:dI2v39UXigCBs29DdxfggO6vMMKZsY2ofRjoecbdhUwdJTzmZhTzC:diwskD8B6vMMEs5oGecbd2wHT0Te
                                    MD5:CAF9EDDED91C1F6C0022B278C16679AA
                                    SHA1:4812DA5EB86A93FB0ADC5BB60A4980EE8B0AD33A
                                    SHA-256:02C6AA0E6E624411A9F19B0360A7865AB15908E26024510E5C38A9C08362C35A
                                    SHA-512:32AC84642A9656609C45A6B649B222829BE572B5FDEB6D5D93ACEA203E02816CF6C06063334470E8106871BDC9F2F3C7F0D1D3E554DA1832BA1490F644E18362
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    Reputation:moderate, very likely benign file
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......|6..8W..8W..8W..s/..:W..1/S.3W..8W...W..8W..9W......(W......'W......-W......9W....?.9W......9W..Rich8W..........PE..d................." ...(."...d............................................................`A........................................0u..4...d}..........................PP...........^..p............................\..@............@...............................text............................... ..`fothk........0...................... ..`.rdata...C...@...D...&..............@..@.data................j..............@....pdata...............n..............@..@_RDATA...............z..............@..@.rsrc................|..............@..@.reloc..............................@..B................................................................................................................................................................................
                                    Process:C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exe
                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                    Category:dropped
                                    Size (bytes):49640
                                    Entropy (8bit):6.698209069449079
                                    Encrypted:false
                                    SSDEEP:768:IzzO6ujT3MbR3vXCz6S5Mq83yJ9d3+DuO9zUgElq9z6m:Fq/XuA3o9dgzUZWz5
                                    MD5:2BD576CBC5CB712935EB1B10E4D312F5
                                    SHA1:DFA7A46012483837F47D8C870973A2DEA786D9FF
                                    SHA-256:7DD9AA02E271C68CA6D5F18D651D23A15D7259715AF43326578F7DDE27F37637
                                    SHA-512:ABBD3EB628D5B7809F49AE08E2436AF3D1B69F8A38DE71EDE3D0CB6E771C7758E35986A0DC0743B763AD91FD8190084EE5A5FBE1AC6159EB03690CCC14C64542
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........i..............p......6........pH.............6.......6.......6.......6.......6.$.....6.......Rich............PE..d...;AL..........." ...(.<...8.......@..............................................O.....`A........................................pm.......m..x....................r...O......D....c..p...........................`b..@............P..`............................text....;.......<.................. ..`.rdata.."#...P...$...@..............@..@.data................d..............@....pdata...............f..............@..@.rsrc................l..............@..@.reloc..D............p..............@..B................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmp
                                    File Type:PE32+ executable (console) x86-64, for MS Windows
                                    Category:dropped
                                    Size (bytes):6144
                                    Entropy (8bit):4.720366600008286
                                    Encrypted:false
                                    SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                    MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                    SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                    SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                    SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                    Malicious:false
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):3292160
                                    Entropy (8bit):6.587860518692336
                                    Encrypted:false
                                    SSDEEP:49152:gdJYVM+9JtzZWnoS2VC23aun8+f5KuG2OY9IG9ivyv2cLx1RQ0333B9:SJYVM+LtVt3P/KuG2ONG9iqLRQ0333n
                                    MD5:4AB29A55C7DDA14917A7D3E75504E7E1
                                    SHA1:F086464C185781EB516D7B302C88BECD05F8147B
                                    SHA-256:11EE0AF6AFAC89AC3C5AD37C93C2E6864BFCC4EACC861D95C60CE02F868B620F
                                    SHA-512:9B0280C01FBB309B7AF2D03E88AE6D98D9DDD50A24F9DFDD8780943FD1E80D14120DA74DE58A5BF6CE157F92B5F8C147591E2E643D7D38D4D4BBA3F05EC2B551
                                    Malicious:true
                                    Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....f..................*..v........*.......*...@...........................3...........@......@...................P,.n.....,.j:...P0.<.....................,.<............................p,.......................,......@,.(....................text.....*.......*................. ..`.itext..$.....*..0....*............. ..`.data.........*.......*.............@....bss.....|....+..........................idata..j:....,..<...f+.............@....didata.(....@,.......+.............@....edata..n....P,.......+.............@..@.tls....X....`,..........................rdata..]....p,.......+.............@..@.reloc..<.....,.......+.............@..B.rsrc...<....P0......./.............@..@.............04......`3.............@..@................
                                    Process:C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmp
                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):18682465
                                    Entropy (8bit):7.999435767384203
                                    Encrypted:true
                                    SSDEEP:393216:f/uTWF93J9DnFaDYcdeJ7gzipurYopPAgzqzsPs7wp:uTWPsDeJszVpYgzqA
                                    MD5:1265F20F7C304FCD1B1E4E92A1C61266
                                    SHA1:673A9BB75331F4AA0921AD9D9185CA3B37EB15FB
                                    SHA-256:56DF24C94188AFA761F371E2CBF1D8C0FD800CCE73F8F8D5ADFEBADE480F516E
                                    SHA-512:C89EE347B3E9D523E4D757A850E42B2CBDAD08C196DC03FBF44A4192698AEDF77200DA9F0DC314E4DF982CA17391D46F9AC8576376A00CBE72E74E557432B524
                                    Malicious:true
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S"1..C_W.C_W.C_Wx\TW.C_W._QW.C_Wx\UW.C_Wx\[W.C_W.K.W.C_W.C^WmC_W.K.W.C_W!eTWEC_W..[V.C_W!eUW.C_W...W.C_W.1\V.C_W.EYW.C_WRich.C_W........PE..L.....f........../......x..........L^............@.............................................................................d....p...............................................................................................................text....v.......x.................. ..`.rdata..Ze.......f...|..............@..@.data....V..........................@....sxdata......`......................@....rsrc........p......................@..@................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmp
                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):18682465
                                    Entropy (8bit):7.999435767384203
                                    Encrypted:true
                                    SSDEEP:393216:f/uTWF93J9DnFaDYcdeJ7gzipurYopPAgzqzsPs7wp:uTWPsDeJszVpYgzqA
                                    MD5:1265F20F7C304FCD1B1E4E92A1C61266
                                    SHA1:673A9BB75331F4AA0921AD9D9185CA3B37EB15FB
                                    SHA-256:56DF24C94188AFA761F371E2CBF1D8C0FD800CCE73F8F8D5ADFEBADE480F516E
                                    SHA-512:C89EE347B3E9D523E4D757A850E42B2CBDAD08C196DC03FBF44A4192698AEDF77200DA9F0DC314E4DF982CA17391D46F9AC8576376A00CBE72E74E557432B524
                                    Malicious:true
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S"1..C_W.C_W.C_Wx\TW.C_W._QW.C_Wx\UW.C_Wx\[W.C_W.K.W.C_W.C^WmC_W.K.W.C_W!eTWEC_W..[V.C_W!eUW.C_W...W.C_W.1\V.C_W.EYW.C_WRich.C_W........PE..L.....f........../......x..........L^............@.............................................................................d....p...............................................................................................................text....v.......x.................. ..`.rdata..Ze.......f...|..............@..@.data....V..........................@....sxdata......`......................@....rsrc........p......................@..@................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exe
                                    File Type:ASCII text, with CRLF, CR line terminators
                                    Category:dropped
                                    Size (bytes):308
                                    Entropy (8bit):5.1328862082984035
                                    Encrypted:false
                                    SSDEEP:6:AMuzkotkUCST3N7aZ5TVSvOrv1ov1AieN7aZ5TVSvOrv+s/F+KFo6papP:p/6bT9+HZtoqV+HZGs/cKW6AP
                                    MD5:8E35C2F3F2ABEBBD1E312D8FBA5DB66D
                                    SHA1:203CA9DB6192F8D9AB70B116C685E4B1B33C5FBE
                                    SHA-256:507F32FE79701EF86411BAEB22F9E7B8415750CA771CD6A2A54CED0829E30F69
                                    SHA-512:F089D47902C66D506FD783FF0ADA10F886A713943E9B41838D9C3A77B2B47674673F48C977C09ECB1125D2EB0E8F684992A705A2008157B22D234DFE5A44AFC2
                                    Malicious:false
                                    Preview:..7-Zip SFX 24.08 (x86) : Copyright (c) 1999-2024 Igor Pavlov : 2024-08-11....Extracting archive: C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exe..--..Path = C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exe..Type = 7z.... 0%. . 98% 1 - msvcp140.dll. .Everything is Ok..
                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):7.98992584185606
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 98.45%
                                    • Inno Setup installer (109748/4) 1.08%
                                    • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                                    • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    File name:flashcenter_pp_ax_inst78ll_cn.exe
                                    File size:20'442'024 bytes
                                    MD5:72469bd8f1f59ddf5512635418b4dcfa
                                    SHA1:7319eff3e05f09169e94f68b365f4b765bba4682
                                    SHA256:d21de9b307b41aaab3ca9efdf78d15518fa40158eabeb8a06eca0373cf0068db
                                    SHA512:6161c6915496fe0c0ec4d4d8574dc8ac9ffebf6332d2b2b52f13b90282b85b39a5b17c23f9ac0517795d245021fb5b961e08833d65855e03c9ad07e412926ebb
                                    SSDEEP:393216:fn/uTWF93J9DnFaDYcdeJ7gzipurYopPAgzqzsPs7w1SY6:+TWPsDeJszVpYgzqHY6
                                    TLSH:B1273316B2CBD03EE0890B3A06B2B265D0FB76559A127E67D6F489BCCF250541E3E347
                                    File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                    Icon Hash:4c0f31edc9c16730
                                    Entrypoint:0x4a83bc
                                    Entrypoint Section:.itext
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x6690DABD [Fri Jul 12 07:26:53 2024 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:6
                                    OS Version Minor:1
                                    File Version Major:6
                                    File Version Minor:1
                                    Subsystem Version Major:6
                                    Subsystem Version Minor:1
                                    Import Hash:40ab50289f7ef5fae60801f88d4541fc
                                    Instruction
                                    push ebp
                                    mov ebp, esp
                                    add esp, FFFFFFA4h
                                    push ebx
                                    push esi
                                    push edi
                                    xor eax, eax
                                    mov dword ptr [ebp-3Ch], eax
                                    mov dword ptr [ebp-40h], eax
                                    mov dword ptr [ebp-5Ch], eax
                                    mov dword ptr [ebp-30h], eax
                                    mov dword ptr [ebp-38h], eax
                                    mov dword ptr [ebp-34h], eax
                                    mov dword ptr [ebp-2Ch], eax
                                    mov dword ptr [ebp-28h], eax
                                    mov dword ptr [ebp-14h], eax
                                    mov eax, 004A2EBCh
                                    call 00007F309105B7A5h
                                    xor eax, eax
                                    push ebp
                                    push 004A8AC1h
                                    push dword ptr fs:[eax]
                                    mov dword ptr fs:[eax], esp
                                    xor edx, edx
                                    push ebp
                                    push 004A8A7Bh
                                    push dword ptr fs:[edx]
                                    mov dword ptr fs:[edx], esp
                                    mov eax, dword ptr [004B0634h]
                                    call 00007F30910ED12Bh
                                    call 00007F30910ECC7Eh
                                    lea edx, dword ptr [ebp-14h]
                                    xor eax, eax
                                    call 00007F30910E7958h
                                    mov edx, dword ptr [ebp-14h]
                                    mov eax, 004B41F4h
                                    call 00007F3091055853h
                                    push 00000002h
                                    push 00000000h
                                    push 00000001h
                                    mov ecx, dword ptr [004B41F4h]
                                    mov dl, 01h
                                    mov eax, dword ptr [0049CD14h]
                                    call 00007F30910E8C83h
                                    mov dword ptr [004B41F8h], eax
                                    xor edx, edx
                                    push ebp
                                    push 004A8A27h
                                    push dword ptr fs:[edx]
                                    mov dword ptr fs:[edx], esp
                                    call 00007F30910ED1B3h
                                    mov dword ptr [004B4200h], eax
                                    mov eax, dword ptr [004B4200h]
                                    cmp dword ptr [eax+0Ch], 01h
                                    jne 00007F30910F3E9Ah
                                    mov eax, dword ptr [004B4200h]
                                    mov edx, 00000028h
                                    call 00007F30910E9578h
                                    mov edx, dword ptr [004B4200h]
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0xb70000x71.edata
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xb50000xfec.idata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xcb0000x64ac.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xba0000x10fa8.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0xb90000x18.rdata
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0xb52d40x25c.idata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xb60000x1a4.didata
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000xa568c0xa5800b889d302f6fc48a904de33d8d947ae80False0.3620185045317221data6.377190161826806IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .itext0xa70000x1b640x1c00588dd0a8ab499300d3701cbd11b017d9False0.548828125data6.109264411030635IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .data0xa90000x38380x3a005c0c76e77aef52ebc6702430837ccb6eFalse0.35338092672413796data4.95916338709992IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .bss0xad0000x72580x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .idata0xb50000xfec0x1000627340dff539ef99048969aa4824fb2dFalse0.380615234375data5.020404933181373IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .didata0xb60000x1a40x200fd11c1109737963cc6cb7258063abfd6False0.34765625data2.729290535217263IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .edata0xb70000x710x2007de8ca0c7a61668a728fd3a88dc0942dFalse0.1796875data1.305578535725827IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .tls0xb80000x180x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rdata0xb90000x5d0x200d84006640084dc9f74a07c2ff9c7d656False0.189453125data1.3892750148744617IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0xba0000x10fa80x11000a85fda2741bd9417695daa5fc5a9d7a5False0.5789579503676471data6.709466460182023IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    .rsrc0xcb0000x64ac0x66000146baaf6ce7487c463de56259f0bf57False0.6391697303921569data6.485422667963741IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0xcb4f80x304PNG image data, 15 x 16, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0142487046632125
                                    RT_ICON0xcb7fc0x54cPNG image data, 23 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0081120943952802
                                    RT_ICON0xcbd480x79ePNG image data, 30 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0056410256410255
                                    RT_ICON0xcc4e80xc90PNG image data, 45 x 48, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0034203980099503
                                    RT_ICON0xcd1780x11d1PNG image data, 60 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0024117518088138
                                    RT_STRING0xce34c0x3f8data0.3198818897637795
                                    RT_STRING0xce7440x2dcdata0.36475409836065575
                                    RT_STRING0xcea200x430data0.40578358208955223
                                    RT_STRING0xcee500x44cdata0.38636363636363635
                                    RT_STRING0xcf29c0x2d4data0.39226519337016574
                                    RT_STRING0xcf5700xb8data0.6467391304347826
                                    RT_STRING0xcf6280x9cdata0.6410256410256411
                                    RT_STRING0xcf6c40x374data0.4230769230769231
                                    RT_STRING0xcfa380x398data0.3358695652173913
                                    RT_STRING0xcfdd00x368data0.3795871559633027
                                    RT_STRING0xd01380x2a4data0.4275147928994083
                                    RT_RCDATA0xd03dc0x10data1.5
                                    RT_RCDATA0xd03ec0x310data0.6173469387755102
                                    RT_RCDATA0xd06fc0x2cdata1.1818181818181819
                                    RT_GROUP_ICON0xd07280x4cdataEnglishUnited States0.868421052631579
                                    RT_VERSION0xd07740x584dataEnglishUnited States0.25920679886685555
                                    RT_MANIFEST0xd0cf80x7b3XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3389142567224759
                                    DLLImport
                                    kernel32.dllGetACP, GetExitCodeProcess, CloseHandle, LocalFree, SizeofResource, VirtualProtect, QueryPerformanceFrequency, VirtualFree, GetFullPathNameW, GetProcessHeap, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, GetModuleHandleW, FreeLibrary, HeapDestroy, ReadFile, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, CreateThread, CompareStringW, LoadLibraryA, ResetEvent, GetVolumeInformationW, GetVersion, GetDriveTypeW, RaiseException, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, LoadLibraryExW, LockResource, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetSystemWindowsDirectoryW, GetThreadPriority, SetThreadPriority, GetCurrentProcess, VirtualAlloc, GetCommandLineW, GetSystemInfo, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, LCMapStringW, VerSetConditionMask, GetDiskFreeSpaceW, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetLocalTime, GetEnvironmentVariableW, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, TlsGetValue, GetDateFormatW, SetErrorMode, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, CreateEventW, SetThreadLocale, GetThreadLocale
                                    comctl32.dllInitCommonControls
                                    user32.dllCreateWindowExW, TranslateMessage, CharLowerBuffW, CallWindowProcW, CharUpperW, PeekMessageW, GetSystemMetrics, SetWindowLongW, MessageBoxW, DestroyWindow, CharUpperBuffW, CharNextW, MsgWaitForMultipleObjects, LoadStringW, ExitWindowsEx, DispatchMessageW
                                    oleaut32.dllSysAllocStringLen, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetLBound, SafeArrayGetUBound, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, VariantChangeType, SafeArrayCreate
                                    advapi32.dllConvertStringSecurityDescriptorToSecurityDescriptorW, OpenThreadToken, AdjustTokenPrivileges, LookupPrivilegeValueW, RegOpenKeyExW, OpenProcessToken, FreeSid, AllocateAndInitializeSid, EqualSid, RegQueryValueExW, GetTokenInformation, ConvertSidToStringSidW, RegCloseKey
                                    NameOrdinalAddress
                                    __dbk_fcall_wrapper20x40fc10
                                    dbkFCallWrapperAddr10x4b063c
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    No network behavior found

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:02:54:36
                                    Start date:03/12/2024
                                    Path:C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exe"
                                    Imagebase:0x230000
                                    File size:20'442'024 bytes
                                    MD5 hash:72469BD8F1F59DDF5512635418B4DCFA
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:Borland Delphi
                                    Reputation:low
                                    Has exited:true

                                    Target ID:2
                                    Start time:02:54:36
                                    Start date:03/12/2024
                                    Path:C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmp
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Local\Temp\is-C1P8K.tmp\flashcenter_pp_ax_inst78ll_cn.tmp" /SL5="$2042C,19484773,802304,C:\Users\user\Desktop\flashcenter_pp_ax_inst78ll_cn.exe"
                                    Imagebase:0x430000
                                    File size:3'292'160 bytes
                                    MD5 hash:4AB29A55C7DDA14917A7D3E75504E7E1
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:Borland Delphi
                                    Reputation:low
                                    Has exited:true

                                    Target ID:3
                                    Start time:02:54:38
                                    Start date:03/12/2024
                                    Path:C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Roaming\9430dad\99e5df4d8.exe" -p4f63a7bd -y -o"C:\Users\user\AppData\Local\Temp\is-3DAJ2.tmp\..\76809449335627201121797450\"
                                    Imagebase:0x400000
                                    File size:18'682'465 bytes
                                    MD5 hash:1265F20F7C304FCD1B1E4E92A1C61266
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:4
                                    Start time:02:54:38
                                    Start date:03/12/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff66e660000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:5
                                    Start time:02:54:39
                                    Start date:03/12/2024
                                    Path:C:\Users\user\AppData\Local\Temp\76809449335627201121797450\svaulpzg.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\AppData\Local\Temp\is-3DAJ2.tmp\..\76809449335627201121797450\svaulpzg.exe"
                                    Imagebase:0x7ff7e3bd0000
                                    File size:148'384 bytes
                                    MD5 hash:0A20FE1FA39C704C6292B05F367D634B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Antivirus matches:
                                    • Detection: 0%, ReversingLabs
                                    Reputation:low
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:13.3%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:0%
                                      Total number of Nodes:2000
                                      Total number of Limit Nodes:17
                                      execution_graph 17543 41e063 VirtualFree 17544 4093c3 17546 4093c8 17544->17546 17547 4093e7 17546->17547 17550 424640 WaitForSingleObject 17546->17550 17553 412e95 17546->17553 17557 424700 SetEvent 17546->17557 17551 424658 17550->17551 17552 42464e GetLastError 17550->17552 17551->17546 17552->17551 17554 412e9f __EH_prolog 17553->17554 17561 412ed4 17554->17561 17556 412eb5 17556->17546 17558 424710 GetLastError 17557->17558 17559 42470d 17557->17559 17560 42471a 17558->17560 17559->17546 17560->17546 17562 412ede __EH_prolog 17561->17562 17570 4160ed 17562->17570 17565 4160ed 4 API calls 17566 412f24 17565->17566 17567 412fc1 17566->17567 17578 41e043 VirtualAlloc 17566->17578 17579 4084f5 17566->17579 17567->17556 17571 416100 17570->17571 17577 412f17 17570->17577 17572 416108 _CxxThrowException 17571->17572 17573 41611d 17571->17573 17572->17573 17585 403ba5 free 17573->17585 17575 416124 17586 403b71 17575->17586 17577->17565 17578->17567 17583 408508 17579->17583 17580 40870c 17580->17567 17583->17580 17584 4086ae memmove 17583->17584 17591 4092d9 17583->17591 17596 409347 17583->17596 17584->17583 17585->17575 17587 403b81 malloc 17586->17587 17588 403b7a 17586->17588 17589 403ba3 17587->17589 17590 403b8f _CxxThrowException 17587->17590 17588->17587 17589->17577 17590->17589 17592 4092ed 17591->17592 17593 40931c 17592->17593 17601 408cd4 17592->17601 17605 407b7e 17592->17605 17593->17583 17597 409354 17596->17597 17598 40937e 17597->17598 17615 41635e 17597->17615 17622 4162b3 17597->17622 17598->17583 17602 408cf8 17601->17602 17603 408d17 17602->17603 17604 407b7e 2 API calls 17602->17604 17603->17592 17604->17603 17610 406553 17605->17610 17608 407bab GetLastError 17609 407ba7 17608->17609 17609->17592 17611 406560 17610->17611 17614 406526 ReadFile 17611->17614 17613 406571 17613->17608 17613->17609 17614->17613 17616 41636d 17615->17616 17619 416447 17616->17619 17620 416322 78 API calls 17616->17620 17627 407f2a 17616->17627 17632 416171 17616->17632 17638 4162f6 17616->17638 17619->17597 17620->17616 17623 4162bd 17622->17623 18471 4055cd SetFileAttributesW 17623->18471 18472 40af6f 17623->18472 17624 4162f2 17624->17597 17642 406600 17627->17642 17630 407f5b 17630->17616 17633 41617b __EH_prolog 17632->17633 17651 40aa7b 17633->17651 17634 4161fc 17634->17616 17635 4161f6 17635->17634 17675 40ada9 17635->17675 17639 4162fd 17638->17639 17640 4162b3 17 API calls 17639->17640 17641 416321 17640->17641 17641->17616 17643 40660d 17642->17643 17645 406639 17643->17645 17648 4065c6 17643->17648 17645->17630 17646 407c2f GetLastError 17645->17646 17647 407c39 17646->17647 17647->17630 17649 4065d4 17648->17649 17650 4065d7 WriteFile 17648->17650 17649->17650 17650->17643 17652 40aa85 __EH_prolog 17651->17652 17679 40aa68 17652->17679 17654 40ab6b 17657 406f66 VariantClear 17654->17657 17656 40ab8e 17682 406f66 17656->17682 17674 40ab89 17657->17674 17665 40ac16 17665->17674 17693 40b286 17665->17693 17668 40abe5 17668->17665 17668->17674 17757 404664 17668->17757 17669 40acc0 17671 403b71 ctype 2 API calls 17669->17671 17670 40ad0d 17699 40a565 17670->17699 17671->17674 17674->17635 17676 40adb3 __EH_prolog 17675->17676 18297 41086d EnterCriticalSection 17676->18297 17677 40ae08 17677->17634 17762 40e1b5 17679->17762 17683 406f8e 17682->17683 17685 406f6e 17682->17685 17686 40df0c 17683->17686 17684 406f87 VariantClear 17684->17683 17685->17683 17685->17684 17687 40df35 17686->17687 17688 406f66 VariantClear 17687->17688 17689 40abbf 17688->17689 17689->17674 17690 409cf1 17689->17690 17803 40e212 17690->17803 17694 40b2b3 17693->17694 17695 40b295 17693->17695 17810 40b3a1 17694->17810 17695->17694 17698 403ba5 free ctype 17695->17698 17698->17695 17700 40a56f __EH_prolog 17699->17700 17813 409f0a 17700->17813 17703 40a92d 17703->17674 17704 40df0c VariantClear 17705 40a5a7 17704->17705 17705->17703 17828 40a07a 17705->17828 17710 40a5d3 17842 4033db 17710->17842 17713 40a5df 17716 40a61d 17713->17716 17964 40a942 17713->17964 17718 40a627 17716->17718 17719 40a65b 17716->17719 17717 4034ab 3 API calls 17720 40a611 17717->17720 17722 4034ab 3 API calls 17718->17722 17728 40a66d 17719->17728 17845 40a23c 17719->17845 17974 403ba5 free 17720->17974 17724 40a638 17722->17724 17727 40a645 17724->17727 17975 4055ee RemoveDirectoryW 17724->17975 17753 40a656 17727->17753 17976 40af1f 17727->17976 17728->17753 17918 4034ab 17728->17918 17731 403b71 ctype 2 API calls 17735 40a6a8 17731->17735 17733 40a925 17992 403ba5 free 17733->17992 17924 406592 17735->17924 17738 40a70f 17980 409e15 17738->17980 17740 40a744 17741 40a82c 17740->17741 17743 40a7a5 17740->17743 17741->17753 17927 406654 17741->17927 17985 40461b 17743->17985 17745 40a890 17745->17753 17932 40646f 17745->17932 17748 409e15 7 API calls 17748->17745 17751 403b71 ctype 2 API calls 17751->17753 17752 409e15 7 API calls 17752->17753 17991 403ba5 free 17753->17991 17754 409ef4 18275 409ec6 17754->18275 17758 404672 17757->17758 17759 40466d 17757->17759 17760 404727 17758->17760 17761 402b04 CharUpperW 17758->17761 17759->17668 17760->17668 17761->17758 17771 402835 17762->17771 17767 40aa78 17767->17654 17767->17656 17767->17674 17772 40285e 17771->17772 17774 402840 17771->17774 17775 40df6b 17772->17775 17773 403ba5 free ctype 17773->17774 17774->17772 17774->17773 17776 40df0c VariantClear 17775->17776 17777 40df76 17776->17777 17777->17767 17778 40e16b 17777->17778 17779 40df87 8 API calls 17778->17779 17780 40e17d 17779->17780 17781 40e1ae 17780->17781 17782 40df79 VariantClear 17780->17782 17781->17767 17785 404738 17781->17785 17783 40e197 17782->17783 17783->17781 17784 4038f3 memmove _CxxThrowException malloc _CxxThrowException free 17783->17784 17784->17781 17786 404742 __EH_prolog 17785->17786 17787 402835 free 17786->17787 17788 404754 17787->17788 17789 403308 malloc _CxxThrowException 17788->17789 17802 4047da 17788->17802 17801 404765 17789->17801 17790 4047ad 17791 403503 _CxxThrowException malloc _CxxThrowException free 17790->17791 17792 4047be 17791->17792 17794 40d5c9 malloc _CxxThrowException free _CxxThrowException memcpy 17792->17794 17793 403503 _CxxThrowException malloc _CxxThrowException free 17793->17801 17795 4047c6 17794->17795 17797 402292 malloc _CxxThrowException 17795->17797 17796 40d5c9 malloc _CxxThrowException free _CxxThrowException memcpy 17796->17801 17798 4047d2 17797->17798 17800 403ba5 ctype free 17798->17800 17799 402292 malloc _CxxThrowException 17799->17801 17800->17802 17801->17790 17801->17793 17801->17796 17801->17799 17802->17767 17804 40e21c __EH_prolog 17803->17804 17805 40e2ac 17804->17805 17809 40e254 17804->17809 17807 406f66 VariantClear 17805->17807 17806 406f66 VariantClear 17808 409d0a 17806->17808 17807->17808 17808->17668 17808->17674 17808->17754 17809->17806 17811 40b3ad memmove 17810->17811 17812 40acaa 17810->17812 17811->17812 17812->17669 17812->17670 17812->17674 17814 409f14 __EH_prolog 17813->17814 17815 406f66 VariantClear 17814->17815 17818 409f51 17814->17818 17819 409f72 17815->17819 17816 406f66 VariantClear 17817 409fb1 17816->17817 17817->17703 17817->17704 17818->17816 17819->17818 17820 409fbc 17819->17820 17821 406f66 VariantClear 17820->17821 17822 409fd8 17821->17822 17993 409c25 17822->17993 17825 409c25 VariantClear 17826 40a002 17825->17826 17826->17817 17827 409c25 VariantClear 17826->17827 17827->17817 17997 40d801 17828->17997 17831 40d993 17832 40d99d __EH_prolog 17831->17832 18022 403308 17832->18022 17834 40d9dd 17835 4033db 2 API calls 17834->17835 17836 40d9e9 17835->17836 18025 403ba5 free 17836->18025 17840 40d9b3 17840->17834 18026 404f62 17840->18026 18030 4036fb 17840->18030 17841 40a5c4 17841->17710 17935 40a130 17841->17935 18033 403134 17842->18033 17846 40a246 __EH_prolog 17845->17846 17847 403308 2 API calls 17846->17847 17848 40a267 17847->17848 18036 405c98 17848->18036 17851 40a283 17880 40a39e 17851->17880 17912 40a37c 17851->17912 18119 40a54a 17851->18119 17852 40a385 18129 4078ab 17852->18129 17853 40a3bf 17856 40a433 17853->17856 17857 40a3c4 17853->17857 17855 40a4a8 17866 4033db 2 API calls 17855->17866 17907 40a3b3 17855->17907 17862 40a455 17856->17862 17863 40a43f 17856->17863 17860 4033db 2 API calls 17857->17860 17867 40a3cd 17860->17867 17861 40a349 17861->17728 18182 406168 17862->18182 18181 4055ee RemoveDirectoryW 17863->18181 17882 40a4c7 17866->17882 17872 4078ab 20 API calls 17867->17872 17870 40a390 18151 409d0b 17870->18151 17877 40a3d9 17872->17877 17873 40a444 17878 40a44c 17873->17878 17873->17907 17883 40a3ed 17877->17883 17884 40a3dd 17877->17884 17887 409e15 7 API calls 17878->17887 18197 403ba5 free 17880->18197 17881 40a462 18190 4057da 17881->18190 17888 403308 2 API calls 17882->17888 18159 4055fb MoveFileW 17883->18159 17889 409d0b 4 API calls 17884->17889 17887->17880 17894 40a4ed 17888->17894 17911 40a31a 17889->17911 17891 40a2c9 17891->17911 18128 403ba5 free 17891->18128 17892 40a469 17893 40a471 GetLastError 17892->17893 17892->17907 17896 40a480 17893->17896 17893->17907 17897 405c98 20 API calls 17894->17897 17895 40a3f7 17898 40a426 17895->17898 17899 40a3fb 17895->17899 17896->17878 17903 40a500 17897->17903 18180 403ba5 free 17898->18180 18160 4062c4 GetLastError 17899->18160 17902 40a42e 17902->17907 17904 40a517 17903->17904 18198 4055cd SetFileAttributesW 17903->18198 18199 403ba5 free 17904->18199 18201 403ba5 free 17907->18201 18126 403ba5 free 17911->18126 17912->17852 17912->17853 17913 40a341 18127 403ba5 free 17913->18127 17915 40a51f 18200 403ba5 free 17915->18200 17919 4034bb 17918->17919 17921 4034b7 17918->17921 17920 403b71 ctype 2 API calls 17919->17920 17919->17921 17922 4034cf 17920->17922 17921->17731 17921->17753 18202 403ba5 free 17922->18202 18203 406575 17924->18203 18206 406459 17927->18206 17930 40667f 17930->17745 17930->17748 17933 406459 5 API calls 17932->17933 17934 406489 17933->17934 17934->17752 17934->17753 17936 40a13a __EH_prolog 17935->17936 18210 4050af 17936->18210 17939 40a16a 17940 40a1b6 17939->17940 17943 403308 2 API calls 17939->17943 18251 401f6a 17940->18251 17945 40a189 17943->17945 18222 409af6 17945->18222 17948 40a1ae 18233 403ba5 free 17948->18233 17950 40a1b8 17951 403308 2 API calls 17950->17951 17953 40a1c0 17951->17953 17952 40a206 18249 403ba5 free 17952->18249 17953->17952 17955 4034ab 3 API calls 17953->17955 17956 40a1e6 17955->17956 18234 40b17a 17956->18234 17957 40a20e 18250 403ba5 free 17957->18250 17962 40a1fb 18243 40b3d4 17962->18243 17965 40a94c __EH_prolog 17964->17965 17966 4033db 2 API calls 17965->17966 17969 40a963 17966->17969 17967 4036fb 4 API calls 17968 40a9b2 17967->17968 17970 4033db 2 API calls 17968->17970 17969->17967 17971 40a9be 17970->17971 18257 403ba5 free 17971->18257 17973 40a604 17973->17717 17974->17716 17975->17727 17977 40af6c 17976->17977 17978 40af2a 17976->17978 17977->17753 17978->17977 17979 409e15 7 API calls 17978->17979 17979->17977 17981 4062c4 GetLastError 17980->17981 17982 409e1d 17981->17982 18258 409d78 17982->18258 17986 404628 17985->17986 17987 404646 17985->17987 17988 404634 17986->17988 18274 403ba5 free 17986->18274 17987->17751 17988->17987 17990 403b71 ctype 2 API calls 17988->17990 17990->17987 17991->17733 17992->17703 17995 409c2f __EH_prolog 17993->17995 17994 406f66 VariantClear 17996 409c9a 17994->17996 17995->17994 17996->17817 17996->17825 18000 40d80b __EH_prolog 17997->18000 17998 40d935 18002 40d942 17998->18002 18003 40d96f 17998->18003 18020 40a097 17998->18020 17999 40d867 18001 40d8c7 17999->18001 18012 40334b malloc _CxxThrowException 17999->18012 18000->17999 18000->18001 18004 40d850 wcscmp 18000->18004 18001->17998 18007 40d6a7 _CxxThrowException memmove malloc _CxxThrowException free 18001->18007 18009 403409 malloc _CxxThrowException free 18001->18009 18013 401f9f memmove free 18001->18013 18005 40332b malloc _CxxThrowException 18002->18005 18006 403409 malloc _CxxThrowException free 18003->18006 18003->18020 18004->17999 18004->18001 18008 40d94c 18005->18008 18006->18020 18007->18001 18010 40d5c9 malloc _CxxThrowException free _CxxThrowException memcpy 18008->18010 18009->18001 18011 40d95c 18010->18011 18014 402292 malloc _CxxThrowException 18011->18014 18015 40d8ab 18012->18015 18013->18001 18016 40d964 18014->18016 18017 405188 6 API calls 18015->18017 18018 403ba5 ctype free 18016->18018 18019 40d8bb 18017->18019 18018->18020 18021 403ba5 ctype free 18019->18021 18020->17831 18021->18001 18023 403b71 ctype malloc _CxxThrowException 18022->18023 18024 403315 18023->18024 18024->17840 18025->17841 18027 404f72 18026->18027 18028 404f6d 18026->18028 18027->17840 18029 403157 _CxxThrowException malloc _CxxThrowException free 18028->18029 18029->18027 18031 40319a _CxxThrowException malloc _CxxThrowException free 18030->18031 18032 40370c 18031->18032 18032->17840 18034 403b71 ctype malloc _CxxThrowException 18033->18034 18035 403149 18034->18035 18035->17713 18037 405ca2 __EH_prolog 18036->18037 18038 40334b malloc _CxxThrowException 18037->18038 18041 405e6d 18037->18041 18039 405cd6 18038->18039 18040 40334b malloc _CxxThrowException 18039->18040 18048 405ce3 18040->18048 18042 405ef4 18041->18042 18043 405ea1 18041->18043 18044 405f15 18042->18044 18046 405f10 18042->18046 18063 405f40 18042->18063 18047 405c89 GetFileAttributesW 18043->18047 18051 405a8d malloc _CxxThrowException free FindClose FindFirstFileW 18044->18051 18053 405eed 18044->18053 18045 403737 _CxxThrowException malloc _CxxThrowException free 18054 405d21 18045->18054 18049 405c89 GetFileAttributesW 18046->18049 18050 405ea8 18047->18050 18048->18045 18048->18054 18049->18044 18050->18044 18052 405ebc 18050->18052 18057 406010 18051->18057 18062 403447 malloc _CxxThrowException free 18052->18062 18058 405a6d FindClose 18053->18058 18055 405d66 18054->18055 18069 405d41 18054->18069 18056 405c98 18 API calls 18055->18056 18059 405d71 18056->18059 18057->18053 18060 406097 GetFileInformationByHandle CreateFileW CloseHandle 18057->18060 18061 405e56 18058->18061 18064 405d64 18059->18064 18065 405e5d 18059->18065 18060->18053 18061->17851 18061->17855 18066 405ed3 18062->18066 18063->18044 18067 406097 GetFileInformationByHandle CreateFileW CloseHandle 18063->18067 18071 4033db malloc _CxxThrowException 18064->18071 18068 403ba5 ctype free 18065->18068 18074 406097 GetFileInformationByHandle CreateFileW CloseHandle 18066->18074 18070 405f75 18067->18070 18072 405e65 18068->18072 18069->18064 18073 4034ab malloc _CxxThrowException free 18069->18073 18075 405f87 18070->18075 18076 405f79 18070->18076 18077 405d9a 18071->18077 18078 403ba5 ctype free 18072->18078 18073->18064 18074->18053 18081 40334b malloc _CxxThrowException 18075->18081 18079 403447 malloc _CxxThrowException free 18076->18079 18080 403308 malloc _CxxThrowException 18077->18080 18078->18041 18082 405f82 18079->18082 18105 405da6 18080->18105 18083 405f90 18081->18083 18086 405a6d FindClose 18082->18086 18085 404f62 _CxxThrowException malloc _CxxThrowException free 18083->18085 18084 405c49 10 API calls 18084->18105 18087 405f9c 18085->18087 18086->18061 18089 403634 _CxxThrowException malloc _CxxThrowException free 18087->18089 18088 405df2 18092 403ba5 ctype free 18088->18092 18091 405fa6 18089->18091 18090 405dea SetLastError 18090->18088 18094 405a8d malloc _CxxThrowException free FindClose FindFirstFileW 18091->18094 18095 405e34 18092->18095 18093 402ac7 CharUpperW 18093->18105 18096 405fb6 18094->18096 18099 403ba5 ctype free 18095->18099 18097 405fdc 18096->18097 18098 405fba wcscmp 18096->18098 18101 405c89 GetFileAttributesW 18097->18101 18098->18097 18118 405fd2 18098->18118 18102 405e3c 18099->18102 18100 405df6 18107 4036fb _CxxThrowException malloc _CxxThrowException free 18100->18107 18106 405fe7 18101->18106 18104 405a6d FindClose 18102->18104 18103 403ba5 ctype free 18103->18105 18108 405e46 18104->18108 18105->18084 18105->18088 18105->18090 18105->18093 18105->18100 18105->18103 18109 403308 malloc _CxxThrowException 18105->18109 18112 405ff9 18106->18112 18106->18118 18107->18088 18111 403ba5 ctype free 18108->18111 18109->18105 18110 403447 malloc _CxxThrowException free 18113 40606d 18110->18113 18115 405e4e 18111->18115 18116 403ba5 ctype free 18112->18116 18114 403ba5 ctype free 18113->18114 18114->18082 18117 403ba5 ctype free 18115->18117 18116->18044 18117->18061 18118->18110 18120 4031f9 malloc _CxxThrowException 18119->18120 18121 40a2ab 18120->18121 18122 4032e4 18121->18122 18123 403288 malloc _CxxThrowException 18122->18123 18124 403301 18123->18124 18125 403ba5 free 18124->18125 18125->17891 18126->17913 18127->17861 18128->17912 18130 4078b5 __EH_prolog 18129->18130 18131 4033db malloc _CxxThrowException 18130->18131 18132 4078db 18131->18132 18133 403308 malloc _CxxThrowException 18132->18133 18134 4078e7 18133->18134 18135 40790e 18134->18135 18137 403447 malloc _CxxThrowException free 18134->18137 18136 403634 _CxxThrowException malloc _CxxThrowException free 18135->18136 18138 407918 18136->18138 18137->18135 18139 403308 malloc _CxxThrowException 18138->18139 18141 407920 18139->18141 18140 407993 20 API calls 18140->18141 18141->18140 18142 407950 18141->18142 18143 407993 20 API calls 18142->18143 18144 40795f 18143->18144 18145 403ba5 ctype free 18144->18145 18146 40796f 18145->18146 18147 403ba5 ctype free 18146->18147 18148 407977 18147->18148 18149 403ba5 ctype free 18148->18149 18150 40797f 18149->18150 18150->17870 18150->17907 18152 409d15 __EH_prolog 18151->18152 18153 40338e malloc _CxxThrowException 18152->18153 18154 409d26 18153->18154 18155 409d5d _CxxThrowException malloc _CxxThrowException free 18154->18155 18156 409d35 18155->18156 18157 403ba5 ctype free 18156->18157 18158 409d4b 18157->18158 18158->17880 18159->17895 18161 4062ce 18160->18161 18162 409e31 18161->18162 18163 409e3b __EH_prolog 18162->18163 18164 40338e malloc _CxxThrowException 18163->18164 18165 409e4c 18164->18165 18166 409e87 18165->18166 18168 403737 _CxxThrowException malloc _CxxThrowException free 18165->18168 18167 409d5d _CxxThrowException malloc _CxxThrowException free 18166->18167 18169 409e93 18167->18169 18170 409e63 18168->18170 18171 409d5d _CxxThrowException malloc _CxxThrowException free 18169->18171 18172 409e02 6 API calls 18170->18172 18173 409e9e 18171->18173 18174 409e6e 18172->18174 18177 403ba5 ctype free 18173->18177 18175 4036fb _CxxThrowException malloc _CxxThrowException free 18174->18175 18176 409e7b 18175->18176 18178 403ba5 ctype free 18176->18178 18179 409eb4 18177->18179 18178->18166 18179->17911 18180->17902 18181->17873 18183 406172 __EH_prolog 18182->18183 18184 403308 malloc _CxxThrowException 18183->18184 18185 406189 18184->18185 18186 405c98 20 API calls 18185->18186 18187 406198 18186->18187 18188 403ba5 ctype free 18187->18188 18189 4061b0 18188->18189 18189->17881 18189->17907 18191 405c89 GetFileAttributesW 18190->18191 18193 4057e2 18191->18193 18192 405801 DeleteFileW 18192->17892 18193->18192 18194 4055cd SetFileAttributesW 18193->18194 18195 4057fb 18194->18195 18195->18192 18196 4057ff 18195->18196 18196->17892 18197->17861 18198->17904 18199->17915 18200->17907 18201->17861 18202->17921 18204 4062e1 CreateFileW CloseHandle 18203->18204 18205 40658f 18204->18205 18205->17738 18205->17740 18207 4063e4 SetFilePointer GetLastError SetFilePointer GetLastError SetLastError 18206->18207 18208 40646c 18207->18208 18208->17930 18209 406645 SetEndOfFile 18208->18209 18209->17930 18212 4050b9 __EH_prolog 18210->18212 18211 40510b 18211->17939 18216 4051d7 18211->18216 18212->18211 18213 403b71 ctype malloc _CxxThrowException 18212->18213 18215 4050ed 18213->18215 18214 402292 malloc _CxxThrowException 18214->18215 18215->18211 18215->18214 18217 4051f5 18216->18217 18218 4051e8 18216->18218 18217->17939 18219 403ba5 ctype free 18218->18219 18220 4051ef 18219->18220 18221 403ba5 ctype free 18220->18221 18221->18217 18223 409b11 18222->18223 18224 4034ab malloc _CxxThrowException free 18223->18224 18229 409b35 18223->18229 18224->18229 18225 409c1e 18225->17948 18225->17950 18226 404f62 _CxxThrowException malloc _CxxThrowException free 18226->18229 18227 4036fb _CxxThrowException malloc _CxxThrowException free 18227->18229 18228 405609 CreateDirectoryW 18228->18229 18229->18225 18229->18226 18229->18227 18229->18228 18230 4062c4 GetLastError 18229->18230 18231 40621c 20 API calls 18229->18231 18232 409d78 6 API calls 18229->18232 18230->18229 18231->18229 18232->18229 18233->17940 18235 405584 CreateFileW SetFileTime CloseHandle 18234->18235 18236 40a1ee 18235->18236 18237 40d5c9 18236->18237 18238 40d5d6 18237->18238 18239 40d60a 18237->18239 18240 40d5f4 18238->18240 18241 40d5df _CxxThrowException 18238->18241 18239->17962 18242 410098 malloc _CxxThrowException free memcpy 18240->18242 18241->18240 18242->18239 18244 40b3de __EH_prolog 18243->18244 18245 403b71 ctype malloc _CxxThrowException 18244->18245 18246 40b3e9 18245->18246 18247 40b410 18246->18247 18248 4033db malloc _CxxThrowException 18246->18248 18247->17952 18248->18247 18249->17957 18250->17940 18252 401f93 18251->18252 18256 401f75 18251->18256 18253 403ba5 ctype free 18252->18253 18254 401f9b 18253->18254 18254->17710 18255 403ba5 free ctype 18255->18256 18256->18252 18256->18255 18257->17973 18259 409d82 __EH_prolog 18258->18259 18260 40338e malloc _CxxThrowException 18259->18260 18261 409d93 18260->18261 18262 409dce 18261->18262 18263 403737 _CxxThrowException malloc _CxxThrowException free 18261->18263 18264 409d5d _CxxThrowException malloc _CxxThrowException free 18262->18264 18265 409daa 18263->18265 18266 409dda 18264->18266 18267 409e02 6 API calls 18265->18267 18270 403ba5 ctype free 18266->18270 18268 409db5 18267->18268 18269 4036fb _CxxThrowException malloc _CxxThrowException free 18268->18269 18271 409dc2 18269->18271 18272 409df0 18270->18272 18273 403ba5 ctype free 18271->18273 18272->17753 18273->18262 18274->17988 18278 404bb0 18275->18278 18279 404bba __EH_prolog 18278->18279 18280 404b73 CharUpperW 18279->18280 18281 404bd0 18280->18281 18282 404c43 18281->18282 18284 404a6c CharUpperW 18281->18284 18285 404bd4 18281->18285 18283 404b73 CharUpperW 18282->18283 18283->18285 18286 404bef 18284->18286 18285->17668 18286->18282 18287 4050af malloc _CxxThrowException 18286->18287 18288 404bfe 18287->18288 18289 401f9f memmove free 18288->18289 18290 404c0c 18289->18290 18291 404bb0 memmove CharUpperW malloc _CxxThrowException free 18290->18291 18292 404c23 18291->18292 18293 404c37 18292->18293 18294 404c27 18292->18294 18296 401f6a ctype free 18293->18296 18295 401f6a ctype free 18294->18295 18295->18285 18296->18282 18328 403447 18297->18328 18301 410a3a 18306 410a3f LeaveCriticalSection 18301->18306 18303 4109d9 18303->18301 18304 410a32 18303->18304 18309 402e21 3 API calls 18303->18309 18334 4124e9 18304->18334 18306->17677 18311 410a23 18309->18311 18310 410914 fputs 18313 410976 18310->18313 18314 41093d 18310->18314 18311->18304 18318 403447 3 API calls 18311->18318 18394 403d5e 18313->18394 18316 403447 3 API calls 18314->18316 18326 410947 18316->18326 18317 410989 18319 4109ba 18317->18319 18320 41098f fputs 18317->18320 18318->18304 18400 403cee fputc 18319->18400 18397 403fd5 18320->18397 18323 4109af fputs 18323->18319 18324 4109c5 18324->18303 18401 403cdf fflush 18324->18401 18326->18313 18327 404f62 4 API calls 18326->18327 18327->18313 18329 403459 18328->18329 18330 40347d 18329->18330 18331 403b71 ctype 2 API calls 18329->18331 18330->18303 18380 410a5b 18330->18380 18332 403473 18331->18332 18402 403ba5 free 18332->18402 18335 412501 18334->18335 18336 412749 18334->18336 18337 412514 18335->18337 18338 41250b GetTickCount 18335->18338 18336->18301 18337->18336 18339 412552 18337->18339 18428 40303f 18337->18428 18338->18337 18339->18336 18403 412442 18339->18403 18343 4125b3 18343->18336 18411 402e7e 18343->18411 18346 40303f strcmp 18346->18343 18348 4125ef 18349 412606 18348->18349 18351 402ef8 5 API calls 18348->18351 18352 4126f5 18349->18352 18356 402ef8 5 API calls 18349->18356 18350 4125c7 18350->18348 18353 402ef8 5 API calls 18350->18353 18354 4125fb 18351->18354 18417 412759 18352->18417 18357 4125e4 18353->18357 18438 402f82 18354->18438 18360 412625 18356->18360 18434 402f40 18357->18434 18364 4034ab 3 API calls 18360->18364 18362 41273e 18457 412777 18362->18457 18367 412633 18364->18367 18441 403d81 18367->18441 18368 412735 18371 402e7e 3 API calls 18368->18371 18369 41272e 18456 403cdf fflush 18369->18456 18371->18362 18373 402f82 5 API calls 18373->18352 18374 4034ab 3 API calls 18377 41264f 18374->18377 18377->18374 18378 403d81 10 API calls 18377->18378 18379 4126da 18377->18379 18448 403a54 18377->18448 18452 4038f3 18377->18452 18378->18377 18379->18373 18381 410a65 18380->18381 18382 4108f8 18380->18382 18381->18382 18383 4123af ctype 6 API calls 18381->18383 18384 402e21 18382->18384 18383->18382 18385 402e33 18384->18385 18386 402e52 18385->18386 18387 403b71 ctype 2 API calls 18385->18387 18386->18310 18390 402ef8 18386->18390 18388 402e48 18387->18388 18462 403ba5 free 18388->18462 18391 402f03 18390->18391 18392 402f08 18390->18392 18463 402d39 18391->18463 18392->18310 18395 403d81 10 API calls 18394->18395 18396 403d70 fputs 18395->18396 18396->18317 18469 4028c3 18397->18469 18399 403fec fputs 18399->18323 18400->18324 18401->18303 18402->18330 18404 412464 __aulldiv 18403->18404 18405 4124ab strlen 18404->18405 18406 4124c9 18405->18406 18407 4124d8 18405->18407 18406->18407 18409 402ef8 memcpy _CxxThrowException malloc _CxxThrowException free 18406->18409 18408 402f40 memcpy _CxxThrowException malloc _CxxThrowException free 18407->18408 18410 4124e4 18408->18410 18409->18406 18410->18343 18410->18346 18412 402ea6 18411->18412 18413 402e8a 18411->18413 18412->18350 18413->18412 18414 403b71 ctype malloc _CxxThrowException 18413->18414 18415 402e9d 18414->18415 18416 403ba5 ctype free 18415->18416 18416->18412 18418 412761 strcmp 18417->18418 18419 412701 18417->18419 18418->18419 18419->18362 18420 4123af 18419->18420 18422 412421 18420->18422 18424 4123c2 18420->18424 18421 412432 fputs 18421->18368 18421->18369 18422->18421 18426 403cdf ctype fflush 18422->18426 18423 4123d6 fputs 18423->18422 18424->18423 18427 402cc8 ctype _CxxThrowException malloc _CxxThrowException free 18424->18427 18426->18421 18427->18423 18429 403047 strcmp 18428->18429 18430 403058 18428->18430 18429->18430 18430->18339 18431 403a33 18430->18431 18432 403a3b wcscmp 18431->18432 18433 403a4d 18431->18433 18432->18433 18433->18339 18435 402f4f 18434->18435 18436 402d7c memcpy _CxxThrowException malloc _CxxThrowException free 18435->18436 18437 402f5e 18436->18437 18437->18348 18439 402d7c memcpy _CxxThrowException malloc _CxxThrowException free 18438->18439 18440 402f92 18439->18440 18440->18349 18442 403d89 18441->18442 18443 403da2 18442->18443 18444 403d93 18442->18444 18446 4040a1 9 API calls 18443->18446 18445 40460f _CxxThrowException malloc _CxxThrowException free _CxxThrowException 18444->18445 18447 403da0 18445->18447 18446->18447 18447->18377 18449 403a6b 18448->18449 18450 403a73 memmove 18449->18450 18451 403a9c 18449->18451 18450->18451 18451->18377 18453 403902 18452->18453 18455 40391d 18452->18455 18453->18453 18454 40305f memmove _CxxThrowException malloc _CxxThrowException free 18453->18454 18453->18455 18454->18455 18455->18377 18456->18368 18458 402e7e malloc _CxxThrowException free 18457->18458 18459 4127ad 18458->18459 18460 4034ab malloc _CxxThrowException free 18459->18460 18461 4127b9 18460->18461 18461->18336 18462->18386 18464 402d4f 18463->18464 18465 402d74 18464->18465 18466 402d5f _CxxThrowException 18464->18466 18467 402c92 memcpy malloc _CxxThrowException free 18465->18467 18466->18465 18468 402d7a 18467->18468 18468->18392 18470 4028d8 __aulldiv __aullrem 18469->18470 18470->18399 18471->17624 18473 40af79 __EH_prolog 18472->18473 18480 40af1a 18473->18480 18476 409cf1 VariantClear 18477 40af9f 18476->18477 18478 40af1f 7 API calls 18477->18478 18479 40afe5 18477->18479 18478->18479 18479->17624 18481 40ae26 18480->18481 18482 406654 6 API calls 18481->18482 18483 40ae91 18481->18483 18488 40ae38 18481->18488 18485 40ae79 18482->18485 18484 40aeee 18483->18484 18490 4065a9 SetFileTime 18483->18490 18491 407f16 18484->18491 18485->18483 18489 409e15 7 API calls 18485->18489 18488->18476 18488->18477 18488->18479 18489->18483 18490->18484 18494 40631a 18491->18494 18495 406324 CloseHandle 18494->18495 18496 40632f 18494->18496 18495->18496 18496->18488 18497 416f84 18498 416f91 18497->18498 18499 416fa2 18497->18499 18498->18499 18503 416fa9 18498->18503 18504 416fb3 __EH_prolog 18503->18504 18512 417899 18504->18512 18508 416fdc 18519 417003 18508->18519 18511 403ba5 free 18511->18499 18515 4178a3 __EH_prolog 18512->18515 18528 417901 18515->18528 18518 403ba5 free 18518->18508 18574 403ba5 free 18519->18574 18521 417011 18575 403ba5 free 18521->18575 18523 41701c 18576 403ba5 free 18523->18576 18525 417027 18577 417033 18525->18577 18538 417986 18528->18538 18530 417937 18545 403ba5 free 18530->18545 18532 417953 18546 403ba5 free 18532->18546 18534 4178ca 18535 415a25 18534->18535 18536 415a45 18535->18536 18537 415a2e memset 18535->18537 18536->18518 18537->18536 18547 417a02 18538->18547 18543 4179a8 18564 403ba5 free 18543->18564 18544 4179bf 18544->18530 18545->18532 18546->18534 18566 403ba5 free 18547->18566 18549 417a12 18567 403ba5 free 18549->18567 18551 417a26 18568 403ba5 free 18551->18568 18553 417a31 18569 403ba5 free 18553->18569 18555 417a3c 18570 403ba5 free 18555->18570 18557 417a47 18571 403ba5 free 18557->18571 18559 417a52 18572 403ba5 free 18559->18572 18561 417a5d 18562 417990 18561->18562 18573 403ba5 free 18561->18573 18562->18543 18565 403ba5 free 18562->18565 18564->18544 18565->18543 18566->18549 18567->18551 18568->18553 18569->18555 18570->18557 18571->18559 18572->18561 18573->18562 18574->18521 18575->18523 18576->18525 18608 403ba5 free 18577->18608 18579 417042 18609 403ba5 free 18579->18609 18581 41704d 18610 403ba5 free 18581->18610 18583 417058 18611 403ba5 free 18583->18611 18585 417069 18612 403ba5 free 18585->18612 18587 417070 18613 403ba5 free 18587->18613 18589 417081 18614 403ba5 free 18589->18614 18591 417088 18615 403ba5 free 18591->18615 18593 417099 18616 403ba5 free 18593->18616 18595 4170a0 18617 403ba5 free 18595->18617 18597 4170ae 18618 403ba5 free 18597->18618 18599 4170b5 18619 403ba5 free 18599->18619 18601 4170bd 18620 403ba5 free 18601->18620 18603 4170c5 18621 403ba5 free 18603->18621 18605 4170cd 18622 4170da 18605->18622 18608->18579 18609->18581 18610->18583 18611->18585 18612->18587 18613->18589 18614->18591 18615->18593 18616->18595 18617->18597 18618->18599 18619->18601 18620->18603 18621->18605 18645 403ba5 free 18622->18645 18624 4170e5 18646 403ba5 free 18624->18646 18626 4170ed 18647 403ba5 free 18626->18647 18628 4170f5 18648 403ba5 free 18628->18648 18630 4170fd 18649 403ba5 free 18630->18649 18632 417105 18650 403ba5 free 18632->18650 18634 41710d 18651 403ba5 free 18634->18651 18636 417115 18652 403ba5 free 18636->18652 18638 41711d 18653 403ba5 free 18638->18653 18640 417125 18654 403ba5 free 18640->18654 18642 41712d 18655 403ba5 free 18642->18655 18644 416f9c 18644->18511 18645->18624 18646->18626 18647->18628 18648->18630 18649->18632 18650->18634 18651->18636 18652->18638 18653->18640 18654->18642 18655->18644 18656 415bc9 18661 415be9 18656->18661 18659 415be1 18662 415bf3 __EH_prolog 18661->18662 18670 415fa4 18662->18670 18669 403ba5 free 18669->18659 18671 415fae __EH_prolog 18670->18671 18688 403ba5 free 18671->18688 18673 415c09 18674 415f68 18673->18674 18675 415f98 18674->18675 18680 415f73 18674->18680 18690 403ba5 free 18675->18690 18677 415c15 18681 415b22 18677->18681 18678 424610 CloseHandle GetLastError ctype 18678->18680 18680->18675 18680->18678 18689 403ba5 free 18680->18689 18691 403ba5 free 18681->18691 18683 415b33 18692 403ba5 free 18683->18692 18685 415b3b 18693 415a47 18685->18693 18688->18673 18689->18680 18690->18677 18691->18683 18692->18685 18704 403ba5 free 18693->18704 18695 415a52 18705 403ba5 free 18695->18705 18697 415a5a 18706 403ba5 free 18697->18706 18699 415a62 18707 403ba5 free 18699->18707 18701 415a6a 18708 403ba5 free 18701->18708 18703 415a71 18703->18659 18703->18669 18704->18695 18705->18697 18706->18699 18707->18701 18708->18703 18709 40962a 18710 409637 18709->18710 18711 409648 18709->18711 18710->18711 18715 40964f 18710->18715 18716 409659 __EH_prolog 18715->18716 18738 403ba5 free 18716->18738 18718 409673 18739 403ba5 free 18718->18739 18720 40967e 18740 40b2e9 18720->18740 18723 401f6a ctype free 18724 4096ae 18723->18724 18746 403ba5 free 18724->18746 18726 4096cd 18747 403ba5 free 18726->18747 18728 4096ee 18729 401f6a ctype free 18728->18729 18730 409701 18729->18730 18748 403ba5 free 18730->18748 18732 409708 18749 403ba5 free 18732->18749 18734 409710 18750 403ba5 free 18734->18750 18736 409642 18737 403ba5 free 18736->18737 18737->18711 18738->18718 18739->18720 18744 40b313 18740->18744 18745 40b2f4 18740->18745 18742 40968b 18742->18723 18743 403ba5 free ctype 18743->18745 18751 403ba5 free 18744->18751 18745->18743 18745->18744 18746->18726 18747->18728 18748->18732 18749->18734 18750->18736 18751->18742 18752 425e4c __set_app_type __p__fmode __p__commode 18753 425eba 18752->18753 18754 425ec3 __setusermatherr 18753->18754 18755 425ecf 18753->18755 18754->18755 18760 425f7a _controlfp 18755->18760 18757 425ed4 _initterm __getmainargs _initterm __p___initenv 18761 411e83 18757->18761 18760->18757 18762 411e8d __EH_prolog 18761->18762 18775 412153 GetVersionExW 18762->18775 18765 411eb3 fputs 18774 412142 exit _XcptFilter 18765->18774 18766 411ecf 18777 41040f SetConsoleCtrlHandler 18766->18777 18776 411eaf 18775->18776 18776->18765 18776->18766 18778 410427 _CxxThrowException 18777->18778 18779 41043c 18777->18779 18778->18779 18780 41eb90 GetVersion 18779->18780 18781 41eb9c GetModuleHandleW GetProcAddress 18780->18781 18782 411ee8 18780->18782 18781->18782 18783 41ebb7 18781->18783 18784 40100a 18782->18784 18783->18782 18785 401014 __EH_prolog 18784->18785 18980 41ebc0 GetVersion 18785->18980 18789 401049 GetCommandLineW 18988 40334b 18789->18988 18795 401077 18796 403308 2 API calls 18795->18796 18797 401080 18796->18797 18798 403308 2 API calls 18797->18798 18799 40108c 18798->18799 19014 40542c GetModuleFileNameW 18799->19014 18804 4010a7 fputs 19181 403ba5 free 18804->19181 18805 4010cc 19022 403ba5 free 18805->19022 18808 4010d8 18810 4010e7 18808->18810 19183 401f9f 18808->19183 18809 4010bc 19182 403ba5 free 18809->19182 19023 40248b 18810->19023 18815 401f6a ctype free 18845 40117e 18815->18845 18818 401114 fputs 19191 403cee fputc 18818->19191 18819 401869 19285 401e69 fputs 18819->19285 18822 40112f fputs 19192 403cee fputc 18822->19192 18823 40186e 18826 4024d3 free 18823->18826 18824 401198 18824->18819 18843 4011c0 18824->18843 19217 401e16 18824->19217 18829 40187d 18826->18829 18828 401146 19193 403d01 18828->19193 19286 403ba5 free 18829->19286 18832 4011df fputs 19222 403cee fputc 18832->19222 18837 401885 18840 401f6a ctype free 18837->18840 18838 4011fc 18841 403d01 11 API calls 18838->18841 18839 40115a 19206 4024d3 18839->19206 18840->18845 18846 401204 18841->18846 18844 401265 18843->18844 19224 40338e 18843->19224 18848 401293 18844->18848 18852 4012f7 _CxxThrowException 18844->18852 18859 401ec3 8 API calls 18844->18859 18979 410461 SetConsoleCtrlHandler 18845->18979 19223 403cee fputc 18846->19223 18853 403308 2 API calls 18848->18853 18856 40130c 18852->18856 18860 4012b0 18853->18860 18862 403308 2 API calls 18856->18862 18857 40120b 18867 4024d3 free 18857->18867 18858 401171 18863 401f6a ctype free 18858->18863 18859->18844 18864 4012cf 18860->18864 18868 4034ab 3 API calls 18860->18868 18866 401314 18862->18866 18863->18845 19043 4061c1 18864->19043 18871 401330 18866->18871 18874 4034ab 3 API calls 18866->18874 18872 4016a6 18867->18872 18868->18864 19051 40504a 18871->19051 19272 403ba5 free 18872->19272 18873 4012db _CxxThrowException 18873->18852 18874->18871 18877 4016ae 18879 401f6a ctype free 18877->18879 18879->18845 18880 40d5c9 5 API calls 18881 401362 18880->18881 19057 402292 18881->19057 18884 40d5c9 5 API calls 18885 401376 18884->18885 18886 402292 2 API calls 18885->18886 18887 401382 18886->18887 18888 403b71 ctype 2 API calls 18887->18888 18889 401397 18888->18889 19063 40db57 18889->19063 18891 4013d5 18892 4013f0 18891->18892 18893 4013d9 _CxxThrowException 18891->18893 18894 401854 _CxxThrowException 18892->18894 18895 4013fa 18892->18895 18893->18892 18894->18819 18896 403b71 ctype 2 API calls 18895->18896 18897 401404 18896->18897 18899 401417 18897->18899 19234 401a02 18897->19234 18900 4034ab 3 API calls 18899->18900 18901 401464 18900->18901 19076 40190f 18901->19076 18904 4034ab 3 API calls 18905 4014b0 18904->18905 18906 403308 2 API calls 18905->18906 18907 4014b8 18906->18907 19079 40c369 18907->19079 18913 40153d 19253 4019e5 18913->19253 18917 40155a fputs 18919 403d01 11 API calls 18917->18919 18918 4016c2 18921 4016ea 18918->18921 19273 403cee fputc 18918->19273 18920 401576 18919->18920 18920->18918 18941 4015f7 18920->18941 18942 401615 18941->18942 18943 4015fe _CxxThrowException 18941->18943 18943->18942 18978 4010c4 18978->18815 18979->18774 18981 41ebd3 GetModuleHandleW GetProcAddress 18980->18981 18982 41ebfd GetSystemDirectoryW 18980->18982 18981->18982 18983 41ebee 18981->18983 18984 41ec15 18982->18984 18986 401025 SetFileApisToOEM fputs 18982->18986 18983->18982 18983->18986 18985 41ec6b LoadLibraryExW 18984->18985 18984->18986 18985->18984 18985->18986 18987 402250 18986->18987 18987->18789 18989 40335b 18988->18989 18990 403134 2 API calls 18989->18990 18991 40105d 18990->18991 18992 4023c8 18991->18992 18993 4023d2 __EH_prolog 18992->18993 18994 4033db 2 API calls 18993->18994 18995 4023e1 18994->18995 19287 403831 18995->19287 18998 402835 free 19011 4023fc 18998->19011 18999 403308 malloc _CxxThrowException 18999->19011 19001 402463 19297 403ba5 free 19001->19297 19002 40d5c9 5 API calls 19002->19011 19003 4034ab 3 API calls 19003->19011 19005 402292 2 API calls 19005->19011 19006 40246b 19298 403ba5 free 19006->19298 19007 403ba5 free ctype 19007->19011 19009 402473 19299 403ba5 free 19009->19299 19011->18999 19011->19001 19011->19002 19011->19003 19011->19005 19011->19007 19291 40231c 19011->19291 19012 40106c 19013 403ba5 free 19012->19013 19013->18795 19015 401098 19014->19015 19016 405469 19014->19016 19018 405814 19015->19018 19016->19015 19017 403447 3 API calls 19016->19017 19017->19015 19019 406e42 19018->19019 19312 406b60 19019->19312 19022->18808 19024 402495 __EH_prolog 19023->19024 19394 402dda 19024->19394 19027 403308 2 API calls 19028 4010f2 19027->19028 19029 402706 19028->19029 19030 402710 __EH_prolog 19029->19030 19031 402835 free 19030->19031 19032 40273c 19031->19032 19033 402749 19032->19033 19397 402523 19032->19397 19035 403b71 ctype 2 API calls 19033->19035 19040 40275e 19035->19040 19036 40110c 19036->18818 19036->18824 19037 40d5c9 5 API calls 19037->19040 19038 402292 2 API calls 19038->19040 19040->19036 19040->19037 19040->19038 19041 402818 19040->19041 19403 402576 19040->19403 19042 4034ab 3 API calls 19041->19042 19042->19036 19044 4061cb __EH_prolog 19043->19044 19045 403308 2 API calls 19044->19045 19046 4061e2 19045->19046 19047 405c98 20 API calls 19046->19047 19048 4061f3 19047->19048 19419 403ba5 free 19048->19419 19050 4012d7 19050->18856 19050->18873 19052 405075 19051->19052 19053 405055 19051->19053 19467 405336 19052->19467 19053->19052 19420 404cba 19053->19420 19058 40229c __EH_prolog 19057->19058 19059 403b71 ctype 2 API calls 19058->19059 19060 4022a7 19059->19060 19061 40136e 19060->19061 19062 4033db 2 API calls 19060->19062 19061->18884 19062->19061 19064 40db61 __EH_prolog 19063->19064 19561 40dc98 19064->19561 19066 40dc52 19066->18891 19068 403308 malloc _CxxThrowException 19069 40db6f 19068->19069 19069->19066 19069->19068 19070 4035c8 malloc _CxxThrowException free 19069->19070 19072 40d5c9 5 API calls 19069->19072 19075 403ba5 free ctype 19069->19075 19566 40dc71 19069->19566 19569 40da4f 19069->19569 19587 40dd83 19069->19587 19593 4021ee 19069->19593 19070->19069 19072->19069 19075->19069 19658 401929 19076->19658 19090 40c373 __EH_prolog 19079->19090 19080 40c4bd 19081 40c4d6 19080->19081 19083 403b71 ctype 2 API calls 19080->19083 19084 403b71 ctype 2 API calls 19081->19084 19082 403308 2 API calls 19082->19090 19083->19081 19085 40c502 19084->19085 19142 40c515 19085->19142 19664 40941e 19085->19664 19086 4033db 2 API calls 19086->19090 19089 405c98 20 API calls 19089->19090 19090->19080 19090->19082 19090->19086 19090->19089 19091 40c519 19090->19091 19093 40c51e 19090->19093 19095 403ba5 free ctype 19090->19095 19860 40c097 19090->19860 19092 4062c4 GetLastError 19091->19092 19092->19093 19866 40cf00 19093->19866 19095->19090 19097 40c608 19920 403ba5 free 19097->19920 19100 403308 2 API calls 19100->19142 19102 40cd33 19921 403ba5 free 19102->19921 19103 40c54c 19883 403ba5 free 19103->19883 19107 405c98 20 API calls 19107->19142 19108 40c554 19884 403ba5 free 19108->19884 19110 40cab2 19114 4062c4 GetLastError 19110->19114 19111 40cc4a 19113 4062c4 GetLastError 19111->19113 19112 40151f 19246 40205a 19112->19246 19115 40cc4f 19113->19115 19116 40cab7 19114->19116 19117 40cf00 6 API calls 19115->19117 19906 403ba5 free 19116->19906 19119 40cc61 19117->19119 19919 403ba5 free 19119->19919 19120 40cad7 19907 403ba5 free 19120->19907 19126 40cc39 19918 403ba5 free 19126->19918 19130 40caf6 19908 403ba5 free 19130->19908 19132 40cb01 19133 40205a free 19132->19133 19136 40cb0e 19133->19136 19134 40cb3e 19910 403ba5 free 19134->19910 19138 40ce93 free 19136->19138 19137 40cb49 19139 40205a free 19137->19139 19140 40cb1d 19138->19140 19141 40cb56 19139->19141 19909 403ba5 free 19140->19909 19145 40ce93 free 19141->19145 19142->19097 19142->19100 19142->19107 19142->19110 19142->19111 19142->19120 19142->19130 19142->19134 19144 40205a free 19142->19144 19148 4033db 2 API calls 19142->19148 19153 40cb87 19142->19153 19155 40cbc2 19142->19155 19160 4034ab malloc _CxxThrowException free 19142->19160 19163 40cbe9 19142->19163 19167 403ba5 free ctype 19142->19167 19179 403cee fputc 19142->19179 19678 4097c2 19142->19678 19682 410dc7 19142->19682 19695 40cde7 19142->19695 19701 40d4c8 19142->19701 19707 40cd50 19142->19707 19711 40fdab 19142->19711 19714 4110b7 19142->19714 19759 40cf6f 19142->19759 19848 40ce93 19142->19848 19885 4059a9 19142->19885 19894 40593d 19142->19894 19902 40c320 19142->19902 19144->19142 19147 40cb65 19145->19147 19146 40cac1 19917 403ba5 free 19146->19917 19911 403ba5 free 19147->19911 19148->19142 19912 403ba5 free 19153->19912 19914 403ba5 free 19155->19914 19157 40cb92 19159 40205a free 19157->19159 19162 40cb9f 19159->19162 19160->19142 19161 40cbcd 19164 40205a free 19161->19164 19166 40ce93 free 19162->19166 19915 403ba5 free 19163->19915 19168 40cbda 19164->19168 19170 40cbae 19166->19170 19167->19142 19171 40ce93 free 19168->19171 19169 40cbf9 19172 40205a free 19169->19172 19913 403ba5 free 19170->19913 19171->19163 19174 40cc06 19172->19174 19175 40ce93 free 19174->19175 19176 40cc15 19175->19176 19916 403ba5 free 19176->19916 19179->19142 19181->18809 19182->18978 19184 401fbe 19183->19184 19185 401fb1 19183->19185 21472 40225d memmove 19184->21472 21470 403ba5 free 19185->21470 19188 401fb8 21471 403ba5 free 19188->21471 19189 401fc8 19189->18810 19191->18822 19192->18828 19194 403d0b __EH_prolog 19193->19194 19195 402dda 2 API calls 19194->19195 19196 403d19 19195->19196 19197 40334b 2 API calls 19196->19197 19198 403d28 19197->19198 19199 403d5e 11 API calls 19198->19199 19200 403d3b 19199->19200 21473 403ba5 free 19200->21473 19202 403d43 21474 403ba5 free 19202->21474 19204 401153 19205 403cee fputc 19204->19205 19205->18839 19207 4024dd __EH_prolog 19206->19207 19208 4024f8 19207->19208 19209 402523 free 19207->19209 21475 403ba5 free 19208->21475 19209->19208 19211 402500 21476 403ba5 free 19211->21476 19213 402508 19214 401f6a ctype free 19213->19214 19215 401169 19214->19215 19216 403ba5 free 19215->19216 19216->18858 19218 4033db 2 API calls 19217->19218 19219 401e29 19218->19219 21477 403ba5 free 19219->21477 19221 4011db 19221->18832 19221->18843 19222->18838 19223->18857 19225 4033a4 19224->19225 19225->19225 19226 403134 2 API calls 19225->19226 19227 401245 19226->19227 19228 401ec3 19227->19228 21478 401ee5 19228->21478 19231 401259 19233 403ba5 free 19231->19233 19233->18844 19235 401a0c __EH_prolog 19234->19235 21507 401ac5 19235->21507 19238 402dda 2 API calls 19239 401a56 19238->19239 19240 403308 2 API calls 19239->19240 19241 401a65 19240->19241 19242 403308 2 API calls 19241->19242 19243 401a74 19242->19243 19244 403308 2 API calls 19243->19244 19245 401a83 19244->19245 19245->18899 19250 402061 19246->19250 19247 402073 21535 403ba5 free 19247->21535 19250->19247 21536 403ba5 free 19250->21536 19251 401531 19252 403ba5 free 19251->19252 19252->18913 19254 401545 19253->19254 19255 4019ee 19253->19255 19254->18920 19257 403cee fputc 19254->19257 19255->19254 19256 4123af ctype 6 API calls 19255->19256 19256->19254 19257->18917 19272->18877 19285->18823 19286->18837 19288 403839 19287->19288 19289 4023f5 19288->19289 19290 40385a memmove 19288->19290 19289->18998 19290->19289 19292 4023a1 19291->19292 19295 402347 19291->19295 19292->19011 19293 4023b3 19294 403447 3 API calls 19293->19294 19294->19292 19295->19292 19295->19293 19300 403157 19295->19300 19297->19006 19298->19009 19299->19012 19301 40316d 19300->19301 19302 403192 19301->19302 19303 40317d _CxxThrowException 19301->19303 19306 40309b 19302->19306 19303->19302 19307 403b71 ctype 2 API calls 19306->19307 19308 4030b0 19307->19308 19311 403ba5 free 19308->19311 19310 4030d6 19310->19295 19311->19310 19313 406b6a __EH_prolog 19312->19313 19314 403447 3 API calls 19313->19314 19316 406b7d 19314->19316 19315 406be3 19317 403308 2 API calls 19315->19317 19316->19315 19322 406b8f 19316->19322 19318 406beb 19317->19318 19319 406c42 19318->19319 19323 406bfa 19318->19323 19356 405819 19319->19356 19321 4010a3 19321->18804 19321->18805 19322->19321 19325 40334b 2 API calls 19322->19325 19324 403447 3 API calls 19323->19324 19330 406c03 19324->19330 19326 406ba8 19325->19326 19351 406cc9 19326->19351 19334 403308 2 API calls 19330->19334 19347 406c4e 19330->19347 19331 406bd3 19355 403ba5 free 19331->19355 19333 4036fb 4 API calls 19333->19331 19335 406c1d 19334->19335 19336 406c52 19335->19336 19337 406c25 19335->19337 19338 403447 3 API calls 19336->19338 19339 406c3d 19337->19339 19341 404f62 4 API calls 19337->19341 19338->19339 19372 4036af 19339->19372 19341->19339 19343 406cc9 memmove 19344 406c72 19343->19344 19346 4034ab 3 API calls 19344->19346 19350 406c76 19344->19350 19348 406c96 19346->19348 19377 403ba5 free 19347->19377 19349 4036fb 4 API calls 19348->19349 19349->19350 19376 403ba5 free 19350->19376 19353 406cdc 19351->19353 19352 406bb4 19352->19331 19352->19333 19353->19352 19354 403a54 memmove 19353->19354 19354->19353 19355->19321 19378 425a80 19356->19378 19358 405823 GetCurrentDirectoryW 19359 40585f 19358->19359 19370 40585b 19358->19370 19360 405863 19359->19360 19361 40587b 19359->19361 19362 403447 3 API calls 19360->19362 19363 403308 2 API calls 19361->19363 19362->19370 19364 405883 19363->19364 19365 405896 GetCurrentDirectoryW 19364->19365 19379 4030e3 19364->19379 19367 4058cb 19365->19367 19368 4058a0 19365->19368 19386 403ba5 free 19367->19386 19368->19367 19371 4034ab 3 API calls 19368->19371 19370->19330 19371->19367 19373 4036bf 19372->19373 19388 40319a 19373->19388 19376->19347 19377->19321 19378->19358 19380 4030f5 _CxxThrowException 19379->19380 19381 40310a 19379->19381 19380->19381 19382 403b71 ctype 2 API calls 19381->19382 19383 403115 19382->19383 19387 403ba5 free 19383->19387 19385 403122 19385->19365 19386->19370 19387->19385 19389 4031de 19388->19389 19391 4031ae 19388->19391 19389->19343 19390 4031e4 _CxxThrowException 19391->19390 19392 4031d7 19391->19392 19393 40309b 3 API calls 19392->19393 19393->19389 19395 403b71 ctype 2 API calls 19394->19395 19396 4024b8 19395->19396 19396->19027 19398 402530 19397->19398 19400 402554 19397->19400 19399 40254e 19398->19399 19416 403ba5 free 19398->19416 19399->19033 19400->19399 19417 403ba5 free 19400->19417 19404 402580 __EH_prolog 19403->19404 19406 402691 19404->19406 19407 4026c0 19404->19407 19411 402601 19404->19411 19405 402e21 3 API calls 19405->19407 19408 40334b 2 API calls 19406->19408 19407->19040 19409 40269f 19408->19409 19410 40d5c9 5 API calls 19409->19410 19412 4026ad 19410->19412 19411->19405 19411->19407 19413 402292 2 API calls 19412->19413 19414 4026b8 19413->19414 19418 403ba5 free 19414->19418 19416->19399 19417->19399 19418->19407 19419->19050 19421 404cc4 __EH_prolog 19420->19421 19422 404cd5 _CxxThrowException 19421->19422 19423 404cea 19421->19423 19422->19423 19424 404738 6 API calls 19423->19424 19425 404d00 19424->19425 19426 4051d7 free 19425->19426 19427 404d2e 19425->19427 19426->19427 19428 403308 2 API calls 19427->19428 19429 404d50 19428->19429 19430 404d8b 19429->19430 19432 404d78 wcscmp 19429->19432 19431 404e58 19430->19431 19493 404f8e 19430->19493 19472 404c66 19431->19472 19432->19430 19436 404e81 19438 404ed2 19436->19438 19445 402835 free 19436->19445 19476 40511e 19438->19476 19439 404dcf wcscmp 19441 404da8 19439->19441 19442 404de5 wcscmp 19439->19442 19441->19439 19451 404e00 19441->19451 19442->19441 19443 4034ab 3 API calls 19443->19436 19446 404ea6 19445->19446 19449 40338e 2 API calls 19446->19449 19448 4036fb 4 API calls 19448->19451 19452 404eb3 19449->19452 19451->19431 19451->19448 19454 404f62 4 API calls 19451->19454 19458 401f9f 2 API calls 19451->19458 19455 40d5c9 5 API calls 19452->19455 19454->19451 19459 404ec1 19455->19459 19456 401f6a ctype free 19457 404f3c 19456->19457 19509 403ba5 free 19457->19509 19458->19451 19461 402292 2 API calls 19459->19461 19463 404eca 19461->19463 19462 404f44 19464 401f6a ctype free 19462->19464 19508 403ba5 free 19463->19508 19466 404f51 19464->19466 19466->19053 19469 401344 19467->19469 19470 405341 19467->19470 19469->18880 19470->19469 19556 412d32 19470->19556 19559 403ba5 free 19470->19559 19473 404c71 19472->19473 19474 404c8d 19472->19474 19473->19474 19475 404664 CharUpperW 19473->19475 19474->19436 19498 405276 19474->19498 19475->19473 19477 405130 19476->19477 19478 404f01 19476->19478 19479 402835 free 19477->19479 19486 404ac5 19478->19486 19480 405137 19479->19480 19481 405147 _CxxThrowException 19480->19481 19482 40515c 19480->19482 19485 405164 19480->19485 19481->19482 19510 410098 19482->19510 19484 402292 2 API calls 19484->19485 19485->19478 19485->19484 19489 404ad4 19486->19489 19490 404b0e 19489->19490 19492 401f9f 2 API calls 19489->19492 19525 404b3b 19489->19525 19519 404aa1 19490->19519 19492->19489 19494 404f9a 19493->19494 19497 404fa9 19493->19497 19495 404fd7 wcscmp 19494->19495 19494->19497 19496 404ff0 wcscmp 19495->19496 19495->19497 19496->19497 19497->19441 19499 405280 __EH_prolog 19498->19499 19500 40d5c9 5 API calls 19499->19500 19501 40528a 19500->19501 19502 403b71 ctype 2 API calls 19501->19502 19503 405291 19502->19503 19504 403308 2 API calls 19503->19504 19507 404e7a 19503->19507 19505 4052a7 19504->19505 19506 405246 2 API calls 19505->19506 19506->19507 19507->19443 19508->19438 19509->19462 19511 4100aa 19510->19511 19512 403b71 ctype 2 API calls 19511->19512 19513 4100b5 19512->19513 19514 4100bf memcpy 19513->19514 19515 4100ce 19513->19515 19514->19515 19518 403ba5 free 19515->19518 19517 4100d5 19517->19485 19518->19517 19520 404aac 19519->19520 19521 40d5c9 5 API calls 19520->19521 19522 404ab6 19521->19522 19532 4053a7 19522->19532 19541 404a6c 19525->19541 19528 404b4b 19528->19489 19531 4034ab 3 API calls 19531->19528 19533 4053b1 __EH_prolog 19532->19533 19534 403b71 ctype 2 API calls 19533->19534 19535 4053bc 19534->19535 19536 404ac1 19535->19536 19538 4053f5 19535->19538 19536->19456 19539 4050af 2 API calls 19538->19539 19540 405403 19539->19540 19540->19536 19543 404a95 19541->19543 19544 404a77 19541->19544 19542 404664 CharUpperW 19542->19544 19543->19528 19545 4051fd 19543->19545 19544->19542 19544->19543 19546 405207 __EH_prolog 19545->19546 19547 40d5c9 5 API calls 19546->19547 19548 405210 19547->19548 19549 403b71 ctype 2 API calls 19548->19549 19550 405217 19549->19550 19551 404b5c 19550->19551 19553 405246 19550->19553 19551->19531 19554 403308 2 API calls 19553->19554 19555 405256 19554->19555 19555->19551 19560 403ba5 free 19556->19560 19558 412d39 19558->19470 19559->19470 19560->19558 19562 40dcc0 19561->19562 19564 40dca3 19561->19564 19562->19069 19564->19562 19599 4021bb 19564->19599 19605 403ba5 free 19564->19605 19567 403308 2 API calls 19566->19567 19568 40dc8a 19567->19568 19568->19069 19570 40da59 __EH_prolog 19569->19570 19607 403aa2 19570->19607 19573 403aa2 6 API calls 19586 40da92 19573->19586 19574 40db2f 19575 401f6a ctype free 19574->19575 19577 40db3a 19575->19577 19576 403308 malloc _CxxThrowException 19576->19586 19578 401f6a ctype free 19577->19578 19579 40db46 19578->19579 19579->19069 19580 4034ab 3 API calls 19580->19586 19581 4034ab 3 API calls 19583 40dad9 wcscmp 19581->19583 19582 40d5c9 5 API calls 19582->19586 19583->19586 19585 403ba5 free ctype 19585->19586 19586->19574 19586->19576 19586->19580 19586->19581 19586->19582 19586->19585 19623 40dd20 19586->19623 19588 40dd8d __EH_prolog 19587->19588 19589 403b71 ctype 2 API calls 19588->19589 19590 40dd98 19589->19590 19591 40ddae 19590->19591 19632 40dde6 19590->19632 19591->19069 19594 4021f8 __EH_prolog 19593->19594 19595 40221e 19594->19595 19644 402234 19594->19644 19649 403ba5 free 19595->19649 19598 402225 19598->19069 19600 4021c5 __EH_prolog 19599->19600 19601 4021ee ctype free 19600->19601 19602 4021d8 19601->19602 19606 403ba5 free 19602->19606 19604 4021e0 19604->19564 19605->19564 19606->19604 19608 403aac __EH_prolog 19607->19608 19609 402835 free 19608->19609 19610 403abe 19609->19610 19611 403b61 19610->19611 19612 403308 2 API calls 19610->19612 19611->19573 19617 403ad6 19612->19617 19613 403b40 19614 403b59 19613->19614 19615 40d5c9 5 API calls 19613->19615 19631 403ba5 free 19614->19631 19619 403b4d 19615->19619 19617->19613 19618 403157 4 API calls 19617->19618 19620 40d5c9 5 API calls 19617->19620 19622 402292 2 API calls 19617->19622 19618->19617 19621 402292 2 API calls 19619->19621 19620->19617 19621->19614 19622->19617 19624 40dd2a __EH_prolog 19623->19624 19625 403b71 ctype 2 API calls 19624->19625 19626 40dd36 19625->19626 19627 40dd60 19626->19627 19628 4033db 2 API calls 19626->19628 19627->19586 19629 40dd50 19628->19629 19630 4033db 2 API calls 19629->19630 19630->19627 19631->19611 19633 40ddf0 __EH_prolog 19632->19633 19634 4033db 2 API calls 19633->19634 19635 40de1d 19634->19635 19638 40de9d 19635->19638 19640 40dea7 __EH_prolog 19638->19640 19639 40de2d 19639->19591 19640->19639 19641 403b71 ctype 2 API calls 19640->19641 19642 40dedb 19641->19642 19642->19639 19643 40dd20 2 API calls 19642->19643 19643->19642 19650 4185e3 19644->19650 19647 402249 19647->19594 19649->19598 19656 403ba5 free 19650->19656 19652 4185ee 19657 403ba5 free 19652->19657 19654 40223c 19654->19647 19655 403ba5 free 19654->19655 19655->19647 19656->19652 19657->19654 19659 401933 __EH_prolog 19658->19659 19660 403308 2 API calls 19659->19660 19661 401967 19660->19661 19662 403308 2 API calls 19661->19662 19663 40146f 19662->19663 19663->18904 19665 409428 __EH_prolog 19664->19665 19666 403308 2 API calls 19665->19666 19667 409487 19666->19667 19668 403308 2 API calls 19667->19668 19669 409493 19668->19669 19922 409572 19669->19922 19672 403308 2 API calls 19673 4094ae 19672->19673 19674 403308 2 API calls 19673->19674 19675 409512 19674->19675 19676 403b71 ctype 2 API calls 19675->19676 19677 409538 19676->19677 19677->19142 19679 4097d3 19678->19679 19680 4097d9 19678->19680 19925 403ba5 free 19679->19925 19680->19142 19683 403447 3 API calls 19682->19683 19684 410ddc 19683->19684 19685 410a5b 6 API calls 19684->19685 19688 410e8a 19684->19688 19686 410e23 19685->19686 19687 410e6c 19686->19687 19926 403cee fputc 19686->19926 19687->19688 19690 402e21 3 API calls 19687->19690 19688->19142 19690->19688 19691 410e46 fputs 19927 403eb1 19691->19927 19696 40cdf1 __EH_prolog 19695->19696 19697 403308 2 API calls 19696->19697 19698 40ce26 19697->19698 19942 40ce41 19698->19942 19703 40d4d2 __EH_prolog 19701->19703 19702 40d524 19702->19142 19703->19702 19704 403b71 ctype 2 API calls 19703->19704 19705 40d506 19704->19705 19705->19702 19948 40d60d 19705->19948 19708 40cd60 19707->19708 19709 403308 2 API calls 19708->19709 19710 40cd7d 19709->19710 19710->19142 19951 40f9e0 19711->19951 19715 4110c1 __EH_prolog 19714->19715 19716 403447 3 API calls 19715->19716 19717 4110d7 19716->19717 19718 4019e5 6 API calls 19717->19718 19719 4110e8 19718->19719 20521 41075c 19719->20521 19721 411397 19723 4113b6 19721->19723 20576 403cdf fflush 19721->20576 19722 411366 19737 411392 19722->19737 20525 41171e 19722->20525 19725 4113c4 fputs 19723->19725 19723->19737 19728 403eb1 11 API calls 19725->19728 19727 403cee fputc 19748 411119 19727->19748 19730 4113e4 19728->19730 20577 403cee fputc 19730->20577 19731 4111c5 fputs 20549 403cee fputc 19731->20549 19733 410e92 9 API calls 19733->19748 19736 4113ef 19737->19142 19739 403d01 11 API calls 19739->19748 19740 41135f 19740->19721 19740->19722 19742 403cdf fflush ctype 19742->19748 19743 4112ad fputs 20550 403cee fputc 19743->20550 19746 403e56 11 API calls 19746->19748 19748->19727 19748->19731 19748->19733 19748->19739 19748->19740 19748->19742 19748->19743 19748->19746 20551 410fa2 19748->20551 19760 40cf79 __EH_prolog 19759->19760 19761 4033db 2 API calls 19760->19761 19762 40cfc9 19761->19762 19763 4033db 2 API calls 19762->19763 19767 40cfdf 19763->19767 19764 40d01f 20917 40d643 19764->20917 19767->19764 19770 4034ab 3 API calls 19767->19770 19770->19764 19849 40ce9d __EH_prolog 19848->19849 19850 40f31e free 19849->19850 19851 40ceb0 19850->19851 19852 40cee9 ctype free 19851->19852 19853 40cebc 19852->19853 21448 403ba5 free 19853->21448 19855 40cec4 19856 401f6a ctype free 19855->19856 19857 40ced1 19856->19857 21449 40d477 19857->21449 19861 40c0a4 19860->19861 19862 40c0d8 19860->19862 19863 40c0c2 19861->19863 19864 40c0ad _CxxThrowException 19861->19864 19862->19090 21458 40c17f 19863->21458 19864->19863 19867 40cf0a __EH_prolog 19866->19867 19868 4035c8 3 API calls 19867->19868 19869 40cf1d 19868->19869 19870 403737 4 API calls 19869->19870 19871 40cf2a 19870->19871 19872 409e02 6 API calls 19871->19872 19873 40cf35 19872->19873 19874 4036fb 4 API calls 19873->19874 19875 40cf41 19874->19875 21467 403ba5 free 19875->21467 19877 40cf4d 19878 403737 4 API calls 19877->19878 19879 40cf56 19878->19879 19880 4036fb 4 API calls 19879->19880 19881 40c544 19880->19881 19882 403ba5 free 19881->19882 19882->19103 19883->19108 19884->19112 19886 4059b9 19885->19886 21468 407455 GetSystemTimeAsFileTime 19886->21468 19888 4059ca SetLastError GetStdHandle 19889 4059f6 19888->19889 19890 405a58 GetLastError 19888->19890 19889->19890 19891 4059fb GetFileInformationByHandle 19889->19891 19892 405a62 SetLastError 19890->19892 19893 405a0a 19890->19893 19891->19893 19892->19893 19893->19142 19895 405947 __EH_prolog 19894->19895 19896 403308 2 API calls 19895->19896 19897 405959 19896->19897 19898 4058eb 9 API calls 19897->19898 19899 40596a 19898->19899 21469 403ba5 free 19899->21469 19901 405974 19901->19142 19903 40c35c 19902->19903 19905 40c334 19902->19905 19903->19142 19904 404664 CharUpperW 19904->19905 19905->19903 19905->19904 19906->19146 19907->19146 19908->19132 19909->19146 19910->19137 19911->19146 19912->19157 19913->19097 19914->19161 19915->19169 19916->19146 19917->19126 19918->19112 19919->19146 19920->19102 19921->19112 19923 403308 2 API calls 19922->19923 19924 40949f 19923->19924 19924->19672 19925->19680 19926->19691 19928 403ebb __EH_prolog 19927->19928 19929 40334b 2 API calls 19928->19929 19930 403ecc 19929->19930 19931 402dda 2 API calls 19930->19931 19932 403ee3 19931->19932 19933 403d5e 11 API calls 19932->19933 19934 403ef6 19933->19934 19940 403ba5 free 19934->19940 19936 403efe 19940->19936 19943 40ce4b __EH_prolog 19942->19943 19944 403308 2 API calls 19943->19944 19945 40ce78 19944->19945 19946 403308 2 API calls 19945->19946 19947 40ce32 19946->19947 19947->19142 19949 403b71 ctype 2 API calls 19948->19949 19950 40d617 19949->19950 19950->19705 19952 40f9ea __EH_prolog 19951->19952 19953 403b71 ctype 2 API calls 19952->19953 19955 40fa04 19953->19955 19954 40fa16 19957 403308 2 API calls 19954->19957 19955->19954 20057 40fb8e 19955->20057 19958 40fa42 19957->19958 19959 403308 2 API calls 19958->19959 19960 40fa4e 19959->19960 19961 40faae 19960->19961 19986 4058eb 19960->19986 20009 40f345 19961->20009 19987 405814 9 API calls 19986->19987 19988 4058fb 19987->19988 19989 403447 3 API calls 19988->19989 19990 40590a 19988->19990 19989->19990 19991 403447 3 API calls 19990->19991 19992 405924 19991->19992 19993 40b564 19992->19993 20010 40f34f __EH_prolog 20009->20010 20083 40f31e 20010->20083 20055 40f360 20058 40fb98 __EH_prolog 20057->20058 20059 403308 2 API calls 20058->20059 20060 40fbfd 20059->20060 20061 403308 2 API calls 20060->20061 20062 40fc09 20061->20062 20063 403308 2 API calls 20062->20063 20064 40fc1f 20063->20064 20064->19954 20084 40f329 20083->20084 20085 40f343 20084->20085 20215 40fe19 20084->20215 20085->20055 20216 40fe37 20215->20216 20217 40fe2a 20215->20217 20216->20084 20522 41077b 20521->20522 20523 410768 20521->20523 20522->19748 20523->20522 20524 4123af ctype 6 API calls 20523->20524 20524->20522 20532 411728 __EH_prolog 20525->20532 20526 411744 fputs 20601 411c1a 20526->20601 20527 41137f 20527->19737 20575 403cee fputc 20527->20575 20529 411777 fputs 20618 403cee fputc 20529->20618 20532->20526 20532->20527 20532->20529 20533 40334b 2 API calls 20532->20533 20537 411ce8 25 API calls 20532->20537 20540 4118cc fputs 20532->20540 20542 4118a9 SysFreeString 20532->20542 20543 41199e SysFreeString 20532->20543 20544 4119a9 20532->20544 20547 406f66 VariantClear 20532->20547 20604 411a47 20532->20604 20619 411d49 20532->20619 20626 403ba5 free 20532->20626 20627 411da5 20532->20627 20637 411a25 20532->20637 20644 4119c1 20532->20644 20651 411c2a 20532->20651 20533->20532 20537->20532 20540->20532 20542->20532 20543->20527 20545 406f66 VariantClear 20544->20545 20545->20543 20548 411966 SysFreeString 20547->20548 20548->20532 20549->19748 20550->19748 20856 425a80 20551->20856 20553 410fac fputs 20857 403e56 20553->20857 20575->19737 20576->19723 20577->19736 20602 411a47 17 API calls 20601->20602 20603 411c29 20602->20603 20603->20532 20675 425a80 20604->20675 20606 411a51 fputs fputs 20608 411a75 20606->20608 20618->20532 20620 411d60 fputs fputs fputs 20619->20620 20621 411d5b 20619->20621 20622 403d01 11 API calls 20620->20622 20621->20620 20623 411d8a fputs 20622->20623 20626->20532 20628 411db6 20627->20628 20732 410e92 20628->20732 20771 4119e3 20637->20771 20645 4119e3 2 API calls 20644->20645 20646 4119c9 20645->20646 20647 403fd5 fputs 20646->20647 20652 411c34 __EH_prolog 20651->20652 20653 403308 2 API calls 20652->20653 20654 411c45 20653->20654 20675->20606 20733 410ea5 20732->20733 20741 410eda 20732->20741 20773 4119f4 20771->20773 20772 411a0a fputs fputs 20773->20772 20856->20553 20858 403e60 __EH_prolog 20857->20858 20859 403308 2 API calls 20858->20859 20860 403e6e 20859->20860 20861 402dda 2 API calls 20860->20861 20918 40d64d __EH_prolog 20917->20918 20919 4033db 2 API calls 20918->20919 20920 40d660 20919->20920 21076 40d6a7 20920->21076 20923 40d684 20925 4033db 2 API calls 20923->20925 20926 40d68f 20925->20926 21077 40d6af 21076->21077 21078 40d674 21077->21078 21087 4038ba 21077->21087 21078->20923 21081 403409 21078->21081 21082 403415 21081->21082 21083 403426 21081->21083 21084 403b71 ctype 2 API calls 21082->21084 21083->20923 21088 4038c5 21087->21088 21089 4038ca memmove 21087->21089 21090 403157 4 API calls 21088->21090 21089->21078 21090->21089 21448->19855 21453 40d481 __EH_prolog 21449->21453 21450 40d4b1 21457 403ba5 free 21450->21457 21452 40cedc 21452->19142 21453->21450 21454 40d537 free 21453->21454 21456 403ba5 free 21453->21456 21454->21453 21456->21453 21457->21452 21459 40c191 21458->21459 21460 403b71 ctype 2 API calls 21459->21460 21461 40c19c 21460->21461 21462 40c1b5 21461->21462 21463 40c1a6 memcpy 21461->21463 21466 403ba5 free 21462->21466 21463->21462 21465 40c1bc 21465->19862 21466->21465 21467->19877 21468->19888 21469->19901 21470->19188 21471->19184 21472->19189 21473->19202 21474->19204 21475->19211 21476->19213 21477->19221 21479 401ef6 21478->21479 21490 405082 21479->21490 21482 401e91 fputs 21506 403cee fputc 21482->21506 21484 401eb1 _CxxThrowException 21485 401ec3 21484->21485 21486 401ee5 5 API calls 21485->21486 21487 401ed0 21486->21487 21488 401ee2 21487->21488 21489 401e91 6 API calls 21487->21489 21488->19231 21489->21488 21495 4052d1 21490->21495 21493 4034ab 3 API calls 21494 401ed0 21493->21494 21494->19231 21494->21482 21496 4052db __EH_prolog 21495->21496 21497 40d5c9 5 API calls 21496->21497 21498 4052e4 21497->21498 21499 403b71 ctype 2 API calls 21498->21499 21500 4052eb 21499->21500 21501 40508c 21500->21501 21503 40531a 21500->21503 21501->21493 21504 403308 2 API calls 21503->21504 21505 405322 21504->21505 21505->21501 21506->21484 21508 401acf __EH_prolog 21507->21508 21513 401b26 21508->21513 21511 403308 2 API calls 21512 401a32 21511->21512 21512->19238 21514 401b30 __EH_prolog 21513->21514 21529 401bba 21514->21529 21517 402dda 2 API calls 21518 401b52 21517->21518 21519 402dda 2 API calls 21518->21519 21520 401b5e 21519->21520 21521 402dda 2 API calls 21520->21521 21522 401b6a 21521->21522 21523 403308 2 API calls 21522->21523 21524 401b76 21523->21524 21525 401bba 2 API calls 21524->21525 21526 401b82 21525->21526 21527 402dda 2 API calls 21526->21527 21528 401ae3 21527->21528 21528->21511 21530 401bc4 __EH_prolog 21529->21530 21531 402dda 2 API calls 21530->21531 21532 401be9 21531->21532 21533 403308 2 API calls 21532->21533 21534 401b3c 21533->21534 21534->21517 21535->19251 21536->19250 21582 41e010 21583 41e014 21582->21583 21584 41e017 malloc 21582->21584 21585 41e030 free 21586 41bef0 21587 41bf0b 21586->21587 21588 41bf22 21587->21588 21590 41beb0 21587->21590 21591 41beba 21590->21591 21595 41bed8 21591->21595 21596 41dfc0 free 21591->21596 21593 41bec9 21597 41dfa0 21593->21597 21595->21588 21596->21593 21598 41dfa4 21597->21598 21599 41dfa7 malloc 21597->21599 21598->21595 21599->21595 21600 422450 21601 422475 21600->21601 21602 42245e 21600->21602 21616 424610 21601->21616 21604 424700 ctype 2 API calls 21602->21604 21605 422466 21604->21605 21607 424700 ctype 2 API calls 21605->21607 21606 42247d 21608 42246e 21607->21608 21610 424660 WaitForSingleObject 21608->21610 21611 424681 21610->21611 21612 42467b GetLastError 21610->21612 21613 42468e CloseHandle 21611->21613 21614 42469f 21611->21614 21612->21611 21613->21614 21615 424699 GetLastError 21613->21615 21614->21601 21615->21614 21617 42463b 21616->21617 21618 424619 CloseHandle 21616->21618 21617->21606 21619 424624 GetLastError 21618->21619 21620 424635 21618->21620 21619->21617 21621 42462e 21619->21621 21620->21617 21621->21606 21622 4077b4 21623 4077c3 21622->21623 21625 4077c9 21622->21625 21624 409347 80 API calls 21623->21624 21624->21625 21626 408435 21627 408453 21626->21627 21628 408442 21626->21628 21628->21627 21630 403ba5 free 21628->21630 21630->21627 21631 41383a 21636 413856 21631->21636 21634 41384f 21637 413860 __EH_prolog 21636->21637 21653 4093f9 21637->21653 21639 413879 21664 4139df 21639->21664 21642 413989 ctype free 21643 413891 21642->21643 21670 403ba5 free 21643->21670 21645 413899 21671 403ba5 free 21645->21671 21647 4138a1 21672 4138cf 21647->21672 21652 403ba5 free 21652->21634 21654 409409 21653->21654 21655 40940e 21653->21655 21657 424700 ctype 2 API calls 21654->21657 21656 40941d 21655->21656 21658 424660 WaitForSingleObject 21655->21658 21656->21639 21657->21655 21659 424681 21658->21659 21660 42467b GetLastError 21658->21660 21661 42468e CloseHandle 21659->21661 21663 42469f 21659->21663 21660->21659 21662 424699 GetLastError 21661->21662 21661->21663 21662->21663 21663->21639 21665 4139e9 __EH_prolog 21664->21665 21666 413a1e 21665->21666 21689 403ba5 free 21665->21689 21688 403ba5 free 21666->21688 21668 413885 21668->21642 21670->21645 21671->21647 21673 4138d9 __EH_prolog 21672->21673 21674 4093f9 ctype 6 API calls 21673->21674 21675 4138f2 21674->21675 21676 424610 ctype 2 API calls 21675->21676 21677 4138fa 21676->21677 21678 424610 ctype 2 API calls 21677->21678 21679 413902 21678->21679 21680 424610 ctype 2 API calls 21679->21680 21681 4138ae 21680->21681 21682 413938 21681->21682 21683 413942 __EH_prolog 21682->21683 21690 403ba5 free 21683->21690 21685 413955 21691 403ba5 free 21685->21691 21687 413842 21687->21634 21687->21652 21688->21668 21689->21665 21690->21685 21691->21687 21692 407afd 21693 407b0a 21692->21693 21694 407b1b 21692->21694 21693->21694 21698 407b22 21693->21698 21699 407b2c __EH_prolog 21698->21699 21700 40631a CloseHandle 21699->21700 21701 407b15 21700->21701 21702 403ba5 free 21701->21702 21702->21694
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 00414F35
                                        • Part of subcall function 0041836A: _CxxThrowException.MSVCRT(?,0042C050), ref: 004183B3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: ExceptionH_prologThrow
                                      • String ID:
                                      • API String ID: 461045715-3916222277
                                      • Opcode ID: 54ba90d0e3e1a2cd44b3a8127065b3736ec06a04d7834e202b5ebaa4a6c5cc2e
                                      • Instruction ID: 9730df7e2326ecd6f3b7c656d3358000a3777ff4a4df54740873238864095401
                                      • Opcode Fuzzy Hash: 54ba90d0e3e1a2cd44b3a8127065b3736ec06a04d7834e202b5ebaa4a6c5cc2e
                                      • Instruction Fuzzy Hash: 1A829F30900659DFDB15DFA8C884BEEBBB1BF48314F14419EE815AB391C738AE85CB65
                                      APIs
                                        • Part of subcall function 00405A6D: FindClose.KERNELBASE(00000000,000000FF,00405A9E), ref: 00405A78
                                      • FindFirstFileW.KERNELBASE(?,?), ref: 00405AAC
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: Find$CloseFileFirst
                                      • String ID:
                                      • API String ID: 2295610775-0
                                      • Opcode ID: d3e20e893d103623865192cbfbd50d7f980ab7106058d3680fa755dbd2b51631
                                      • Instruction ID: ed05b2355a57328246007ee694caf2b5fc6674e02e4ec3abcb408285466e3139
                                      • Opcode Fuzzy Hash: d3e20e893d103623865192cbfbd50d7f980ab7106058d3680fa755dbd2b51631
                                      • Instruction Fuzzy Hash: DBE0923020091857CF20AF64CCC55EB3768EF51318F104376A861A72D1E7389D4A8FA8

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 40100a-4010a5 call 425a80 call 41ebc0 SetFileApisToOEM fputs call 402250 GetCommandLineW call 40334b call 4023c8 call 403ba5 call 403308 * 2 call 40542c call 405814 21 4010a7-4010c7 fputs call 403ba5 * 2 0->21 22 4010cc-4010dc call 403ba5 0->22 33 401843-40184f call 401f6a 21->33 27 4010e7-40110e call 40248b call 402706 22->27 28 4010de-4010e2 call 401f9f 22->28 40 401114-401180 fputs call 403cee fputs call 403cee call 403d01 call 403cee call 4024d3 call 403ba5 call 401f6a 27->40 41 401198-4011a7 27->41 28->27 39 401851-401852 33->39 42 401894-4018a2 39->42 40->39 43 401869-401892 call 401e69 call 4024d3 call 403ba5 call 401f6a 41->43 44 4011ad-4011b0 41->44 43->42 44->43 47 4011b6-4011be 44->47 50 4011c0-4011c7 47->50 51 4011c9-4011dd call 401e16 47->51 54 401216-401235 call 401000 call 4018a3 50->54 61 401213-401215 51->61 62 4011df-40120e fputs call 403cee call 403d01 call 403cee 51->62 76 401237-40126b call 40338e call 401ec3 call 403ba5 54->76 77 40126c 54->77 61->54 98 401697-4016bd call 4024d3 call 403ba5 call 401f6a 62->98 76->77 81 401293-4012b7 call 403308 77->81 82 40126e-40127a 77->82 101 4012b9-4012ca call 4034ab 81->101 102 4012cf-4012d2 call 4061c1 81->102 86 4012f7-401307 _CxxThrowException 82->86 87 40127c-401291 call 401ec3 82->87 91 40130c-401321 call 403308 86->91 87->81 87->82 111 401323-401333 call 4034ab call 406727 91->111 112 401338-4013a3 call 40504a call 40d5c9 call 402292 call 40d5c9 call 402292 call 403b71 91->112 98->42 101->102 109 4012d7-4012d9 102->109 109->91 114 4012db-4012f2 _CxxThrowException 109->114 111->112 134 4013b1-4013b4 112->134 135 4013a5-4013af call 4018bf 112->135 114->86 137 4013b6-4013c2 134->137 135->137 139 4013c4-4013c6 137->139 140 4013ca-4013d7 call 40db57 137->140 139->140 143 4013f0-4013f4 140->143 144 4013d9-4013eb _CxxThrowException 140->144 145 401854-401864 _CxxThrowException 143->145 146 4013fa-40140e call 403b71 143->146 144->143 145->43 149 401410-401419 call 401a02 146->149 150 40141b 146->150 152 40141d-401429 149->152 150->152 154 401431-40151a call 401d0f call 4034ab call 40190f call 4034ab call 403308 call 40c369 152->154 155 40142b-40142d 152->155 167 40151f-401548 call 40205a call 403ba5 call 4019e5 154->167 155->154 174 401584 167->174 175 40154a-401579 call 403cee fputs call 403d01 167->175 177 40158a-401598 174->177 175->177 191 40157b-401582 175->191 179 4016c2-4016c4 177->179 180 40159e-4015a0 177->180 183 4016c6-4016e5 call 403cee fputs call 403cee 179->183 184 4016ea-4016f9 179->184 180->179 182 4015a6-4015b2 180->182 182->179 189 4015b8-4015bb 182->189 183->184 187 4016fb-40171a call 403cee fputs call 403cee 184->187 188 40171f-40172b 184->188 187->188 193 401764-401770 188->193 194 40172d-40175f call 403cee fputs call 403fd5 call 403cee 188->194 189->179 195 4015c1-4015cd 189->195 191->177 196 401772-4017a4 call 403cee fputs call 403fd5 call 403cee 193->196 197 4017a9-4017c7 call 403ba5 call 4019ce 193->197 194->193 195->179 201 4015d3-4015d6 195->201 196->197 222 4017c9-4017cb 197->222 223 4017cf-4017d8 197->223 201->179 206 4015dc-4015e8 201->206 206->179 210 4015ee-4015f1 206->210 210->179 214 4015f7-4015fc 210->214 215 401615-401633 call 403ba5 call 4019ce 214->215 216 4015fe-401610 _CxxThrowException 214->216 232 401635-401637 215->232 233 40163b-401644 215->233 216->215 222->223 225 4017e0-401842 call 401f6a * 2 call 403ba5 * 2 call 401f6a call 401fce call 4024d3 call 403ba5 223->225 226 4017da-4017dc 223->226 225->33 226->225 232->233 235 401646-401648 233->235 236 40164c-401692 call 401f6a * 2 call 403ba5 * 2 call 401f6a call 401fce 233->236 235->236 236->98
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 0040100F
                                        • Part of subcall function 0041EBC0: GetVersion.KERNEL32 ref: 0041EBC7
                                        • Part of subcall function 0041EBC0: GetModuleHandleW.KERNEL32(kernel32.dll,SetDefaultDllDirectories), ref: 0041EBDD
                                        • Part of subcall function 0041EBC0: GetProcAddress.KERNEL32(00000000), ref: 0041EBE4
                                        • Part of subcall function 0041EBC0: GetSystemDirectoryW.KERNEL32(?,00000106), ref: 0041EC07
                                        • Part of subcall function 0041EBC0: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0041EC8D
                                      • SetFileApisToOEM.KERNEL32 ref: 00401025
                                      • fputs.MSVCRT ref: 0040103D
                                      • GetCommandLineW.KERNEL32 ref: 0040104E
                                        • Part of subcall function 004023C8: __EH_prolog.LIBCMT ref: 004023CD
                                        • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                        • Part of subcall function 0040542C: GetModuleFileNameW.KERNEL32(00000000,00000000,00000105), ref: 0040545C
                                      • fputs.MSVCRT ref: 004010B2
                                      • fputs.MSVCRT ref: 0040111F
                                      • fputs.MSVCRT ref: 0040113B
                                      • _CxxThrowException.MSVCRT(?,0042BC68), ref: 00401864
                                        • Part of subcall function 00401E69: fputs.MSVCRT ref: 00401E75
                                        • Part of subcall function 004024D3: __EH_prolog.LIBCMT ref: 004024D8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: fputs$H_prolog$FileModule$AddressApisCommandDirectoryExceptionHandleLibraryLineLoadNameProcSystemThrowVersionfree
                                      • String ID: Archive Errors$Can't open as archive$Command line error:$ERROR: Unknown command:$Error: $GetFullPathName Error$Open Errors: $Sub items Errors:
                                      • API String ID: 1316033296-2186481410
                                      • Opcode ID: a8d33f717df1afc205c6f6fc5be29a96f206f1e3117ba57bbeba55c80b253504
                                      • Instruction ID: 37754d37836912fedcf3d689fcb171cea941b93a5e0cdad8537999c6aa24026e
                                      • Opcode Fuzzy Hash: a8d33f717df1afc205c6f6fc5be29a96f206f1e3117ba57bbeba55c80b253504
                                      • Instruction Fuzzy Hash: 47428D31900259DFDF25EFA5D895AEDBBB4AF04304F1440AFE44AB72E2DB381A45CB19

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 260 41171e-41173e call 425a80 263 411744-411770 fputs call 411c1a 260->263 264 41198b 260->264 268 411772-411775 263->268 269 4117cc-4117d1 263->269 265 41198d-41199b 264->265 272 411777-41178d fputs call 403cee 268->272 273 41178f-411791 268->273 270 4117d3-4117d8 269->270 271 4117da-4117e3 269->271 274 4117e6-4117f2 call 411a47 270->274 271->274 272->269 276 411793-411798 273->276 277 41179a-4117a3 273->277 281 4117f7-411816 call 411da5 274->281 280 4117a6-4117cb call 40334b call 411d49 call 403ba5 276->280 277->280 280->269 287 411824-411835 call 411ce8 281->287 288 411818-41181f call 411a25 281->288 287->265 295 41183b-411845 287->295 288->287 296 411853-411861 295->296 297 411847-41184e call 4119c1 295->297 296->265 300 411867-41186a 296->300 297->296 301 4118bc-4118c6 300->301 302 41186c-41188c 300->302 303 41197c-411985 301->303 304 4118cc-4118e7 fputs 301->304 306 411892-4118a3 call 411ce8 302->306 307 41199e-4119a3 302->307 303->263 303->264 304->303 310 4118ed-411901 304->310 306->307 315 4118a9-4118ba SysFreeString 306->315 311 4119b7-4119bf SysFreeString 307->311 313 411903-411925 310->313 314 411979 310->314 311->265 317 4119a5-4119a7 313->317 318 411927-41194b 313->318 314->303 315->301 315->302 319 4119b4 317->319 321 4119a9-4119b1 call 406f66 318->321 322 41194d-411977 call 411c2a call 406f66 SysFreeString 318->322 319->311 321->319 322->313 322->314
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 00411723
                                      • fputs.MSVCRT ref: 00411759
                                      • fputs.MSVCRT ref: 0041177E
                                        • Part of subcall function 00403CEE: fputc.MSVCRT ref: 00403CF5
                                        • Part of subcall function 00406F66: VariantClear.OLEAUT32(?), ref: 00406F88
                                      • SysFreeString.OLEAUT32(00000000), ref: 004118B0
                                      • fputs.MSVCRT ref: 004118D3
                                      • SysFreeString.OLEAUT32(00000000), ref: 0041196D
                                      • SysFreeString.OLEAUT32(00000000), ref: 004119B7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: FreeStringfputs$ClearH_prologVariantfputc
                                      • String ID: --$----$Type$Warning: The archive is open with offset
                                      • API String ID: 2072268484-1245056967
                                      • Opcode ID: fb3390146c81334d396c99daa6d3461159feaf5986877ce0f5b400962f183e80
                                      • Instruction ID: a3d5f6d9cfde6feea9fdbc4782c9a90494907b9087194ce7bf4d0a7410971838
                                      • Opcode Fuzzy Hash: fb3390146c81334d396c99daa6d3461159feaf5986877ce0f5b400962f183e80
                                      • Instruction Fuzzy Hash: D491AC71A10209EFDB14DFA5D981AEEB7B5FF48314F10412EE512A72A0DB38AD85CB58

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: _initterm$FilterXcpt__getmainargs__p___initenv__p__commode__p__fmode__set_app_type__setusermatherrexit
                                      • String ID:
                                      • API String ID: 167530163-0
                                      • Opcode ID: d4e87e20f13268a2368b37537ec0d8a4c7ebd2ceb8382e40c53da9a686bd4e22
                                      • Instruction ID: 5d8486ae153206ccce82f6c4c9ba7e61262e203fc83edcfd9949eb2a5c758f24
                                      • Opcode Fuzzy Hash: d4e87e20f13268a2368b37537ec0d8a4c7ebd2ceb8382e40c53da9a686bd4e22
                                      • Instruction Fuzzy Hash: 16318575A00719EFDB14DFA0ED4AEAD7B74FB08321F50022AF515A32A0DB785900CF28

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 338 4110b7-4110f0 call 425a80 call 403447 call 4019e5 345 411111-411122 call 41075c 338->345 346 4110f2-4110f8 338->346 350 411361-411364 345->350 351 411128-411140 345->351 346->345 347 4110fa-41110e 346->347 347->345 352 411397-4113af 350->352 353 411366-41136e 350->353 354 411142 351->354 355 411145-411147 351->355 360 4113b1 call 403cdf 352->360 361 4113b6-4113be 352->361 358 411374-41137a call 41171e 353->358 359 41145d call 4121d4 353->359 354->355 356 411152-41115a 355->356 357 411149-41114c 355->357 364 411184-411186 356->364 365 41115c-411165 call 403cee 356->365 357->356 363 411224-41122f call 411473 357->363 374 41137f-411381 358->374 371 411462-411470 359->371 360->361 361->359 366 4113c4-411402 fputs call 403eb1 call 403cee call 411e0b 361->366 391 411231-411234 363->391 392 41123a-411242 363->392 372 4111b5-4111b9 364->372 373 411188-411190 364->373 365->364 386 411167-41117f call 403e56 call 403cee 365->386 366->371 425 411404-41140a 366->425 382 4111bb-4111c3 372->382 383 41120a-411212 372->383 378 411192-411198 call 410e92 373->378 379 41119d-4111ae 373->379 374->371 380 411387-411392 call 403cee 374->380 378->379 379->372 380->359 384 4111f2-411203 382->384 385 4111c5-4111ed fputs call 403cee call 403d01 call 403cee 382->385 383->363 388 411214-41121f call 403cee call 403cdf 383->388 384->383 385->384 386->364 388->363 391->392 393 411315-411319 391->393 395 411244-41124d call 403cee 392->395 396 41126c-41126e 392->396 408 41131b-411329 393->408 409 41134d-411359 393->409 395->396 423 41124f-411267 call 403e56 call 403cee 395->423 405 411270-411278 396->405 406 41129d-4112a1 396->406 415 411285-411296 405->415 416 41127a-411280 call 410e92 405->416 418 4112a3-4112ab 406->418 419 4112f2-4112fa 406->419 420 411346 408->420 421 41132b-41133d call 410fa2 408->421 409->351 412 41135f 409->412 412->350 415->406 416->415 427 4112da-4112eb 418->427 428 4112ad-4112d5 fputs call 403cee call 403d01 call 403cee 418->428 419->393 424 4112fc-411308 call 403cee 419->424 420->409 421->420 438 41133f-411341 call 403cdf 421->438 423->396 424->393 447 41130a-411310 call 403cdf 424->447 435 411452-411458 call 403cdf 425->435 436 41140c-411412 425->436 427->419 428->427 435->359 442 411414-411424 fputs 436->442 443 411426-411441 call 409e02 call 403d01 call 403ba5 436->443 438->420 448 411446-41144d call 403cee 442->448 443->448 447->393 448->435
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 004110BC
                                      • fputs.MSVCRT ref: 004111D2
                                      • fputs.MSVCRT ref: 004112BA
                                      • fputs.MSVCRT ref: 004113D2
                                      • fputs.MSVCRT ref: 00411421
                                        • Part of subcall function 00403CDF: fflush.MSVCRT ref: 00403CE1
                                        • Part of subcall function 00403D01: __EH_prolog.LIBCMT ref: 00403D06
                                        • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: fputs$H_prolog$fflushfree
                                      • String ID: Can't allocate required memory$ERRORS:$WARNINGS:
                                      • API String ID: 1750297421-1898165966
                                      • Opcode ID: 3337441fc7a0776c9f4238b91f1044a6ef0d067e4b8c70e6cfac88f835a85e45
                                      • Instruction ID: 33d289f6b5c606ebc4a1115891c26e2319c58622cdac9781428c791bf3c2c158
                                      • Opcode Fuzzy Hash: 3337441fc7a0776c9f4238b91f1044a6ef0d067e4b8c70e6cfac88f835a85e45
                                      • Instruction Fuzzy Hash: 2FB1A4306017059FEB24DF61C891BEAB7E1BF44308F04852FD65AA76A1CB39BD84CB59

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 458 4114d9-411505 call 425a80 EnterCriticalSection 461 411507-41150d 458->461 462 41152a-411532 458->462 461->462 465 41150f-411514 call 4123af 461->465 463 411534 call 403cdf 462->463 464 411539-41153e 462->464 463->464 467 411544-411550 464->467 468 41160d-411612 464->468 474 411519-411527 465->474 470 411592-4115aa 467->470 471 411552-411558 467->471 472 411618-41161d 468->472 473 4116ba 468->473 477 4115ac-4115bd call 403cee 470->477 478 4115ee-4115f6 470->478 471->470 475 41155a-411566 471->475 472->473 476 411623-41163b 472->476 479 4116bc-4116d3 LeaveCriticalSection 473->479 474->462 482 411568 475->482 483 41156e-41157c 475->483 480 4116ac-4116b8 call 4121d4 476->480 484 41163d-41165f call 403cee fputs 476->484 477->478 495 4115bf-4115e7 fputs call 403fd5 477->495 478->480 481 4115fc-411602 478->481 480->479 481->480 486 411608 481->486 482->483 483->478 488 41157e-411590 fputs 483->488 498 411661-411672 fputs 484->498 499 411674-411690 call 409e02 call 403d01 call 403ba5 484->499 491 4116a7 call 403cdf 486->491 493 4115e9 call 403cee 488->493 491->480 493->478 495->493 502 411695-4116a1 call 403cee 498->502 499->502 502->491
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 004114DE
                                      • EnterCriticalSection.KERNEL32(00430538), ref: 004114F4
                                      • fputs.MSVCRT ref: 00411586
                                      • fputs.MSVCRT ref: 004115CC
                                      • fputs.MSVCRT ref: 00411652
                                      • fputs.MSVCRT ref: 0041166F
                                        • Part of subcall function 004123AF: fputs.MSVCRT ref: 00412418
                                        • Part of subcall function 00403D01: __EH_prolog.LIBCMT ref: 00403D06
                                        • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                      • LeaveCriticalSection.KERNEL32(00430538), ref: 004116BD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: fputs$CriticalH_prologSection$EnterLeavefree
                                      • String ID: Sub items Errors:
                                      • API String ID: 777174534-2637271492
                                      • Opcode ID: c1a4c0227faf2a1eb2b0c2454e411b2b285b3bc7d7242277324e758b1d64e425
                                      • Instruction ID: c436f3324885b6c5f0cde1dde4f741d5a44cae6dcfed69199f3fe9034af22f22
                                      • Opcode Fuzzy Hash: c1a4c0227faf2a1eb2b0c2454e411b2b285b3bc7d7242277324e758b1d64e425
                                      • Instruction Fuzzy Hash: 36519D32601600DFDB25DF65D884AEABBE2FF84310F54852FE15B97261DB3A6D90CB09

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 510 40739d-4073d0 GetModuleHandleA GetProcAddress 511 4073d2-4073da GlobalMemoryStatusEx 510->511 512 4073fd-407414 GlobalMemoryStatus 510->512 511->512 515 4073dc-4073e5 511->515 513 407416 512->513 514 407419-40741b 512->514 513->514 516 40741f-407423 514->516 517 4073f3 515->517 518 4073e7 515->518 521 4073f6-4073fb 517->521 519 4073e9-4073ec 518->519 520 4073ee-4073f1 518->520 519->517 519->520 520->521 521->516
                                      APIs
                                      • GetModuleHandleA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx), ref: 004073C1
                                      • GetProcAddress.KERNEL32(00000000), ref: 004073C8
                                      • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 004073D6
                                      • GlobalMemoryStatus.KERNEL32(?), ref: 00407408
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: GlobalMemoryStatus$AddressHandleModuleProc
                                      • String ID: $@$GlobalMemoryStatusEx$kernel32.dll
                                      • API String ID: 180289352-802862622
                                      • Opcode ID: 2a986c63f2b6fa7951a361114db15d026d7f1eb5d0adc5c4a8a9ed1fa11470ce
                                      • Instruction ID: bd3d2fabc704362d9ca5d338a6c6718327ec6968a32443d636c6e2c65d652486
                                      • Opcode Fuzzy Hash: 2a986c63f2b6fa7951a361114db15d026d7f1eb5d0adc5c4a8a9ed1fa11470ce
                                      • Instruction Fuzzy Hash: 41113970E04219DBEB20DF94D989BAEBBF5FB04341F50042AE942F7280D778B844DB59

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 522 401190-4011a7 524 401869-401892 call 401e69 call 4024d3 call 403ba5 call 401f6a 522->524 525 4011ad-4011b0 522->525 555 401894-4018a2 524->555 525->524 527 4011b6-4011be 525->527 529 4011c0-4011c7 527->529 530 4011c9-4011dd call 401e16 527->530 532 401216-401235 call 401000 call 4018a3 529->532 537 401213-401215 530->537 538 4011df-40120e fputs call 403cee call 403d01 call 403cee 530->538 548 401237-40126b call 40338e call 401ec3 call 403ba5 532->548 549 40126c 532->549 537->532 568 401697-4016bd call 4024d3 call 403ba5 call 401f6a 538->568 548->549 552 401293-4012b7 call 403308 549->552 553 40126e-40127a 549->553 570 4012b9-4012ca call 4034ab 552->570 571 4012cf-4012d2 call 4061c1 552->571 557 4012f7-401307 _CxxThrowException 553->557 558 40127c-401291 call 401ec3 553->558 562 40130c-401321 call 403308 557->562 558->552 558->553 579 401323-401333 call 4034ab call 406727 562->579 580 401338-4013a3 call 40504a call 40d5c9 call 402292 call 40d5c9 call 402292 call 403b71 562->580 568->555 570->571 577 4012d7-4012d9 571->577 577->562 582 4012db-4012f2 _CxxThrowException 577->582 579->580 602 4013b1-4013b4 580->602 603 4013a5-4013af call 4018bf 580->603 582->557 605 4013b6-4013c2 602->605 603->605 607 4013c4-4013c6 605->607 608 4013ca-4013d7 call 40db57 605->608 607->608 611 4013f0-4013f4 608->611 612 4013d9-4013eb _CxxThrowException 608->612 613 401854-401864 _CxxThrowException 611->613 614 4013fa-40140e call 403b71 611->614 612->611 613->524 617 401410-401419 call 401a02 614->617 618 40141b 614->618 620 40141d-401429 617->620 618->620 622 401431-4014b3 call 401d0f call 4034ab call 40190f call 4034ab call 403308 620->622 623 40142b-40142d 620->623 633 4014b8-40151a call 40c369 622->633 623->622 635 40151f-401548 call 40205a call 403ba5 call 4019e5 633->635 642 401584 635->642 643 40154a-401579 call 403cee fputs call 403d01 635->643 645 40158a-401598 642->645 643->645 659 40157b-401582 643->659 647 4016c2-4016c4 645->647 648 40159e-4015a0 645->648 651 4016c6-4016e5 call 403cee fputs call 403cee 647->651 652 4016ea-4016f9 647->652 648->647 650 4015a6-4015b2 648->650 650->647 657 4015b8-4015bb 650->657 651->652 655 4016fb-40171a call 403cee fputs call 403cee 652->655 656 40171f-40172b 652->656 655->656 661 401764-401770 656->661 662 40172d-40175f call 403cee fputs call 403fd5 call 403cee 656->662 657->647 663 4015c1-4015cd 657->663 659->645 664 401772-4017a4 call 403cee fputs call 403fd5 call 403cee 661->664 665 4017a9-4017c7 call 403ba5 call 4019ce 661->665 662->661 663->647 669 4015d3-4015d6 663->669 664->665 690 4017c9-4017cb 665->690 691 4017cf-4017d8 665->691 669->647 674 4015dc-4015e8 669->674 674->647 678 4015ee-4015f1 674->678 678->647 682 4015f7-4015fc 678->682 683 401615-401633 call 403ba5 call 4019ce 682->683 684 4015fe-401610 _CxxThrowException 682->684 700 401635-401637 683->700 701 40163b-401644 683->701 684->683 690->691 693 4017e0-401852 call 401f6a * 2 call 403ba5 * 2 call 401f6a call 401fce call 4024d3 call 403ba5 call 401f6a 691->693 694 4017da-4017dc 691->694 693->555 694->693 700->701 703 401646-401648 701->703 704 40164c-401692 call 401f6a * 2 call 403ba5 * 2 call 401f6a call 401fce 701->704 703->704 704->568
                                      APIs
                                      • fputs.MSVCRT ref: 004011EC
                                      • _CxxThrowException.MSVCRT(?,0042BC88), ref: 004012F2
                                      • _CxxThrowException.MSVCRT(?,0042BC78), ref: 00401307
                                        • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: ExceptionThrow$fputsfree
                                      • String ID: Error:
                                      • API String ID: 3322102733-1682980639
                                      • Opcode ID: cb713b701b404916949d04a6c4d16adeee2ca955423f9cf93048dcc92e8eafc9
                                      • Instruction ID: 4a2e7b9742cb2017b67176a9351b53f13f8677fefdef250d775b56a696d96fcd
                                      • Opcode Fuzzy Hash: cb713b701b404916949d04a6c4d16adeee2ca955423f9cf93048dcc92e8eafc9
                                      • Instruction Fuzzy Hash: 3FE16C31900259DEDF21EFA4C991BEDBBB4AF14304F1444AFE449B72A2DB385A49CF25

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1057 404cba-404cd3 call 425a80 1060 404cd5-404ce5 _CxxThrowException 1057->1060 1061 404cea-404d20 call 404738 1057->1061 1060->1061 1064 404d30-404d35 1061->1064 1065 404d22-404d2e call 4051d7 1061->1065 1067 404d44 1064->1067 1068 404d37-404d39 1064->1068 1070 404d48-404d62 call 403308 1065->1070 1067->1070 1068->1070 1071 404d3b-404d42 call 404906 1068->1071 1076 404d92-404d96 1070->1076 1077 404d64-404d6d 1070->1077 1071->1067 1071->1070 1079 404e58-404e6a call 404c66 1076->1079 1080 404d9c-404db7 call 404f8e 1076->1080 1077->1076 1078 404d6f-404d76 1077->1078 1078->1076 1081 404d78-404d89 wcscmp 1078->1081 1087 404e81-404e85 1079->1087 1088 404e6c-404e7c call 405276 call 4034ab 1079->1088 1089 404dc7-404dcd 1080->1089 1090 404db9-404dbb 1080->1090 1081->1076 1084 404d8b 1081->1084 1084->1076 1092 404ee3 1087->1092 1093 404e87-404e8b 1087->1093 1088->1087 1095 404e12-404e17 1089->1095 1096 404dcf-404de3 wcscmp 1089->1096 1090->1089 1094 404dbd-404dbf 1090->1094 1099 404ee6-404f2b call 40511e call 404ac5 1092->1099 1100 404e8d-404e91 1093->1100 1101 404e9e-404ee1 call 402835 call 40338e call 40d5c9 call 402292 call 403ba5 1093->1101 1094->1089 1102 404dc1-404dc4 1094->1102 1095->1079 1097 404e19-404e25 1095->1097 1103 404df5 1096->1103 1104 404de5-404df3 wcscmp 1096->1104 1106 404e37-404e56 call 4036fb call 404f62 call 401f9f 1097->1106 1107 404e27-404e2a 1097->1107 1126 404f30-404f5f call 401f6a call 403ba5 call 401f6a 1099->1126 1100->1092 1110 404e93-404e9c 1100->1110 1101->1099 1102->1089 1105 404df8-404dfe 1103->1105 1104->1103 1104->1105 1105->1096 1113 404e00-404e04 1105->1113 1106->1079 1106->1097 1107->1106 1114 404e2c-404e35 call 404906 1107->1114 1110->1092 1110->1101 1113->1095 1118 404e06-404e0c 1113->1118 1114->1079 1114->1106 1123 404e0e 1118->1123 1124 404e0f 1118->1124 1123->1124 1124->1095
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: wcscmp$ExceptionH_prologThrow
                                      • String ID:
                                      • API String ID: 2750596395-0
                                      • Opcode ID: 589eae14b945e66ded5d862d77fd0a401752f7eb3523f6666398b11f1596b00b
                                      • Instruction ID: a49034ca18766dd2985d6115f704c3eb646d16e2e938f66f16f9e822e2dcca93
                                      • Opcode Fuzzy Hash: 589eae14b945e66ded5d862d77fd0a401752f7eb3523f6666398b11f1596b00b
                                      • Instruction Fuzzy Hash: 4791BF71D002499FCF15DFA8C845AEEBBB0BF95304F54806EE500B72D1CB385A45CB58

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1143 417dfd-417e20 call 425a80 call 409325 1148 417e26-417e2f call 418029 1143->1148 1149 417fa8-417fb6 1143->1149 1152 417e31-417e33 1148->1152 1153 417e38-417e3d 1148->1153 1152->1149 1154 417e3f-417e44 1153->1154 1155 417e4e-417e5f call 41e080 1153->1155 1154->1155 1156 417e46-417e49 1154->1156 1159 417e61-417e71 _CxxThrowException 1155->1159 1160 417e76-417e8d memcpy 1155->1160 1156->1149 1159->1160 1161 417e91-417e9c 1160->1161 1162 417ea1-417ea3 1161->1162 1163 417e9e 1161->1163 1164 417ea5-417eb4 1162->1164 1165 417ec6-417ede call 407b7e 1162->1165 1163->1162 1166 417eb6 1164->1166 1167 417ebe-417ec0 1164->1167 1173 417ee0-417ee5 1165->1173 1174 417f59-417f5b 1165->1174 1168 417eb8-417eba 1166->1168 1169 417ebc 1166->1169 1167->1165 1170 417f5d-417f60 1167->1170 1168->1167 1168->1169 1169->1167 1172 417f9f-417fa6 call 41e0b0 1170->1172 1172->1149 1173->1170 1175 417ee7-417efd call 417fc0 1173->1175 1174->1172 1180 417f38-417f54 memmove 1175->1180 1181 417eff 1175->1181 1180->1161 1182 417f04-417f1a call 4251e0 1181->1182 1185 417f62-417f97 memcpy call 407c4c 1182->1185 1186 417f1c-417f33 call 417fc0 1182->1186 1189 417f9a-417f9d 1185->1189 1190 417f01 1186->1190 1191 417f35 1186->1191 1189->1172 1190->1182 1191->1180
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog
                                      • String ID:
                                      • API String ID: 3519838083-0
                                      • Opcode ID: 6465af3b85f9c6ec0544edb33d8b4d85580d0812a5a0e51c2c98df890fa78ea5
                                      • Instruction ID: fc13bfd809c8fc2b6a0ab506a486224924f27f492ec3e4f1722cabba43a86d91
                                      • Opcode Fuzzy Hash: 6465af3b85f9c6ec0544edb33d8b4d85580d0812a5a0e51c2c98df890fa78ea5
                                      • Instruction Fuzzy Hash: 9A519B76A043159FDB10DFA4C881BFFB7B5BF88314F14441AE905AB341D778AD868BA8

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1194 41086d-410899 EnterCriticalSection call 403447 1197 41089b-41089c 1194->1197 1198 4108cd 1194->1198 1199 4108c6-4108cb 1197->1199 1200 41089e-41089f 1197->1200 1201 4108d2 1198->1201 1199->1201 1202 4108a1-4108a2 1200->1202 1203 4108bc-4108c4 1200->1203 1204 4108d5-4108db 1201->1204 1205 4108b0-4108ba 1202->1205 1206 4108a4 1202->1206 1207 4108ab-4108ae 1203->1207 1208 4108e1-4108e7 1204->1208 1209 410a55-410a59 1204->1209 1205->1204 1206->1207 1207->1204 1208->1209 1210 4108ed-41090b call 410a5b call 402e21 1208->1210 1211 4109db-4109e1 1209->1211 1227 410914-41093b fputs 1210->1227 1228 41090d-41090f call 402ef8 1210->1228 1213 4109e3-4109ea 1211->1213 1214 410a3a-410a52 call 4121d4 LeaveCriticalSection 1211->1214 1213->1214 1217 4109ec-4109f3 1213->1217 1218 410a32-410a35 call 4124e9 1217->1218 1219 4109f5-410a13 1217->1219 1218->1214 1222 410a15-410a19 1219->1222 1223 410a1b-410a26 call 402e21 1219->1223 1222->1218 1222->1223 1223->1218 1234 410a28-410a2d call 403447 1223->1234 1231 410976-41098d call 403d5e 1227->1231 1232 41093d-410957 call 403447 call 403dfe 1227->1232 1228->1227 1239 4109ba-4109cc call 403cee 1231->1239 1240 41098f-4109b9 fputs call 403fd5 fputs 1231->1240 1232->1231 1247 410959-410960 1232->1247 1234->1218 1248 4109d9 1239->1248 1249 4109ce-4109d4 call 403cdf 1239->1249 1240->1239 1247->1231 1250 410962-41096d 1247->1250 1248->1211 1249->1248 1250->1231 1252 41096f-410971 call 404f62 1250->1252 1252->1231
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: fputs$CriticalSection$EnterLeave
                                      • String ID:
                                      • API String ID: 1081906680-0
                                      • Opcode ID: 4b232bbd17f4a76d09bbce54b306d6d23778686cbaaac9dcbf2d7c0cfa658c83
                                      • Instruction ID: 027993372e94a90fe108f72b057ff34fb2b178c490f9bd66c7364564f43692ce
                                      • Opcode Fuzzy Hash: 4b232bbd17f4a76d09bbce54b306d6d23778686cbaaac9dcbf2d7c0cfa658c83
                                      • Instruction Fuzzy Hash: 7351D231604306DFEB24DF20C955BEA7BA1FF48314F04842FE45A6B291CBB8A9D5CB59

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1254 405c98-405cb8 call 425a80 call 4069e5 1259 405cbe-405cc4 1254->1259 1260 405e6f-405e85 call 40695f 1254->1260 1259->1260 1261 405cca-405cea call 40334b * 2 1259->1261 1266 405e87-405e89 1260->1266 1267 405e8a-405e97 call 406747 1260->1267 1274 405cf7-405cfd 1261->1274 1275 405cec-405cf2 1261->1275 1266->1267 1272 405ef4-405efb 1267->1272 1273 405e99-405e9f 1267->1273 1276 405f07-405f0e 1272->1276 1277 405efd-405f01 1272->1277 1273->1272 1278 405ea1-405ead call 405c89 1273->1278 1279 405d14-405d1c call 403737 1274->1279 1280 405cff-405d12 call 402b85 1274->1280 1275->1274 1283 405f40-405f47 call 4068e7 1276->1283 1284 405f10-405f1a call 405c89 1276->1284 1277->1276 1281 406006-40600b call 405a8d 1277->1281 1278->1281 1295 405eb3-405eb6 1278->1295 1288 405d21-405d2e call 406944 1279->1288 1280->1279 1280->1288 1297 406010-406014 1281->1297 1283->1281 1301 405f4d-405f58 1283->1301 1284->1281 1299 405f20-405f23 1284->1299 1305 405d30-405d33 1288->1305 1306 405d66-405d73 call 405c98 1288->1306 1295->1281 1300 405ebc-405ed9 call 405986 call 403447 1295->1300 1302 406016-406018 1297->1302 1303 40602d 1297->1303 1299->1281 1307 405f29-405f3e call 405986 1299->1307 1338 405ee5-405ee8 call 406097 1300->1338 1339 405edb-405ee0 1300->1339 1301->1281 1309 405f5e-405f67 call 406701 1301->1309 1302->1303 1310 40601a-406023 1302->1310 1304 40602f-406032 call 405a6d 1303->1304 1322 406037 1304->1322 1314 405d41-405d59 call 405986 1305->1314 1315 405d35-405d38 1305->1315 1328 405d79 1306->1328 1329 405e5d-405e6e call 403ba5 * 2 1306->1329 1331 405eed-405eef 1307->1331 1309->1281 1327 405f6d-405f77 call 406097 1309->1327 1310->1303 1312 406025-406028 call 406097 1310->1312 1312->1303 1335 405d7b-405da1 call 4033db call 403308 1314->1335 1337 405d5b-405d64 call 4034ab 1314->1337 1315->1306 1323 405d3a-405d3f 1315->1323 1330 406039-406047 1322->1330 1323->1306 1323->1314 1345 405f87-405fb8 call 40334b call 404f62 call 403634 call 405a8d 1327->1345 1346 405f79-405f82 call 403447 1327->1346 1328->1335 1329->1260 1331->1304 1355 405da6-405dbc call 405c49 1335->1355 1337->1335 1338->1331 1339->1338 1377 405fe0-405fed call 405c89 1345->1377 1378 405fba-405fd0 wcscmp 1345->1378 1357 406076-406080 call 405a6d 1346->1357 1364 405df2-405df4 1355->1364 1365 405dbe-405dc2 1355->1365 1357->1330 1367 405e2c-405e58 call 403ba5 * 2 call 405a6d call 403ba5 * 2 1364->1367 1368 405dc4-405dd1 call 402ac7 1365->1368 1369 405dea-405dec SetLastError 1365->1369 1367->1322 1380 405dd3-405de8 call 403ba5 call 403308 1368->1380 1381 405df6-405dfc 1368->1381 1369->1364 1397 40604a-406054 call 405986 1377->1397 1398 405fef-405ff2 1377->1398 1382 405fd2-405fd7 1378->1382 1383 405fdc 1378->1383 1380->1355 1385 405dfe-405e03 1381->1385 1386 405e0f-405e2a call 4036fb 1381->1386 1391 406068-406075 call 403447 call 403ba5 1382->1391 1383->1377 1385->1386 1393 405e05-405e0b 1385->1393 1386->1367 1391->1357 1393->1386 1414 406056-406059 1397->1414 1415 40605b 1397->1415 1403 405ff4-405ff7 1398->1403 1404 405ff9-406005 call 403ba5 1398->1404 1403->1397 1403->1404 1404->1281 1417 406062-406065 1414->1417 1415->1417 1417->1391
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 00405C9D
                                      • SetLastError.KERNEL32(00000002,?,?,0000FBEF,:$DATA,?,00000000,00000000,?,00000001), ref: 00405DEC
                                        • Part of subcall function 00405C98: wcscmp.MSVCRT ref: 00405FC6
                                        • Part of subcall function 00405C89: GetFileAttributesW.KERNELBASE(?,00405FE7,?,?,0000002A,?,?,00000000,?,00000001), ref: 00405C8A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: AttributesErrorFileH_prologLastwcscmp
                                      • String ID: :$DATA
                                      • API String ID: 3506966624-2587938151
                                      • Opcode ID: 87bfde631d3deb79e08e3bd7bfe69129d78864a065144b55b4a4eba179ff856b
                                      • Instruction ID: 07b953e3390746c4a9dc82bd7aadb35804c006ab05ede8c66105daedd2d37e57
                                      • Opcode Fuzzy Hash: 87bfde631d3deb79e08e3bd7bfe69129d78864a065144b55b4a4eba179ff856b
                                      • Instruction Fuzzy Hash: E6C1D030900A059ADF25EFA5C485AEEBBB5EF14318F10813FE882772D2DB3D5A55CB18

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1418 40efa5-40efd0 call 425a80 1421 40efd2-40efdc call 403b71 1418->1421 1422 40efff-40f002 1418->1422 1431 40efe9 1421->1431 1432 40efde-40efe7 1421->1432 1423 40f008-40f019 call 403b71 1422->1423 1424 40f08e-40f091 call 40ed49 1422->1424 1433 40f024-40f052 call 40b2c2 call 4034ab call 406518 1423->1433 1434 40f01b-40f022 call 4079c2 1423->1434 1430 40f096-40f09f 1424->1430 1435 40f0a5-40f0a9 1430->1435 1436 40f278-40f281 1430->1436 1437 40efeb-40effa call 40b2c2 1431->1437 1432->1437 1466 40f084-40f08a 1433->1466 1467 40f054-40f064 call 4062c4 1433->1467 1434->1433 1435->1436 1442 40f0af-40f0b3 1435->1442 1438 40f283-40f285 1436->1438 1439 40f289-40f292 1436->1439 1437->1424 1438->1439 1444 40f294-40f296 1439->1444 1445 40f29a 1439->1445 1442->1436 1448 40f0b9-40f0c0 1442->1448 1444->1445 1450 40f29c-40f2aa 1445->1450 1452 40f0c2-40f0c8 1448->1452 1453 40f0ce-40f0d4 1448->1453 1452->1436 1452->1453 1454 40f219-40f222 1453->1454 1455 40f0da-40f0f3 call 402b85 1453->1455 1459 40f224-40f226 1454->1459 1460 40f22a-40f233 1454->1460 1455->1454 1465 40f0f9-40f119 call 40a54a 1455->1465 1459->1460 1462 40f235-40f237 1460->1462 1463 40f23b-40f23e 1460->1463 1462->1463 1463->1450 1474 40f210-40f218 call 403ba5 1465->1474 1475 40f11f-40f137 call 402b85 1465->1475 1466->1424 1472 40f066-40f068 1467->1472 1473 40f06c-40f075 1467->1473 1472->1473 1476 40f077-40f079 1473->1476 1477 40f07d-40f07f 1473->1477 1474->1454 1482 40f13d-40f1a0 call 4033db call 403661 call 40f2f2 call 4036fb call 403ba5 call 4034ab call 403737 call 40f2c5 1475->1482 1483 40f1ff-40f20a 1475->1483 1476->1477 1477->1450 1500 40f1a2-40f1b9 call 4034ab call 40f2c5 1482->1500 1501 40f1bb-40f1cf call 406518 1482->1501 1483->1474 1483->1475 1500->1501 1507 40f1f2-40f1fe call 403ba5 1500->1507 1506 40f1d1-40f1f0 call 40e3d4 call 40ed49 1501->1506 1501->1507 1506->1507 1516 40f240-40f25b call 403ba5 * 2 1506->1516 1507->1483 1521 40f263-40f26c 1516->1521 1522 40f25d-40f25f 1516->1522 1523 40f274-40f276 1521->1523 1524 40f26e-40f270 1521->1524 1522->1521 1523->1450 1524->1523
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 0040EFAA
                                        • Part of subcall function 00403B71: malloc.MSVCRT ref: 00403B84
                                        • Part of subcall function 00403B71: _CxxThrowException.MSVCRT(?,0042C1C8), ref: 00403B9E
                                        • Part of subcall function 0040ED49: __EH_prolog.LIBCMT ref: 0040ED4E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog$ExceptionThrowmalloc
                                      • String ID: .001$.exe$Split
                                      • API String ID: 3744649731-1819480430
                                      • Opcode ID: 8a5e57ecd8d467f13b4767564fc4cb883c967624f50ec570ad460c2d1a20d4bb
                                      • Instruction ID: 6ee4b62a70a765373665152c840579a13589d10806b9eb9c9327f76c0b6f4a6d
                                      • Opcode Fuzzy Hash: 8a5e57ecd8d467f13b4767564fc4cb883c967624f50ec570ad460c2d1a20d4bb
                                      • Instruction Fuzzy Hash: 8AA1D334A00205DBCF21DFA5C445BAEBBB4AF45314F1445BEE845BB6D2CB39AE49CB14

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1525 411a47-411a73 call 425a80 fputs * 2 1528 411a81-411a9a call 40334b 1525->1528 1529 411a75-411a7f call 411ad2 1525->1529 1535 411aa3 call 403db3 1528->1535 1536 411a9c-411aa1 call 403dfe 1528->1536 1534 411ac2-411acf 1529->1534 1539 411aa8-411aad call 403d01 1535->1539 1536->1539 1542 411ab2-411ac1 call 403cee call 403ba5 1539->1542 1542->1534
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 00411A4C
                                      • fputs.MSVCRT ref: 00411A61
                                      • fputs.MSVCRT ref: 00411A6A
                                        • Part of subcall function 00411AD2: __EH_prolog.LIBCMT ref: 00411AD7
                                        • Part of subcall function 00411AD2: fputs.MSVCRT ref: 00411B17
                                        • Part of subcall function 00411AD2: fputs.MSVCRT ref: 00411BA6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: fputs$H_prolog
                                      • String ID: =
                                      • API String ID: 2614055831-2525689732
                                      • Opcode ID: cb02bf5d739171821884010db5d4c3a9afc62b04c47f741bb3b2f8847e761e53
                                      • Instruction ID: 4685179e67a5387b9933c8bac1fb032a3b631e83bc1fbaf7f8a336648ebc960e
                                      • Opcode Fuzzy Hash: cb02bf5d739171821884010db5d4c3a9afc62b04c47f741bb3b2f8847e761e53
                                      • Instruction Fuzzy Hash: 84012831A00005ABDF15BF66D802BEE7F79AF80359F00402FF841622A1CB7C5A91CB9A

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1547 424660-424679 WaitForSingleObject 1548 424686 1547->1548 1549 42467b-42467f GetLastError 1547->1549 1551 424688-42468c 1548->1551 1549->1548 1550 424681-424684 1549->1550 1550->1551 1552 42468e-424697 CloseHandle 1551->1552 1553 4246ac 1551->1553 1554 4246a6 1552->1554 1555 424699-42469d GetLastError 1552->1555 1556 4246ae-4246b0 1553->1556 1554->1553 1555->1556 1557 42469f-4246a4 1555->1557 1558 4246b2 1556->1558 1559 4246b4-4246b7 1556->1559 1557->1556 1558->1559
                                      APIs
                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0042466A
                                      • GetLastError.KERNEL32(?,000000FF), ref: 0042467B
                                      • CloseHandle.KERNELBASE(00000000,?,000000FF), ref: 0042468F
                                      • GetLastError.KERNEL32(?,000000FF), ref: 00424699
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: ErrorLast$CloseHandleObjectSingleWait
                                      • String ID:
                                      • API String ID: 1796208289-0
                                      • Opcode ID: 9ad817bcdee8a37bd63ddf115caa5bcabacb03681436272bee2871554aa3e524
                                      • Instruction ID: 0e6695afe9b1d70dfe2be0eee00a61d69e8467993ccb29156463d7536a55e89f
                                      • Opcode Fuzzy Hash: 9ad817bcdee8a37bd63ddf115caa5bcabacb03681436272bee2871554aa3e524
                                      • Instruction Fuzzy Hash: 01F05E713046324BDB305AB9AC44A1776DCDFD2774BA10737E960C33D0DA6CCC028A68
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 0040C36E
                                        • Part of subcall function 004062C4: GetLastError.KERNEL32(0040CC4F,?,00000001,?,00000010,00000000,00000000), ref: 004062C4
                                        • Part of subcall function 0040CF00: __EH_prolog.LIBCMT ref: 0040CF05
                                        • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog$ErrorLastfree
                                      • String ID: Cannot find archive file$The item is a directory
                                      • API String ID: 683690243-1569138187
                                      • Opcode ID: d4b52d7e044e471e1c830f5b7b4d30bcba43f6748932abe95ee6bd99c13eb021
                                      • Instruction ID: b5a1b32bc12d711d5e0a8161568501f8c01d54cd71bc8ef7c26888fa0a065d70
                                      • Opcode Fuzzy Hash: d4b52d7e044e471e1c830f5b7b4d30bcba43f6748932abe95ee6bd99c13eb021
                                      • Instruction Fuzzy Hash: D6724970900258DFDB21DF68C884BDEBBB5AF59304F1441AAE849B7392C778AE81CF55

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1821 4124e9-4124fb 1822 412501-412509 1821->1822 1823 412754-412758 1821->1823 1824 412514-41251b 1822->1824 1825 41250b-412511 GetTickCount 1822->1825 1826 41258d-4125a4 call 412442 1824->1826 1827 41251d-412522 1824->1827 1825->1824 1833 4125a6-4125b5 call 40303f 1826->1833 1834 4125bb-4125d1 call 402e7e 1826->1834 1829 412532-412542 call 40303f 1827->1829 1830 412524-41252c 1827->1830 1829->1826 1838 412544-412554 call 403a33 1829->1838 1830->1823 1830->1829 1833->1823 1833->1834 1843 4125d3-4125ea call 4028c3 call 402ef8 call 402f40 1834->1843 1844 4125ef-4125f2 1834->1844 1838->1826 1845 412556-41255c 1838->1845 1843->1844 1847 4125f4-412601 call 402ef8 call 402f82 1844->1847 1848 412606-412609 1844->1848 1845->1826 1849 41255e-412564 1845->1849 1847->1848 1852 4126f7-412703 call 412759 1848->1852 1853 41260f-412618 1848->1853 1849->1826 1854 412566-41256c 1849->1854 1868 412740-41274c call 412777 1852->1868 1869 412705-41272c call 4123af fputs 1852->1869 1853->1852 1858 41261e-41265b call 402ef8 call 4034ab call 403dfe call 403d81 1853->1858 1860 412589 1854->1860 1861 41256e-412574 1854->1861 1887 412661-412669 1858->1887 1888 4126ea-4126f5 call 402f82 1858->1888 1860->1826 1861->1860 1866 412576-41257b 1861->1866 1866->1860 1872 41257d-412583 1866->1872 1868->1823 1880 41274e-412751 1868->1880 1877 412735-41273e call 402e7e 1869->1877 1878 41272e-412730 call 403cdf 1869->1878 1872->1823 1872->1860 1877->1868 1878->1877 1880->1823 1889 4126e0-4126e7 1887->1889 1890 41266b-412671 1887->1890 1888->1852 1889->1888 1892 412673-412675 1890->1892 1893 412676-4126d2 call 4034ab call 403a54 call 4038f3 call 403dfe call 403d81 1890->1893 1892->1893 1905 4126d4-4126d8 1893->1905 1906 4126da-4126de 1893->1906 1905->1890 1905->1906 1906->1888 1906->1889
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: CountTickfputs
                                      • String ID: .
                                      • API String ID: 290905099-4150638102
                                      • Opcode ID: 62978d2e05be1da6066eb87697aec2cc0ac5a4a437e1c063d05335f7abfea39d
                                      • Instruction ID: cb26736c674bc8d9c7ca26a32cfd03a69c5f5ceaab9adc37427ae5af0aaaee1d
                                      • Opcode Fuzzy Hash: 62978d2e05be1da6066eb87697aec2cc0ac5a4a437e1c063d05335f7abfea39d
                                      • Instruction Fuzzy Hash: 21814C30600B459FCB25DF65C6D0AABB7F6AF40304F10482EE496D7691DBB8F989CB18
                                      APIs
                                        • Part of subcall function 0040739D: GetModuleHandleA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx), ref: 004073C1
                                        • Part of subcall function 0040739D: GetProcAddress.KERNEL32(00000000), ref: 004073C8
                                        • Part of subcall function 0040739D: GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 004073D6
                                      • __aulldiv.LIBCMT ref: 00416ECD
                                      • __aulldiv.LIBCMT ref: 00416ED9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: __aulldiv$AddressGlobalHandleMemoryModuleProcStatus
                                      • String ID: 3333
                                      • API String ID: 3520896023-2924271548
                                      • Opcode ID: 14d98df592c1ed9401447ad19b8c5cbbf4c4088a852356cff76e661ec3d3721c
                                      • Instruction ID: 5119751143de8b55060969e9aa1b5a70445e0105ff33e8ddafc95c9096c2d0b2
                                      • Opcode Fuzzy Hash: 14d98df592c1ed9401447ad19b8c5cbbf4c4088a852356cff76e661ec3d3721c
                                      • Instruction Fuzzy Hash: 6521B7B5A00704AFE730DF6A9881A6FFAF8EB84714F44892FB145D3641D674ED408B59
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 00411E88
                                        • Part of subcall function 00412153: GetVersionExW.KERNEL32(?), ref: 0041216D
                                      • fputs.MSVCRT ref: 00411EBF
                                      Strings
                                      • Unsupported Windows version, xrefs: 00411EBA
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prologVersionfputs
                                      • String ID: Unsupported Windows version
                                      • API String ID: 1051792753-2397968907
                                      • Opcode ID: 6c2c40629df218334bec5ec3bc1302cec0765b107ed07878728180e7a12435a0
                                      • Instruction ID: a092db236a47294cc3f6e096509d2604d9432d6bca79f67c2c86b4b3dc796ef4
                                      • Opcode Fuzzy Hash: 6c2c40629df218334bec5ec3bc1302cec0765b107ed07878728180e7a12435a0
                                      • Instruction Fuzzy Hash: 8C01D871900245EFDB00EF99E9567EE77B0EB04329F20465FE502B31A1D7B81A458F59
                                      APIs
                                      • SetFilePointer.KERNELBASE(?,00000000,?,80004004,80004004,?,?,?,?,0040646C,80004004,80004004,00000000,?,0040666B,00000000), ref: 00406404
                                      • GetLastError.KERNEL32(?,0040646C,80004004,80004004,00000000,?,0040666B,00000000,?,00000000,?,?,?,?,0040AE79,?), ref: 00406411
                                        • Part of subcall function 00406389: SetFilePointer.KERNEL32(?,00000000,?,00000001,00000000,?,?,?,00406427,?,?,0040646C,80004004,80004004,00000000,?), ref: 0040639D
                                        • Part of subcall function 00406389: GetLastError.KERNEL32(?,00406427,?,?,0040646C,80004004,80004004,00000000,?,0040666B,00000000,?,00000000,?,?,?), ref: 004063AA
                                      • SetLastError.KERNEL32(00000000,?,?,0040646C,80004004,80004004,00000000,?,0040666B,00000000,?,00000000,?,?,?), ref: 00406428
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: ErrorLast$FilePointer
                                      • String ID:
                                      • API String ID: 1156039329-0
                                      • Opcode ID: 0b05d6185b408afcdee46b4b0f28ff2912608ed381f3cb98e0708fe1c876e7e2
                                      • Instruction ID: 864dc6c6c593cf8bf19505ec3c4d2a71f9220abb1ddbe6d7f18ae570c31cdd18
                                      • Opcode Fuzzy Hash: 0b05d6185b408afcdee46b4b0f28ff2912608ed381f3cb98e0708fe1c876e7e2
                                      • Instruction Fuzzy Hash: 89018475300208AFCB119F68EC45A9F3BE9AF48320F51813AF906E7391D6758D119668
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 0040575E
                                      • CreateDirectoryW.KERNELBASE(?,00000000,80004004,00000000), ref: 0040576E
                                      • GetLastError.KERNEL32(?,00000000,80004004,00000000), ref: 0040577C
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: CreateDirectoryErrorH_prologLast
                                      • String ID:
                                      • API String ID: 2841023564-0
                                      • Opcode ID: 9cacd7261072eef841eea90e155f46b680eb7036377b12a0fd961b6c2ca1e33c
                                      • Instruction ID: 079377e55826ee0f4379d49620bbc90c1195ddaef26b68593b7f8623b37cd9bc
                                      • Opcode Fuzzy Hash: 9cacd7261072eef841eea90e155f46b680eb7036377b12a0fd961b6c2ca1e33c
                                      • Instruction Fuzzy Hash: E2F06D75A01A18DEDB14AF54E985AEF7778EB15348F50003EE802B72D2CA385E06DE69
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog
                                      • String ID: Split
                                      • API String ID: 3519838083-1882502421
                                      • Opcode ID: bbca351a3752bb955aacaa789748a3f82b9a69272ada15e68eeb157a7eb85066
                                      • Instruction ID: 736ae2316e5d0145198b9a3bf66f2ac6d4ce90c3458676da96f14d14a3bbf3ba
                                      • Opcode Fuzzy Hash: bbca351a3752bb955aacaa789748a3f82b9a69272ada15e68eeb157a7eb85066
                                      • Instruction Fuzzy Hash: 6F025070A00249DFDB11DFA6C884AAEBBB5BF08304F14887EE446BB391D739AD55CB54
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 0040CF74
                                        • Part of subcall function 00405618: __EH_prolog.LIBCMT ref: 0040561D
                                      Strings
                                      • Cannot create output directory, xrefs: 0040D32C
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog
                                      • String ID: Cannot create output directory
                                      • API String ID: 3519838083-1181934277
                                      • Opcode ID: 0a2daac4de3efc79e484f2d5e690c8759645e8bb826c42a2e8713bfbc5c64fdf
                                      • Instruction ID: 1cab3c87023adceb4cf1cff07f82d3cc3a0dce552b336292f606194224630fe1
                                      • Opcode Fuzzy Hash: 0a2daac4de3efc79e484f2d5e690c8759645e8bb826c42a2e8713bfbc5c64fdf
                                      • Instruction Fuzzy Hash: 2FF18E31D00249DFCF11EFE4C8949EEBBB5AF59308F14806EE84577292DB389A49CB55
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 0040A56A
                                        • Part of subcall function 00409F0A: __EH_prolog.LIBCMT ref: 00409F0F
                                        • Part of subcall function 0040D993: __EH_prolog.LIBCMT ref: 0040D998
                                        • Part of subcall function 0040A130: __EH_prolog.LIBCMT ref: 0040A135
                                        • Part of subcall function 0040A23C: __EH_prolog.LIBCMT ref: 0040A241
                                      Strings
                                      • Cannot seek to begin of file, xrefs: 0040A8C0
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog
                                      • String ID: Cannot seek to begin of file
                                      • API String ID: 3519838083-2298593816
                                      • Opcode ID: 8332cf66c7340a2e0d8a83573379208fd480841702d1361402cef0b3b1fd7fd2
                                      • Instruction ID: ecade97c4e2ac40fd8b16c0bf8f986f2c90cabb7ab41a2d788bc46ed2bc5babc
                                      • Opcode Fuzzy Hash: 8332cf66c7340a2e0d8a83573379208fd480841702d1361402cef0b3b1fd7fd2
                                      • Instruction Fuzzy Hash: B6C1F171A003419EDB21DB64C484BAEBBF4AF40304F14887FE486B72D2DB78AD55C75A
                                      APIs
                                      • fputs.MSVCRT ref: 00412418
                                        • Part of subcall function 00402CC8: _CxxThrowException.MSVCRT(00000000,0042C050), ref: 00402CEA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: ExceptionThrowfputs
                                      • String ID:
                                      • API String ID: 1334390793-399585960
                                      • Opcode ID: ec99868a2370106556cac535b7a6e100cd634181ff94c6eddc8767ec8ac5bdfa
                                      • Instruction ID: d8e4c1249425f7f36e7589520ef7ed907c8d3a90e64baa80d70663753212215a
                                      • Opcode Fuzzy Hash: ec99868a2370106556cac535b7a6e100cd634181ff94c6eddc8767ec8ac5bdfa
                                      • Instruction Fuzzy Hash: 6711DD716047049FEB25CF59D881BAABBE6FF4A304F44406EE186CB281C7B9BC54CB64
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: fputs
                                      • String ID: Open
                                      • API String ID: 1795875747-71445658
                                      • Opcode ID: ae14ebf0cd98cf96a64dc60231d62bdc906b1897b720879a927c219a97561d33
                                      • Instruction ID: b3d4efdce60f7cf7a5ac5682edf5dbbf603c16c6f2166bcf7d74fcf7ccc6ffd6
                                      • Opcode Fuzzy Hash: ae14ebf0cd98cf96a64dc60231d62bdc906b1897b720879a927c219a97561d33
                                      • Instruction Fuzzy Hash: A811EE321047449FE721EF32D891ADBBBA5BF10314F00882FE49A83291DB766994CF49
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 0040A241
                                        • Part of subcall function 00405C98: __EH_prolog.LIBCMT ref: 00405C9D
                                        • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog$free
                                      • String ID:
                                      • API String ID: 2654054672-0
                                      • Opcode ID: 3cad1ab7b769f2d1acacac0414ec1099ca9b1d7be8c662c3c923ed6bed840f9a
                                      • Instruction ID: 119d2db5184c98bb620e655760488671e2cf7285567f933d7f5c7ab3a4145e28
                                      • Opcode Fuzzy Hash: 3cad1ab7b769f2d1acacac0414ec1099ca9b1d7be8c662c3c923ed6bed840f9a
                                      • Instruction Fuzzy Hash: F291D431900204ABCF21EFA5D885AAEBBB5AF85308F14403FE841B72D1CB395E55CB5A
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 0041923F
                                      • _CxxThrowException.MSVCRT(?,0042E810), ref: 00419459
                                        • Part of subcall function 00414F30: __EH_prolog.LIBCMT ref: 00414F35
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog$ExceptionThrow
                                      • String ID:
                                      • API String ID: 2366012087-0
                                      • Opcode ID: 5b91504e9a128caa8ba8520bba2a7aec4533bf77359d1d494c76c090470ab4c4
                                      • Instruction ID: 4dd68368b573ab2b3fbb2926aa4f54af7d60f28f21f52d43cd7d550c9688040f
                                      • Opcode Fuzzy Hash: 5b91504e9a128caa8ba8520bba2a7aec4533bf77359d1d494c76c090470ab4c4
                                      • Instruction Fuzzy Hash: 2B816D70D00159DFCB11DFA4C891AEEBBB5BF09308F10809AE455B7292DB38AE95CF64
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 0040561D
                                        • Part of subcall function 00405C89: GetFileAttributesW.KERNELBASE(?,00405FE7,?,?,0000002A,?,?,00000000,?,00000001), ref: 00405C8A
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: AttributesFileH_prolog
                                      • String ID:
                                      • API String ID: 3244726999-0
                                      • Opcode ID: 7307f15d7dcd26a1028437531f8b3d46531374772733964b746c2e4a545ecfa4
                                      • Instruction ID: 1ec97c357641f2a95409124c811880a2bc8558c2d5f8d70d5842d2e5aa1dfbfc
                                      • Opcode Fuzzy Hash: 7307f15d7dcd26a1028437531f8b3d46531374772733964b746c2e4a545ecfa4
                                      • Instruction Fuzzy Hash: 96318A31900916DACF24ABA8C5814FFB775EF11318F90047BD802B72D1DB3A6E469FA9
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 00419F30
                                        • Part of subcall function 00419C39: __EH_prolog.LIBCMT ref: 00419C3E
                                      • _CxxThrowException.MSVCRT(?,0042E810), ref: 00419F7B
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog$ExceptionThrow
                                      • String ID:
                                      • API String ID: 2366012087-0
                                      • Opcode ID: f3ed8672d2c2e4200345710861aa6959bc24473354d3664b997b8fe4b6267530
                                      • Instruction ID: 46f78fe5ae91ca0ba6bfca82b63fd184bcf2fa2220459aed858054068ed78b21
                                      • Opcode Fuzzy Hash: f3ed8672d2c2e4200345710861aa6959bc24473354d3664b997b8fe4b6267530
                                      • Instruction Fuzzy Hash: 0401DF32500248BFDF118F54C816BEE7BA4EB45314F44414AF4489B211C3BA9990CBA4
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: ErrorLast_beginthreadex
                                      • String ID:
                                      • API String ID: 4034172046-0
                                      • Opcode ID: 84ad473c3d34086ae7fede349773d0ba2c5fd96f40ec9ed9a40fef1eb1428159
                                      • Instruction ID: 467cfe1d8112a966019ebae5ced0304520bc6109d9d80bdd01151506748d1c69
                                      • Opcode Fuzzy Hash: 84ad473c3d34086ae7fede349773d0ba2c5fd96f40ec9ed9a40fef1eb1428159
                                      • Instruction Fuzzy Hash: C2E0CDB63042115FF3109B54AC01F7771DCDBD0701F80443EBA44CA180E6A5CD00C379
                                      APIs
                                      • GetCurrentProcess.KERNEL32(?,?,0040737C), ref: 00407360
                                      • GetProcessAffinityMask.KERNEL32(00000000), ref: 00407367
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: Process$AffinityCurrentMask
                                      • String ID:
                                      • API String ID: 1231390398-0
                                      • Opcode ID: 81c132c54f17672c127dd815764c6083acefeaec05c63578e1865d3c67dcce40
                                      • Instruction ID: 6c427cee417cddacfba452fddf0a978d30e57e06aa7b4599873eb5b06c94d529
                                      • Opcode Fuzzy Hash: 81c132c54f17672c127dd815764c6083acefeaec05c63578e1865d3c67dcce40
                                      • Instruction Fuzzy Hash: C9B092B1500108ABCE209BA09D0CC163B2CBB052017508464B101C2010C636C802CB24
                                      APIs
                                      • EnterCriticalSection.KERNEL32(00430538), ref: 004105D7
                                      • LeaveCriticalSection.KERNEL32(00430538), ref: 00410616
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeave
                                      • String ID:
                                      • API String ID: 3168844106-0
                                      • Opcode ID: 233e16de90028f4b419763472694496bf6d9b53b4615fc2cbc689a092118ae32
                                      • Instruction ID: 685853894ae39eee227984b1d0e7600127116368531782c57f48b05f3866eb5d
                                      • Opcode Fuzzy Hash: 233e16de90028f4b419763472694496bf6d9b53b4615fc2cbc689a092118ae32
                                      • Instruction Fuzzy Hash: 04F058346412109FD318DF16C808FAA37A1AFD5315F1A80BEE00587362CB78CCC6CB94
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: ExceptionThrowmalloc
                                      • String ID:
                                      • API String ID: 2436765578-0
                                      • Opcode ID: 3e791b120deac60a940b24b1a74ec80c1e3bf78372a8eec457417a2a87f4d28b
                                      • Instruction ID: 413c76808b874f20dff1fc6092fe03bbab6c47668a85a4a3cdc964c164a5b717
                                      • Opcode Fuzzy Hash: 3e791b120deac60a940b24b1a74ec80c1e3bf78372a8eec457417a2a87f4d28b
                                      • Instruction Fuzzy Hash: E2E0CD3120460C69DF105F50D8467AD3F7C5F10355F809026FC0C5D142C278D7D48744
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 00416499
                                        • Part of subcall function 00415A25: memset.MSVCRT ref: 00415A39
                                        • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prologfreememset
                                      • String ID:
                                      • API String ID: 743394225-0
                                      • Opcode ID: ecb5d9f32fce810a4cf2dad596e34102d691c2a121b38bb246af0aaa1a2a0c01
                                      • Instruction ID: 2c44f47edba988f8aeb80a4babf8dfcf021c45bdc66655be1d995d0b6d76fbbe
                                      • Opcode Fuzzy Hash: ecb5d9f32fce810a4cf2dad596e34102d691c2a121b38bb246af0aaa1a2a0c01
                                      • Instruction Fuzzy Hash: B5528170900249DFDB15CFA8C588BEEBBB5AF49304F19409EE445AB391DB38DE85CB25
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog
                                      • String ID:
                                      • API String ID: 3519838083-0
                                      • Opcode ID: 1aee6a2b02e4ed9202893e1c1d1e0e5268040115cd70fa0940a311bbe32e592f
                                      • Instruction ID: 82ec2a547574f120ef1af248452345df4ce190c02b8900f5607f34d2821a8202
                                      • Opcode Fuzzy Hash: 1aee6a2b02e4ed9202893e1c1d1e0e5268040115cd70fa0940a311bbe32e592f
                                      • Instruction Fuzzy Hash: 5B128F71D00209DFCF24DFA4C984ADEBBB5AF45314F2441BAE445BB291DB38AE49CB15
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 0040AA80
                                        • Part of subcall function 0040A565: __EH_prolog.LIBCMT ref: 0040A56A
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog
                                      • String ID:
                                      • API String ID: 3519838083-0
                                      • Opcode ID: 65ca0c2dc067e8dd7b604a56fa9051946c2790ea55eaf7037d4eae63aaf6ad7c
                                      • Instruction ID: 0ab7f169d6ce1dd3c498451d8d56829bda81e7c46dbb63c9e1e9485555b509e8
                                      • Opcode Fuzzy Hash: 65ca0c2dc067e8dd7b604a56fa9051946c2790ea55eaf7037d4eae63aaf6ad7c
                                      • Instruction Fuzzy Hash: 57A1B071504385DFDB21DF68C190AAABBE1BF15300F54887FE58AAB781D338A954CB1A
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog
                                      • String ID:
                                      • API String ID: 3519838083-0
                                      • Opcode ID: 814c2577e94aeeae8925f0f2e3e4d1bac3cdb935e3642a6643956ec4685baf12
                                      • Instruction ID: 1255ca181abffa466eb45554b4903856dd8a335ef0234f0ec3abff0dd25b2713
                                      • Opcode Fuzzy Hash: 814c2577e94aeeae8925f0f2e3e4d1bac3cdb935e3642a6643956ec4685baf12
                                      • Instruction Fuzzy Hash: F5A1A930A04646AFDB29DF65C4907EEFBF1BF18304F10452EE55AA3291C779AD80CB99
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 0040ED4E
                                        • Part of subcall function 0040E825: __EH_prolog.LIBCMT ref: 0040E82A
                                        • Part of subcall function 0040C1DC: __EH_prolog.LIBCMT ref: 0040C1E1
                                        • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog$free
                                      • String ID:
                                      • API String ID: 2654054672-0
                                      • Opcode ID: 1563f0183111ff3756f6a4956a005afc579fd9423b9086b0a952e52ce037ac1c
                                      • Instruction ID: f06d9fa28c26d18b38afae9a2a45c1291361f954b2c40a63c05487aefbd1d087
                                      • Opcode Fuzzy Hash: 1563f0183111ff3756f6a4956a005afc579fd9423b9086b0a952e52ce037ac1c
                                      • Instruction Fuzzy Hash: CF51B570600206AFDB24EF62C891DAEBBB9AF54308F10487FF141B72D1DB78A945CB54
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 0040F9E5
                                        • Part of subcall function 00403B71: malloc.MSVCRT ref: 00403B84
                                        • Part of subcall function 00403B71: _CxxThrowException.MSVCRT(?,0042C1C8), ref: 00403B9E
                                        • Part of subcall function 0040FB8E: __EH_prolog.LIBCMT ref: 0040FB93
                                        • Part of subcall function 0040F345: __EH_prolog.LIBCMT ref: 0040F34A
                                        • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog$ExceptionThrowfreemalloc
                                      • String ID:
                                      • API String ID: 2423332413-0
                                      • Opcode ID: 7218004ae5ef1fe9806936a0f038da38e3923b5432e8bd4cb542ba0030af2ccb
                                      • Instruction ID: f917c622738c18646c6016d604920ad8a146ceec9960691556415646441905d3
                                      • Opcode Fuzzy Hash: 7218004ae5ef1fe9806936a0f038da38e3923b5432e8bd4cb542ba0030af2ccb
                                      • Instruction Fuzzy Hash: C9518131900605DFCB25DFA5C48499EBBB4AF08328F14827FE455B76D2CB38AA45CF54
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 00417706
                                        • Part of subcall function 00419F2B: __EH_prolog.LIBCMT ref: 00419F30
                                        • Part of subcall function 00419F2B: _CxxThrowException.MSVCRT(?,0042E810), ref: 00419F7B
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog$ExceptionThrow
                                      • String ID:
                                      • API String ID: 2366012087-0
                                      • Opcode ID: 83cab5e49b25565b3939891e45a9a10d77df0106bca05394c1e75b10824dee2a
                                      • Instruction ID: bd9aade3164a5327875f6b72e53f7940bc2ea94ed18cba3f1a24b0faa07c9e4a
                                      • Opcode Fuzzy Hash: 83cab5e49b25565b3939891e45a9a10d77df0106bca05394c1e75b10824dee2a
                                      • Instruction Fuzzy Hash: 1B515D74904249DFCB11DFA8C888BDEBBB4AF49304F1444AEE44AD7341C779AE85DB21
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog
                                      • String ID:
                                      • API String ID: 3519838083-0
                                      • Opcode ID: 9d3f9eba52a6049b96d43d4433ba62f4fc9a9c7786f44eb93216ddbc3de23f8f
                                      • Instruction ID: d11674bc6fe02063f26dadcb6afdd03e26e0ef6b4e536af382a12bfe63abda49
                                      • Opcode Fuzzy Hash: 9d3f9eba52a6049b96d43d4433ba62f4fc9a9c7786f44eb93216ddbc3de23f8f
                                      • Instruction Fuzzy Hash: 82518A74A00606CFCB14CF68C5809ABFBB2FF49304B10895EE5929B750D375E9A2DF94
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog
                                      • String ID:
                                      • API String ID: 3519838083-0
                                      • Opcode ID: a997c84d03bd27bc7c58f18df43cd408c6534c18cfdddf53a5232f7de0750d7b
                                      • Instruction ID: 8cea611797d63b8bfc20365acd018897896d5ffa812fa3ec194bbb2aa7859777
                                      • Opcode Fuzzy Hash: a997c84d03bd27bc7c58f18df43cd408c6534c18cfdddf53a5232f7de0750d7b
                                      • Instruction Fuzzy Hash: F541C070A00256EFDB20CF54C488BAABBE0BF15314F1586AED49A97791C774EDC0CB44
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog
                                      • String ID:
                                      • API String ID: 3519838083-0
                                      • Opcode ID: 99f0c1ea61ba1c17496419a7e591ea91786ec0a304dbe574bacff4d7304d9231
                                      • Instruction ID: 5b8ce99cd93288b9b3622ce56f3a952f4719c764294ef63b1931a13ebe5bf3d5
                                      • Opcode Fuzzy Hash: 99f0c1ea61ba1c17496419a7e591ea91786ec0a304dbe574bacff4d7304d9231
                                      • Instruction Fuzzy Hash: 4211B2B1900B909FD765DF24C48099BBBA4BF84308F44886FE0876B642D738BC04C715
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 0040B569
                                        • Part of subcall function 00405C98: __EH_prolog.LIBCMT ref: 00405C9D
                                        • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                        • Part of subcall function 004062C4: GetLastError.KERNEL32(0040CC4F,?,00000001,?,00000010,00000000,00000000), ref: 004062C4
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog$ErrorLastfree
                                      • String ID:
                                      • API String ID: 683690243-0
                                      • Opcode ID: 7e91c0dde115849d1ad0c908fe74a0a5c3d4acead8dbe92c6034b86eb64ab493
                                      • Instruction ID: fb4660edd494918f797c6894fe9440a752d3d01a1d336716f1c709085ebbaccd
                                      • Opcode Fuzzy Hash: 7e91c0dde115849d1ad0c908fe74a0a5c3d4acead8dbe92c6034b86eb64ab493
                                      • Instruction Fuzzy Hash: F901AD726407009EC725FF76D8929DEBBB5EF55314B00463FE883636D2CB78A609CA58
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog
                                      • String ID:
                                      • API String ID: 3519838083-0
                                      • Opcode ID: de6ac51bcd99ab72591421d5a9ffce9123d6af97c8a1c3ffa7523416d85887b9
                                      • Instruction ID: 280b33d701c2ecb1cb4dae2fac1941bf42244302b9ad5706c5af4e40132ac7de
                                      • Opcode Fuzzy Hash: de6ac51bcd99ab72591421d5a9ffce9123d6af97c8a1c3ffa7523416d85887b9
                                      • Instruction Fuzzy Hash: 38014B72B00A219FCB209F9DD4C191EFBE5FB88754761863FE499E7390CAB59C408B58
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog
                                      • String ID:
                                      • API String ID: 3519838083-0
                                      • Opcode ID: 179cfd55bd690a9624279460b47188c0f2cab1c0c399eb3132e33efedfce8100
                                      • Instruction ID: a45f0e56605284764902bbf4f31209531414a1f933827dee0c0a0f48ea1503d5
                                      • Opcode Fuzzy Hash: 179cfd55bd690a9624279460b47188c0f2cab1c0c399eb3132e33efedfce8100
                                      • Instruction Fuzzy Hash: E401FC30608344AFC705CF69D084EAABBA9FF45304F4480FEE0059B212C2799844CB65
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 0041385B
                                        • Part of subcall function 004139DF: __EH_prolog.LIBCMT ref: 004139E4
                                        • Part of subcall function 00413989: __EH_prolog.LIBCMT ref: 0041398E
                                        • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                        • Part of subcall function 004138CF: __EH_prolog.LIBCMT ref: 004138D4
                                        • Part of subcall function 00413938: __EH_prolog.LIBCMT ref: 0041393D
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog$free
                                      • String ID:
                                      • API String ID: 2654054672-0
                                      • Opcode ID: aab47c9550c61e81e4e4e96012b6a7bc3c1ee662ec5293290cb8e2509aa26bae
                                      • Instruction ID: e175e7f10f43f6cca05f6be96f189574f0e094f52caf40dd2350f9aae9621fc3
                                      • Opcode Fuzzy Hash: aab47c9550c61e81e4e4e96012b6a7bc3c1ee662ec5293290cb8e2509aa26bae
                                      • Instruction Fuzzy Hash: D0F0D170914A60DEEB19EF68D81639CBBE0AF04308F50429FE092622D2CBBC2B04874D
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 004061C6
                                        • Part of subcall function 00405C98: __EH_prolog.LIBCMT ref: 00405C9D
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog
                                      • String ID:
                                      • API String ID: 3519838083-0
                                      • Opcode ID: 4a6112fb950159eaf5e83c92a170fb4a182376475d04aa02fba525872de66c1e
                                      • Instruction ID: e5ddfb142680ed3c69e4bb472637a6dcbd7afa6831621fbacd83d8a3cc0fb80d
                                      • Opcode Fuzzy Hash: 4a6112fb950159eaf5e83c92a170fb4a182376475d04aa02fba525872de66c1e
                                      • Instruction Fuzzy Hash: 2CF08932D415049ADB15EB94E991BEEB374DF1535DF10016FE852771C2CB396E09CA18
                                      APIs
                                      • SetFileTime.KERNEL32(00000018,00000000,000000FF,00000000,00000013,80000000,00000000,?,?,?,00000018,00000018,?,00406515,?,00000013), ref: 004064E9
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: FileTime
                                      • String ID:
                                      • API String ID: 1425588814-0
                                      • Opcode ID: 59be36acff0148b2a6399661b1d03899d1d288337076d1e5c4a00da86c42ff5d
                                      • Instruction ID: 49423b807954fbf5132eddd10db361c8cf6ef33813656f7b93e5a35af05f7635
                                      • Opcode Fuzzy Hash: 59be36acff0148b2a6399661b1d03899d1d288337076d1e5c4a00da86c42ff5d
                                      • Instruction Fuzzy Hash: 1CF0F630100248BFEF228F14CD05BEA3FA8AB05324F14426EF9A6622E1C375DE20C758
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 00416DCD
                                        • Part of subcall function 00416E44: __aulldiv.LIBCMT ref: 00416ECD
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog__aulldiv
                                      • String ID:
                                      • API String ID: 4125985754-0
                                      • Opcode ID: 8bf19885dd5ea0e2f94d69bfacb549f2fcc5b7e4eebcd9df4adba7efa0999e04
                                      • Instruction ID: f8137897850cfe31c0c95d7590cf4b9d67ad1fbb95bcf970c06535ca175f3cf8
                                      • Opcode Fuzzy Hash: 8bf19885dd5ea0e2f94d69bfacb549f2fcc5b7e4eebcd9df4adba7efa0999e04
                                      • Instruction Fuzzy Hash: FD0146B1A01BA0DFC325DF64D4A12DAFBE4FB04308F808A5FD5DA53601C7B8A504CB98
                                      APIs
                                      • SysAllocString.OLEAUT32(?), ref: 00412322
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: AllocString
                                      • String ID:
                                      • API String ID: 2525500382-0
                                      • Opcode ID: 7513ca34129e98510f3681b072cb7c0b6c5abb15b675a2f96db53ad422757b1f
                                      • Instruction ID: 84edb9678b7a745c0b725e3e0dbbada79bae0bb88cc8bfe653711e49ff3b59e2
                                      • Opcode Fuzzy Hash: 7513ca34129e98510f3681b072cb7c0b6c5abb15b675a2f96db53ad422757b1f
                                      • Instruction Fuzzy Hash: 1AF027312007078AF7305B31DD01BDBB7D09F61318F14462EE8A9D3250EBBC98A4C769
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 00402297
                                        • Part of subcall function 00403B71: malloc.MSVCRT ref: 00403B84
                                        • Part of subcall function 00403B71: _CxxThrowException.MSVCRT(?,0042C1C8), ref: 00403B9E
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: ExceptionH_prologThrowmalloc
                                      • String ID:
                                      • API String ID: 3978722251-0
                                      • Opcode ID: 63cdaece89f50c39978ce6c8850528780203bdae850baeecadb4c7eacae8e156
                                      • Instruction ID: 5b325d54a320dae1f17efd6f96a645c63fb9c4f6f7ddd04e3403ca5b45223fd6
                                      • Opcode Fuzzy Hash: 63cdaece89f50c39978ce6c8850528780203bdae850baeecadb4c7eacae8e156
                                      • Instruction Fuzzy Hash: 20F0E2307001009FDB08CF58D146BADB7E0EF08304F00867FA40AE3380CBB869008A58
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 00416FAE
                                        • Part of subcall function 00417899: __EH_prolog.LIBCMT ref: 0041789E
                                        • Part of subcall function 00403BA5: free.MSVCRT ref: 00403BA9
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog$free
                                      • String ID:
                                      • API String ID: 2654054672-0
                                      • Opcode ID: eb0fa4d0185cf915b7e1cd56f291fcce4e57fc542e8566139852d541875939b9
                                      • Instruction ID: 410289a83d4ed025744fd943b1f64dcfed9d5ec8ab00e327c3d154e98af9d3b0
                                      • Opcode Fuzzy Hash: eb0fa4d0185cf915b7e1cd56f291fcce4e57fc542e8566139852d541875939b9
                                      • Instruction Fuzzy Hash: 82F0BE31901A20DBC322AF14D906ADEB7F4FF04324F00465FE4D263691CBB8AA408B88
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog
                                      • String ID:
                                      • API String ID: 3519838083-0
                                      • Opcode ID: 573a2cf2bc836b99d9609f8487cba32822be38598a2facaf8ebd2ea7fbb3612e
                                      • Instruction ID: 1b364a8ab76887425b7e3a6f64e7fe538d72e94d07a99577154da66e0cac4a81
                                      • Opcode Fuzzy Hash: 573a2cf2bc836b99d9609f8487cba32822be38598a2facaf8ebd2ea7fbb3612e
                                      • Instruction Fuzzy Hash: 7AE06D76B04204EFC700EF99D445F9EB7A8FF48314F40855EB00A97241C7389900CA68
                                      APIs
                                        • Part of subcall function 0040631A: CloseHandle.KERNELBASE(00000000,000000FF,004062EC,?,?,0040612D,?,00000000,00000001,00000003,02000000,?,?,?,004060AB), ref: 00406325
                                      • CreateFileW.KERNELBASE(004060AB,?,?,00000000,?,02000000,00000000,?,?,0040612D,?,00000000,00000001,00000003,02000000), ref: 00406303
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: CloseCreateFileHandle
                                      • String ID:
                                      • API String ID: 3498533004-0
                                      • Opcode ID: 019bf48367bcf98dcb756a2f82181cd61b9fe9e8a00531e4bac9db3451219804
                                      • Instruction ID: adc6e9f92411e864d9c6c7b87d178177d260d9e0db269cc12a015677b2bab9cc
                                      • Opcode Fuzzy Hash: 019bf48367bcf98dcb756a2f82181cd61b9fe9e8a00531e4bac9db3451219804
                                      • Instruction Fuzzy Hash: 4CE086321002197BCF215F649C01BCE3B55AF19370F100126FE15AA1E1D772C871AF98
                                      APIs
                                      • WriteFile.KERNELBASE(?,?,?,?,00000000), ref: 004065E9
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: FileWrite
                                      • String ID:
                                      • API String ID: 3934441357-0
                                      • Opcode ID: fe5bcde431ae922a75e4756504e17ece85435cb636739ef29d2279dd80125517
                                      • Instruction ID: da683ac8c70a974cc3f8237807a5398f2218d9b128b4c0510ef96a262ff81173
                                      • Opcode Fuzzy Hash: fe5bcde431ae922a75e4756504e17ece85435cb636739ef29d2279dd80125517
                                      • Instruction Fuzzy Hash: 63E0E575600208FBCB11CFA5D801F8E7BB9AB08358F20C16AF919AA290D739DA10DF54
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 00415BEE
                                        • Part of subcall function 00415FA4: __EH_prolog.LIBCMT ref: 00415FA9
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog
                                      • String ID:
                                      • API String ID: 3519838083-0
                                      • Opcode ID: 80e3150f7c2d9fd7c4f1173715c9fe5ffee53762babf6db31bc0c1742898919b
                                      • Instruction ID: ce869e3aab6ace1ce8533568d57fd8f5675fbc5f5a758563eac7a77371b3ba82
                                      • Opcode Fuzzy Hash: 80e3150f7c2d9fd7c4f1173715c9fe5ffee53762babf6db31bc0c1742898919b
                                      • Instruction Fuzzy Hash: 62E09AB1A10920CADB19EB64E4127EDB7A4EF44708F00065EA08393281CBB82A04C799
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 00412E9A
                                        • Part of subcall function 00412ED4: __EH_prolog.LIBCMT ref: 00412ED9
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog
                                      • String ID:
                                      • API String ID: 3519838083-0
                                      • Opcode ID: ad06726d17add293a3b597e3220079d2e7ba6869ca03fb404eef0c1873daa0e0
                                      • Instruction ID: 69d3665519c70779c744395f10d9950b652281d112e39adaa058e3f3ba64c18f
                                      • Opcode Fuzzy Hash: ad06726d17add293a3b597e3220079d2e7ba6869ca03fb404eef0c1873daa0e0
                                      • Instruction Fuzzy Hash: B6D01271A14218AFD718DB45D947BEEB778EB41758F10465FF001A1240C3B95E008668
                                      APIs
                                      • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0040653C
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: FileRead
                                      • String ID:
                                      • API String ID: 2738559852-0
                                      • Opcode ID: 7b95e35fa55aa0e0c3428753206580943a288fc2de83e1cadcb6ea6cb1f466f9
                                      • Instruction ID: aa511b6798c59930b0405c074b109464cadd0f08f127264607b407b712c08231
                                      • Opcode Fuzzy Hash: 7b95e35fa55aa0e0c3428753206580943a288fc2de83e1cadcb6ea6cb1f466f9
                                      • Instruction Fuzzy Hash: 97E0EC75600208FBCB11CF90CD01FCE7BBAAB49754F208158E90596160C375AA14EB54
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 0041A2AB
                                        • Part of subcall function 00403B71: malloc.MSVCRT ref: 00403B84
                                        • Part of subcall function 00403B71: _CxxThrowException.MSVCRT(?,0042C1C8), ref: 00403B9E
                                        • Part of subcall function 00416DC8: __EH_prolog.LIBCMT ref: 00416DCD
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog$ExceptionThrowmalloc
                                      • String ID:
                                      • API String ID: 3744649731-0
                                      • Opcode ID: c9e71ed1f5ae39a151610ad1d4401ee0482bbc4c59b442a92ca8ff4e7376cbdb
                                      • Instruction ID: bffb35fe6662f17f768acfd319c4c1181e1a9fa832d6402326a06ee7331dc0b5
                                      • Opcode Fuzzy Hash: c9e71ed1f5ae39a151610ad1d4401ee0482bbc4c59b442a92ca8ff4e7376cbdb
                                      • Instruction Fuzzy Hash: 9DD05E71B01514AFCB4CEFB8A447BADB6E0EB44348F50467FA012E2781EF7899408629
                                      APIs
                                      • FindClose.KERNELBASE(00000000,000000FF,00405A9E), ref: 00405A78
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: CloseFind
                                      • String ID:
                                      • API String ID: 1863332320-0
                                      • Opcode ID: 771ecb549d2df5e9db96aaaa111c166b5f13e32054afe09ecd2ab3c97690b28b
                                      • Instruction ID: fa3dde25846cff55b07d37752d80c8345f1936d69bcc94e9975f1054c5fe9f6f
                                      • Opcode Fuzzy Hash: 771ecb549d2df5e9db96aaaa111c166b5f13e32054afe09ecd2ab3c97690b28b
                                      • Instruction Fuzzy Hash: 81D012312045214ADA745E7C78849E333D89A12330321076AF4B4D32E0D3748C834E98
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: fputs
                                      • String ID:
                                      • API String ID: 1795875747-0
                                      • Opcode ID: c078ba7b642f1437405dd27f64575dd6badec6b4367417118eb25951d77006ff
                                      • Instruction ID: 1fba68da9fe9ae202432a53fb8ce6af3c3a1bc415edf3b5a9342c634e64c5272
                                      • Opcode Fuzzy Hash: c078ba7b642f1437405dd27f64575dd6badec6b4367417118eb25951d77006ff
                                      • Instruction Fuzzy Hash: 92D0C7361082519FE6155F16EC09C87FFA5FFD5321B11082FF450511609B726C26DA64
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: fputc
                                      • String ID:
                                      • API String ID: 1992160199-0
                                      • Opcode ID: ca0c3902a19e84967535e1b89705d167b4bdcf58c56db1bb82e36f2fb91b2edc
                                      • Instruction ID: bdcaa610731fbb92d061b186abac76fc107d3a3afa5d30b62c2ee034d17f0ff1
                                      • Opcode Fuzzy Hash: ca0c3902a19e84967535e1b89705d167b4bdcf58c56db1bb82e36f2fb91b2edc
                                      • Instruction Fuzzy Hash: 7FB092323082209BE7281A99BC0AA946794EB0D721F25006BF544C21909A911C528A99
                                      APIs
                                      • SetFileTime.KERNELBASE(?,?,?,?,0040AEEE,00000000,00000000,?,00000000,?,?,?,?,?,0040B26E,?), ref: 004065B7
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: FileTime
                                      • String ID:
                                      • API String ID: 1425588814-0
                                      • Opcode ID: c1faabe7ee04c17a3e9dedf9d691a06c13326f8eaf91e6cc6540484f6927ee96
                                      • Instruction ID: dd5313f992c8f3caee4660e88009fcd1fa651df6d34ad12b859f3340a0bd94a5
                                      • Opcode Fuzzy Hash: c1faabe7ee04c17a3e9dedf9d691a06c13326f8eaf91e6cc6540484f6927ee96
                                      • Instruction Fuzzy Hash: 4DC04C36158105FF8F120F70CC04D1ABBB2BB95315F10D918B155C5070C7328424EB02
                                      APIs
                                      • SetFileAttributesW.KERNELBASE ref: 004055CF
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: AttributesFile
                                      • String ID:
                                      • API String ID: 3188754299-0
                                      • Opcode ID: dabda50b76c128f6b582b6eece111edba8ad408e96a23e841a2b7badc71f8a96
                                      • Instruction ID: 414952e8fe1a2e075d93a374d6099bf3f4316265d06550280dff1d114576109c
                                      • Opcode Fuzzy Hash: dabda50b76c128f6b582b6eece111edba8ad408e96a23e841a2b7badc71f8a96
                                      • Instruction Fuzzy Hash: 53A002A0312216DBAA241B329E09A2F256DAEC1AD1B45C96C7401C5170DA2DCC515535
                                      APIs
                                      • SetEndOfFile.KERNELBASE(?,0040668A,00000000,?,00000000,?,?,?,?,0040AE79,?,80004004,?,00000000,?), ref: 00406647
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: File
                                      • String ID:
                                      • API String ID: 749574446-0
                                      • Opcode ID: dbc56d001a548cd5070795bd2d90de6a3695ba147366a044821af2c85d996497
                                      • Instruction ID: 86e43d1d87ccd767641ce6018b972dd42dd26830d60569e3cf728c40a3797de3
                                      • Opcode Fuzzy Hash: dbc56d001a548cd5070795bd2d90de6a3695ba147366a044821af2c85d996497
                                      • Instruction Fuzzy Hash: CFA002703E502FCB8F211F34DC098243AA6AB96707B6057B4B103D95F4DF224819AA15
                                      APIs
                                      • GetFileAttributesW.KERNELBASE(?,00405FE7,?,?,0000002A,?,?,00000000,?,00000001), ref: 00405C8A
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: AttributesFile
                                      • String ID:
                                      • API String ID: 3188754299-0
                                      • Opcode ID: 79a2f7dced282e2fb32e550a1d2b0904197e204eb4e7884ebd859e13ad972910
                                      • Instruction ID: 880e6c9350023c768339967658fda1199bc4c9145147cf13f7093929cf76d2ce
                                      • Opcode Fuzzy Hash: 79a2f7dced282e2fb32e550a1d2b0904197e204eb4e7884ebd859e13ad972910
                                      • Instruction Fuzzy Hash: 91A001A0A26A04469A341B346C4899A29A5A996736BA00B75F132D01E4DB79C881A919
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: memmove
                                      • String ID:
                                      • API String ID: 2162964266-0
                                      • Opcode ID: 4549de4e085ce23c5d742228b4179348cb2073e1a461e3f40e03bd9db6ea1aff
                                      • Instruction ID: e6815487489208ab39f33fed76fb0e7ab78d55a9c6f4cab8f9f9bf2c978d5583
                                      • Opcode Fuzzy Hash: 4549de4e085ce23c5d742228b4179348cb2073e1a461e3f40e03bd9db6ea1aff
                                      • Instruction Fuzzy Hash: F2814171D002499FDF14CFA8C680AAEB7B1AB48304F24447FD581B7781DB39A980CF59
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: ErrorLast
                                      • String ID:
                                      • API String ID: 1452528299-0
                                      • Opcode ID: 8c18664cc0e2afd8735706c9fad17548e6b9e64cdc38ad65294e7055b2357f7f
                                      • Instruction ID: 540c822f5f08825451efabc7153c463d8467db7d585d389fc5b2ba1f3b10f2b9
                                      • Opcode Fuzzy Hash: 8c18664cc0e2afd8735706c9fad17548e6b9e64cdc38ad65294e7055b2357f7f
                                      • Instruction Fuzzy Hash: 53F04471A0820B9BCB14DE54DC40AB777B9FF44318B14843AAD17EB290D379FC119B9A
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 4f3d972a2cc645180b03ab5989da7a7abdbb96092aef46b131a3a4169954ef89
                                      • Instruction ID: 6a611e0c24855a470b21982780ef0240856e0dbfab85deb95be053ee113d5378
                                      • Opcode Fuzzy Hash: 4f3d972a2cc645180b03ab5989da7a7abdbb96092aef46b131a3a4169954ef89
                                      • Instruction Fuzzy Hash: A3D0A774A5251146CF8486328949B9735A83F04306F58857EEC13CE681FB6EC497C708
                                      APIs
                                      • CloseHandle.KERNELBASE(00000000,000000FF,004062EC,?,?,0040612D,?,00000000,00000001,00000003,02000000,?,?,?,004060AB), ref: 00406325
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: CloseHandle
                                      • String ID:
                                      • API String ID: 2962429428-0
                                      • Opcode ID: 63bd52484c3e27620c52f78d23f88a666e8d75c923b48dba9752bb41ea792720
                                      • Instruction ID: 37909153597268066c058ee49dc1832c7f7ed1a892d8ea3123e2061e027ab4fe
                                      • Opcode Fuzzy Hash: 63bd52484c3e27620c52f78d23f88a666e8d75c923b48dba9752bb41ea792720
                                      • Instruction Fuzzy Hash: 23D0123160417157DA741E3C7D455C233D85E1237032207AAF4B5D32E0D3748C9346D4
                                      APIs
                                      • VirtualAlloc.KERNELBASE(00000000), ref: 0041E051
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: f56809b49086c6ed513efbd4586875a7e0a01cfb318715d2f5b7dbd5dc263cde
                                      • Instruction ID: 37d545aa3dd278780438cb9abc06a095e6c0b675cb82c61b18e0c7a60c84fb8a
                                      • Opcode Fuzzy Hash: f56809b49086c6ed513efbd4586875a7e0a01cfb318715d2f5b7dbd5dc263cde
                                      • Instruction Fuzzy Hash: D2C09BE1E4E290DFDF0657109C55B603F319F97741F4A10C5E4445B0D3D5551D19C727
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 896ef36176023112d6443d1c7dbb081b3f05f1399666896d001e6a3ed2194474
                                      • Instruction ID: 2cf01b38eb4ee948cf265c98e74a8636803a57433c2cd1d462a5ffe318260026
                                      • Opcode Fuzzy Hash: 896ef36176023112d6443d1c7dbb081b3f05f1399666896d001e6a3ed2194474
                                      • Instruction Fuzzy Hash: CDA012CDE1001100994411322C41053101221E16057C8C479A80144104FF2DC804700A
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: db257ee4f71baae5e6f327627217561a0c71f3babe6a0257f2be35a8eab85669
                                      • Instruction ID: 769eb2c9eb345b6015b8715d85aee880fb048f10648ae35f76c4dfcca9cb3a5f
                                      • Opcode Fuzzy Hash: db257ee4f71baae5e6f327627217561a0c71f3babe6a0257f2be35a8eab85669
                                      • Instruction Fuzzy Hash: 6BA024D5F3100100DD5C31313C01457100111D03077C044FD7407C0100F71DC514500F
                                      APIs
                                      • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 0041E06C
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: FreeVirtual
                                      • String ID:
                                      • API String ID: 1263568516-0
                                      • Opcode ID: b969455fa2f22fc73ea04ac6af0352f9a8db9e597e97f0f7f8fcdc9855555cef
                                      • Instruction ID: e16472afc0667f0882427de6cdc1df0a5e98d7cfee31e37e763c24b0fda5beb4
                                      • Opcode Fuzzy Hash: b969455fa2f22fc73ea04ac6af0352f9a8db9e597e97f0f7f8fcdc9855555cef
                                      • Instruction Fuzzy Hash: 71A00278F80714B6ED7467306D4FF6525246784F01F60C594B241681D49DE464459A2C
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 215540552cff86145e4461e69ebfb5076cc52fc8c4b4bc72fa675cccf62c4148
                                      • Instruction ID: 317c144e9e448446760cd229ef9c40f20c29eefaa629672554263170cc7ba9b1
                                      • Opcode Fuzzy Hash: 215540552cff86145e4461e69ebfb5076cc52fc8c4b4bc72fa675cccf62c4148
                                      • Instruction Fuzzy Hash:
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: c77b473b94ae96f42027579122339939922c3ef578ecea1100068d67e2cb92de
                                      • Instruction ID: 8a4addd67d1395683a601ebee97e0ac27b042bf7b24b100f5c4dc94180559340
                                      • Opcode Fuzzy Hash: c77b473b94ae96f42027579122339939922c3ef578ecea1100068d67e2cb92de
                                      • Instruction Fuzzy Hash: 83A00271105101DBDB551B91ED0D55A7B61FB84652F654469F04B405708B314C31FA05
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: d0ffa420d5295d2d66e13c681143ce4ee7e28d14a99b9877e117c45ff1c9cee4
                                      • Instruction ID: aa35c656e66cb15e5c91bcce4ec064c5ed426d125c34c476f51aa09ca71418e3
                                      • Opcode Fuzzy Hash: d0ffa420d5295d2d66e13c681143ce4ee7e28d14a99b9877e117c45ff1c9cee4
                                      • Instruction Fuzzy Hash:
                                      APIs
                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00407091
                                      • FileTimeToSystemTime.KERNEL32(?,?,?,?), ref: 004070A3
                                      • __aullrem.LIBCMT ref: 00407205
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: Time$File$LocalSystem__aullrem
                                      • String ID:
                                      • API String ID: 2417234408-0
                                      • Opcode ID: e2ea9a577c3c03632edbf28e011eeb485c98ebec837ccdf391d33486ad268604
                                      • Instruction ID: 097ebb133b43d6c75499fc9ab10b51d9df6370fde1c7953e3ae636fd5b3e94c1
                                      • Opcode Fuzzy Hash: e2ea9a577c3c03632edbf28e011eeb485c98ebec837ccdf391d33486ad268604
                                      • Instruction Fuzzy Hash: 4271BC71E09345DBD711CF6984C06EEFBF69F79314F14806EE884A3282D27A5D5AC721
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 004194AE
                                        • Part of subcall function 004191A2: __EH_prolog.LIBCMT ref: 004191A7
                                      • _CxxThrowException.MSVCRT(?,0042E810), ref: 00419986
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog$ExceptionThrow
                                      • String ID:
                                      • API String ID: 2366012087-0
                                      • Opcode ID: 800fb9f3c2d82f9e2b0987539adecd0ab6a29e1bc71cd275f5283ebc7644eb9a
                                      • Instruction ID: 3bae86e87b3cf8b9d8377ed57d25004214f6e4a97d94b5689226fb05ce5736f1
                                      • Opcode Fuzzy Hash: 800fb9f3c2d82f9e2b0987539adecd0ab6a29e1bc71cd275f5283ebc7644eb9a
                                      • Instruction Fuzzy Hash: 10325A7090424ADFCF14DF65C5A0AEEBBB1BF05308F14806EE449AB252D738AE95CF95
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: @
                                      • API String ID: 0-2766056989
                                      • Opcode ID: 387d9f5b0d722e16858b989fb5cf058498023d896b5906e39b88b724edac5b15
                                      • Instruction ID: c4327a5b03a4357bab17156b007e5d35fc2f343ba8ec6b5de1daa222e62ab7b1
                                      • Opcode Fuzzy Hash: 387d9f5b0d722e16858b989fb5cf058498023d896b5906e39b88b724edac5b15
                                      • Instruction Fuzzy Hash: E8020AB16083058FC358DF4AD88045BF7E2BFC8314F58892EF59997315DB70A95ACB86
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: @
                                      • API String ID: 0-2766056989
                                      • Opcode ID: 20fb1e679b1ea7c9bc9397992702f5c06c27ebda3db9de964d82a84f63a00d7a
                                      • Instruction ID: a5a46c98ad045cca7d8d22a35470739b0e600e8396af2da8c62bd07726d085e0
                                      • Opcode Fuzzy Hash: 20fb1e679b1ea7c9bc9397992702f5c06c27ebda3db9de964d82a84f63a00d7a
                                      • Instruction Fuzzy Hash: B3E11BB160C3058FC358DF4AD88045BF7E2BFC8314F58892DF59983356DB70A95ACA8A
                                      APIs
                                        • Part of subcall function 0040735B: GetCurrentProcess.KERNEL32(?,?,0040737C), ref: 00407360
                                        • Part of subcall function 0040735B: GetProcessAffinityMask.KERNEL32(00000000), ref: 00407367
                                      • GetSystemInfo.KERNEL32(?), ref: 00407392
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: Process$AffinityCurrentInfoMaskSystem
                                      • String ID:
                                      • API String ID: 3251479945-0
                                      • Opcode ID: 12424a63e269e0877277bfdfa86892c8ee2fc88c8c4c8b17476209747d2dff76
                                      • Instruction ID: 37ac09f4e8775b3dc7db151483154f559ecac358ef485f747e15dc97df7041dd
                                      • Opcode Fuzzy Hash: 12424a63e269e0877277bfdfa86892c8ee2fc88c8c4c8b17476209747d2dff76
                                      • Instruction Fuzzy Hash: F2D01270E0420997DF54E7F5D44699E77785E44348F0400799C01F21D0DB78F945D65A
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: Version
                                      • String ID:
                                      • API String ID: 1889659487-0
                                      • Opcode ID: a8b240aa1cb2597892d2c620267438a9b7ed24a8c987694d8ca527b9fca9a5f6
                                      • Instruction ID: 1a04f80bb725c75d3dd7a7d213ed030404e6ca71b9454b7eb32c971da4491ff5
                                      • Opcode Fuzzy Hash: a8b240aa1cb2597892d2c620267438a9b7ed24a8c987694d8ca527b9fca9a5f6
                                      • Instruction Fuzzy Hash: 55D05E71E5042443DB04B72CD94A12933E2F741300FC608EAD498C5226E92DAA16D64B
                                      APIs
                                      • GetSystemTimeAsFileTime.KERNEL32(?,004059CA,00000000,00000000,?,?,?,?,?,?,?,?,?,0040C681,?,00000010), ref: 00407456
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: Time$FileSystem
                                      • String ID:
                                      • API String ID: 2086374402-0
                                      • Opcode ID: dd4d65d4735ecad5eff269bcc9c5ffcae217ccde2733e6e548aead3813e70d00
                                      • Instruction ID: 03b31f416222a043bea4c947158f1946739afe019085366f262c6bff39aea67e
                                      • Opcode Fuzzy Hash: dd4d65d4735ecad5eff269bcc9c5ffcae217ccde2733e6e548aead3813e70d00
                                      • Instruction Fuzzy Hash:
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PbB
                                      • API String ID: 0-1558502971
                                      • Opcode ID: 47ff404f096a15f6be07cdd7ff47f7c3a4c0280c46258968b647365bbcb83ffc
                                      • Instruction ID: a90cc3db49980fd9bdf7688ba4c454fc12f945e6fdca8d25ef6de79eb1c97d35
                                      • Opcode Fuzzy Hash: 47ff404f096a15f6be07cdd7ff47f7c3a4c0280c46258968b647365bbcb83ffc
                                      • Instruction Fuzzy Hash: 4D41E432F10A3006B34CCE3AAC851662BC3DBC9382785D739D565C66D9D9BDC413D1A8
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterErrorLastLeaveObjectSingleWait
                                      • String ID:
                                      • API String ID: 1001467830-0
                                      • Opcode ID: c2e93f49e507dd83a320957035e7cc1bd384210c5e44b5caa0bc2a24e808fe7a
                                      • Instruction ID: a07709ed0249790d25947c5d4043c77be657826ad63f2b176fd792c5173063d6
                                      • Opcode Fuzzy Hash: c2e93f49e507dd83a320957035e7cc1bd384210c5e44b5caa0bc2a24e808fe7a
                                      • Instruction Fuzzy Hash: 8A621771A083519FCB24CF19D68052BFBE1BFC8740F948A2EE89597315D7B8E845CB46
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dc8004adaa3259f52bc6ab735d8be8844deca4391a1dba6202427b66ce1407bc
                                      • Instruction ID: 6779b2a74973eff395bcc09e7ec8ee8c4b47229ef48312d7df48326998885e9a
                                      • Opcode Fuzzy Hash: dc8004adaa3259f52bc6ab735d8be8844deca4391a1dba6202427b66ce1407bc
                                      • Instruction Fuzzy Hash: 60022A73B0836047D718CE19DD80229B7E3FBD0380FAA492FF89647395DAB49946C799
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f4c3878cdf6dda1e5ca36c24f377bc52bcf6993d29949e9196dea34e7f5de905
                                      • Instruction ID: 5fbcdf7e76c78e01b99a8ca8083e79c7bf9a59bce4f2b0593f3807deda067ad1
                                      • Opcode Fuzzy Hash: f4c3878cdf6dda1e5ca36c24f377bc52bcf6993d29949e9196dea34e7f5de905
                                      • Instruction Fuzzy Hash: 18024A32B043218BD708CE28D58027DBBE3FBE4345F550A3FE896976A4D7789845CB89
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 197aec8a6e2a317b323f6aae5095031827df40ea46c44a9cbc9116775b6008cc
                                      • Instruction ID: 2dae5d15b16d92ed7caafcb73801ff926bcdae23959ce8009c2e2d6f19409047
                                      • Opcode Fuzzy Hash: 197aec8a6e2a317b323f6aae5095031827df40ea46c44a9cbc9116775b6008cc
                                      • Instruction Fuzzy Hash: 2A028C706047208FC328CF2EE49422AFBE1EFC5301F548A6EE5DA87791D23AE559CB55
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ec21f2bc10a4140bfded27c6d5d1301f13af393237b8a6ab6090c49201403264
                                      • Instruction ID: 9dbdf3cc36c0871e00d70d1cf73c890cd0849f4c1b349caee6c3423430388a93
                                      • Opcode Fuzzy Hash: ec21f2bc10a4140bfded27c6d5d1301f13af393237b8a6ab6090c49201403264
                                      • Instruction Fuzzy Hash: 95E1F6729043AA4FD31CEF58EC91635B7A1FF88380F09457DCA560B3B2D6746A01DB94
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0be95466a501aa6df6135e314a315b2d27713a5a1a3cbbde2114f59cc96eeb67
                                      • Instruction ID: 180b3774adec75c40f857ab56fa67e51ed4644e1aa4a0a04af6b9390553663a5
                                      • Opcode Fuzzy Hash: 0be95466a501aa6df6135e314a315b2d27713a5a1a3cbbde2114f59cc96eeb67
                                      • Instruction Fuzzy Hash: D2B192766012118FC750CF2EC8801597BA2BFC532977997AEC8A48F746D33AE857CB94
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2e506fc7279a820970dcbf9ac392f20d839b71f7c0b8c4e9d2c3673edf14b0ee
                                      • Instruction ID: 586f8480fd11126397f6699f5bfc9f0ef5ac81eadabf3b744486f71cccb0705d
                                      • Opcode Fuzzy Hash: 2e506fc7279a820970dcbf9ac392f20d839b71f7c0b8c4e9d2c3673edf14b0ee
                                      • Instruction Fuzzy Hash: 3231277B600A054EF620852B89883E77213FFD63A0F19C727DD16873E8CA399DC6814D
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b992da0320ec3f814fb582ec4cb6330d05488eb9d43a721a90b87cbfbd9ca5c7
                                      • Instruction ID: 8a31634d1fb8d893b677315f844586136606d247691434bc821e591bcdba7911
                                      • Opcode Fuzzy Hash: b992da0320ec3f814fb582ec4cb6330d05488eb9d43a721a90b87cbfbd9ca5c7
                                      • Instruction Fuzzy Hash: FA5186315102399BC782EF5DF8D4AEA73E5FB4434EFD34A26DE8257141C624E826D6A0
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fc8755404496fa14fc5fc9ac73b9f104171496fa033ba51e4f77bd0a7ed76c6b
                                      • Instruction ID: cec01148624ff6002e8d78b3abb26f3a7b04ecb4e699d004dc871b06b6aa27d5
                                      • Opcode Fuzzy Hash: fc8755404496fa14fc5fc9ac73b9f104171496fa033ba51e4f77bd0a7ed76c6b
                                      • Instruction Fuzzy Hash: 69217137AA0D1707D70C8A28EC37AB93281E744305F89567EE94BCB3D1DEAC8800C648
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 77e3b7086b35622f3edc5cc23a5ba1f7ddd0fc26d22bb20063e423d6306cc5fe
                                      • Instruction ID: 3f22e8bbf1c80f18dc348f81ee196079cd90f877339ced02ae457c1f152bd803
                                      • Opcode Fuzzy Hash: 77e3b7086b35622f3edc5cc23a5ba1f7ddd0fc26d22bb20063e423d6306cc5fe
                                      • Instruction Fuzzy Hash: C8214BB1B043BA07E310BE7CDC8027777E6EBC1301F884276D9948F646D679889297A4
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 152ca77b835acdaa31470eaeb3eb3d3d2907b0f4df8f431f6db191a7075f4f47
                                      • Instruction ID: 9e775abeed684ca77467d17cca6977048c68fff2285a19e0a564aa4dd6adc1c9
                                      • Opcode Fuzzy Hash: 152ca77b835acdaa31470eaeb3eb3d3d2907b0f4df8f431f6db191a7075f4f47
                                      • Instruction Fuzzy Hash: 27C002F6609606AF970CCF1FA480415FBE9FAD8321324C23FA02DC3700C77198258B64
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 004185FE
                                        • Part of subcall function 00417D89: _CxxThrowException.MSVCRT(?,0042E810), ref: 00417DAC
                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?,0000000B,00000000,?,?), ref: 004189F0
                                      • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418A8C
                                      • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418AA0
                                      • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418AB4
                                      • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418AC8
                                      • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418ADC
                                      • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418AF0
                                      • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418B04
                                      • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418B18
                                      • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418B2C
                                      • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418B40
                                      • _CxxThrowException.MSVCRT(?,0042E810), ref: 00418B54
                                        • Part of subcall function 00417BB2: _CxxThrowException.MSVCRT(?,0042E7D0), ref: 00417BC5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: ExceptionThrow$H_prologmemcpy
                                      • String ID: $!$@
                                      • API String ID: 3273695820-2517134481
                                      • Opcode ID: 86ab02d0ed812b2bc682d74ebd8090e91257ed431655c286634e8f5cefe57a90
                                      • Instruction ID: a8af2338d33f97ab3af66800fc8919b7e7d9159ea038428e72aaae9fbbebb504
                                      • Opcode Fuzzy Hash: 86ab02d0ed812b2bc682d74ebd8090e91257ed431655c286634e8f5cefe57a90
                                      • Instruction Fuzzy Hash: 92126C74E05249EFCF04DFA5C981AEEBBB1BF09304F54845EE445AB352DB38A981CB58
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: fputs$H_prolog$fputcfree
                                      • String ID: Modified: $Path: $Size:
                                      • API String ID: 2632947726-3207571042
                                      • Opcode ID: dad6ea9b37028dc7d9b6d66f9ca6d710003fafdbd0f38657ec1ce368b28c369f
                                      • Instruction ID: b65d724bde5c915c69112c2f50a2259a5a42bfe36314ecb7860c7f1e00933a31
                                      • Opcode Fuzzy Hash: dad6ea9b37028dc7d9b6d66f9ca6d710003fafdbd0f38657ec1ce368b28c369f
                                      • Instruction Fuzzy Hash: 5121C431A00014ABCF11BFA6DC81AAE7F36EF44354F54402BF805662A1EB7A49A1DF95
                                      APIs
                                      • memcmp.MSVCRT(?,0042BB50,00000010), ref: 00408244
                                      • memcmp.MSVCRT(?,004293D8,00000010), ref: 00408261
                                      • memcmp.MSVCRT(?,004294C8,00000010), ref: 00408274
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: memcmp
                                      • String ID:
                                      • API String ID: 1475443563-0
                                      • Opcode ID: 8910d6305239276ff3f7db42ecd347003804e214d9e1dbdd8d8a49be33777170
                                      • Instruction ID: e96827f4b63efecacfe58e3eea22b3fe6ab2bc99bd733a1cd9902dd8c249a16e
                                      • Opcode Fuzzy Hash: 8910d6305239276ff3f7db42ecd347003804e214d9e1dbdd8d8a49be33777170
                                      • Instruction Fuzzy Hash: 1951AA72B00625ABE7105A15ED41FA733AC9E20754B40412EFD86E7381FB38FE05CA99
                                      APIs
                                      • GetVersion.KERNEL32 ref: 0041EBC7
                                      • GetModuleHandleW.KERNEL32(kernel32.dll,SetDefaultDllDirectories), ref: 0041EBDD
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041EBE4
                                      • GetSystemDirectoryW.KERNEL32(?,00000106), ref: 0041EC07
                                      • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0041EC8D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemVersion
                                      • String ID: SetDefaultDllDirectories$\$\$kernel32.dll
                                      • API String ID: 2515194075-2532076501
                                      • Opcode ID: 82f5796dbf9e0cdcb216b5097f80af6bf4f1409dd4f72cd67fc1d0562e83a76e
                                      • Instruction ID: 913686e8244bd061a2bcb12ad3078c3bbff088274ca3bb4e53c0d7fdda3888e6
                                      • Opcode Fuzzy Hash: 82f5796dbf9e0cdcb216b5097f80af6bf4f1409dd4f72cd67fc1d0562e83a76e
                                      • Instruction Fuzzy Hash: 2321C3346043159AE7349F59EC08F97BBE4AF40700F58942AD984D72A0F77998C5C79E
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: fputs
                                      • String ID: : Cannot open the file as [$ERROR$Open $WARNING$] archive
                                      • API String ID: 1795875747-657955069
                                      • Opcode ID: 64877689ad02330c930da7756644846f4b0a693915e548a7d511e3b40fd6094c
                                      • Instruction ID: 9c73f5e0e90770f140b12c62cfba92fc1376db5acbc4535256ac5aafa418b3ee
                                      • Opcode Fuzzy Hash: 64877689ad02330c930da7756644846f4b0a693915e548a7d511e3b40fd6094c
                                      • Instruction Fuzzy Hash: 8FF0E9327001257BD6102766BC40E6FBF1ADF89761F600027FD0493241EB3E1830DA69
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog
                                      • String ID: Incorrect switch postfix:$Multiple instances for switch:$Too long switch:$Too short switch:$Unknown switch:
                                      • API String ID: 3519838083-2104980125
                                      • Opcode ID: 939d9dd5dfe706750911b410f5a9badb0fb4dd8201800066082cbf673cc68056
                                      • Instruction ID: 801a60c05f7d27c0b30539d6495d90dca1c7defda93e75e34d4a3a70a0fcaa99
                                      • Opcode Fuzzy Hash: 939d9dd5dfe706750911b410f5a9badb0fb4dd8201800066082cbf673cc68056
                                      • Instruction Fuzzy Hash: C051B330A002569FCF24DF14CA88AAEBBB1BF11304F5444AFD845BB2D2D7BA9D41CB59
                                      APIs
                                      • EnterCriticalSection.KERNEL32(00430538), ref: 0041062E
                                      • fputs.MSVCRT ref: 0041066D
                                      • fputs.MSVCRT ref: 00410692
                                      • LeaveCriticalSection.KERNEL32(00430538), ref: 0041072E
                                      Strings
                                      • with the file from archive:, xrefs: 0041068D
                                      • Would you like to replace the existing file:, xrefs: 00410668
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: CriticalSectionfputs$EnterLeave
                                      • String ID: Would you like to replace the existing file:$with the file from archive:
                                      • API String ID: 3346953513-686978020
                                      • Opcode ID: ff04ac6ed1f533fd7777a74cc65d11423ec9600f7fec2d7fbf7f7cc178b0eb7c
                                      • Instruction ID: 8d30f5c3a769b9b05dc9022ead1e570209d6b32d37c02158444c586a9a64ffd4
                                      • Opcode Fuzzy Hash: ff04ac6ed1f533fd7777a74cc65d11423ec9600f7fec2d7fbf7f7cc178b0eb7c
                                      • Instruction Fuzzy Hash: 2A317F75200204DBDB11AF25D940BDA77E1EF88314F11416BF92A97291CBB9ACE2CF5D
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 00410FA7
                                      • fputs.MSVCRT ref: 00410FC0
                                        • Part of subcall function 00403E56: __EH_prolog.LIBCMT ref: 00403E5B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog$fputs
                                      • String ID: Cannot open the file$The archive is open with offset$The file is open$WARNING:
                                      • API String ID: 3822167597-1259944392
                                      • Opcode ID: 3769bc2594a60d947f324f43e162f9542d25cae14344e564b9194a4f14147df9
                                      • Instruction ID: 2fe33cfd7bd924c02116d12d6cc5e0899d97df651c7911a456f6b34765396213
                                      • Opcode Fuzzy Hash: 3769bc2594a60d947f324f43e162f9542d25cae14344e564b9194a4f14147df9
                                      • Instruction Fuzzy Hash: 6921C431B00511DFCB14EF65D542AAEBBB4EF48345B80442FE602E7691CB3DADC68B49
                                      APIs
                                      • fputs.MSVCRT ref: 0041292A
                                        • Part of subcall function 00403CDF: fflush.MSVCRT ref: 00403CE1
                                      • GetStdHandle.KERNEL32(000000F6), ref: 0041293C
                                      • GetConsoleMode.KERNEL32(00000000,00000000), ref: 0041295E
                                      • SetConsoleMode.KERNEL32(00000000,00000000), ref: 0041296F
                                      • SetConsoleMode.KERNEL32(00000000,00000000), ref: 0041298F
                                      Strings
                                      • Enter password (will not be echoed):, xrefs: 00412925
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: ConsoleMode$Handlefflushfputs
                                      • String ID: Enter password (will not be echoed):
                                      • API String ID: 108775803-3720017889
                                      • Opcode ID: 25c804d01db33c1ab0bc5cb966c29544ee48e5892db4f5b428a53a560feb2906
                                      • Instruction ID: 06c9a69e81cbb5c5db69f777e7cc9e6c7d4d2dc80c9e68aa15962718b8ebadc6
                                      • Opcode Fuzzy Hash: 25c804d01db33c1ab0bc5cb966c29544ee48e5892db4f5b428a53a560feb2906
                                      • Instruction Fuzzy Hash: 21110A76B041196BDB115BA99D056EEBFB9AF81724F14416BE810F32D0CB780D51CB9C
                                      APIs
                                      • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00405B4D
                                      • GetProcAddress.KERNEL32(00000000,FindFirstStreamW), ref: 00405B61
                                      • GetProcAddress.KERNEL32(00000000,FindNextStreamW), ref: 00405B6E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: AddressProc$HandleModule
                                      • String ID: FindFirstStreamW$FindNextStreamW$kernel32.dll
                                      • API String ID: 667068680-4044117955
                                      • Opcode ID: 209bc51a69cd21a9cb9a554d552f349016e7f251f682d818fccc93cde8e55180
                                      • Instruction ID: 993e4fd1b4b43a4bdfd4fb802b812d309aec3832960eb3898a326147e7614a50
                                      • Opcode Fuzzy Hash: 209bc51a69cd21a9cb9a554d552f349016e7f251f682d818fccc93cde8e55180
                                      • Instruction Fuzzy Hash: 74E0C231B043246BD3104BAABC89877FEECEAC4760760017BB509E3260E6F82C028F5D
                                      APIs
                                      • memcmp.MSVCRT(?,0042BB50,00000010), ref: 00407A34
                                      • memcmp.MSVCRT(?,004291F8,00000010), ref: 00407A51
                                      • memcmp.MSVCRT(?,004291D8,00000010), ref: 00407A64
                                      • memcmp.MSVCRT(?,00429218,00000010), ref: 00407A77
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: memcmp
                                      • String ID:
                                      • API String ID: 1475443563-0
                                      • Opcode ID: 1906f6f9a3bc8567207bf16f5b12049dd60c52ce4a1937d7281cae0f19a5e01e
                                      • Instruction ID: 09fc6409721d384321c9daad9889d0c59f869200ca07e15681de2c6d8400d0c6
                                      • Opcode Fuzzy Hash: 1906f6f9a3bc8567207bf16f5b12049dd60c52ce4a1937d7281cae0f19a5e01e
                                      • Instruction Fuzzy Hash: 1721A372B442156BE7008A15AC82F7F33AC9A50754B54852AFD05E7381F678EE009AAB
                                      APIs
                                      • EnterCriticalSection.KERNEL32(00430538), ref: 00410C02
                                      • fputs.MSVCRT ref: 00410CA2
                                      • fputs.MSVCRT ref: 00410CBB
                                      • LeaveCriticalSection.KERNEL32(00430538), ref: 00410CFD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: CriticalSectionfputs$EnterLeave
                                      • String ID: :
                                      • API String ID: 3346953513-3653984579
                                      • Opcode ID: 8b3c42645f9caea0802aa794edd836212cfb1d2fd3be4aacd33e6040b09cc957
                                      • Instruction ID: 09d9808faf5bd919de83ef7c98426f172d115119e5f1a576890054117d399c7e
                                      • Opcode Fuzzy Hash: 8b3c42645f9caea0802aa794edd836212cfb1d2fd3be4aacd33e6040b09cc957
                                      • Instruction Fuzzy Hash: EC319C31500208DFD714EF65D894EDAB7B4FF44318F50826FE81A9B252DB78A980CF58
                                      APIs
                                      • GetVersion.KERNEL32(00411EE8), ref: 0041EB90
                                      • GetModuleHandleW.KERNEL32(kernel32.dll,SetDefaultDllDirectories), ref: 0041EBA6
                                      • GetProcAddress.KERNEL32(00000000), ref: 0041EBAD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: AddressHandleModuleProcVersion
                                      • String ID: SetDefaultDllDirectories$kernel32.dll
                                      • API String ID: 3310240892-2102062458
                                      • Opcode ID: 612a3b4ddb9acc66ff93ecbb857bc4bfeff86ee96ca2284e8fffde39a6173eaf
                                      • Instruction ID: 0862184ad8ba24335b569b053d5d12c6817f75253087d21a0b209ed3f2b8ea95
                                      • Opcode Fuzzy Hash: 612a3b4ddb9acc66ff93ecbb857bc4bfeff86ee96ca2284e8fffde39a6173eaf
                                      • Instruction Fuzzy Hash: 27C01234B4421D96DB2417A5AD0DF963666E7C4702FD80062BD03D00E4CF789982C61C
                                      APIs
                                      • WideCharToMultiByte.KERNEL32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,00000000), ref: 004040EE
                                      • GetLastError.KERNEL32(?,00000000,?,?,?,00000000), ref: 004040F7
                                      • _CxxThrowException.MSVCRT(?,0042C050), ref: 00404115
                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,?,00000001,00000001,?,00000000,?,?), ref: 0040417C
                                      • _CxxThrowException.MSVCRT(0000FDE9,0042C050), ref: 004041A4
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: ByteCharExceptionMultiThrowWide$ErrorLast
                                      • String ID:
                                      • API String ID: 2296236218-0
                                      • Opcode ID: cfd6c78358ac07a3c2f5c7783267483c925d2c8b350aec6f244fbd3ed4ca990f
                                      • Instruction ID: ddf483936085a76ef41ae3a6c868e145893958370a6de898f5c65fa482b2d003
                                      • Opcode Fuzzy Hash: cfd6c78358ac07a3c2f5c7783267483c925d2c8b350aec6f244fbd3ed4ca990f
                                      • Instruction Fuzzy Hash: 8631E3B1604205BFDB11CFA4CC85BBEBBF8AF55344F10806AE544EB280C7789D85CBA4
                                      APIs
                                      • memcmp.MSVCRT(?,0042BB50,00000010), ref: 004147AB
                                      • memcmp.MSVCRT(?,004293D8,00000010), ref: 004147C8
                                      • memcmp.MSVCRT(?,004294A8,00000010), ref: 004147DB
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: memcmp
                                      • String ID:
                                      • API String ID: 1475443563-0
                                      • Opcode ID: d1d27eebe698f95dafb466b7f552e0a33d146d414f17f5489ccea16cbcc13696
                                      • Instruction ID: ab4dab2fae12ce32b20b6cfbf363ba4071ac0056bfb13e88cb7f35a40cc3fbe5
                                      • Opcode Fuzzy Hash: d1d27eebe698f95dafb466b7f552e0a33d146d414f17f5489ccea16cbcc13696
                                      • Instruction Fuzzy Hash: B221C576B00215ABE700AE15EC82FBB73A89BA07A4F14412AFD05DB341E678DD4146AA
                                      APIs
                                        • Part of subcall function 00407455: GetSystemTimeAsFileTime.KERNEL32(?,004059CA,00000000,00000000,?,?,?,?,?,?,?,?,?,0040C681,?,00000010), ref: 00407456
                                      • SetLastError.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,0040C681,?,00000010,00000000), ref: 004059E8
                                      • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,?,0040C681,?,00000010,00000000,00000000), ref: 004059EC
                                      • GetFileInformationByHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0040C681,?,00000010,00000000,00000000), ref: 00405A00
                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,0040C681,?,00000010,00000000,00000000), ref: 00405A58
                                      • SetLastError.KERNEL32(00000006,?,?,?,?,?,?,?,?,0040C681,?,00000010,00000000,00000000), ref: 00405A64
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: ErrorLast$FileHandleTime$InformationSystem
                                      • String ID:
                                      • API String ID: 1030185623-0
                                      • Opcode ID: 491123aa0d19b53963d0ba5624d9c6b6f027d198acf0d456067b5beaa04c73dd
                                      • Instruction ID: 43247151832c92c783002a763622c32ca72b9f62b1d40b072dcd93f988fba4cd
                                      • Opcode Fuzzy Hash: 491123aa0d19b53963d0ba5624d9c6b6f027d198acf0d456067b5beaa04c73dd
                                      • Instruction Fuzzy Hash: 9421F774A00B059FCB20DF69D885A5BBBF4FF08320B10462AE569E3790E734E905CF54
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: fputs$H_prolog
                                      • String ID: =
                                      • API String ID: 2614055831-2525689732
                                      • Opcode ID: 6c471a2ef6530a59ec5113148ca7b72510f446cde176fcdeb89754153c16460e
                                      • Instruction ID: 1b0edf4538b9036d1089c6cef4bedea74b82e6cb5f1a31546f15677c97918bcb
                                      • Opcode Fuzzy Hash: 6c471a2ef6530a59ec5113148ca7b72510f446cde176fcdeb89754153c16460e
                                      • Instruction Fuzzy Hash: EA219F32900118AFDF05EB95D842BEDBBB5AF44319F20402FE401721A1EB792E81CB98
                                      APIs
                                      • memcmp.MSVCRT(?,0042BB50,00000010), ref: 0040FC76
                                      • memcmp.MSVCRT(?,00429278,00000010), ref: 0040FC91
                                      • memcmp.MSVCRT(?,004292A8,00000010), ref: 0040FCA5
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: memcmp
                                      • String ID:
                                      • API String ID: 1475443563-0
                                      • Opcode ID: a693b106da1646162e2325d0c3da7007423092edf42d73c4806106454a0f5857
                                      • Instruction ID: b4b8cbf5b466e02db0d24476debb83d958eff9c092edf636f16ca7dc42c6bbb7
                                      • Opcode Fuzzy Hash: a693b106da1646162e2325d0c3da7007423092edf42d73c4806106454a0f5857
                                      • Instruction Fuzzy Hash: 75112932740209A7E7204A15EC43FBA33A45F54710F54453BFD46EB3C1F679E804569E
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000), ref: 0040402D
                                      • GetLastError.KERNEL32(?,?,00000000,00000000), ref: 00404036
                                      • _CxxThrowException.MSVCRT(?,0042C050), ref: 00404050
                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,?,?,?,?,00000000,00000000), ref: 00404075
                                      • _CxxThrowException.MSVCRT(?,0042C050), ref: 0040408B
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: ByteCharExceptionMultiThrowWide$ErrorLast
                                      • String ID:
                                      • API String ID: 2296236218-0
                                      • Opcode ID: bdd5df10d88c5e80083a4577c3421ebdd7ddd51eeeca16ae066f61805f11393e
                                      • Instruction ID: 4ac132360325015ebd2c62f9aad36c2b8b5ce9f4421ab3691f6160e0cd77abd7
                                      • Opcode Fuzzy Hash: bdd5df10d88c5e80083a4577c3421ebdd7ddd51eeeca16ae066f61805f11393e
                                      • Instruction Fuzzy Hash: 49110DB5200505BFD720DF65DC81E6BB7EDFF88384B50812AEA19E7240D775AD418BA8
                                      APIs
                                        • Part of subcall function 00405A6D: FindClose.KERNELBASE(00000000,000000FF,00405A9E), ref: 00405A78
                                      • SetLastError.KERNEL32(00000078), ref: 00405B9B
                                      • SetLastError.KERNEL32(00000000), ref: 00405BA5
                                      • FindFirstStreamW.KERNELBASE(?,00000000,?,00000000), ref: 00405BB9
                                      • GetLastError.KERNEL32 ref: 00405BC6
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: ErrorLast$Find$CloseFirstStream
                                      • String ID:
                                      • API String ID: 4071060300-0
                                      • Opcode ID: 2749851167958df2b69f257e2b4f0fabe59ec9884642ac4421954b3e0dc01f9e
                                      • Instruction ID: 8b1c33bf5c767727a663e7b38ed12da21a1870170c7a8d394256995f507f3ca5
                                      • Opcode Fuzzy Hash: 2749851167958df2b69f257e2b4f0fabe59ec9884642ac4421954b3e0dc01f9e
                                      • Instruction Fuzzy Hash: B8F08C30104A099BCB306F24DC09BAB3375EB10325F204276E552BA1E0EA78BD86CF69
                                      APIs
                                      • ResetEvent.KERNEL32(?,00409399,?,00413510,?,?), ref: 00424723
                                      • GetLastError.KERNEL32(?,00413510,?,?), ref: 00424730
                                      • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,00409399,?,00413510,?,?), ref: 0042474B
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: Event$CreateErrorLastReset
                                      • String ID:
                                      • API String ID: 3053278375-0
                                      • Opcode ID: ad2609b926203c852762c17253ddc8a92b970ffd877e63c396e861917d5cc8ee
                                      • Instruction ID: 69587264c1ca5cd8272a9dfa6d0881f87e04865dcef00d1d77fbe5789d4fff4d
                                      • Opcode Fuzzy Hash: ad2609b926203c852762c17253ddc8a92b970ffd877e63c396e861917d5cc8ee
                                      • Instruction Fuzzy Hash: 0BF030743003159BE7305F34AD08B633994EBC2B42FD0047AB915DA2D0EB6DC842DA5C
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 0040E405
                                        • Part of subcall function 00406F66: VariantClear.OLEAUT32(?), ref: 00406F88
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: ClearH_prologVariant
                                      • String ID: Unknown error$Unknown warning
                                      • API String ID: 1166855276-4291957651
                                      • Opcode ID: b83380f3ee18b6f9f934a345221d735d3a38ddd69aefc5361ffd61519bd1e1f7
                                      • Instruction ID: e2c51ea3c9d5ff53c368fc9fea119ca8137ad16915fe70a45aa60a70686436fe
                                      • Opcode Fuzzy Hash: b83380f3ee18b6f9f934a345221d735d3a38ddd69aefc5361ffd61519bd1e1f7
                                      • Instruction Fuzzy Hash: C58147B1A00709DBCB10DFA6C5809EEB7F0FF58308F50896EE456A7290D779AE14CB58
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: wcscmp
                                      • String ID: UNC
                                      • API String ID: 3392835482-337201128
                                      • Opcode ID: 0f50e1a4b89f9bb1c8fdf0474285ed29ed5cb079e505af0e673f1010bac49f26
                                      • Instruction ID: d4f1103d63d9ba93538f6336bbde5048e2c91832e0775446ecdb83d365754428
                                      • Opcode Fuzzy Hash: 0f50e1a4b89f9bb1c8fdf0474285ed29ed5cb079e505af0e673f1010bac49f26
                                      • Instruction Fuzzy Hash: E9215CB53006019FD724CE48D984A2AB3E5EB85350B64847BE645AF3D1C63AEC42CF88
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: __aulldivstrlen
                                      • String ID: M
                                      • API String ID: 1892184250-3664761504
                                      • Opcode ID: 5cb360c24d34eea26afc0b9a41df7248fd98ee7fc509eed417d6c7d163f83f1e
                                      • Instruction ID: 4c523177f86cd1d8441d7e59bba430fadbe405382aa8792db896841e4d0aaa05
                                      • Opcode Fuzzy Hash: 5cb360c24d34eea26afc0b9a41df7248fd98ee7fc509eed417d6c7d163f83f1e
                                      • Instruction Fuzzy Hash: 41113D323006546BDF25DAA5C945FBF77E99B88314F14482FE287D71C1D9B8AC458328
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: H_prolog
                                      • String ID: 0$x
                                      • API String ID: 3519838083-1948001322
                                      • Opcode ID: 22b041c608f5a5e13fb34e29759c105454cba705c22a6f84aeb62827a4a014bc
                                      • Instruction ID: e1ee27c14022c3c4861809de81e0fb68f5ccf3bdc354b16ac99790b939c913b1
                                      • Opcode Fuzzy Hash: 22b041c608f5a5e13fb34e29759c105454cba705c22a6f84aeb62827a4a014bc
                                      • Instruction Fuzzy Hash: 99218E32D0011A9BCF04EB99D6866EEB7B5EF48308F50006FE401772C1DBB95E45CBA9
                                      APIs
                                      Strings
                                      • Cannot open the file as archive, xrefs: 00411E56
                                      • Cannot open encrypted archive. Wrong password?, xrefs: 00411E1E
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: fputs
                                      • String ID: Cannot open encrypted archive. Wrong password?$Cannot open the file as archive
                                      • API String ID: 1795875747-1623556331
                                      • Opcode ID: 903e6ea9d750758cf79017287e50944535a56994a1adf74cb8bda59e51e8e830
                                      • Instruction ID: 0cf7914edf2aa8e7341596000c12c1df42a57dbecb04f7ec900b94d22c574bf8
                                      • Opcode Fuzzy Hash: 903e6ea9d750758cf79017287e50944535a56994a1adf74cb8bda59e51e8e830
                                      • Instruction Fuzzy Hash: C9012B313043004BDA14ABA6D494BBEB3ABEFC8305F54442FE90297691DB79A841CB49
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: fputs
                                      • String ID: =
                                      • API String ID: 1795875747-2525689732
                                      • Opcode ID: 0147c7e87789d73289e91d10756a9f56ae187d6ee00c8b5ffa58ce0ff1850403
                                      • Instruction ID: fd7b5fc4074da5f726c61a76c532ff66209f63a2db578f74099ff53049078f53
                                      • Opcode Fuzzy Hash: 0147c7e87789d73289e91d10756a9f56ae187d6ee00c8b5ffa58ce0ff1850403
                                      • Instruction Fuzzy Hash: F9E06832B001165BDF00A7A9DC048BE3F29EB803407800833E92083240E734D821CBD9
                                      APIs
                                      • memcmp.MSVCRT(?,0042BB50,00000010), ref: 0040959F
                                      • memcmp.MSVCRT(?,00429298,00000010), ref: 004095B3
                                      • memcmp.MSVCRT(?,004293A8,00000010), ref: 004095D1
                                      • memcmp.MSVCRT(?,004293C8,00000010), ref: 004095EF
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: memcmp
                                      • String ID:
                                      • API String ID: 1475443563-0
                                      • Opcode ID: 80e00aac9ef1727003516d7c20b7c01282fa0a3255e32e4d8766d31eaa877d50
                                      • Instruction ID: c938bc79dae6d3baf006416a7562a1e2610761fca94207467e88f97749ed857f
                                      • Opcode Fuzzy Hash: 80e00aac9ef1727003516d7c20b7c01282fa0a3255e32e4d8766d31eaa877d50
                                      • Instruction Fuzzy Hash: 7111E132740305ABD7048A15EC42FAA33A45B94711F15493AFD45EB3C2E6B9ED10969D
                                      APIs
                                      • memcmp.MSVCRT(?,0042BB50,00000010), ref: 00401C55
                                      • memcmp.MSVCRT(?,00429598,00000010), ref: 00401C70
                                      • memcmp.MSVCRT(?,004295A8,00000010), ref: 00401C84
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: memcmp
                                      • String ID:
                                      • API String ID: 1475443563-0
                                      • Opcode ID: 6d1a407f022db9f2e5c143e4d34420cd98d487bfa406f32ca3a087a793df4ed1
                                      • Instruction ID: 1bb52f204ec3132851ce200ba376ef9f6e02923974aa5b90121e92a54bb61859
                                      • Opcode Fuzzy Hash: 6d1a407f022db9f2e5c143e4d34420cd98d487bfa406f32ca3a087a793df4ed1
                                      • Instruction Fuzzy Hash: 0C01E1327803156BE7104A15DC82FBA33A48B54761F54453EFE45FB392E2B8E840969D
                                      APIs
                                      • memcmp.MSVCRT(?,0042BB50,00000010), ref: 0040BDC7
                                      • memcmp.MSVCRT(?,004291F8,00000010), ref: 0040BDE2
                                      • memcmp.MSVCRT(?,004291D8,00000010), ref: 0040BDF6
                                      • memcmp.MSVCRT(?,00429218,00000010), ref: 0040BE0A
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2153346139.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000003.00000002.2153201879.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2153885828.0000000000429000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154328143.0000000000430000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000003.00000002.2154371891.0000000000437000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_400000_99e5df4d8.jbxd
                                      Similarity
                                      • API ID: memcmp
                                      • String ID:
                                      • API String ID: 1475443563-0
                                      • Opcode ID: 2f98c186718bde587d544e52970a976abc0dd2256160a2195ffc1d90ca2aabb8
                                      • Instruction ID: e040212cbf1a7ccb1c558fc37de72ae02c15694fc619d7ee7d70c4cf786e1ef4
                                      • Opcode Fuzzy Hash: 2f98c186718bde587d544e52970a976abc0dd2256160a2195ffc1d90ca2aabb8
                                      • Instruction Fuzzy Hash: 8F01D63274030666D7100A15EC43FBA73A48B54750F54443EFE84EB382E7B8D410469E

                                      Execution Graph

                                      Execution Coverage:0.5%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:5.6%
                                      Total number of Nodes:142
                                      Total number of Limit Nodes:3
                                      execution_graph 37091 7ff7e3be1c60 37092 7ff7e3be1c74 37091->37092 37093 7ff7e3be1dac 37092->37093 37094 7ff7e3be1c7c __scrt_acquire_startup_lock 37092->37094 37120 7ff7e3be20f0 9 API calls 37093->37120 37096 7ff7e3be1db6 37094->37096 37097 7ff7e3be1c9a __scrt_release_startup_lock 37094->37097 37121 7ff7e3be20f0 9 API calls 37096->37121 37101 7ff7e3be1cbf 37097->37101 37102 7ff7e3be1d45 37097->37102 37106 7ff7e3be1d3d _register_thread_local_exe_atexit_callback 37097->37106 37099 7ff7e3be1dc1 37100 7ff7e3be1dc9 _exit 37099->37100 37113 7ff7e3be2238 memset GetStartupInfoW 37102->37113 37104 7ff7e3be1d4a _get_wide_winmain_command_line 37114 7ff7e3bdf710 CoInitializeEx 37104->37114 37106->37102 37107 7ff7e3be1d66 37119 7ff7e3be227c GetModuleHandleW 37107->37119 37109 7ff7e3be1d6d 37109->37099 37110 7ff7e3be1d71 37109->37110 37111 7ff7e3be1d76 _cexit 37110->37111 37112 7ff7e3be1d7b 37110->37112 37111->37112 37112->37101 37113->37104 37115 7ff7e3bdf722 37114->37115 37116 7ff7e3bdf72c GetCommandLineW CommandLineToArgvW 37114->37116 37115->37107 37122 7ff7e3bdf400 37116->37122 37119->37109 37120->37096 37121->37099 37123 7ff7e3bdf573 37122->37123 37124 7ff7e3bdf439 _wcsicmp 37122->37124 37125 7ff7e3bdf453 37123->37125 37126 7ff7e3bdf579 _wcsicmp 37123->37126 37127 7ff7e3bdf44e 37124->37127 37128 7ff7e3bdf458 _wcsicmp 37124->37128 37157 7ff7e3be14a0 37125->37157 37131 7ff7e3bdf676 _wcsicmp 37126->37131 37156 7ff7e3bdf595 37126->37156 37166 7ff7e3bdf160 109 API calls 37127->37166 37129 7ff7e3bdf510 _wcsicmp 37128->37129 37130 7ff7e3bdf471 GetModuleFileNameW LoadTypeLibEx 37128->37130 37136 7ff7e3bdf525 37129->37136 37137 7ff7e3bdf550 _wcsicmp 37129->37137 37146 7ff7e3bdf49d 37130->37146 37131->37125 37133 7ff7e3bdf68f 37131->37133 37133->37125 37141 7ff7e3bdf703 37133->37141 37147 7ff7e3bdf6a0 RegOpenKeyExW 37133->37147 37134 7ff7e3bdf66c 37170 7ff7e3bdbc40 104 API calls 37134->37170 37168 7ff7e3bdb970 10 API calls 37136->37168 37137->37125 37140 7ff7e3bdf569 37137->37140 37169 7ff7e3bdbc40 104 API calls 37140->37169 37171 7ff7e3bdbc40 104 API calls 37141->37171 37142 7ff7e3bdf5b0 GetModuleFileNameW 37142->37125 37142->37156 37144 7ff7e3bdf52c UnRegisterTypeLib 37144->37125 37146->37125 37167 7ff7e3bdb970 10 API calls 37146->37167 37147->37133 37150 7ff7e3bdf6d4 RegDeleteValueW RegCloseKey 37147->37150 37150->37133 37151 7ff7e3bdf56e 37151->37125 37152 7ff7e3bdf5dc RegCreateKeyExW 37152->37125 37154 7ff7e3bdf61f RegSetValueExW RegCloseKey 37152->37154 37153 7ff7e3bdf4b9 37153->37125 37155 7ff7e3bdf4c1 UnRegisterTypeLib 37153->37155 37154->37125 37154->37156 37155->37125 37156->37125 37156->37134 37156->37142 37156->37152 37158 7ff7e3be14a9 37157->37158 37159 7ff7e3bdf4f3 LocalFree CoUninitialize 37158->37159 37160 7ff7e3be1910 IsProcessorFeaturePresent 37158->37160 37159->37107 37161 7ff7e3be1928 37160->37161 37172 7ff7e3be1b08 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 37161->37172 37163 7ff7e3be193b 37173 7ff7e3be18dc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 37163->37173 37166->37125 37167->37153 37168->37144 37169->37151 37170->37151 37171->37151 37172->37163 37174 7ffd944e10a0 37177 7ffd944e3c00 37174->37177 37176 7ffd944e10c0 shared_ptr 37178 7ffd944e3c1b 37177->37178 37181 7ffd944e8560 37178->37181 37180 7ffd944e3c94 37180->37176 37193 7ffd944e6780 37181->37193 37186 7ffd944e85ab 37187 7ffd944e85b8 37186->37187 37204 7ffd944eafe0 _lock_locales _unlock_locales tidy_global 37186->37204 37187->37180 37189 7ffd944e85c8 std::ios_base::Init::_Init_dtor 37205 7ffd944e488c 19 API calls std::ios_base::failure::failure 37189->37205 37191 7ffd944e8608 _CxxThrowException 37192 7ffd944e8622 37191->37192 37192->37180 37206 7ffd944e6ce0 37193->37206 37195 7ffd944e67c0 37216 7ffd94531b5c 37195->37216 37198 7ffd944e67d9 37200 7ffd944e9450 37198->37200 37201 7ffd944e9479 37200->37201 37230 7ffd944e3a64 37201->37230 37204->37187 37205->37191 37207 7ffd944e6cf1 37206->37207 37208 7ffd944e6cf7 std::ios_base::Init::_Init_dtor 37206->37208 37207->37195 37226 7ffd944e488c 19 API calls std::ios_base::failure::failure 37208->37226 37210 7ffd944e6d39 _CxxThrowException 37211 7ffd944e6d50 37210->37211 37211->37195 37212 7ffd944e6d6e _CxxThrowException 37211->37212 37213 7ffd944e6d78 std::ios_base::Init::_Init_dtor 37211->37213 37212->37213 37227 7ffd944e488c 19 API calls std::ios_base::failure::failure 37213->37227 37215 7ffd944e6dba _CxxThrowException 37217 7ffd94531b76 malloc 37216->37217 37218 7ffd944e67ca 37217->37218 37219 7ffd94531b67 37217->37219 37218->37198 37225 7ffd944f1740 10 API calls 4 library calls 37218->37225 37219->37217 37220 7ffd94531b86 37219->37220 37221 7ffd94531b91 37220->37221 37228 7ffd94519590 _CxxThrowException Concurrency::cancel_current_task 37220->37228 37229 7ffd944e69e8 _CxxThrowException std::bad_alloc::bad_alloc 37221->37229 37225->37198 37226->37210 37227->37215 37249 7ffd94515fb0 37230->37249 37232 7ffd944e3a7e 37233 7ffd94515fb0 tidy_global _lock_locales 37232->37233 37239 7ffd944e3acd 37232->37239 37234 7ffd944e3aa3 37233->37234 37263 7ffd94516050 _unlock_locales 37234->37263 37235 7ffd944e3b1a 37265 7ffd94516050 _unlock_locales 37235->37265 37237 7ffd944e3b65 37237->37186 37237->37189 37239->37235 37252 7ffd944e6020 37239->37252 37242 7ffd944e3b32 37264 7ffd944f16f8 _CxxThrowException _CxxThrowException malloc std::locale::_Locimp::_New_Locimp 37242->37264 37243 7ffd944e3b73 37266 7ffd944e6a08 _CxxThrowException free free std::bad_alloc::bad_alloc 37243->37266 37250 7ffd94515fbf _lock_locales 37249->37250 37251 7ffd94515fc7 37249->37251 37250->37251 37251->37232 37253 7ffd944e3b2c 37252->37253 37254 7ffd944e604f 37252->37254 37253->37242 37253->37243 37254->37253 37255 7ffd94531b5c std::locale::_Locimp::_New_Locimp 3 API calls 37254->37255 37257 7ffd944e6060 37255->37257 37256 7ffd944e60c7 37256->37253 37277 7ffd944e4dd0 7 API calls 37256->37277 37257->37256 37267 7ffd944e4500 37257->37267 37263->37239 37264->37235 37265->37237 37268 7ffd94515fb0 tidy_global _lock_locales 37267->37268 37269 7ffd944e451c 37268->37269 37270 7ffd944e456a 37269->37270 37271 7ffd944e4550 37269->37271 37283 7ffd945196c0 __std_exception_copy _CxxThrowException 37270->37283 37278 7ffd944f1860 setlocale 37271->37278 37275 7ffd944e4576 37284 7ffd944e4f00 37278->37284 37281 7ffd944f1899 setlocale 37282 7ffd944f18a7 37281->37282 37283->37275 37285 7ffd944e4f65 37284->37285 37286 7ffd944e4f1d 37284->37286 37285->37281 37285->37282 37287 7ffd944e4f28 37286->37287 37288 7ffd944e4f22 free 37286->37288 37287->37285 37289 7ffd944e4f41 malloc 37287->37289 37288->37287 37289->37285 37290 7ffd944e4f56 memcpy 37289->37290 37290->37285

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: __scrt_acquire_startup_lock__scrt_get_show_window_mode__scrt_release_startup_lock_cexit_exit_get_wide_winmain_command_line_register_thread_local_exe_atexit_callback
                                      • String ID:
                                      • API String ID: 2671446237-0
                                      • Opcode ID: ec5abd4061dcf22de5515a52abec68c9ce79071f04010aeef17c3c0f92359f81
                                      • Instruction ID: 36709dfd571e424d158ea7202aef160c3c3e7c681a541fbebcec8f29df1a6220
                                      • Opcode Fuzzy Hash: ec5abd4061dcf22de5515a52abec68c9ce79071f04010aeef17c3c0f92359f81
                                      • Instruction Fuzzy Hash: 91311A21E0920A45EAD4BB6ED4523B9BB919F81344FD44636D58FEB2D3DE7CA4048223

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ExceptionThrowstd::ios_base::failure::failure
                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                      • API String ID: 2003779279-1866435925
                                      • Opcode ID: 3922031971dd58f53ba93548a128d67857b803b0b7c7b7364a86a24539dcf903
                                      • Instruction ID: c24567d4aafe53d830d4e55fda2edc2e4dc9b0e8898003c29e6e5a48aaa74abc
                                      • Opcode Fuzzy Hash: 3922031971dd58f53ba93548a128d67857b803b0b7c7b7364a86a24539dcf903
                                      • Instruction Fuzzy Hash: 0C21B062B0864692EE658B90E5A13BB2360FB527C4F848431E64D47A9BDF7CE1A1C340

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CommandLine$ArgvFreeInitializeLocalUninitialize
                                      • String ID:
                                      • API String ID: 414636379-0
                                      • Opcode ID: 9a8f806c77a32fb40d03d2c5a65f5961ac5affaeb25bfab2df8612784e8540e9
                                      • Instruction ID: e8ad6c5c27a1d949ce4e1cb4ab2d98a923517553794d999f1474da11b64dac19
                                      • Opcode Fuzzy Hash: 9a8f806c77a32fb40d03d2c5a65f5961ac5affaeb25bfab2df8612784e8540e9
                                      • Instruction Fuzzy Hash: 92F06225F1864183DB40BB26E84422AB7A1FF98781FC40136D9CF97718DF3CD0048611

                                      Control-flow Graph

                                      APIs
                                      • setlocale.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E455B,?,?,?,00007FFD944E5C51), ref: 00007FFD944F1874
                                        • Part of subcall function 00007FFD944E4F00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FFD944F1894,?,?,?,00007FFD944E455B,?,?,?,00007FFD944E5C51), ref: 00007FFD944E4F22
                                        • Part of subcall function 00007FFD944E4F00: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FFD944F1894,?,?,?,00007FFD944E455B,?,?,?,00007FFD944E5C51), ref: 00007FFD944E4F48
                                        • Part of subcall function 00007FFD944E4F00: memcpy.VCRUNTIME140(?,?,?,00007FFD944F1894,?,?,?,00007FFD944E455B,?,?,?,00007FFD944E5C51), ref: 00007FFD944E4F60
                                      • setlocale.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E455B,?,?,?,00007FFD944E5C51), ref: 00007FFD944F189E
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: setlocale$freemallocmemcpy
                                      • String ID:
                                      • API String ID: 1663771476-0
                                      • Opcode ID: 8d6757bba07d167be6db75c39264780bdcd379d6cb1bae6446b4cf5204bdf0b0
                                      • Instruction ID: 7316087ad570dabda34ed905a74e76759129bc51748e2df3bec3809adc4a598c
                                      • Opcode Fuzzy Hash: 8d6757bba07d167be6db75c39264780bdcd379d6cb1bae6446b4cf5204bdf0b0
                                      • Instruction Fuzzy Hash: B5F09621B0464292EF6A8FD2E5E40B69352EF45B80B8CC4398A0D4775AFE2CE054C300

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 00007FFD94515FB0: _lock_locales.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,7FFFFFFFFFFFFFFF,00007FFD944E3966,?,?,?,7FFFFFFFFFFFFFFF), ref: 00007FFD94515FBF
                                      • std::_Facet_Register.LIBCPMT ref: 00007FFD944E3B3F
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Facet_Register_lock_localesstd::_
                                      • String ID:
                                      • API String ID: 3986400115-0
                                      • Opcode ID: 389548114120814b7aa6b6b53f58aa35cad2e99b738acfb6396b45dc8f77983f
                                      • Instruction ID: e1e4664c2bb6317c7283056fd1e5da088cb2a169ad95044476eb8960dbf8a57c
                                      • Opcode Fuzzy Hash: 389548114120814b7aa6b6b53f58aa35cad2e99b738acfb6396b45dc8f77983f
                                      • Instruction Fuzzy Hash: 2331B361B09A4585EA76DBD5E4E027B6361EF46BA0F488131DE0D0739BDFBCE442C700

                                      Control-flow Graph

                                      APIs
                                      • HeapAlloc.KERNEL32(?,?,00000000,00007FFDA358CE76,?,?,?,00007FFDA358EF69,?,?,?,?,00007FFDA358E1FC), ref: 00007FFDA358F0A9
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189862502.00007FFDA3561000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3560000, based on PE: true
                                      • Associated: 00000005.00000002.2189849486.00007FFDA3560000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189887154.00007FFDA359D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189902000.00007FFDA35A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189916777.00007FFDA35AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189916777.00007FFDA35AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189942387.00007FFDA35B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189955378.00007FFDA35B3000.00000020.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2190056184.00007FFDA373C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda3560000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: AllocHeap
                                      • String ID:
                                      • API String ID: 4292702814-0
                                      • Opcode ID: aa91aeab73d5e836095c1d7a866754a155a1d392816a509f502024a330992be0
                                      • Instruction ID: 2d8339afa00e67d5d68616a93cc3b0459d4bb1dd837415b03d7214bc3acf59d1
                                      • Opcode Fuzzy Hash: aa91aeab73d5e836095c1d7a866754a155a1d392816a509f502024a330992be0
                                      • Instruction Fuzzy Hash: B2F06245F1B2038BFE5756AEA9353B552925F4CB80F8C4436C90FA63D3ED1EE4406259

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 890 7ff7e3bdbc40-7ff7e3bdbca1 RegOpenKeyExW 891 7ff7e3bdbca3-7ff7e3bdbca6 890->891 892 7ff7e3bdbcab-7ff7e3bdbcf5 RegQueryInfoKeyW 890->892 893 7ff7e3bdc04b 891->893 894 7ff7e3bdbcf7 892->894 895 7ff7e3bdbd09-7ff7e3bdbd24 malloc 892->895 896 7ff7e3bdc04e-7ff7e3bdc07d call 7ff7e3be14a0 893->896 897 7ff7e3bdbcfc-7ff7e3bdbd04 RegCloseKey 894->897 895->894 898 7ff7e3bdbd26-7ff7e3bdbd46 895->898 897->896 900 7ff7e3bdbd4c 898->900 901 7ff7e3bdbea7-7ff7e3bdbeb8 free 898->901 905 7ff7e3bdbd50-7ff7e3bdbd99 RegEnumValueW 900->905 902 7ff7e3bdbecd-7ff7e3bdbed0 901->902 903 7ff7e3bdbeba-7ff7e3bdbec8 call 7ff7e3bdbac0 901->903 909 7ff7e3bdbed6-7ff7e3bdbf0c RegCloseKey RegOpenKeyExW 902->909 910 7ff7e3bdbffa-7ff7e3bdc014 call 7ff7e3bdbac0 902->910 903->902 906 7ff7e3bdbd9f-7ff7e3bdbda4 905->906 907 7ff7e3bdbe9b-7ff7e3bdbea1 905->907 906->907 911 7ff7e3bdbdaa-7ff7e3bdbdbd 906->911 907->901 907->905 909->891 912 7ff7e3bdbf12-7ff7e3bdbf94 memset VerSetConditionMask * 3 VerifyVersionInfoW 909->912 910->897 925 7ff7e3bdc01a-7ff7e3bdc036 RegSetValueExW 910->925 914 7ff7e3bdbdbf-7ff7e3bdbdc4 911->914 915 7ff7e3bdbde8-7ff7e3bdbded 911->915 916 7ff7e3bdbfe6-7ff7e3bdbff8 SHDeleteKeyW 912->916 917 7ff7e3bdbf96-7ff7e3bdbfa9 LoadLibraryW 912->917 914->907 919 7ff7e3bdbdca-7ff7e3bdbddc 914->919 920 7ff7e3bdbdef-7ff7e3bdbe05 memcpy 915->920 921 7ff7e3bdbe0a-7ff7e3bdbe1a GetFileVersionInfoSizeW 915->921 924 7ff7e3bdc03c 916->924 922 7ff7e3bdbfdb-7ff7e3bdbfe4 FreeLibrary 917->922 923 7ff7e3bdbfab-7ff7e3bdbfbe GetProcAddress 917->923 927 7ff7e3bdbde2 919->927 928 7ff7e3bdc07e-7ff7e3bdc09c call 7ff7e3be19e4 919->928 920->907 921->907 930 7ff7e3bdbe1c-7ff7e3bdbe2a malloc 921->930 926 7ff7e3bdc03e-7ff7e3bdc049 RegCloseKey 922->926 923->922 929 7ff7e3bdbfc0-7ff7e3bdbfd9 923->929 924->926 925->924 926->893 927->915 937 7ff7e3bdc09e-7ff7e3bdc0a8 928->937 938 7ff7e3bdc0a9-7ff7e3bdc0b9 928->938 929->922 930->907 932 7ff7e3bdbe2c-7ff7e3bdbe40 GetFileVersionInfoW 930->932 935 7ff7e3bdbe92-7ff7e3bdbe95 free 932->935 936 7ff7e3bdbe42-7ff7e3bdbe5c VerQueryValueW 932->936 935->907 936->935 939 7ff7e3bdbe5e-7ff7e3bdbe72 936->939 940 7ff7e3bdc0f0-7ff7e3bdc108 938->940 941 7ff7e3bdc0bb-7ff7e3bdc0d0 call 7ff7e3bdc2a0 938->941 939->935 942 7ff7e3bdbe74-7ff7e3bdbe8d memcpy 939->942 946 7ff7e3bdc0d2-7ff7e3bdc0db 941->946 947 7ff7e3bdc0de-7ff7e3bdc0ef 941->947 942->935 946->947
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CloseInfoOpenQuery
                                      • String ID: /REGSERVER$/UNREGSERVER$Advapi32.dll$AppId$RegDeleteKeyExW$Software\Nico Mak Computing\Common\ZipSend$Software\Nico Mak Computing\Common\ZipSend\AppId
                                      • API String ID: 2142960691-1184628555
                                      • Opcode ID: a79cefbbe6a3561b31b1dfadd2e3866cd81819ca879f3cc7d5dc76d7e8797abf
                                      • Instruction ID: 22e4b9861cb61011259cd95350eb51ee3fd27ffb78b655769bf06d56c903246f
                                      • Opcode Fuzzy Hash: a79cefbbe6a3561b31b1dfadd2e3866cd81819ca879f3cc7d5dc76d7e8797abf
                                      • Instruction Fuzzy Hash: C7D17336B08B4586EB90EF26E4503AABBA0FB84784F844136DA8F97758DF3CD545CB11
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: _wcsicmp$CriticalInitializeRegisterSectionType$CloseFileMessageModuleNameObjectValue$ClassCreateDeleteLoadOpenSingleTranslateWait
                                      • String ID: -Embedding$/REGAPP$/REGSERVER$/REPAIR$/UNREGAPP$/UNREGSERVER$Software\Nico Mak Computing\Common\ZipSend\AppId
                                      • API String ID: 2880039950-3586265033
                                      • Opcode ID: 234d11face9fdba306429f545c22b24f333ecc2bed0f17e943854f28972a5889
                                      • Instruction ID: 1c3aff724cb304356b44c020f2f9d40836fb000d0da74b2fb635169348b1d9df
                                      • Opcode Fuzzy Hash: 234d11face9fdba306429f545c22b24f333ecc2bed0f17e943854f28972a5889
                                      • Instruction Fuzzy Hash: CA818231A0C64682EBA0AB26E85437ABB61FF84748FC04133D9CF97665DF7CE5458722
                                      APIs
                                      • InitializeCriticalSection.KERNEL32 ref: 00007FF7E3BDF1BC
                                        • Part of subcall function 00007FF7E3BDFB80: CreateMutexW.KERNEL32 ref: 00007FF7E3BDFB91
                                        • Part of subcall function 00007FF7E3BDFB80: WaitForSingleObject.KERNEL32 ref: 00007FF7E3BDFBA2
                                        • Part of subcall function 00007FF7E3BDFB80: CreateWzExtensionsManager.WXFMANAGER64 ref: 00007FF7E3BDFBB2
                                        • Part of subcall function 00007FF7E3BDFB80: RegOpenKeyExW.ADVAPI32 ref: 00007FF7E3BDFBE0
                                        • Part of subcall function 00007FF7E3BDFB80: RegCloseKey.ADVAPI32 ref: 00007FF7E3BDFBEF
                                        • Part of subcall function 00007FF7E3BDFB80: Init.WXFMANAGER64 ref: 00007FF7E3BDFC13
                                        • Part of subcall function 00007FF7E3BDFB80: ReleaseMutex.KERNEL32 ref: 00007FF7E3BDFC1C
                                        • Part of subcall function 00007FF7E3BDFB80: CloseHandle.KERNEL32 ref: 00007FF7E3BDFC25
                                        • Part of subcall function 00007FF7E3BDA060: RegOpenKeyExW.ADVAPI32 ref: 00007FF7E3BDA09F
                                        • Part of subcall function 00007FF7E3BDA060: RegQueryValueExW.ADVAPI32 ref: 00007FF7E3BDA0D4
                                        • Part of subcall function 00007FF7E3BDA060: RegQueryValueExW.ADVAPI32 ref: 00007FF7E3BDA135
                                        • Part of subcall function 00007FF7E3BDA060: RegCloseKey.ADVAPI32 ref: 00007FF7E3BDA15A
                                        • Part of subcall function 00007FF7E3BE14EC: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E3BE1531,?,?,?,?,00007FF7E3BDC2D3), ref: 00007FF7E3BE1506
                                      • InitializeCriticalSection.KERNEL32 ref: 00007FF7E3BDF213
                                      • InitializeCriticalSection.KERNEL32 ref: 00007FF7E3BDF21D
                                      • CreateEventW.KERNEL32 ref: 00007FF7E3BDF252
                                        • Part of subcall function 00007FF7E3BE01A0: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,00007FF7E3BD3CE8,?,?,?,?,?,?,?), ref: 00007FF7E3BE01BB
                                        • Part of subcall function 00007FF7E3BE01A0: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00007FF7E3BD3CE8,?,?,?,?,?,?,?), ref: 00007FF7E3BE01C5
                                        • Part of subcall function 00007FF7E3BE01A0: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00007FF7E3BD3CE8,?,?,?,?,?,?,?), ref: 00007FF7E3BE01D2
                                      • CoRegisterClassObject.OLE32 ref: 00007FF7E3BDF2F2
                                      • GetMessageW.USER32 ref: 00007FF7E3BDF335
                                      • WaitForSingleObject.KERNEL32 ref: 00007FF7E3BDF349
                                      • TranslateMessage.USER32 ref: 00007FF7E3BDF358
                                      • DispatchMessageW.USER32 ref: 00007FF7E3BDF363
                                      • GetMessageW.USER32 ref: 00007FF7E3BDF376
                                      • CoRevokeClassObject.OLE32 ref: 00007FF7E3BDF387
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CriticalSection$CloseMessageObject$CreateInitialize$ClassDeleteHandleMutexOpenQuerySingleValueWait$DispatchEventExtensionsInitManagerRegisterReleaseRevokeTranslatemalloc
                                      • String ID:
                                      • API String ID: 3066366108-0
                                      • Opcode ID: edd9724d60c9597930c83f56b2443394b2aaec184fea2a6d385fe4db12993e6e
                                      • Instruction ID: 58ec471028439eb16930095f534c43acdb3c4438716bd614dc224b234f97b90f
                                      • Opcode Fuzzy Hash: edd9724d60c9597930c83f56b2443394b2aaec184fea2a6d385fe4db12993e6e
                                      • Instruction Fuzzy Hash: C361C132A18B4681E790AB25F8503A9B7A4FF94B44FC55236DACF96A90DF3CD544C322
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: memchr$isdigit$localeconv
                                      • String ID: 0$0123456789abcdefABCDEF
                                      • API String ID: 1981154758-1185640306
                                      • Opcode ID: 80342a31f141c027b757a1df577f888472fcb55c472049e43c220dbff44cdccc
                                      • Instruction ID: 538bcc281306c4b8f17fcf136a77c30b27de204eee11efcd80487e2cf7fd924a
                                      • Opcode Fuzzy Hash: 80342a31f141c027b757a1df577f888472fcb55c472049e43c220dbff44cdccc
                                      • Instruction Fuzzy Hash: D9914862B0869646E7B38B90D8B02797B91FB4AB48F48D135DE8E47756DF3CE805C740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: isdigit$localeconv
                                      • String ID: 0$0
                                      • API String ID: 3674116420-203156872
                                      • Opcode ID: 7eba96e480bafa463126f689b5a476f39e0a1d844de0d60ee0b45b193ba35ca2
                                      • Instruction ID: d54371d8fbf2070d709da320264752f2ab509804cc657a4bb3c51be055f3ef9d
                                      • Opcode Fuzzy Hash: 7eba96e480bafa463126f689b5a476f39e0a1d844de0d60ee0b45b193ba35ca2
                                      • Instruction Fuzzy Hash: 64813D73B0858647E7724FA498B03BA7BE1BB96748F08D034DE8947256DB3CE945D700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: iswdigit$btowclocaleconv
                                      • String ID: 0
                                      • API String ID: 240710166-4108050209
                                      • Opcode ID: fd26330687f291c5d946141a090314486050d5e6ebaa0dffc5a722ab78f63222
                                      • Instruction ID: 92a2deb85becaa8cc0bab773e782b9c0cbac3afbef3e618169b9079a5be2c140
                                      • Opcode Fuzzy Hash: fd26330687f291c5d946141a090314486050d5e6ebaa0dffc5a722ab78f63222
                                      • Instruction Fuzzy Hash: 43812A72B0854686E7B79FA5D8A02BA73A1FF95B45F049231DE8A46192DF3CED45C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                      • String ID:
                                      • API String ID: 313767242-0
                                      • Opcode ID: ef183cbf577813a1a620a35d3f0e2e4c95b00fe437db806ec9235f47f82a2b15
                                      • Instruction ID: 821a3f3e19b363150739cdb0831e9c841e71ba766210959166b8982b2971ad30
                                      • Opcode Fuzzy Hash: ef183cbf577813a1a620a35d3f0e2e4c95b00fe437db806ec9235f47f82a2b15
                                      • Instruction Fuzzy Hash: 4C316476704B8585EBA0AF66E8403ED7B60FB44704F84413ADA8E9B794DF3CC548C711
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: iswdigit$localeconv
                                      • String ID: 0$0$0$0123456789abcdefABCDEF
                                      • API String ID: 2634821343-4215698122
                                      • Opcode ID: 5017de796c2376dee23f9bf8171388842aa81307c3636573ac8da977c0875b13
                                      • Instruction ID: 8d3490fcf76f25b9fa079533da14916922e275bd38157e8e8677dd709b6f372a
                                      • Opcode Fuzzy Hash: 5017de796c2376dee23f9bf8171388842aa81307c3636573ac8da977c0875b13
                                      • Instruction Fuzzy Hash: FE810C62F0819686EBB75BE4D8A067976A0FB49B44F05D231DE8947786EB3CED81C340
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CastDynamicmemcpy
                                      • String ID:
                                      • API String ID: 4110239763-0
                                      • Opcode ID: a71736c638eb58bc321c3975b81aae3ac09700c9d8e2de536e11ea61703a745b
                                      • Instruction ID: 1f046e597a49f0efa982ad7f362103afa2ba21727babdf30cb0c3793e5afd8a4
                                      • Opcode Fuzzy Hash: a71736c638eb58bc321c3975b81aae3ac09700c9d8e2de536e11ea61703a745b
                                      • Instruction Fuzzy Hash: 3A91D172A08B8585E750EB26E84039EBBB4FB88B88F804132EE8E57B55DF3CD555C711
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Find$CloseFileFirst_invalid_parameter_noinfo_noreturnwcscpy_s
                                      • String ID: .
                                      • API String ID: 1484651601-248832578
                                      • Opcode ID: 79aeddcc7cdf35ead3b018189b5d5a46bf5efa5be6d1b8723a80d4c44f1814be
                                      • Instruction ID: 4ff37fe1bf00dea3e244938ad3b1666c97f98b80e7061b37f3e604f8bebae65b
                                      • Opcode Fuzzy Hash: 79aeddcc7cdf35ead3b018189b5d5a46bf5efa5be6d1b8723a80d4c44f1814be
                                      • Instruction Fuzzy Hash: A951E862B1864185EA70DBA5E4A537F6360FB867A0F409331EA7E166DADFBCD480C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CreateFileInstanceModuleName
                                      • String ID: MODULE$REGISTRY
                                      • API String ID: 2726553136-981620220
                                      • Opcode ID: 6b8004f2ee8dfa7b600045a1ffaa58c294321d90986e8fdd59d76948e1a97889
                                      • Instruction ID: 32d5859874ad5ef366282651e3becdc512c276f90b9389eba5f7e060719f9c09
                                      • Opcode Fuzzy Hash: 6b8004f2ee8dfa7b600045a1ffaa58c294321d90986e8fdd59d76948e1a97889
                                      • Instruction Fuzzy Hash: 21212122718A4A82EB90DB2AE45436ABB70FB84B84FC15133DA8F97755DE3DD508C711
                                      APIs
                                      Strings
                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF7E3BE2543
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: DebugDebuggerErrorLastOutputPresentString
                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                      • API String ID: 389471666-631824599
                                      • Opcode ID: 61e457aee29548682dd6cad434e7485474c69e4d2668bfedc6d7b3c81a43c635
                                      • Instruction ID: 8a1308de2af64a24f3d8ec1b35184b880c871089da2c4cef1e72aeb56e05f81c
                                      • Opcode Fuzzy Hash: 61e457aee29548682dd6cad434e7485474c69e4d2668bfedc6d7b3c81a43c635
                                      • Instruction Fuzzy Hash: EB118232A14B4596EB84AB2BD65037977A4FF04301F80423AC68E97A50EF7CE064C722
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: FormatInfoLocaleMessage
                                      • String ID: !x-sys-default-locale
                                      • API String ID: 4235545615-2729719199
                                      • Opcode ID: 54718cadd4bdb1b305c9a9b90ae8675dfddda27c22b0e41b56190c434a35652b
                                      • Instruction ID: 07c81b5c0202ca2b71863e526f8347f415adcd0d05749da0008080b06f08707a
                                      • Opcode Fuzzy Hash: 54718cadd4bdb1b305c9a9b90ae8675dfddda27c22b0e41b56190c434a35652b
                                      • Instruction Fuzzy Hash: A201D672B08B8182E7768B91F5B077A67A1FB8A794F44C035DA4946B9ACF7DD501CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: DiskFreeSpace_invalid_parameter_noinfo_noreturn
                                      • String ID:
                                      • API String ID: 2170103895-0
                                      • Opcode ID: f0b5db2a13a97756e3b9d7573d921f61e74b285c7bddbdc73987eb0850326121
                                      • Instruction ID: 92f32303b01cebdae89838fb9ba4d4874ed787f39b62c5b4117924ad706ca59c
                                      • Opcode Fuzzy Hash: f0b5db2a13a97756e3b9d7573d921f61e74b285c7bddbdc73987eb0850326121
                                      • Instruction Fuzzy Hash: A4416D62F00B4188FB10CBE5D4A02AE27B1F759BA8F559625CE5E23A9DDF789095C340
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: InfoLocale___lc_locale_name_func
                                      • String ID:
                                      • API String ID: 3366915261-0
                                      • Opcode ID: 1df46b44e570eacb70458f3e3d459a2b441d0bc39d25a1c4aabdfadd61c49cb4
                                      • Instruction ID: 7e7db46725692ce1bead8cd983e473614b9c11a00d22c34c764bb051e44a8600
                                      • Opcode Fuzzy Hash: 1df46b44e570eacb70458f3e3d459a2b441d0bc39d25a1c4aabdfadd61c49cb4
                                      • Instruction Fuzzy Hash: C2F03A6AF3D14282E6FE4AD894F47781360EF46700F808535E50F5269ACE1CE849C741
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ebbba7fb9e0e50eda0c8ee338e6b29b5ab33eae1f617f09dbd9ba1ac74871385
                                      • Instruction ID: 97b88f3c63a57a6e85d79641c4600d9942b87b0235b0ffed47b7a54fd667c2ab
                                      • Opcode Fuzzy Hash: ebbba7fb9e0e50eda0c8ee338e6b29b5ab33eae1f617f09dbd9ba1ac74871385
                                      • Instruction Fuzzy Hash: 2CA00125E0880AE0EA85AB0AA850220BB24AB64340B810232D08EA90A09E7CA5419226

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 744 7ffda4337b88-7ffda4337bbb 745 7ffda4337bc1-7ffda4337be8 744->745 746 7ffda4338146-7ffda4338159 744->746 747 7ffda4337bee 745->747 748 7ffda4337d03-7ffda4337d06 745->748 749 7ffda433815c-7ffda433815f call 7ffda4336098 746->749 750 7ffda4337bf4-7ffda4337bf7 747->750 751 7ffda4337cf1-7ffda4337cfe 747->751 752 7ffda4337d3d-7ffda4337d44 748->752 753 7ffda4337d08-7ffda4337d2c call 7ffda4339194 748->753 756 7ffda4338164-7ffda4338184 749->756 757 7ffda4337c6f-7ffda4337c74 750->757 758 7ffda4337bf9 750->758 761 7ffda4338080-7ffda4338084 call 7ffda4335b5c 751->761 759 7ffda4337d50-7ffda4337d57 752->759 760 7ffda4337d46-7ffda4337d49 752->760 772 7ffda4337d32-7ffda4337d38 753->772 773 7ffda4338089-7ffda433808d 753->773 762 7ffda4337cdf-7ffda4337cec 757->762 763 7ffda4337c76-7ffda4337c79 757->763 765 7ffda4337c27-7ffda4337c34 758->765 766 7ffda4337bfb-7ffda4337bfe 758->766 767 7ffda4337e60-7ffda4337e63 759->767 768 7ffda4337d5d 759->768 760->759 761->773 762->761 770 7ffda4337cb2-7ffda4337cda call 7ffda433611c 763->770 771 7ffda4337c7b-7ffda4337c7e 763->771 765->761 776 7ffda4337c00-7ffda4337c03 766->776 777 7ffda4337c5d-7ffda4337c6a 766->777 774 7ffda4337fdf-7ffda4337fe2 767->774 775 7ffda4337e69 767->775 778 7ffda4337e4e-7ffda4337e5b 768->778 779 7ffda4337d63-7ffda4337d66 768->779 770->773 780 7ffda4337c80-7ffda4337c83 771->780 781 7ffda4337c9c-7ffda4337cad call 7ffda4335b5c 771->781 772->756 790 7ffda433808f-7ffda4338095 773->790 791 7ffda43380bd-7ffda43380c4 773->791 785 7ffda4337fe8-7ffda4337feb 774->785 786 7ffda4338076 774->786 782 7ffda4337e6f-7ffda4337e72 775->782 783 7ffda4337fcd-7ffda4337fda 775->783 776->777 784 7ffda4337c05-7ffda4337c08 776->784 777->761 778->761 787 7ffda4337e07-7ffda4337e0a 779->787 788 7ffda4337d6c 779->788 793 7ffda4337c94-7ffda4337c97 780->793 794 7ffda4337c85-7ffda4337c88 780->794 781->770 795 7ffda4337e74-7ffda4337e77 782->795 796 7ffda4337ecb 782->796 783->761 784->777 797 7ffda4337c0a-7ffda4337c0d 784->797 799 7ffda4337fed-7ffda4337ff0 785->799 800 7ffda4338023-7ffda4338074 call 7ffda433ac00 call 7ffda4335d40 call 7ffda4336098 785->800 798 7ffda433807d 786->798 802 7ffda4337e3f-7ffda4337e49 787->802 804 7ffda4337e0c-7ffda4337e0f 787->804 788->802 803 7ffda4337d72-7ffda4337d75 788->803 806 7ffda43380ad-7ffda43380bb 790->806 807 7ffda4338097-7ffda433809b 790->807 792 7ffda43380c8-7ffda43380fd call 7ffda4335d40 call 7ffda4336098 791->792 812 7ffda4338100-7ffda4338104 792->812 809 7ffda4337ed0-7ffda4337ee9 793->809 794->793 808 7ffda4337c8a-7ffda4337c8d 794->808 815 7ffda4337eb9-7ffda4337ec6 795->815 816 7ffda4337e79-7ffda4337e7c 795->816 796->809 817 7ffda4337c0f-7ffda4337c12 797->817 818 7ffda4337c4b-7ffda4337c58 797->818 798->761 819 7ffda4337ff2-7ffda4337ff5 799->819 820 7ffda4338017-7ffda4338021 799->820 800->773 802->761 821 7ffda4337df4-7ffda4337e02 call 7ffda4335ffc 803->821 822 7ffda4337d77-7ffda4337d7a 803->822 810 7ffda4337e30-7ffda4337e3a 804->810 811 7ffda4337e11-7ffda4337e14 804->811 806->792 807->812 813 7ffda433809d-7ffda43380a5 807->813 808->793 825 7ffda4337c8f-7ffda4337c92 808->825 839 7ffda4337eeb-7ffda4337f0e call 7ffda433b084 809->839 840 7ffda4337f4a-7ffda4337f4d 809->840 810->761 811->810 827 7ffda4337e16-7ffda4337e19 811->827 830 7ffda4338137-7ffda4338144 812->830 831 7ffda4338106-7ffda4338132 call 7ffda4337318 call 7ffda4336098 call 7ffda433619c 812->831 813->812 828 7ffda43380a7-7ffda43380ab 813->828 815->761 832 7ffda4337e7e-7ffda4337e81 816->832 833 7ffda4337eaa-7ffda4337eb4 816->833 817->818 834 7ffda4337c14-7ffda4337c17 817->834 818->761 835 7ffda4337ff7-7ffda4337ffa 819->835 836 7ffda4338008-7ffda433800b 819->836 820->761 821->773 837 7ffda4337db5-7ffda4337def call 7ffda4337b88 call 7ffda4335d40 822->837 838 7ffda4337d7c-7ffda4337d7f 822->838 825->753 825->793 847 7ffda4337e24-7ffda4337e2b 827->847 848 7ffda4337e1b-7ffda4337e1e 827->848 828->806 828->812 830->756 831->830 851 7ffda4337e83-7ffda4337e86 832->851 852 7ffda4337e98-7ffda4337ea5 832->852 833->761 853 7ffda4337c39-7ffda4337c46 834->853 854 7ffda4337c19-7ffda4337c1c 834->854 835->836 855 7ffda4337ffc-7ffda4338006 835->855 836->820 837->749 856 7ffda4337da3-7ffda4337db0 838->856 857 7ffda4337d81-7ffda4337d84 838->857 869 7ffda4337f10-7ffda4337f38 call 7ffda433611c 839->869 870 7ffda4337f3b-7ffda4337f45 839->870 844 7ffda4337f4f-7ffda4337f57 840->844 845 7ffda4337fb2-7ffda4337fc8 call 7ffda433b084 840->845 861 7ffda4337f9b-7ffda4337f9d 844->861 862 7ffda4337f59-7ffda4337f6f call 7ffda4335b5c 844->862 845->756 847->798 848->847 848->855 851->855 866 7ffda4337e8c-7ffda4337e93 851->866 852->761 853->761 854->853 867 7ffda4337c1e-7ffda4337c21 854->867 855->761 856->761 857->856 868 7ffda4337d86-7ffda4337d89 857->868 861->845 874 7ffda4337f9f-7ffda4337fad call 7ffda4335b5c 861->874 862->845 886 7ffda4337f71-7ffda4337f99 call 7ffda433611c 862->886 866->798 867->753 867->765 877 7ffda4337d94-7ffda4337d9e 868->877 878 7ffda4337d8b-7ffda4337d8e 868->878 869->870 870->756 874->845 877->761 878->855 878->877 886->845
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Name::operator+
                                      • String ID: volatile$<unknown>$UNKNOWN$__int128$__int16$__int32$__int64$__int8$__w64 $auto$bool$char$char16_t$char32_t$char8_t$const$decltype(auto)$double$float$int$long$long $short$signed $this $unsigned $void$volatile$wchar_t
                                      • API String ID: 2943138195-1482988683
                                      • Opcode ID: 48bfad7f18ff3c061c92d68e79d849bf1ef7807b8258b4cd0edd992179487da2
                                      • Instruction ID: 136947d567f3901e8c0558df077be3ba51226e11f1ebeb9f37156a0d6fe205a2
                                      • Opcode Fuzzy Hash: 48bfad7f18ff3c061c92d68e79d849bf1ef7807b8258b4cd0edd992179487da2
                                      • Instruction Fuzzy Hash: 71027F72F9AE1298FB18AB64C8F42BC27A0BB06744F504535DA0D16BBADF7DB544C348
                                      APIs
                                      • GetCurrentProcessId.KERNEL32(?,?,?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000,?,?,00000000), ref: 00007FF7E3BD9594
                                      • MessageBoxA.USER32 ref: 00007FF7E3BD95EC
                                      • GetCurrentThreadId.KERNEL32 ref: 00007FF7E3BD959C
                                        • Part of subcall function 00007FF7E3BE0C90: __stdio_common_vsprintf_s.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7E3BE0CD3
                                      • GetCurrentProcessId.KERNEL32(?,?,?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000,?,?,00000000), ref: 00007FF7E3BD95F9
                                      • GetCurrentThreadId.KERNEL32 ref: 00007FF7E3BD9601
                                      • MessageBoxA.USER32 ref: 00007FF7E3BD9651
                                      • GetCurrentProcessId.KERNEL32(?,?,?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000,?,?,00000000), ref: 00007FF7E3BD965C
                                      • GetCurrentThreadId.KERNEL32 ref: 00007FF7E3BD9664
                                      • MessageBoxA.USER32 ref: 00007FF7E3BD96B4
                                      • EnterCriticalSection.KERNEL32(?,?,?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000,?,?,00000000), ref: 00007FF7E3BD96C1
                                      • SysAllocString.OLEAUT32 ref: 00007FF7E3BD9718
                                      • LeaveCriticalSection.KERNEL32(?,?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000,?,?,00000000), ref: 00007FF7E3BD972C
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000,?,?,00000000), ref: 00007FF7E3BD97FA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Current$MessageProcessThread$CriticalSection$AllocEnterLeaveString__stdio_common_vsprintf_s_invalid_parameter_noinfo_noreturn
                                      • String ID: !appid.empty()$!key.empty()$Assert Error$D:\a\Courier\Courier\ZipSendService\ZipSendService\GlobalUploadQueue.cpp$Pid: %d Tid: %dExpr: %sFile: %sLine: %d$errorDesc != nullptr$filename != nullptr$keys != nullptr$option != nullptr$result != nullptr$results != nullptr$status != nullptr
                                      • API String ID: 1368387527-3554853540
                                      • Opcode ID: f48d30e5b353a16eb4cd060553c7ad3274f9474d83a072f1c0084df61406bdfc
                                      • Instruction ID: dabd10a6a49ccf363588b66c506499466cfd9c4ef596a8e117284386c7c9f58e
                                      • Opcode Fuzzy Hash: f48d30e5b353a16eb4cd060553c7ad3274f9474d83a072f1c0084df61406bdfc
                                      • Instruction Fuzzy Hash: 16717171B08B8995EAA0AF2AF4543AABB60FB44784FC00136DACF97654DF7CD544C312
                                      APIs
                                      • GetCurrentProcessId.KERNEL32(?,?,?,00000000,?,00007FF7E3BD7A05), ref: 00007FF7E3BD7221
                                      • MessageBoxA.USER32 ref: 00007FF7E3BD7273
                                      • GetCurrentThreadId.KERNEL32 ref: 00007FF7E3BD7229
                                        • Part of subcall function 00007FF7E3BE0C90: __stdio_common_vsprintf_s.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7E3BE0CD3
                                      • GetCurrentProcessId.KERNEL32(?,?,?,00000000,?,00007FF7E3BD7A05), ref: 00007FF7E3BD7280
                                      • GetCurrentThreadId.KERNEL32 ref: 00007FF7E3BD7288
                                      • MessageBoxA.USER32 ref: 00007FF7E3BD72D2
                                      • GetCurrentProcessId.KERNEL32(?,?,?,00000000,?,00007FF7E3BD7A05), ref: 00007FF7E3BD72DD
                                      • GetCurrentThreadId.KERNEL32 ref: 00007FF7E3BD72E5
                                      • MessageBoxA.USER32 ref: 00007FF7E3BD732F
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FF7E3BD7A05), ref: 00007FF7E3BD73FA
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FF7E3BD7A05), ref: 00007FF7E3BD7401
                                      • EnterCriticalSection.KERNEL32(?,?,?,?,?,00000000,00007FF7E3BE0237,?,?,?,?,?,?,?,?,00007FF7E3BD3CE8), ref: 00007FF7E3BD7423
                                      • SetEvent.KERNEL32(?,?,?,?,?,?,00007FF7E3BD7A05), ref: 00007FF7E3BD7505
                                      • Deinit.WXFMANAGER64(?,?,?,?,?,?,00007FF7E3BD7A05), ref: 00007FF7E3BD7548
                                      • DeleteWzExtensionsManager.WXFMANAGER64(?,?,?,?,?,?,00007FF7E3BD7A05), ref: 00007FF7E3BD7555
                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000,00007FF7E3BE0237,?,?,?,?,?,?,?,?,00007FF7E3BD3CE8), ref: 00007FF7E3BD755F
                                      • DeleteCriticalSection.KERNEL32(?,?,?,?,?,00000000,00007FF7E3BE0237,?,?,?,?,?,?,?,?,00007FF7E3BD3CE8), ref: 00007FF7E3BD7569
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,00000000,00007FF7E3BE0237,?,?,?,?,?,?,?,?,00007FF7E3BD3CE8), ref: 00007FF7E3BD7607
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Current$CriticalMessageProcessSectionThread_invalid_parameter_noinfo_noreturn$Delete$DeinitEnterEventExtensionsLeaveManager__stdio_common_vsprintf_s
                                      • String ID: !appid.empty()$!key.empty()$Assert Error$D:\a\Courier\Courier\ZipSendService\ZipSendService\GlobalUploadQueue.cpp$Pid: %d Tid: %dExpr: %sFile: %sLine: %d$task != nullptr
                                      • API String ID: 3459848528-618188071
                                      • Opcode ID: 8999bedaa8aaab2f1b8e02414bb1be42c70c5f777a03f97c457e45901fb7406f
                                      • Instruction ID: 706a12bd988c4989649f76f65022201ea8f658956f9f2931cf109dae1dc39911
                                      • Opcode Fuzzy Hash: 8999bedaa8aaab2f1b8e02414bb1be42c70c5f777a03f97c457e45901fb7406f
                                      • Instruction Fuzzy Hash: 34C19532A18B4582EAA0AF26F4543A9BB60FB44794FC04237DACF57A94DF3DE544C712
                                      APIs
                                      • EnterCriticalSection.KERNEL32(?,?,?,?,?,00000000,?,00000000,?,00000000,00007FF7E3BD7A4F), ref: 00007FF7E3BD9C73
                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000,?,00000000,?,00000000,00007FF7E3BD7A4F), ref: 00007FF7E3BD9D27
                                      • memmove.VCRUNTIME140(?,?,?,?,?,00000000,?,00000000,?,00000000,00007FF7E3BD7A4F), ref: 00007FF7E3BD9D95
                                      • memmove.VCRUNTIME140(?,?,?,?,?,00000000,?,00000000,?,00000000,00007FF7E3BD7A4F), ref: 00007FF7E3BD9DE6
                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000,?,00000000,?,00000000,00007FF7E3BD7A4F), ref: 00007FF7E3BD9E54
                                      • RegCreateKeyExW.ADVAPI32 ref: 00007FF7E3BD9F87
                                      • RegSetValueExW.ADVAPI32 ref: 00007FF7E3BD9FB7
                                      • RegCloseKey.ADVAPI32 ref: 00007FF7E3BD9FC7
                                      • GetLastError.KERNEL32 ref: 00007FF7E3BD9FD1
                                        • Part of subcall function 00007FF7E3BE0DB0: GetCurrentProcessId.KERNEL32(00000000,00000000,?,00007FF7E3BD9C00), ref: 00007FF7E3BE0DEE
                                        • Part of subcall function 00007FF7E3BE0DB0: GetCurrentThreadId.KERNEL32 ref: 00007FF7E3BE0DF6
                                        • Part of subcall function 00007FF7E3BE0DB0: __stdio_common_vsprintf_s.API-MS-WIN-CRT-STDIO-L1-1-0(?,00007FF7E3BD9C00), ref: 00007FF7E3BE0E27
                                        • Part of subcall function 00007FF7E3BE0DB0: OutputDebugStringA.KERNEL32(?,00007FF7E3BD9C00), ref: 00007FF7E3BE0E59
                                      • GetLastError.KERNEL32 ref: 00007FF7E3BD9FE5
                                        • Part of subcall function 00007FF7E3BE0CF0: GetCurrentProcessId.KERNEL32(00000000,?,00007FF7E3BD9C0F), ref: 00007FF7E3BE0D2D
                                        • Part of subcall function 00007FF7E3BE0CF0: GetCurrentThreadId.KERNEL32 ref: 00007FF7E3BE0D35
                                        • Part of subcall function 00007FF7E3BE0CF0: __stdio_common_vsprintf_s.API-MS-WIN-CRT-STDIO-L1-1-0(?,00007FF7E3BD9C0F), ref: 00007FF7E3BE0D7B
                                        • Part of subcall function 00007FF7E3BE0CF0: MessageBoxA.USER32 ref: 00007FF7E3BE0D90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Current$CriticalSection$ErrorLastLeaveProcessThread__stdio_common_vsprintf_smemmove$CloseCreateDebugEnterMessageOutputStringValue
                                      • String ID: D:\a\Courier\Courier\ZipSendService\Utils\Serialize.h$No enough memory when Write Task Queue$No enough memory when prepare for Write Task Queue$Queue$Software\Nico Mak Computing\Common\ZipSend$Write Registry failed %08x$Write Task Queue Step 1 Fail$Write Task Queue Step 2 Fail$false
                                      • API String ID: 1692961011-2236933153
                                      • Opcode ID: 739d04aa620992f2d4f4bff2e8a8c46c15cdabce62537b207310b718f14a91ba
                                      • Instruction ID: 13f8f4f7eceda950947c304427118627dbde45fb66974e010eaf8c40c6ffd1f7
                                      • Opcode Fuzzy Hash: 739d04aa620992f2d4f4bff2e8a8c46c15cdabce62537b207310b718f14a91ba
                                      • Instruction Fuzzy Hash: 60B18226B0864A81EAA0AF16E5403A9BB51FF45B90FC44233CA9F67795DF3CE545C322
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Name::operator+$Replicator::operator[]
                                      • String ID: `anonymous namespace'
                                      • API String ID: 3863519203-3062148218
                                      • Opcode ID: 4d6a53c72438a8ea40c1e6d7c2b24d169bbac4952f94ac9fbbbf341f1eafdc4b
                                      • Instruction ID: d8b2481b5dc2f9ab1c63deef82c9769bd398d9be48ee641c17f4ff969daab225
                                      • Opcode Fuzzy Hash: 4d6a53c72438a8ea40c1e6d7c2b24d169bbac4952f94ac9fbbbf341f1eafdc4b
                                      • Instruction Fuzzy Hash: 37E12672A4AF8299EB20AF25D4E01AC77A0FB46789F408135EA4D17BB6DF3CE554C704
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CriticalSection$Leave$CurrentEnter$DeleteInitializeMessageProcessThreadUninitialize__stdio_common_vsprintf_s
                                      • String ID: !commands_.empty()$Assert Error$D:\a\Courier\Courier\ZipSendService\ZipSendService\UploadEventDispatcher.h$Pid: %d Tid: %dExpr: %sFile: %sLine: %d$S
                                      • API String ID: 83914183-2615395679
                                      • Opcode ID: b13968904d6309a2723b6f6a05d243e36fd4b864acde68270730b44ec8e438bc
                                      • Instruction ID: cefd33572f56d315d15b766dcb9c26ed8851507b7bd8281601e326aa18da3ad7
                                      • Opcode Fuzzy Hash: b13968904d6309a2723b6f6a05d243e36fd4b864acde68270730b44ec8e438bc
                                      • Instruction Fuzzy Hash: 89519136A14A4582DB54EF2AE4543697BA1FB84F94F804236CD8FA7354DF3DD441C311
                                      APIs
                                      • EnterCriticalSection.KERNEL32(00000000,?,00000000,00000000,?,00000000,?,?,?,00000000,?,?,?,00000000,00000000), ref: 00007FF7E3BD9A32
                                      • RegOpenKeyExW.ADVAPI32(?,00000000,00000000,?,00000000,?,?,?,00000000,?,?,?,00000000,00000000,?,00000000), ref: 00007FF7E3BD9A59
                                      • LeaveCriticalSection.KERNEL32(?,00000000,00000000,?,00000000,?,?,?,00000000,?,?,?,00000000,00000000,?,00000000), ref: 00007FF7E3BD9A69
                                      • RegQueryInfoKeyW.ADVAPI32 ref: 00007FF7E3BD9AD0
                                      • RegCloseKey.ADVAPI32(?,00000000,00000000,?,00000000,?,?,?,00000000,?,?,?,00000000,00000000,?,00000000), ref: 00007FF7E3BD9ADF
                                      • LeaveCriticalSection.KERNEL32(?,00000000,00000000,?,00000000,?,?,?,00000000,?,?,?,00000000,00000000,?,00000000), ref: 00007FF7E3BD9AE9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CriticalSection$Leave$CloseEnterInfoOpenQuery
                                      • String ID: Create UploadQueue %S failed$Software\Nico Mak Computing\Common\ZipSend\AppId
                                      • API String ID: 2639298367-1457088679
                                      • Opcode ID: e4b1de9ad63966c568374af1339d70bfb53778290a5ca6c8a3a5e1c3b8e0435d
                                      • Instruction ID: bf9fbc57f11bf1bc910b668323a8a34046f08f6753514e567d8035a0715aca68
                                      • Opcode Fuzzy Hash: e4b1de9ad63966c568374af1339d70bfb53778290a5ca6c8a3a5e1c3b8e0435d
                                      • Instruction Fuzzy Hash: CF513432A08B8682EBA0EF25F45036AB7A4FB85755F800132DACF67A58DF3CD585C711
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: NameName::$Name::operator+atolswprintf_s
                                      • String ID: NULL$`generic-class-parameter-$`generic-method-parameter-$`template-type-parameter-$lambda$nullptr
                                      • API String ID: 2331677841-2441609178
                                      • Opcode ID: 1337080a8712cf2b186886f982200b7f95fea8318008cd2a99218dd623351aeb
                                      • Instruction ID: 7d003193e4f03c4abafa44dda8cbadd478aec8af7c90b647fe6adf4120b496eb
                                      • Opcode Fuzzy Hash: 1337080a8712cf2b186886f982200b7f95fea8318008cd2a99218dd623351aeb
                                      • Instruction Fuzzy Hash: 05F14A23F8AE1284FA15BB7585F81FC27A1AF47744F540136CA0E66BB7DE2CB544A348
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: free$Current$CriticalDeleteMessageProcessSectionThread__stdio_common_vsprintf_s
                                      • String ID: *$Assert Error$D:\a\Courier\Courier\ZipSendService\ZipSendService\UploadTask.cpp$Pid: %d Tid: %dExpr: %sFile: %sLine: %d$task_ == nullptr
                                      • API String ID: 2364920510-3495599304
                                      • Opcode ID: 39fb82197aba7a65d09682cc9219dc9e2dfbbd46141805dbf253b7286f854d0c
                                      • Instruction ID: edb60416453f31d71dd958fde7b044a0f5878e63980db5717f7d31d916f2313a
                                      • Opcode Fuzzy Hash: 39fb82197aba7a65d09682cc9219dc9e2dfbbd46141805dbf253b7286f854d0c
                                      • Instruction Fuzzy Hash: 02315331A04A4582EB90AF2AE4543A9B770FB84B84FC40237DA9FA7655DF3CD549C711
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWidefree$__strncntmalloc$CompareInfoString
                                      • String ID:
                                      • API String ID: 413445966-0
                                      • Opcode ID: b56ee1bed11420737cedf5a4c9bd6d08f938309ea2ccd9fa2f4a42ac3f352b01
                                      • Instruction ID: 948d52eef1f882b9dae69e8514ca96547125cf9b5b8d3993367008698e1b0d2a
                                      • Opcode Fuzzy Hash: b56ee1bed11420737cedf5a4c9bd6d08f938309ea2ccd9fa2f4a42ac3f352b01
                                      • Instruction Fuzzy Hash: 3AA1CE62B0868286EB718FA194B437B6792FF46BA4F448631CA5D076CADFBCD545C340
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Current$CloseCriticalMessageProcessSectionThread$QueryValue$EnterInitializeLeaveOpen
                                      • String ID: Create TaskInfo failed$Create UploadTaskInternal failed$Queue$Software\Nico Mak Computing\Common\ZipSend
                                      • API String ID: 755602007-698671834
                                      • Opcode ID: 5881cc4b403839b988e2d522605f3728b198d00f26011ecaa7c2b48f509e50a4
                                      • Instruction ID: 6b7eec9e8705ca87b18c36c98b70533142e199cc03ff1b296f54e1e57cbbbcfc
                                      • Opcode Fuzzy Hash: 5881cc4b403839b988e2d522605f3728b198d00f26011ecaa7c2b48f509e50a4
                                      • Instruction Fuzzy Hash: 9A91A022B09A4685EB90EF66E4403ADBBA1FF44794FC54133D98E67A95DF3CE504C322
                                      APIs
                                      • GetCurrentProcessId.KERNEL32(?,00000000,?,?,?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 00007FF7E3BD984A
                                      • GetCurrentThreadId.KERNEL32 ref: 00007FF7E3BD9852
                                        • Part of subcall function 00007FF7E3BE0C90: __stdio_common_vsprintf_s.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7E3BE0CD3
                                      • MessageBoxA.USER32 ref: 00007FF7E3BD98A3
                                      • EnterCriticalSection.KERNEL32(?,00000000,?,?,?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 00007FF7E3BD98AD
                                      • _wcsnicmp.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 00007FF7E3BD98E2
                                      • LeaveCriticalSection.KERNEL32(?,00000000,?,?,?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 00007FF7E3BD98FE
                                      • LeaveCriticalSection.KERNEL32(?,00000000,?,?,?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 00007FF7E3BD99CB
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,?,?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 00007FF7E3BD9A16
                                        • Part of subcall function 00007FF7E3BDA3A0: EnterCriticalSection.KERNEL32 ref: 00007FF7E3BDA3BD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CriticalSection$CurrentEnterLeave$MessageProcessThread__stdio_common_vsprintf_s_invalid_parameter_noinfo_noreturn_wcsnicmp
                                      • String ID: !appid.empty()$Assert Error$D:\a\Courier\Courier\ZipSendService\ZipSendService\GlobalUploadQueue.cpp$Pid: %d Tid: %dExpr: %sFile: %sLine: %d
                                      • API String ID: 1472907134-2436460847
                                      • Opcode ID: e61ed493d8ce1d74ad241842819e8b3e4405a1651b2332a4a7ab3718ea4acdbd
                                      • Instruction ID: 998d64d3b42c00a41ea1bfa6ace7d8c7973395b89dbd24a6143717f9f54fc8c9
                                      • Opcode Fuzzy Hash: e61ed493d8ce1d74ad241842819e8b3e4405a1651b2332a4a7ab3718ea4acdbd
                                      • Instruction Fuzzy Hash: 0F51B672B08A4596EB94EB2AE4443AD7B61FB44B84FC00237D68FA3694DF3CE484C351
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Name::operator+
                                      • String ID:
                                      • API String ID: 2943138195-0
                                      • Opcode ID: b5cdb839dd03f35b6a53839e10f9b05876287b9c2dfd2f9f107b53bcec25dd50
                                      • Instruction ID: e69d980dc44f012b997a2d9cfc1570a2dbccf1ff872e044b888f3649d111f430
                                      • Opcode Fuzzy Hash: b5cdb839dd03f35b6a53839e10f9b05876287b9c2dfd2f9f107b53bcec25dd50
                                      • Instruction Fuzzy Hash: FDF16A76B4AA8299E710EF64D4F11EC37A0EB0674CB404435DA4E57BBADE3CE519C348
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: free$ByteCharMultiStringWide$malloc$__strncnt
                                      • String ID:
                                      • API String ID: 1617860942-0
                                      • Opcode ID: 4bf190d9ba59b1640d96bc5a8d070e7247b9b25b7a8258eacc3250c70f990771
                                      • Instruction ID: df8075ea7510768dcde84bef7660916ffa9204a68974da63ce6f79419232c2fa
                                      • Opcode Fuzzy Hash: 4bf190d9ba59b1640d96bc5a8d070e7247b9b25b7a8258eacc3250c70f990771
                                      • Instruction Fuzzy Hash: E491BF72B0874286EB748FA5E4A026A73A1FF45BA8F148631DA5E43BD9DF7CD445C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CastCurrentDynamic$MessageProcessThread__stdio_common_vsprintf_smemcpy
                                      • String ID: .$Assert Error$D:\a\Courier\Courier\ZipSendService\ZipSendService\Serialize.h$Pid: %d Tid: %dExpr: %sFile: %sLine: %d$value != nullptr
                                      • API String ID: 575956159-1840405654
                                      • Opcode ID: f996dc371ab87fdcd71f99c761a75a5fcd5face911d4bf0904db97e658dd252d
                                      • Instruction ID: 4e1d1f8130587d9090c6abbbbeeba23e76f5d0e90720d9f473d36141ff37d233
                                      • Opcode Fuzzy Hash: f996dc371ab87fdcd71f99c761a75a5fcd5face911d4bf0904db97e658dd252d
                                      • Instruction Fuzzy Hash: 2341A421B0864681EA60AF5AE4442AABB60FF847A4FC04233D6DFA7694DF7CE545C312
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CloseHandleProcessfree$CodeCreateExitObjectSingleWaitmallocswprintf_s
                                      • String ID: "%s" %s$h
                                      • API String ID: 1113467762-3731297023
                                      • Opcode ID: e3cce38a4b51c42112672d9d994e7f7bb1c271f888f7ce85837f47653211b863
                                      • Instruction ID: 816a7b89bf6f1bc401aad62857d83b7ea065b9ba58c1d6f168459d80ab0d1602
                                      • Opcode Fuzzy Hash: e3cce38a4b51c42112672d9d994e7f7bb1c271f888f7ce85837f47653211b863
                                      • Instruction Fuzzy Hash: 2941C622908BC586D7A0DB15E44036AFBA0FB99B90F858332EADE93754DF7CD184C711
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CloseCreateMutex$ExtensionsHandleInitManagerObjectOpenReleaseSingleWait
                                      • String ID: Software\Nico Mak Computing\WinZip Express\Outlook\WXF$Software\Nico Mak Computing\WinZip\WXF$WXFManagerHolder
                                      • API String ID: 910357124-2105400318
                                      • Opcode ID: f577e7643938d562cf6d8ce8f179c5352a2064b40baa9df84b6bf8e04e12685c
                                      • Instruction ID: 515083f188c8914e303fa1acfe0d76e88ed958fd2f8bf77ff9ef5f8e63931c06
                                      • Opcode Fuzzy Hash: f577e7643938d562cf6d8ce8f179c5352a2064b40baa9df84b6bf8e04e12685c
                                      • Instruction Fuzzy Hash: 21118624E18B0A81EA80AB2BB810375BB61BF44755FC00737C89FA73A4DF3CD144C222
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: BlockFrameHandler3::Unwindabortterminate$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                      • String ID: csm$csm$csm
                                      • API String ID: 4223619315-393685449
                                      • Opcode ID: 28d9fe0dc564746e1165c302fc55894f033c11c1e4b232c9a3c91503718a418f
                                      • Instruction ID: 7f02b580788e4fa1df47b18635ed3f9c104eb01ac78d59d03868d9732d8d9692
                                      • Opcode Fuzzy Hash: 28d9fe0dc564746e1165c302fc55894f033c11c1e4b232c9a3c91503718a418f
                                      • Instruction Fuzzy Hash: BAD17C22A49B4186EB60AB6594A03AD77A0FB46798F140135EB8D57BB6DF3CF091C704
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Replicator::operator[]
                                      • String ID: `generic-type-$`template-parameter-$generic-type-$template-parameter-
                                      • API String ID: 3676697650-3207858774
                                      • Opcode ID: 64820509464fd6ff4b84ea6475a10b49d6616995939ea767522a00fbe31f1ef7
                                      • Instruction ID: c4c70d5e480958d415093b38266a6da8759473005199eb729cb703c1a652a473
                                      • Opcode Fuzzy Hash: 64820509464fd6ff4b84ea6475a10b49d6616995939ea767522a00fbe31f1ef7
                                      • Instruction Fuzzy Hash: 94916C22B8AE8699FB10AF20D4B02FC27A1AB56748F945131DA4E077B6DF3CF545C748
                                      APIs
                                      • isspace.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FFD944F00EB), ref: 00007FFD94518A4D
                                      • tolower.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FFD944F00EB), ref: 00007FFD94518AEA
                                      • memchr.VCRUNTIME140(?,?,?,?,?,?,00007FFD944F00EB), ref: 00007FFD94518AFC
                                      • tolower.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FFD944F00EB), ref: 00007FFD94518B37
                                      • memchr.VCRUNTIME140(?,?,?,?,?,?,00007FFD944F00EB), ref: 00007FFD94518B45
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00007FFD944F00EB), ref: 00007FFD94518BB1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: memchrtolower$_errnoisspace
                                      • String ID: 0$0$0$0123456789abcdefghijklmnopqrstuvwxyz
                                      • API String ID: 3508154992-176538734
                                      • Opcode ID: 70c141f73bae999968ebe817ac045cfe7e20f056ce18028f1a7eb433e8a8acf6
                                      • Instruction ID: b9d7c9a5ee48427354cb8b75e9ccefbbbb915c64f900f966e8cbfeb74a85ba84
                                      • Opcode Fuzzy Hash: 70c141f73bae999968ebe817ac045cfe7e20f056ce18028f1a7eb433e8a8acf6
                                      • Instruction Fuzzy Hash: 3151A652B0D6D64BEBB78AE094B477966906F4BBA4F1CC531CD9D06396DE3CE942C300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Current$CastDynamicMessageProcessStringThread__stdio_common_vsprintf_s
                                      • String ID: Assert Error$B$D:\a\Courier\Courier\ZipSendService\ZipSendService\UploadTask.cpp$Pid: %d Tid: %dExpr: %sFile: %sLine: %d$info_ == nullptr
                                      • API String ID: 2158136681-2391666810
                                      • Opcode ID: 18e653fa6f169c3ee023c9e6997143602141e330465365e98096114a40a402db
                                      • Instruction ID: 622085f005b58acecba70570318aa02ff05b6d049c867774e712f2fc4dbb85d0
                                      • Opcode Fuzzy Hash: 18e653fa6f169c3ee023c9e6997143602141e330465365e98096114a40a402db
                                      • Instruction Fuzzy Hash: 4D51A432A08B8586E750EF66E4403B97BA0FB84B84FC5423ADA8E67755DF3CE551C311
                                      APIs
                                        • Part of subcall function 00007FFD94519A10: ___lc_codepage_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A30
                                        • Part of subcall function 00007FFD94519A10: ___mb_cur_max_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A38
                                        • Part of subcall function 00007FFD94519A10: ___lc_locale_name_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A41
                                        • Part of subcall function 00007FFD94519A10: __pctype_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A5D
                                      • _Getdays.API-MS-WIN-CRT-TIME-L1-1-0(?,?,?,?,?,?,?,?,00000000,00007FFD944FEACE), ref: 00007FFD944F7036
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00007FFD944FEACE), ref: 00007FFD944F7056
                                      • _Maklocstr.LIBCPMT ref: 00007FFD944F7070
                                      • _Getmonths.API-MS-WIN-CRT-TIME-L1-1-0(?,?,?,?,?,?,?,?,00000000,00007FFD944FEACE), ref: 00007FFD944F7079
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00007FFD944FEACE), ref: 00007FFD944F7099
                                      • _Maklocstr.LIBCPMT ref: 00007FFD944F70B3
                                      • _Maklocstr.LIBCPMT ref: 00007FFD944F70C8
                                        • Part of subcall function 00007FFD944E4F00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FFD944F1894,?,?,?,00007FFD944E455B,?,?,?,00007FFD944E5C51), ref: 00007FFD944E4F22
                                        • Part of subcall function 00007FFD944E4F00: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FFD944F1894,?,?,?,00007FFD944E455B,?,?,?,00007FFD944E5C51), ref: 00007FFD944E4F48
                                        • Part of subcall function 00007FFD944E4F00: memcpy.VCRUNTIME140(?,?,?,00007FFD944F1894,?,?,?,00007FFD944E455B,?,?,?,00007FFD944E5C51), ref: 00007FFD944E4F60
                                      Strings
                                      • :Sun:Sunday:Mon:Monday:Tue:Tuesday:Wed:Wednesday:Thu:Thursday:Fri:Friday:Sat:Saturday, xrefs: 00007FFD944F7060
                                      • :AM:am:PM:pm, xrefs: 00007FFD944F70C1
                                      • :Jan:January:Feb:February:Mar:March:Apr:April:May:May:Jun:June:Jul:July:Aug:August:Sep:September:Oct:October:Nov:November:Dec:December, xrefs: 00007FFD944F70A3
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Maklocstrfree$GetdaysGetmonths___lc_codepage_func___lc_locale_name_func___mb_cur_max_func__pctype_funcmallocmemcpy
                                      • String ID: :AM:am:PM:pm$:Jan:January:Feb:February:Mar:March:Apr:April:May:May:Jun:June:Jul:July:Aug:August:Sep:September:Oct:October:Nov:November:Dec:December$:Sun:Sunday:Mon:Monday:Tue:Tuesday:Wed:Wednesday:Thu:Thursday:Fri:Friday:Sat:Saturday
                                      • API String ID: 2460671452-35662545
                                      • Opcode ID: dc0739515a7a86576b90c3e1a96f00c17ae4e5f85a1d68a3c4b3782ed53e0a0e
                                      • Instruction ID: 1196cb97a74baf2cef2842f9c9748855f4230422261c9bfeab5c1e988e0fbc02
                                      • Opcode Fuzzy Hash: dc0739515a7a86576b90c3e1a96f00c17ae4e5f85a1d68a3c4b3782ed53e0a0e
                                      • Instruction Fuzzy Hash: F5314F62B08B45C6EB21DFA1E8A02A977A5FB8AF80F458531DB4D0375ADF3CE181C340
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Name::operator+
                                      • String ID:
                                      • API String ID: 2943138195-0
                                      • Opcode ID: 4f3cdc343292aa6b77b4444b2aafc50e0404cdfcccec85b8854ab0fec35406c3
                                      • Instruction ID: 9181cd9655eab96af7d269c993d0f0fc5bafe5a9fb0c39d1a528a86b37407476
                                      • Opcode Fuzzy Hash: 4f3cdc343292aa6b77b4444b2aafc50e0404cdfcccec85b8854ab0fec35406c3
                                      • Instruction Fuzzy Hash: 03713D72B49A4299EB10EF65D0A11FC23B1EB0678CB809431DA0D57BBADF38E615C394
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ExceptionThrowstd::ios_base::failure::failure
                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                      • API String ID: 2003779279-1866435925
                                      • Opcode ID: 2900850eaf5c161de94a61c1d1de97a83468921e5b23e2bace5ef4ad86228e0b
                                      • Instruction ID: e8161adf3e2bd3e13240c8e441a3d8c3d6ed0ed1dd2b20facc6924d3ea26917a
                                      • Opcode Fuzzy Hash: 2900850eaf5c161de94a61c1d1de97a83468921e5b23e2bace5ef4ad86228e0b
                                      • Instruction Fuzzy Hash: 76919E22B18A4A81EAB68BD5D4F13BD2760FB42F84F44C432DA4D477AAEF6DD546C340
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: _invalid_parameter_noinfo_noreturn$Formatmemcpy$DateTimememmove
                                      • String ID: HHmmss$ZipShare\$yyyyMMdd
                                      • API String ID: 1648391657-1071675722
                                      • Opcode ID: 7ce1f77e4bf02c550869ebc7c276b33e708c188194edd653b4dfc4ef8a2fca41
                                      • Instruction ID: 55e5f99a504592d081e056221bc8a3b55cd0afa9689d3250469af8fedb0cc533
                                      • Opcode Fuzzy Hash: 7ce1f77e4bf02c550869ebc7c276b33e708c188194edd653b4dfc4ef8a2fca41
                                      • Instruction Fuzzy Hash: 7E71A562E08B8581EA40AB29E4443ADB761FB847A4FD05333EADE167A9DF7CD184C711
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: memcpy$_localtime64_s_time64memmovememsetwcsftime
                                      • String ID: %Y%m%d%H%M%S$.
                                      • API String ID: 3043386550-1074938333
                                      • Opcode ID: ce0e66ffbd78282ba408a55e13192fdd390516edaef0b52b2e0ed409794bc42a
                                      • Instruction ID: 4e4f0af7928bab4875865abd1e8870d5d114e0ccfbb1b41f17e4f5bb1bed34df
                                      • Opcode Fuzzy Hash: ce0e66ffbd78282ba408a55e13192fdd390516edaef0b52b2e0ed409794bc42a
                                      • Instruction Fuzzy Hash: 1051B232A08B8995DA50EF16E4402EEB761FB84B80FC40133DA9E5BB95EF3CE645C711
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Current$CastDynamicMessageProcessThread__stdio_common_vsprintf_s
                                      • String ID: Assert Error$D:\a\Courier\Courier\ZipSendService\ZipSendService\UploadTask.cpp$Pid: %d Tid: %dExpr: %sFile: %sLine: %d$X$info_ == nullptr
                                      • API String ID: 4188797845-2801632222
                                      • Opcode ID: f55abef53e0bc20ec4f2caf995eb7d79e851d4a7d16796457d1b3cb19d31598e
                                      • Instruction ID: d6464d3149b04280b170694edaf2605610a0d795b9027a2531c63ddb24c0318b
                                      • Opcode Fuzzy Hash: f55abef53e0bc20ec4f2caf995eb7d79e851d4a7d16796457d1b3cb19d31598e
                                      • Instruction Fuzzy Hash: ED51C232A14B8586E790EF66E4403A9BBA0FB88B84FC54236DB8E97751DF3CE554C311
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Name::operator+
                                      • String ID: `unknown ecsu'$class $coclass $cointerface $enum $struct $union
                                      • API String ID: 2943138195-1464470183
                                      • Opcode ID: a60277abc839728db8185859493b15a67fd6e22878adca3a0fa986c140fcfaf3
                                      • Instruction ID: d42c7656d7558b55b1256fa9d5c27302ad5561186cc07e2877e0bdcefb7e5caa
                                      • Opcode Fuzzy Hash: a60277abc839728db8185859493b15a67fd6e22878adca3a0fa986c140fcfaf3
                                      • Instruction Fuzzy Hash: FA513462F9AE16C8FB10EB64E8F05AC37B4BF06354F500035EA0E56BBADF2DA5448704
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Xp_setw$Xp_setn$Xp_addx$isspaceisxdigit
                                      • String ID:
                                      • API String ID: 2501290797-0
                                      • Opcode ID: 8cddcad3a3d6d4a1350eb31ea6c80334170057116226202367b8ca936c2e9a4c
                                      • Instruction ID: a74b37141953ebfa72ff7d74995d2dcdb03581a31251263948be3ddb36b78c79
                                      • Opcode Fuzzy Hash: 8cddcad3a3d6d4a1350eb31ea6c80334170057116226202367b8ca936c2e9a4c
                                      • Instruction Fuzzy Hash: E661E726F085029AE772DFE5D4E01FD3761AB5A748F508636DE0D2769BDE38E90AC700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Xp_setw$Xp_setn$Xp_addx$iswspaceiswxdigit
                                      • String ID:
                                      • API String ID: 3781602613-0
                                      • Opcode ID: 23ec25c14a62ac7a7091776c9814259c8478145b1004428f4984c21b260187c7
                                      • Instruction ID: 3f721a79c1147de0aef759e13ea285f328555b3416cd1bf06e6f40c87277aa7a
                                      • Opcode Fuzzy Hash: 23ec25c14a62ac7a7091776c9814259c8478145b1004428f4984c21b260187c7
                                      • Instruction Fuzzy Hash: BD61A626F085029AE772DEE1D4E01FD3761AB5A758F508635DE0D67A8EEE38E50AC700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190160805.00007FFDA54B1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA54B0000, based on PE: true
                                      • Associated: 00000005.00000002.2190144253.00007FFDA54B0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190175865.00007FFDA54B5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190190132.00007FFDA54B8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190204054.00007FFDA54B9000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda54b0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: abort$AdjustPointermemmove
                                      • String ID:
                                      • API String ID: 338301193-0
                                      • Opcode ID: bafb7092c6ea717c5b51bdfcc7bb64ec8c03cae7c73241a87bd8c5609a40f506
                                      • Instruction ID: 83bef234d413521cade96e8fdd3d558ed8ff239695a36dd94fcc3aa1ea7415b2
                                      • Opcode Fuzzy Hash: bafb7092c6ea717c5b51bdfcc7bb64ec8c03cae7c73241a87bd8c5609a40f506
                                      • Instruction Fuzzy Hash: 4751B032F0BA4A81EF6D8B5194A47386394AF47F80F0B9535CE4D56787DEACE4428308
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: abortterminate$Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                      • String ID: csm$csm$csm
                                      • API String ID: 211107550-393685449
                                      • Opcode ID: d68ba9ae6053e55c1f6dd5e81b00418c15c30b3383d366199ac7c5e764c2f6d1
                                      • Instruction ID: 11e63b4e759457bcd688399b6a6c77e804097ca40ded40f8766276bd07fb4e3f
                                      • Opcode Fuzzy Hash: d68ba9ae6053e55c1f6dd5e81b00418c15c30b3383d366199ac7c5e764c2f6d1
                                      • Instruction Fuzzy Hash: F8E1AF72A0AA828AE750AF24D4A03AC7BA0FB46758F144235DA9D57776CF3CF485CB04
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190160805.00007FFDA54B1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA54B0000, based on PE: true
                                      • Associated: 00000005.00000002.2190144253.00007FFDA54B0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190175865.00007FFDA54B5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190190132.00007FFDA54B8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190204054.00007FFDA54B9000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda54b0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: abortterminate$Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                      • String ID: csm$csm$csm
                                      • API String ID: 211107550-393685449
                                      • Opcode ID: c6ba75de018d68ffaf235a95367a862bb3cf87cd3e6af993e41b71dbc63c26de
                                      • Instruction ID: d5f5a19d1007f0c72e8c6fdd6439a896d501a5eb0b88b08dd74836ae9278f51b
                                      • Opcode Fuzzy Hash: c6ba75de018d68ffaf235a95367a862bb3cf87cd3e6af993e41b71dbc63c26de
                                      • Instruction Fuzzy Hash: 9FE1D132A0978A8AEF109F25D4A03AD77A0FB46B48F161235EA8D57757DF78E181C704
                                      APIs
                                      • FreeLibrary.KERNEL32(?,?,?,00007FFDA358C970,?,?,00000000,00007FFDA359094F,?,?,00000001,00007FFDA358AC69), ref: 00007FFDA358CB1C
                                      • GetProcAddress.KERNEL32(?,?,?,00007FFDA358C970,?,?,00000000,00007FFDA359094F,?,?,00000001,00007FFDA358AC69), ref: 00007FFDA358CB28
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189862502.00007FFDA3561000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3560000, based on PE: true
                                      • Associated: 00000005.00000002.2189849486.00007FFDA3560000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189887154.00007FFDA359D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189902000.00007FFDA35A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189916777.00007FFDA35AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189916777.00007FFDA35AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189942387.00007FFDA35B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189955378.00007FFDA35B3000.00000020.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2190056184.00007FFDA373C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda3560000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: AddressFreeLibraryProc
                                      • String ID: MZx$api-ms-$ext-ms-
                                      • API String ID: 3013587201-2431898299
                                      • Opcode ID: c0e430e080f2dc4e6cb9873d1b29f96695d8ce874c8e5368cb0b8f85829fe244
                                      • Instruction ID: 70b49361fd4908c8b4413c6b0aef3b884335f22804de5fd347071a3901493b30
                                      • Opcode Fuzzy Hash: c0e430e080f2dc4e6cb9873d1b29f96695d8ce874c8e5368cb0b8f85829fe244
                                      • Instruction Fuzzy Hash: 85412D62B1BA4242FB13CF1EA8245B66392BF467D0F484535DD0D67786EE3EE405A308
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Name::operator+
                                      • String ID: cli::array<$cli::pin_ptr<$std::nullptr_t$std::nullptr_t $void$void
                                      • API String ID: 2943138195-2239912363
                                      • Opcode ID: cdcca47889ab1cdae99d1bd304091cebbbe9ed3589e22fdf6d8f6cc6a4ab66a2
                                      • Instruction ID: 328704e7b7e4bf45496dc9fc24ca5c7283890f240dc5fa1b4a3dbcd5f2b774f7
                                      • Opcode Fuzzy Hash: cdcca47889ab1cdae99d1bd304091cebbbe9ed3589e22fdf6d8f6cc6a4ab66a2
                                      • Instruction Fuzzy Hash: E9514BA2F5AF5198FB11EB60D8A12BC77B0BB06745F444135EA4D12BB6DF7CA184C708
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ExceptionThrow$std::ios_base::failure::failure
                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                      • API String ID: 1099746521-1866435925
                                      • Opcode ID: 489d4bd0c01e22102b5730e69c1f066659ec9a10ac6b87fa36b8611991938bf0
                                      • Instruction ID: b3afbaf013561aa6700a44ace12bac5e5a373cc627e85cd25c93e0583aadf188
                                      • Opcode Fuzzy Hash: 489d4bd0c01e22102b5730e69c1f066659ec9a10ac6b87fa36b8611991938bf0
                                      • Instruction Fuzzy Hash: 6321D651F1850A91FAB587C0E4F16FB1321AF52780FD8C431D54D465ABEF6CE246C380
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: AddressProc$HandleModule
                                      • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                      • API String ID: 667068680-1247241052
                                      • Opcode ID: 1841e991687c70b8216430fa606aaaa9ee9f598abd87b0542e277fc463e639c5
                                      • Instruction ID: 9229471034b84f4d0844360b5a63792957710c2ff24eebb57c39dc9baf21c58c
                                      • Opcode Fuzzy Hash: 1841e991687c70b8216430fa606aaaa9ee9f598abd87b0542e277fc463e639c5
                                      • Instruction Fuzzy Hash: D3F0DA60B09E07D1EBA69FE1BCF40642360BF4A751B90D935C80E43326EF7DA499C380
                                      APIs
                                      • memmove.VCRUNTIME140(?,?,?,?,00007FF7E3BDD9B3,?,?,00000002,00007FF7E3BDCBF2), ref: 00007FF7E3BDDCFD
                                      • memmove.VCRUNTIME140(?,?,?,?,00007FF7E3BDD9B3,?,?,00000002,00007FF7E3BDCBF2), ref: 00007FF7E3BDDD14
                                      • memset.VCRUNTIME140(?,?,?,?,00007FF7E3BDD9B3,?,?,00000002,00007FF7E3BDCBF2), ref: 00007FF7E3BDDD29
                                      • memmove.VCRUNTIME140(?,?,?,?,00007FF7E3BDD9B3,?,?,00000002,00007FF7E3BDCBF2), ref: 00007FF7E3BDDD41
                                      • memmove.VCRUNTIME140(?,?,?,?,00007FF7E3BDD9B3,?,?,00000002,00007FF7E3BDCBF2), ref: 00007FF7E3BDDD5A
                                      • memset.VCRUNTIME140(?,?,?,?,00007FF7E3BDD9B3,?,?,00000002,00007FF7E3BDCBF2), ref: 00007FF7E3BDDD68
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF7E3BDD9B3,?,?,00000002,00007FF7E3BDCBF2), ref: 00007FF7E3BDDDCC
                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7E3BDDDD3
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,00007FF7E3BDD9B3,?,?,00000002,00007FF7E3BDCBF2), ref: 00007FF7E3BDDE68
                                        • Part of subcall function 00007FF7E3BE14EC: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E3BE1531,?,?,?,?,00007FF7E3BDC2D3), ref: 00007FF7E3BE1506
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: memmove$_invalid_parameter_noinfo_noreturnmemset$Concurrency::cancel_current_taskmalloc
                                      • String ID:
                                      • API String ID: 851562609-0
                                      • Opcode ID: 5ad273a4b8a43f6855b986b7a8ebd12d0e00e73eb1cdece1767ea2c4f93ca41c
                                      • Instruction ID: 4a2c528c65a6152c1aea88b2ae5ed4ec212cd6f34ce23019369825e1789d8436
                                      • Opcode Fuzzy Hash: 5ad273a4b8a43f6855b986b7a8ebd12d0e00e73eb1cdece1767ea2c4f93ca41c
                                      • Instruction Fuzzy Hash: 0B712621B19A8581EE40AB59E4403BCBBA0EF44BD4FD44636DAEE1BB99DF7CD041C311
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ExceptionThrowstd::ios_base::failure::failure
                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                      • API String ID: 2003779279-1866435925
                                      • Opcode ID: c539f59753844d1dc98f1ffe19b1b6ae9f13422cc828e2e910c28957e3180997
                                      • Instruction ID: beafb34ae481ebab030c4eb76719ee35b5cee9a6de73e8ccdd43fa381715b44b
                                      • Opcode Fuzzy Hash: c539f59753844d1dc98f1ffe19b1b6ae9f13422cc828e2e910c28957e3180997
                                      • Instruction Fuzzy Hash: 68618F22708A4A86EAB58BD5D4F13BD6760FB82F84F45C536CA4D477AADF2CD446C340
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ExceptionThrowfputwcfwritestd::ios_base::failure::failure
                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                      • API String ID: 1428583292-1866435925
                                      • Opcode ID: 711b0c6146fb416d12d36fe88960480654ddd48872be59a4ba01784264a13ef8
                                      • Instruction ID: f0c7024d105d0e70f038e515210db114a513536bc97e4bd7c111701288c52bdb
                                      • Opcode Fuzzy Hash: 711b0c6146fb416d12d36fe88960480654ddd48872be59a4ba01784264a13ef8
                                      • Instruction Fuzzy Hash: C161C033718A86D5EB60CFA5D0E02A933A0FF05B88F858032EA4D4776ADF79D595C740
                                      APIs
                                      • std::ios_base::failure::failure.LIBCPMT ref: 00007FFD94528C63
                                      • _CxxThrowException.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FFD9451ACB4), ref: 00007FFD94528C74
                                      • std::ios_base::failure::failure.LIBCPMT ref: 00007FFD94528CB7
                                      • _CxxThrowException.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FFD9451ACB4), ref: 00007FFD94528CC8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ExceptionThrowstd::ios_base::failure::failure
                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                      • API String ID: 2003779279-1866435925
                                      • Opcode ID: 328fc347e3c8245754ed9a7b60baaced4898e4347a34f50d9ec979a59ade1ed2
                                      • Instruction ID: 684d11a7bf8f8a4b2e3098d33fa805af542763d935014475843c86ca8dc4328f
                                      • Opcode Fuzzy Hash: 328fc347e3c8245754ed9a7b60baaced4898e4347a34f50d9ec979a59ade1ed2
                                      • Instruction Fuzzy Hash: C7619D62B08A4981EAB68BD5D4F03BD2760FB81F94F49C536CA4D477A6DF6CD44AC340
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: memchrtolower$_errnoisspace
                                      • String ID: 0123456789abcdefghijklmnopqrstuvwxyz
                                      • API String ID: 3508154992-4256519037
                                      • Opcode ID: 40463b482985df8b9f757077bc510e2cc07557704a9b012572fbb0a3e9f59514
                                      • Instruction ID: 9d3e7e25bcfeccd79081c0ae889a27e5db24f5dbce343113d9464618480e197e
                                      • Opcode Fuzzy Hash: 40463b482985df8b9f757077bc510e2cc07557704a9b012572fbb0a3e9f59514
                                      • Instruction Fuzzy Hash: 4F51E616F0C68695E7B79EE598B03797A90AB4AB94F088934CD8D42396DE3CE842C701
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ExceptionThrowstd::ios_base::failure::failure
                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                      • API String ID: 2003779279-1866435925
                                      • Opcode ID: bf7e3dd04ae35c8ed02a2fbfcd15c175d785d4dfe41701edacc95d7798bd3ac8
                                      • Instruction ID: 11f3213330a510e58f945898ee2daf98b53ded71ab578cb53ef99ec8adfa34ff
                                      • Opcode Fuzzy Hash: bf7e3dd04ae35c8ed02a2fbfcd15c175d785d4dfe41701edacc95d7798bd3ac8
                                      • Instruction Fuzzy Hash: F851BE22B08A8981EB61CB99D4E12BA6360FF86B88F94C531DA4D477BADF7CD445C740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Current$MessageProcessThread__stdio_common_vsprintf_s
                                      • String ID: Assert Error$D:\a\Courier\Courier\ZipSendService\ZipSendService\Serialize.h$Pid: %d Tid: %dExpr: %sFile: %sLine: %d$info != nullptr
                                      • API String ID: 982897249-766901785
                                      • Opcode ID: eb5298d06cc181e687fa8e02a9dd405bfebed12163c5587bc25a2aa1536b8f5d
                                      • Instruction ID: f29d24de2786092eea1b0a198c44517740c4610ecf1d2caae544040a2f8b59d5
                                      • Opcode Fuzzy Hash: eb5298d06cc181e687fa8e02a9dd405bfebed12163c5587bc25a2aa1536b8f5d
                                      • Instruction Fuzzy Hash: DC31E461B0868681EB64EB1AF4603FABB60AB157D8FC04237CADF67785DE3CD1448711
                                      APIs
                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FFDA4335863,?,?,00000000,00007FFDA4335694,?,?,?,?,00007FFDA43353D1), ref: 00007FFDA4335729
                                      • GetLastError.KERNEL32(?,?,?,00007FFDA4335863,?,?,00000000,00007FFDA4335694,?,?,?,?,00007FFDA43353D1), ref: 00007FFDA4335737
                                      • wcsncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FFDA4335863,?,?,00000000,00007FFDA4335694,?,?,?,?,00007FFDA43353D1), ref: 00007FFDA4335750
                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FFDA4335863,?,?,00000000,00007FFDA4335694,?,?,?,?,00007FFDA43353D1), ref: 00007FFDA4335762
                                      • FreeLibrary.KERNEL32(?,?,?,00007FFDA4335863,?,?,00000000,00007FFDA4335694,?,?,?,?,00007FFDA43353D1), ref: 00007FFDA43357D0
                                      • GetProcAddress.KERNEL32(?,?,?,00007FFDA4335863,?,?,00000000,00007FFDA4335694,?,?,?,?,00007FFDA43353D1), ref: 00007FFDA43357DC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Library$Load$AddressErrorFreeLastProcwcsncmp
                                      • String ID: api-ms-
                                      • API String ID: 916704608-2084034818
                                      • Opcode ID: e684dc1ea15019c11da8b5489464cae19cb3925c8f7c5ac0dd2cd0c8e7a31cf1
                                      • Instruction ID: c206a09f666aaf79d275a3827e978602bd3ad76d36643b490191e7b2e85a4a14
                                      • Opcode Fuzzy Hash: e684dc1ea15019c11da8b5489464cae19cb3925c8f7c5ac0dd2cd0c8e7a31cf1
                                      • Instruction Fuzzy Hash: 9231A121B5BE02D1EE25BB12A8B45B562A4BF16BA1F590535DD2E073B2DF3CF5448308
                                      APIs
                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FFDA54B35F3,?,?,00000000,00007FFDA54B3424,?,?,?,?,00007FFDA54B319D), ref: 00007FFDA54B34B9
                                      • GetLastError.KERNEL32(?,?,?,00007FFDA54B35F3,?,?,00000000,00007FFDA54B3424,?,?,?,?,00007FFDA54B319D), ref: 00007FFDA54B34C7
                                      • wcsncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FFDA54B35F3,?,?,00000000,00007FFDA54B3424,?,?,?,?,00007FFDA54B319D), ref: 00007FFDA54B34E0
                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FFDA54B35F3,?,?,00000000,00007FFDA54B3424,?,?,?,?,00007FFDA54B319D), ref: 00007FFDA54B34F2
                                      • FreeLibrary.KERNEL32(?,?,?,00007FFDA54B35F3,?,?,00000000,00007FFDA54B3424,?,?,?,?,00007FFDA54B319D), ref: 00007FFDA54B3560
                                      • GetProcAddress.KERNEL32(?,?,?,00007FFDA54B35F3,?,?,00000000,00007FFDA54B3424,?,?,?,?,00007FFDA54B319D), ref: 00007FFDA54B356C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190160805.00007FFDA54B1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA54B0000, based on PE: true
                                      • Associated: 00000005.00000002.2190144253.00007FFDA54B0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190175865.00007FFDA54B5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190190132.00007FFDA54B8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190204054.00007FFDA54B9000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda54b0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Library$Load$AddressErrorFreeLastProcwcsncmp
                                      • String ID: api-ms-
                                      • API String ID: 916704608-2084034818
                                      • Opcode ID: 4bec6726948007d4728554b5fde2ad41efbaba757065dfdcd168b9413cec3b88
                                      • Instruction ID: 6bc3562e67d120963be205feb6882f9b7baa0671f96e3066785d0c2ac276c4d4
                                      • Opcode Fuzzy Hash: 4bec6726948007d4728554b5fde2ad41efbaba757065dfdcd168b9413cec3b88
                                      • Instruction Fuzzy Hash: 2A31A131B1BB4A91EE12DB16B8207B96398FF46FA5F4A4534DD1D07342EEBCE5458304
                                      APIs
                                        • Part of subcall function 00007FFD94519A10: ___lc_codepage_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A30
                                        • Part of subcall function 00007FFD94519A10: ___mb_cur_max_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A38
                                        • Part of subcall function 00007FFD94519A10: ___lc_locale_name_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A41
                                        • Part of subcall function 00007FFD94519A10: __pctype_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A5D
                                      • _Getdays.API-MS-WIN-CRT-TIME-L1-1-0(?,?,?,?,?,?,?,?,00000000,00007FFD9451132E), ref: 00007FFD945101B6
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00007FFD9451132E), ref: 00007FFD945101D6
                                      • _Getmonths.API-MS-WIN-CRT-TIME-L1-1-0(?,?,?,?,?,?,?,?,00000000,00007FFD9451132E), ref: 00007FFD945101F9
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00007FFD9451132E), ref: 00007FFD94510219
                                        • Part of subcall function 00007FFD944E4F00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FFD944F1894,?,?,?,00007FFD944E455B,?,?,?,00007FFD944E5C51), ref: 00007FFD944E4F22
                                        • Part of subcall function 00007FFD944E4F00: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FFD944F1894,?,?,?,00007FFD944E455B,?,?,?,00007FFD944E5C51), ref: 00007FFD944E4F48
                                        • Part of subcall function 00007FFD944E4F00: memcpy.VCRUNTIME140(?,?,?,00007FFD944F1894,?,?,?,00007FFD944E455B,?,?,?,00007FFD944E5C51), ref: 00007FFD944E4F60
                                      Strings
                                      • :Sun:Sunday:Mon:Monday:Tue:Tuesday:Wed:Wednesday:Thu:Thursday:Fri:Friday:Sat:Saturday, xrefs: 00007FFD945101E0
                                      • :AM:am:PM:pm, xrefs: 00007FFD94510241
                                      • :Jan:January:Feb:February:Mar:March:Apr:April:May:May:Jun:June:Jul:July:Aug:August:Sep:September:Oct:October:Nov:November:Dec:December, xrefs: 00007FFD94510223
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: free$GetdaysGetmonths___lc_codepage_func___lc_locale_name_func___mb_cur_max_func__pctype_funcmallocmemcpy
                                      • String ID: :AM:am:PM:pm$:Jan:January:Feb:February:Mar:March:Apr:April:May:May:Jun:June:Jul:July:Aug:August:Sep:September:Oct:October:Nov:November:Dec:December$:Sun:Sunday:Mon:Monday:Tue:Tuesday:Wed:Wednesday:Thu:Thursday:Fri:Friday:Sat:Saturday
                                      • API String ID: 1539549574-35662545
                                      • Opcode ID: a676f0e7c2d71a14bdd62c4bfe13086be4823ae6ed3ee90dedd35561346ae13b
                                      • Instruction ID: 1ac4a632e2f75dd69e7fab2d8bf22f4491d79faf3ad8e92d3245f77bce7499b5
                                      • Opcode Fuzzy Hash: a676f0e7c2d71a14bdd62c4bfe13086be4823ae6ed3ee90dedd35561346ae13b
                                      • Instruction Fuzzy Hash: 5B312F62B08B45C6EB25DFA1E8A02A977A5FB8AF80F45C531DA4D0376ADF3CE141C740
                                      APIs
                                        • Part of subcall function 00007FFD94519A10: ___lc_codepage_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A30
                                        • Part of subcall function 00007FFD94519A10: ___mb_cur_max_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A38
                                        • Part of subcall function 00007FFD94519A10: ___lc_locale_name_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A41
                                        • Part of subcall function 00007FFD94519A10: __pctype_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A5D
                                      • _W_Getdays.API-MS-WIN-CRT-TIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FFD944FEBBE), ref: 00007FFD944F7132
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FFD944FEBBE), ref: 00007FFD944F7152
                                      • _W_Getmonths.API-MS-WIN-CRT-TIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FFD944FEBBE), ref: 00007FFD944F7170
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FFD944FEBBE), ref: 00007FFD944F7190
                                        • Part of subcall function 00007FFD944E4F80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FFD944F718D,?,?,?,?,?,?,?,?,?,00007FFD944FEBBE), ref: 00007FFD944E4FA9
                                        • Part of subcall function 00007FFD944E4F80: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FFD944F718D,?,?,?,?,?,?,?,?,?,00007FFD944FEBBE), ref: 00007FFD944E4FD8
                                        • Part of subcall function 00007FFD944E4F80: memcpy.VCRUNTIME140(?,?,00000000,00007FFD944F718D,?,?,?,?,?,?,?,?,?,00007FFD944FEBBE), ref: 00007FFD944E4FEF
                                      Strings
                                      • :Sun:Sunday:Mon:Monday:Tue:Tuesday:Wed:Wednesday:Thu:Thursday:Fri:Friday:Sat:Saturday, xrefs: 00007FFD944F715C
                                      • :Jan:January:Feb:February:Mar:March:Apr:April:May:May:Jun:June:Jul:July:Aug:August:Sep:September:Oct:October:Nov:November:Dec:Dece, xrefs: 00007FFD944F719A
                                      • :AM:am:PM:pm, xrefs: 00007FFD944F71AA
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: free$GetdaysGetmonths___lc_codepage_func___lc_locale_name_func___mb_cur_max_func__pctype_funcmallocmemcpy
                                      • String ID: :AM:am:PM:pm$:Jan:January:Feb:February:Mar:March:Apr:April:May:May:Jun:June:Jul:July:Aug:August:Sep:September:Oct:October:Nov:November:Dec:Dece$:Sun:Sunday:Mon:Monday:Tue:Tuesday:Wed:Wednesday:Thu:Thursday:Fri:Friday:Sat:Saturday
                                      • API String ID: 1539549574-3743323925
                                      • Opcode ID: 298cfb4e410774fa577b2ea169d7dc88918803f9a8023e5866419453c1425580
                                      • Instruction ID: a241ce5eaf2ff9a42681afd0935988997ea3672360f3716fb19d1b10b06328a7
                                      • Opcode Fuzzy Hash: 298cfb4e410774fa577b2ea169d7dc88918803f9a8023e5866419453c1425580
                                      • Instruction Fuzzy Hash: BE213E22B09B4586DA61DFA1E5A026973B0EB9AB80F449130DA4E0375AEF7CE484C740
                                      APIs
                                      • memcpy.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,?,00000000,?,?,?,00000000), ref: 00007FF7E3BD2BFB
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00000000,00000000,?,00000000,?,?,?,00000000), ref: 00007FF7E3BD2C81
                                      • memcpy.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,?,00000000,?,?,?,00000000), ref: 00007FF7E3BD2CA7
                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7E3BD2CD3
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00000000,?), ref: 00007FF7E3BD2DC2
                                        • Part of subcall function 00007FF7E3BE14EC: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E3BE1531,?,?,?,?,00007FF7E3BDC2D3), ref: 00007FF7E3BE1506
                                      • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00000000,?), ref: 00007FF7E3BD2DE7
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: memcpy$_invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskmalloc
                                      • String ID:
                                      • API String ID: 1888007232-0
                                      • Opcode ID: d36b9c1caab3303d327bff716c038a1d9a06cc36c6624c85828ceee40fea196e
                                      • Instruction ID: 0a4f7d615028bf1729af6b0ac669bea0ca7ddaf23cc988d44f24572d0927d6c2
                                      • Opcode Fuzzy Hash: d36b9c1caab3303d327bff716c038a1d9a06cc36c6624c85828ceee40fea196e
                                      • Instruction Fuzzy Hash: 94710862B09B8581EA94EB15E50036CB6A0EB44BF0FE84732DABE5B7D5DF3CD4918311
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: abort$AdjustPointer
                                      • String ID:
                                      • API String ID: 1501936508-0
                                      • Opcode ID: 98a416edc45a5e95c36baca34e5d44da6672747cfa60eeb2456210e7a9bbe22a
                                      • Instruction ID: 0f3e1f5deb2134ab872859cef67905ade0da13b3df1f8e47864d2e0aa95e6430
                                      • Opcode Fuzzy Hash: 98a416edc45a5e95c36baca34e5d44da6672747cfa60eeb2456210e7a9bbe22a
                                      • Instruction Fuzzy Hash: B551C022B8BE4281FE65EF4094F46786394AF16B81B098535DF5E067B7CF2CF8418708
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: abort$AdjustPointer
                                      • String ID:
                                      • API String ID: 1501936508-0
                                      • Opcode ID: 22208570b95ea64dd9b2aa500690151811944e6dc4ced560c8c87b5655b6ed86
                                      • Instruction ID: 0e5551f8e5cc84c51a46d5094360a159dc36778f74222958918d2fc41227f537
                                      • Opcode Fuzzy Hash: 22208570b95ea64dd9b2aa500690151811944e6dc4ced560c8c87b5655b6ed86
                                      • Instruction Fuzzy Hash: D751B321B8BE4281EEA5BF1190F467C63A4AF56B95F154435CB8E06BB7DF2CF4418308
                                      APIs
                                      • memcpy.VCRUNTIME140(?,?,?,?,?,0000000100000000,?,00007FF7E3BD238C), ref: 00007FF7E3BD337E
                                      • memcpy.VCRUNTIME140(?,?,?,?,?,0000000100000000,?,00007FF7E3BD238C), ref: 00007FF7E3BD3391
                                      • memcpy.VCRUNTIME140(?,?,?,?,?,0000000100000000,?,00007FF7E3BD238C), ref: 00007FF7E3BD33A2
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,0000000100000000,?,00007FF7E3BD238C), ref: 00007FF7E3BD33DA
                                      • memcpy.VCRUNTIME140(?,?,?,?,?,0000000100000000,?,00007FF7E3BD238C), ref: 00007FF7E3BD33E4
                                      • memcpy.VCRUNTIME140(?,?,?,?,?,0000000100000000,?,00007FF7E3BD238C), ref: 00007FF7E3BD33F7
                                      • memcpy.VCRUNTIME140(?,?,?,?,?,0000000100000000,?,00007FF7E3BD238C), ref: 00007FF7E3BD3406
                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7E3BD3439
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                      • String ID:
                                      • API String ID: 1775671525-0
                                      • Opcode ID: 0f2a9c3ad0a1f8abc1fc031ffe795402e0328c1c48188ed335372d23b1476403
                                      • Instruction ID: c2dcf3aa5c5e49626eaabaea961953373cb05114f298a9c0988b1e7eb7193741
                                      • Opcode Fuzzy Hash: 0f2a9c3ad0a1f8abc1fc031ffe795402e0328c1c48188ed335372d23b1476403
                                      • Instruction Fuzzy Hash: 4651A172709A8580DA90EB16E1443ADBB61EB44BE0FD44332DEAE57BDADE3CE145C311
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: _invalid_parameter_noinfo_noreturnmemsetstrcspn$localeconv
                                      • String ID:
                                      • API String ID: 4135771353-0
                                      • Opcode ID: 8dab499b34ffeabe5bf8aa86c3ce950b0a8127b366956c4d513acc89633725b8
                                      • Instruction ID: b705465fce1e8230b271e2ca3d02204e9485d02f9b3992dde1e74ecf53400ee3
                                      • Opcode Fuzzy Hash: 8dab499b34ffeabe5bf8aa86c3ce950b0a8127b366956c4d513acc89633725b8
                                      • Instruction Fuzzy Hash: FFF1C022F08AC589FB22CFE5D4A02BE6371EB46B98F548531DE4D1779ADE78D446C340
                                      APIs
                                      • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000038,?,?,00000000,00007FF7E3BDA57C), ref: 00007FF7E3BDCB56
                                      • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000038,?,?,00000000,00007FF7E3BDA57C), ref: 00007FF7E3BDCBD9
                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000038,?,?,00000000,00007FF7E3BDA57C), ref: 00007FF7E3BDCBF6
                                      • QueueUserWorkItem.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000038,?,?,00000000,00007FF7E3BDA57C), ref: 00007FF7E3BDCC12
                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000038,?,?,00000000,00007FF7E3BDA57C), ref: 00007FF7E3BDCC2D
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00000038,?,?,00000000,00007FF7E3BDA57C), ref: 00007FF7E3BDCC6D
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00000038,?,?,00000000,00007FF7E3BDA57C), ref: 00007FF7E3BDCCF3
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeave_invalid_parameter_noinfo_noreturn$ItemQueueUserWork
                                      • String ID:
                                      • API String ID: 3867203677-0
                                      • Opcode ID: b1d420479618e54f2758523f1ce81a6509be0f65fc7cc3866eee72a0a40e8747
                                      • Instruction ID: 53555c1ab9cebc0506ba3a4d9980346280bfdca00c800c649a839f71d10b8abe
                                      • Opcode Fuzzy Hash: b1d420479618e54f2758523f1ce81a6509be0f65fc7cc3866eee72a0a40e8747
                                      • Instruction Fuzzy Hash: AE71CE62A08A4192EA90EF16E44436ABBA0FB88BD0FC94132DB8E67B55DF3CD441C751
                                      APIs
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7E3BDDE88,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF7E3BDCAEB
                                      • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000038,?,?,00000000,00007FF7E3BDA57C), ref: 00007FF7E3BDCB56
                                      • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000038,?,?,00000000,00007FF7E3BDA57C), ref: 00007FF7E3BDCBD9
                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000038,?,?,00000000,00007FF7E3BDA57C), ref: 00007FF7E3BDCBF6
                                      • QueueUserWorkItem.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000038,?,?,00000000,00007FF7E3BDA57C), ref: 00007FF7E3BDCC12
                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000038,?,?,00000000,00007FF7E3BDA57C), ref: 00007FF7E3BDCC2D
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00000038,?,?,00000000,00007FF7E3BDA57C), ref: 00007FF7E3BDCC6D
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00000038,?,?,00000000,00007FF7E3BDA57C), ref: 00007FF7E3BDCCF3
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CriticalSection$_invalid_parameter_noinfo_noreturn$EnterLeave$ItemQueueUserWork
                                      • String ID:
                                      • API String ID: 380606389-0
                                      • Opcode ID: bf0ba21900bd0f492281c8739eb7739aec2d99d14466a480d607af6ee46b4fba
                                      • Instruction ID: 7c9539c03906c330e5d6f4091970909949abf590a83e90b7d7469eff353ac0aa
                                      • Opcode Fuzzy Hash: bf0ba21900bd0f492281c8739eb7739aec2d99d14466a480d607af6ee46b4fba
                                      • Instruction Fuzzy Hash: 5261CD72B08A4181EA90EB2AE44436DBBA0FB48B84FD40133DB9E57B55DF3CD485C751
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: FileHeader$ExceptionRaise
                                      • String ID: Access violation - no RTTI data!$Attempted a typeid of nullptr pointer!$Bad dynamic_cast!$Bad read pointer - no RTTI data!
                                      • API String ID: 3685223789-928371585
                                      • Opcode ID: 4f73c46b7be505823b8c23bdf2e01a106e3a134808b8006f3c7a9710838bb3a8
                                      • Instruction ID: b760bb35c07a2e77bf1f4100b3fe70e86ae7e24f45836bb60d734f5637bd2ce9
                                      • Opcode Fuzzy Hash: 4f73c46b7be505823b8c23bdf2e01a106e3a134808b8006f3c7a9710838bb3a8
                                      • Instruction Fuzzy Hash: AD518C22B5AE46A2DE20EB10E4F05B96360FF65B85F604531DA8E07776EE3CF545C704
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Name::operator+
                                      • String ID: {for
                                      • API String ID: 2943138195-864106941
                                      • Opcode ID: e28e9d1f3631d4fb5693f2a073767a0cc6dff7d4d31713262684a28cd151016f
                                      • Instruction ID: 36bd7dd1896e9ba0b2c99889e9ecd2b2ea884af378c262ad62674420ea1d15d0
                                      • Opcode Fuzzy Hash: e28e9d1f3631d4fb5693f2a073767a0cc6dff7d4d31713262684a28cd151016f
                                      • Instruction Fuzzy Hash: DE514D72B4AE85A9E711AF25D4A13EC63A0EB46748F808031EA4D47BB6DF7CE554C308
                                      APIs
                                      • memcpy.VCRUNTIME140(?,00000000,?,00007FFD944F15AF,?,?,?,?,00000000,00007FFD944EB801), ref: 00007FFD944EE04C
                                      • memset.VCRUNTIME140(?,00000000,?,00007FFD944F15AF,?,?,?,?,00000000,00007FFD944EB801), ref: 00007FFD944EE05C
                                      • memcpy.VCRUNTIME140(?,00000000,?,00007FFD944F15AF,?,?,?,?,00000000,00007FFD944EB801), ref: 00007FFD944EE071
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,00007FFD944F15AF,?,?,?,?,00000000,00007FFD944EB801), ref: 00007FFD944EE0A5
                                      • memcpy.VCRUNTIME140(?,00000000,?,00007FFD944F15AF,?,?,?,?,00000000,00007FFD944EB801), ref: 00007FFD944EE0AF
                                      • memset.VCRUNTIME140(?,00000000,?,00007FFD944F15AF,?,?,?,?,00000000,00007FFD944EB801), ref: 00007FFD944EE0BF
                                      • memcpy.VCRUNTIME140(?,00000000,?,00007FFD944F15AF,?,?,?,?,00000000,00007FFD944EB801), ref: 00007FFD944EE0CF
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: memcpy$memset$_invalid_parameter_noinfo_noreturn
                                      • String ID:
                                      • API String ID: 700262077-0
                                      • Opcode ID: b2bdcbd8606280514bc66d9d2951ba0696e1817c0948a1094c7d34a125e20018
                                      • Instruction ID: 94f788e5ce4da1d6f24daa9e51c92e1c988b61df337a675db3f454d4e742c133
                                      • Opcode Fuzzy Hash: b2bdcbd8606280514bc66d9d2951ba0696e1817c0948a1094c7d34a125e20018
                                      • Instruction Fuzzy Hash: D741C662B08A9181EE24EFA6E4A42AF6351FB45BD4F548532EF5D0BB9BDE7CD041C300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ExceptionThrowsetvbufstd::ios_base::failure::failure
                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                      • API String ID: 2924853686-1866435925
                                      • Opcode ID: 2c39280db052db23b3fddc9d3f67106f8d8e22556bd84a42786215674899bd93
                                      • Instruction ID: a0699bd961eb0f03eaecf0e40b879ee22199de67265f3a7b730eb2874c8a11fc
                                      • Opcode Fuzzy Hash: 2c39280db052db23b3fddc9d3f67106f8d8e22556bd84a42786215674899bd93
                                      • Instruction Fuzzy Hash: A041E072B04B4696EB68CFA0E1A03A933A0FF16B88F408131DA4C4765BDF7CE194C780
                                      APIs
                                      • localeconv.API-MS-WIN-CRT-LOCALE-L1-1-0 ref: 00007FFD945021BA
                                        • Part of subcall function 00007FFD94519A10: ___lc_codepage_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A30
                                        • Part of subcall function 00007FFD94519A10: ___mb_cur_max_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A38
                                        • Part of subcall function 00007FFD94519A10: ___lc_locale_name_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A41
                                        • Part of subcall function 00007FFD94519A10: __pctype_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A5D
                                      • _Maklocstr.LIBCPMT ref: 00007FFD94502233
                                      • _Maklocstr.LIBCPMT ref: 00007FFD94502249
                                      • _Getvals.LIBCPMT ref: 00007FFD945022EE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Maklocstr$Getvals___lc_codepage_func___lc_locale_name_func___mb_cur_max_func__pctype_funclocaleconv
                                      • String ID: false$true
                                      • API String ID: 2626534690-2658103896
                                      • Opcode ID: e8ddeff9f44de4f8fb278b4ead688765334a09998f0b454b1657f4843fedeccf
                                      • Instruction ID: 0ba8b1da3663300636fe2d34479f8e744ea38feefe510b3fcbba131d6f9557a2
                                      • Opcode Fuzzy Hash: e8ddeff9f44de4f8fb278b4ead688765334a09998f0b454b1657f4843fedeccf
                                      • Instruction Fuzzy Hash: 69415D26B08A81DAE721CFF4E4501ED33B1FB59748B409626EE4D27A5AEF38D596C340
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: NameName::atol
                                      • String ID: `template-parameter$void
                                      • API String ID: 2130343216-4057429177
                                      • Opcode ID: 59493a6d2a7aae2ddd4956f52367a67dab7b15104d6997a8396ea259485d124f
                                      • Instruction ID: 3704a202ac30f4f98836f43fab80ec26968499e54b92d53864a621528482f0ad
                                      • Opcode Fuzzy Hash: 59493a6d2a7aae2ddd4956f52367a67dab7b15104d6997a8396ea259485d124f
                                      • Instruction Fuzzy Hash: 41414A22F4AF5188FB00ABA0D8A52FC2371BB0A788F554135DE0D2A7B6DF7CA1458344
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Name::operator+Replicator::operator[]
                                      • String ID: ,...$,<ellipsis>$...$<ellipsis>$void
                                      • API String ID: 1405650943-2211150622
                                      • Opcode ID: 9f024d171a3f47a800bb80ab550b9114fa76043a2d4a8103672545ca5466c7ea
                                      • Instruction ID: cce7cd343359b2de719d316959377ff92bbdd48f78d46b0d3d8e74e13f208f6d
                                      • Opcode Fuzzy Hash: 9f024d171a3f47a800bb80ab550b9114fa76043a2d4a8103672545ca5466c7ea
                                      • Instruction Fuzzy Hash: 374138A2F4AF4698F701AB68D8B42FC37A0BB0A348F549535CA4D163B6DF7CA540C748
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Name::operator+
                                      • String ID: char $int $long $short $unsigned
                                      • API String ID: 2943138195-3894466517
                                      • Opcode ID: 3c3afed22fbae0bd15e2fc1efda1da40bd840b4d73e0681f55d3c70b90d1d654
                                      • Instruction ID: d5feab33ba5e29bafce852f3d2bbc98a0fa20508cd5bd40639a973e559eac66f
                                      • Opcode Fuzzy Hash: 3c3afed22fbae0bd15e2fc1efda1da40bd840b4d73e0681f55d3c70b90d1d654
                                      • Instruction Fuzzy Hash: 67312972F5AE51C9E701AB68D8F41AC27B1BB0A748F548135DA4E16BBADE3CE504C708
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Dunscale$_errno
                                      • String ID:
                                      • API String ID: 2900277114-0
                                      • Opcode ID: 5ce02b36a2e3a1ba29bfa6ab94e8b9aef83d290c33b12981f784d2203041673d
                                      • Instruction ID: 6e85b5940b9fd402c6ff3a9c834910779470ffe84ffdc3ef03e89d04a09b67fc
                                      • Opcode Fuzzy Hash: 5ce02b36a2e3a1ba29bfa6ab94e8b9aef83d290c33b12981f784d2203041673d
                                      • Instruction Fuzzy Hash: 04A1B316B18E4A89D7B2DEF884E01BD5362FF5B794F50C231EA4E165A6DF38E496C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Dunscale$_errno
                                      • String ID:
                                      • API String ID: 2900277114-0
                                      • Opcode ID: c63ac688d4028622990a585cde29c4c7eee12cff14747b8683a601da36398575
                                      • Instruction ID: 09f83e90d3162d77301815683a0d8e09c58ea62f7bfc2f9e12482d60ad99f8aa
                                      • Opcode Fuzzy Hash: c63ac688d4028622990a585cde29c4c7eee12cff14747b8683a601da36398575
                                      • Instruction Fuzzy Hash: 89A1E63BF0868A9AE7B6DEE685D10BC6311FF56745F64C230E60D1619ADF38B096D700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: fgetc
                                      • String ID:
                                      • API String ID: 2807381905-0
                                      • Opcode ID: da38ef9a5443db732ee562a96ebe53d1638a1f0b2d79e2a09f6e4dc9d3da73e8
                                      • Instruction ID: f4d654c5320aba0c3261e203c03294802bf52a3ff3e5d41013d680fbeaa77869
                                      • Opcode Fuzzy Hash: da38ef9a5443db732ee562a96ebe53d1638a1f0b2d79e2a09f6e4dc9d3da73e8
                                      • Instruction Fuzzy Hash: 59818B73709A81C9EF61CFA5D0E03AE73A0FB49748F448532EA5E46A9AEF78D454C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Xp_setn$Xp_addx$isspaceisxdigit
                                      • String ID:
                                      • API String ID: 2908567333-0
                                      • Opcode ID: 3e9e61286455fa8b0d4477d2a82ac41f9d5538707f36af545e6a498fbf202ff1
                                      • Instruction ID: da44e3f1a1a816c5f2d96ff66ee138ceadf1310c8f1fd56f96eae6d465c2e0a3
                                      • Opcode Fuzzy Hash: 3e9e61286455fa8b0d4477d2a82ac41f9d5538707f36af545e6a498fbf202ff1
                                      • Instruction Fuzzy Hash: 0661C522B1854282E7B2DFE5E4E05AE6760FB9A744F508532EE4E136A7DF3CD549CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Xp_setn$Xp_addx$iswspaceiswxdigit
                                      • String ID:
                                      • API String ID: 3490103321-0
                                      • Opcode ID: 6fd54ea143c9a280b0c11a3813756671dd877181ce86f25af51dd73d28c2cfcb
                                      • Instruction ID: 7c8d883447f73f0764221a4347aa0a2041e0226ef6592f95e53cea5472d6eba0
                                      • Opcode Fuzzy Hash: 6fd54ea143c9a280b0c11a3813756671dd877181ce86f25af51dd73d28c2cfcb
                                      • Instruction Fuzzy Hash: D061CB26B1C94292E7A2EED5D4E05BE6760FB8A744F508132EE4E1369BEF3CD545CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Xp_setn$Xp_addx$isspaceisxdigit
                                      • String ID:
                                      • API String ID: 2908567333-0
                                      • Opcode ID: d7605cebda99171b709e74a24857eaa706f155c27f07d91b9a12433e6d831dfc
                                      • Instruction ID: dadd03b14b7bcc6654e8cbaadcf2e158a4fdb7c98020872cedac12877abf383c
                                      • Opcode Fuzzy Hash: d7605cebda99171b709e74a24857eaa706f155c27f07d91b9a12433e6d831dfc
                                      • Instruction Fuzzy Hash: 9961D422B1854293E7B2DEE5E4E05AE6720FB8A344F508132EE4E13A97DE7CE506C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Xp_setn$Xp_addx$iswspaceiswxdigit
                                      • String ID:
                                      • API String ID: 3490103321-0
                                      • Opcode ID: d7eed582d395bd3741fee58c62c1966e5a70bade292dc389d8de865f8368d023
                                      • Instruction ID: 95adb553987a1fd362b9151790b763d61b170c0128aaa1862b32b5f24a05b261
                                      • Opcode Fuzzy Hash: d7eed582d395bd3741fee58c62c1966e5a70bade292dc389d8de865f8368d023
                                      • Instruction Fuzzy Hash: 7D61B822B1C54243D6A3EED5E4E05BE6760FB8A744F508132EE4E53A97DE7CD945C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Name::operator+$NameName::
                                      • String ID:
                                      • API String ID: 168861036-0
                                      • Opcode ID: 324be46c7699672607354ffe77b7e62202c9aa6b193d4e3f36b0da409810ee66
                                      • Instruction ID: 6dc866518ad8ac85748e03233e313120ccd74588b25c7c259cc5258de9e33d7a
                                      • Opcode Fuzzy Hash: 324be46c7699672607354ffe77b7e62202c9aa6b193d4e3f36b0da409810ee66
                                      • Instruction Fuzzy Hash: 68713572B4AE92C9FB10ABA4D8A02AC37A1BB46754F548131DA0E177B6DF7DE441C704
                                      APIs
                                      • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00000000,00000000,00000000,0000001F,?,?,00007FF7E3BD5E63), ref: 00007FF7E3BD6DE7
                                      • memset.VCRUNTIME140(?,?,?,?,?,?,?,00000000,00000000,00000000,0000001F,?,?,00007FF7E3BD5E63), ref: 00007FF7E3BD6DF0
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,0000001F,?,?,00007FF7E3BD5E63), ref: 00007FF7E3BD6DF5
                                      • _invalid_parameter_noinfo.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,0000001F,?,?,00007FF7E3BD5E63), ref: 00007FF7E3BD6E01
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,0000001F,?,?,00007FF7E3BD5E63), ref: 00007FF7E3BD6E8C
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,0000001F,?,?,00007FF7E3BD5E63), ref: 00007FF7E3BD6EEB
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: _invalid_parameter_noinfo_noreturn$_errno_invalid_parameter_noinfomemcpymemset
                                      • String ID:
                                      • API String ID: 3291378255-0
                                      • Opcode ID: 6a47b394aab36d93c049cfc821bcc7ec04938c3c2aad8afe9587cca9a65e85d4
                                      • Instruction ID: 688bf61b0825d5c124100ba8f55ab7d0de632eeecd133e2db183b52743e903f2
                                      • Opcode Fuzzy Hash: 6a47b394aab36d93c049cfc821bcc7ec04938c3c2aad8afe9587cca9a65e85d4
                                      • Instruction Fuzzy Hash: C851D662E0864A42FE90BB19E504379BA55EB447F4FD54333DABE2A7D5DE3CE4408312
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: _wcsdup$free
                                      • String ID:
                                      • API String ID: 2821050141-0
                                      • Opcode ID: 0a30ed8b38fdc64fe2349363889bf2098842113576166af62a13b061307e7fc4
                                      • Instruction ID: b0ca55c19a157dda9befc659f7e0f674be3045a442ea5f61722d52f00a34ed51
                                      • Opcode Fuzzy Hash: 0a30ed8b38fdc64fe2349363889bf2098842113576166af62a13b061307e7fc4
                                      • Instruction Fuzzy Hash: E9518525B19B4986EA80FB16E00426EBB94FF85BC4F940236EE8F57B54DE3CE544C712
                                      APIs
                                      • EnterCriticalSection.KERNEL32(?,?,?,?,?,00000000,00007FF7E3BE0237,?,?,?,?,?,?,?,?,00007FF7E3BD3CE8), ref: 00007FF7E3BD7423
                                      • Deinit.WXFMANAGER64(?,?,?,?,?,?,00007FF7E3BD7A05), ref: 00007FF7E3BD7548
                                      • DeleteWzExtensionsManager.WXFMANAGER64(?,?,?,?,?,?,00007FF7E3BD7A05), ref: 00007FF7E3BD7555
                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000,00007FF7E3BE0237,?,?,?,?,?,?,?,?,00007FF7E3BD3CE8), ref: 00007FF7E3BD755F
                                      • DeleteCriticalSection.KERNEL32(?,?,?,?,?,00000000,00007FF7E3BE0237,?,?,?,?,?,?,?,?,00007FF7E3BD3CE8), ref: 00007FF7E3BD7569
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,00000000,00007FF7E3BE0237,?,?,?,?,?,?,?,?,00007FF7E3BD3CE8), ref: 00007FF7E3BD7607
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CriticalSection$Delete$DeinitEnterExtensionsLeaveManager_invalid_parameter_noinfo_noreturn
                                      • String ID:
                                      • API String ID: 1609876981-0
                                      • Opcode ID: e80ae5a2692c9f82ceb8dd8b5c5ffda72f4e3df09b3e5e635b72ea5c17da2f3e
                                      • Instruction ID: 8bc0afab042718d0d7f07be068ccf6b2f1cec14676ac2bb57d49c45f29ea57c2
                                      • Opcode Fuzzy Hash: e80ae5a2692c9f82ceb8dd8b5c5ffda72f4e3df09b3e5e635b72ea5c17da2f3e
                                      • Instruction Fuzzy Hash: 25516E32615A4582DAA1AF26F4413AAFB61FB44B94FC44236DBDF57A94CF3CE440C712
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: FileHandle$CloseCreateInformation
                                      • String ID:
                                      • API String ID: 1240749428-0
                                      • Opcode ID: e0acb6e887bb951a0835afe1ec8fe70009cf8879c6c8ed950f02717f605faf88
                                      • Instruction ID: 9cfffa2c5cd93be059a22cc1d50666878539d1c06ab1490e4c2241a00497567f
                                      • Opcode Fuzzy Hash: e0acb6e887bb951a0835afe1ec8fe70009cf8879c6c8ed950f02717f605faf88
                                      • Instruction Fuzzy Hash: 9141E232F08641CAF761CFB1E8A03AE33A0EB59798F409735EE1D52A99DF389595C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: AcquireExclusiveLock$CurrentThreadsys_get_time
                                      • String ID:
                                      • API String ID: 184115430-0
                                      • Opcode ID: 11a15157c385787f894d150ae291b78bf2f3a54f076f7b340c30771fcdeb6fe5
                                      • Instruction ID: 58d39056b0b2d735b17ad3e932efe721f243410c25566a9dba022fcab7d208d7
                                      • Opcode Fuzzy Hash: 11a15157c385787f894d150ae291b78bf2f3a54f076f7b340c30771fcdeb6fe5
                                      • Instruction Fuzzy Hash: BC412C32B18A06D6E7748F91D4A027973A0FF52B44FC08675D64E8269ADF7EE891CB01
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CastDynamic$_errno_invalid_parameter_noinfomemcpymemset
                                      • String ID:
                                      • API String ID: 2153630693-0
                                      • Opcode ID: 5d509c29bebb33a4b0074b62644f6fda2cfd391f415c591955fd2fa19a0f65d7
                                      • Instruction ID: e3db66e6ba88bdbfc13fa4938ecd9d44cfc2b5b5ddaba9f75aea7048e076ff54
                                      • Opcode Fuzzy Hash: 5d509c29bebb33a4b0074b62644f6fda2cfd391f415c591955fd2fa19a0f65d7
                                      • Instruction Fuzzy Hash: CF319362B0CA8291EA61EB56E4043AAFB64FB84754FC14133DA8F63744DF3CE605D622
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: free$EntryInterlockedListNamePush__unmallocstrcpy_s
                                      • String ID:
                                      • API String ID: 3741236498-0
                                      • Opcode ID: 866ea2b764558c050a0cc0a8bbb3401513b7e8aca2bfba0586f224786ad82dc5
                                      • Instruction ID: 80b8c05039443306a2b01f6b8faac0b395f27ba150242acce974a7d1d083b31c
                                      • Opcode Fuzzy Hash: 866ea2b764558c050a0cc0a8bbb3401513b7e8aca2bfba0586f224786ad82dc5
                                      • Instruction Fuzzy Hash: CF31C622B57F5151EE11EB15A8685A923A0BF1ABD4B554531DD2E033A2EE3DE842C344
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ConditionSleepVariablesys_get_time$CurrentThreadabort
                                      • String ID:
                                      • API String ID: 330701040-0
                                      • Opcode ID: 0fdbf4683e24fee20d2a60a7c231d24d24362fbfc9649aa6435325675bbe1770
                                      • Instruction ID: f66b20b52b4ed2d725d1bc86a3fa52986d36f0c064fb8ab3f3519e5f1d78306d
                                      • Opcode Fuzzy Hash: 0fdbf4683e24fee20d2a60a7c231d24d24362fbfc9649aa6435325675bbe1770
                                      • Instruction Fuzzy Hash: B011F6B371460286FB75DBA5E4A15696360FF86B94F808631DD1D8369AEF3DC542C700
                                      APIs
                                      • GetLastError.KERNEL32(?,?,?,00007FFDA358EF69,?,?,?,?,00007FFDA358E1FC), ref: 00007FFDA358CE23
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFDA358EF69,?,?,?,?,00007FFDA358E1FC), ref: 00007FFDA358CE59
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFDA358EF69,?,?,?,?,00007FFDA358E1FC), ref: 00007FFDA358CE86
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFDA358EF69,?,?,?,?,00007FFDA358E1FC), ref: 00007FFDA358CE97
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFDA358EF69,?,?,?,?,00007FFDA358E1FC), ref: 00007FFDA358CEA8
                                      • SetLastError.KERNEL32(?,?,?,00007FFDA358EF69,?,?,?,?,00007FFDA358E1FC), ref: 00007FFDA358CEC3
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189862502.00007FFDA3561000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3560000, based on PE: true
                                      • Associated: 00000005.00000002.2189849486.00007FFDA3560000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189887154.00007FFDA359D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189902000.00007FFDA35A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189916777.00007FFDA35AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189916777.00007FFDA35AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189942387.00007FFDA35B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189955378.00007FFDA35B3000.00000020.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2190056184.00007FFDA373C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda3560000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Value$ErrorLast
                                      • String ID:
                                      • API String ID: 2506987500-0
                                      • Opcode ID: 94517cf9672c66fc30c61a9200baee077cc0c8df5f6e0ce772c0e82fdb4e8889
                                      • Instruction ID: 192287a515418fa1cdf1fc692fad526bd62c1e55b7e6fe11eb8870c7acbc03e0
                                      • Opcode Fuzzy Hash: 94517cf9672c66fc30c61a9200baee077cc0c8df5f6e0ce772c0e82fdb4e8889
                                      • Instruction Fuzzy Hash: 4C114F22F0B68243FA579339557503992939F457B0F840A34D92E677D7DE2EB441A308
                                      APIs
                                      • ___lc_codepage_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,00000000,00007FFD944E60B6), ref: 00007FFD944E2FA9
                                      • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FFD944E60B6), ref: 00007FFD944E2FBB
                                      • __pctype_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,00000000,00007FFD944E60B6), ref: 00007FFD944E2FCA
                                      • __pctype_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,00000000,00007FFD944E60B6), ref: 00007FFD944E3030
                                      • ___lc_locale_name_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,00000000,00007FFD944E60B6), ref: 00007FFD944E303E
                                      • _wcsdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,00007FFD944E60B6), ref: 00007FFD944E3051
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: __pctype_func$___lc_codepage_func___lc_locale_name_func_wcsdupcalloc
                                      • String ID:
                                      • API String ID: 490008815-0
                                      • Opcode ID: 883c42097863d2430cc01175ace05e63b8581df211ad2e3c91a792b828fdf2a8
                                      • Instruction ID: c06bc86b6c387ac6c9faeebafc5f7551b4f5b543dda42c17b7bc26ec08602b1b
                                      • Opcode Fuzzy Hash: 883c42097863d2430cc01175ace05e63b8581df211ad2e3c91a792b828fdf2a8
                                      • Instruction Fuzzy Hash: 27215162E08B85C3E7168FB8C5612787360FBAAB48F15E620CE8C06217DF79E1D5C340
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: abort$CallEncodePointerTranslator
                                      • String ID: MOC$RCC
                                      • API String ID: 2889003569-2084237596
                                      • Opcode ID: 73384d943c82023c9b92037721da8eb0cad5d5e78b685c30dae3c1ceff46f5e3
                                      • Instruction ID: f19d3eb62ca6325580501073c946c21b7859f9b11b882feb18cb6f3f5e350c7d
                                      • Opcode Fuzzy Hash: 73384d943c82023c9b92037721da8eb0cad5d5e78b685c30dae3c1ceff46f5e3
                                      • Instruction Fuzzy Hash: 95919273B09B918AE710EB64E4A02AD77B0FB45788F108125EA8D57776DF3CE195C704
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190160805.00007FFDA54B1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA54B0000, based on PE: true
                                      • Associated: 00000005.00000002.2190144253.00007FFDA54B0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190175865.00007FFDA54B5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190190132.00007FFDA54B8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190204054.00007FFDA54B9000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda54b0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: abort$CallEncodePointerTranslator
                                      • String ID: MOC$RCC
                                      • API String ID: 2889003569-2084237596
                                      • Opcode ID: e219486185c9a6c876cb8926008b3bded5c074c836f53f255e0545f36a685c03
                                      • Instruction ID: 219b3d92c7b9170f3c8826f37f9192c46ab591a145495d40b7325545cff08e46
                                      • Opcode Fuzzy Hash: e219486185c9a6c876cb8926008b3bded5c074c836f53f255e0545f36a685c03
                                      • Instruction Fuzzy Hash: 5C91D373B09B898AEB10CF65E8503AD77B0FB46B88F114129EA8C17756DF78E195C704
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Name::operator+
                                      • String ID: std::nullptr_t$std::nullptr_t $volatile$volatile
                                      • API String ID: 2943138195-757766384
                                      • Opcode ID: dd1429a5ed7d4145acb9ee615fdcef798bfb655970b58e36f34b395a959dc1bb
                                      • Instruction ID: 4850342f9d4b2bcd1b5f7c621bed3b2f44392807910e956a87543f5eca78c3a6
                                      • Opcode Fuzzy Hash: dd1429a5ed7d4145acb9ee615fdcef798bfb655970b58e36f34b395a959dc1bb
                                      • Instruction Fuzzy Hash: 2E713A72B8AE4284EB14BB6498B00BC77A5BB07B85F444535DA4E56BB6DF7CB150C308
                                      APIs
                                      • __except_validate_context_record.LIBVCRUNTIME ref: 00007FFDA4332DDA
                                        • Part of subcall function 00007FFDA4335508: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FFDA433108E), ref: 00007FFDA4335516
                                      • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFDA4332F2F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: abort$__except_validate_context_record
                                      • String ID: $csm$csm
                                      • API String ID: 3000080923-1512788406
                                      • Opcode ID: a6e101957fe1e77dd933d7c2405cc9f0679c2286e7cee33148c3554897acf41d
                                      • Instruction ID: 77ab0a5ff3fa72a46f4318f368ba05d47bfa8edb3def4ba50a777c95392aed1b
                                      • Opcode Fuzzy Hash: a6e101957fe1e77dd933d7c2405cc9f0679c2286e7cee33148c3554897acf41d
                                      • Instruction Fuzzy Hash: C771A332A0AA8186D761AF1190B07797BA0FB06F85F149135EA5D57BBACB3CE491C704
                                      APIs
                                      • __except_validate_context_record.LIBVCRUNTIME ref: 00007FFDA54B1F52
                                        • Part of subcall function 00007FFDA54B3374: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,00007FFDA54B1082), ref: 00007FFDA54B33B4
                                      • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFDA54B20A7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190160805.00007FFDA54B1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA54B0000, based on PE: true
                                      • Associated: 00000005.00000002.2190144253.00007FFDA54B0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190175865.00007FFDA54B5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190190132.00007FFDA54B8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190204054.00007FFDA54B9000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda54b0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: abort$__except_validate_context_record
                                      • String ID: $csm$csm
                                      • API String ID: 3000080923-1512788406
                                      • Opcode ID: 971032131d011c8ceed9186027e105cd692b4e6c1ddef89ad5d79e80dbf73767
                                      • Instruction ID: 830ec44b473b44a9a2e7869ba971ddd3b912f19c782918e318ec7fe2acdd52e7
                                      • Opcode Fuzzy Hash: 971032131d011c8ceed9186027e105cd692b4e6c1ddef89ad5d79e80dbf73767
                                      • Instruction Fuzzy Hash: B871AE72B0E68686DF608B2594A077D7BA0FB06F89F158135EB4D07B8ACB7CD491C748
                                      APIs
                                      • DeleteCriticalSection.KERNEL32(?,?,00000000,00007FF7E3BD3FD2,?,?,00000000,00007FF7E3BDB26D), ref: 00007FF7E3BDB0BA
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00007FF7E3BD3FD2,?,?,00000000,00007FF7E3BDB26D), ref: 00007FF7E3BDB10C
                                      • InitializeCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00000000,?), ref: 00007FF7E3BDB201
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00000000,?), ref: 00007FF7E3BDB31A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CriticalSection_invalid_parameter_noinfo_noreturn$DeleteInitialize
                                      • String ID: D:\a\Courier\Courier\ZipSendService\Utils\Serialize.h$false
                                      • API String ID: 827790545-1469131792
                                      • Opcode ID: fa32023aa47d9daf4aa97d8131ae0bbb6f5b01df7f1709e596794da2fbb631c5
                                      • Instruction ID: b61c72a669197555fb977f29b5a94d43a48fc21414db0c5a5a53042940312236
                                      • Opcode Fuzzy Hash: fa32023aa47d9daf4aa97d8131ae0bbb6f5b01df7f1709e596794da2fbb631c5
                                      • Instruction Fuzzy Hash: BF41E662B0964581EA44EB2AE40436DBBA0EF44BE8FD44233DFAE177D4DE7CD4918312
                                      APIs
                                      • __except_validate_context_record.LIBVCRUNTIME ref: 00007FFDA4332BB0
                                        • Part of subcall function 00007FFDA4335508: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FFDA433108E), ref: 00007FFDA4335516
                                      • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFDA4332C7F
                                      • __FrameHandler3::FrameUnwindToEmptyState.LIBVCRUNTIME ref: 00007FFDA4332C8F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Frameabort$EmptyHandler3::StateUnwind__except_validate_context_record
                                      • String ID: csm$csm
                                      • API String ID: 1245442199-3733052814
                                      • Opcode ID: 03e2a13ccd19e9d954db063dad7120f2276b320a18aa339786b3d5ef8d3b8248
                                      • Instruction ID: 503037e4d511d789fe038d45f188786218b6cf4c1e3258448257bf543730b3de
                                      • Opcode Fuzzy Hash: 03e2a13ccd19e9d954db063dad7120f2276b320a18aa339786b3d5ef8d3b8248
                                      • Instruction Fuzzy Hash: F861B236749A828AEB64AF1290B436877A0FB56B85F148135DA6D43BF6CF3CF451C708
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: abort$CallEncodePointerTranslator
                                      • String ID: MOC$RCC
                                      • API String ID: 2889003569-2084237596
                                      • Opcode ID: 412ae4e05827d5c660a41158829c13d418b7430c0a058c8386c48240e8dbe5b4
                                      • Instruction ID: b7565159fdc6a75320c9e84291dcbed956339622c5d72f2d68198669dcd051d3
                                      • Opcode Fuzzy Hash: 412ae4e05827d5c660a41158829c13d418b7430c0a058c8386c48240e8dbe5b4
                                      • Instruction Fuzzy Hash: 4C619432A09F8581E7609B15E4A03AAB7A0FB86794F048225EB9D43776DF3CE190CB04
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: FileHeader
                                      • String ID: MOC$RCC$csm$csm
                                      • API String ID: 104395404-1441736206
                                      • Opcode ID: 2f7819a6e7334cd80d7289c252f885002fdbf5779c1e806f6eb8d82655ad3f9b
                                      • Instruction ID: 0948624822cb40c5a7c3f650ba392868da1172ea86809605acd496497db7bb27
                                      • Opcode Fuzzy Hash: 2f7819a6e7334cd80d7289c252f885002fdbf5779c1e806f6eb8d82655ad3f9b
                                      • Instruction Fuzzy Hash: 1B519D26B4AE4296EA60EF1191B017D2AA0FF56798F240135EE8D43773DF3CF8618709
                                      APIs
                                      • isspace.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FFD94517AD2), ref: 00007FFD945186BC
                                      • isxdigit.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FFD94517AD2), ref: 00007FFD9451871C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: isspaceisxdigit
                                      • String ID: ($0
                                      • API String ID: 2593999819-506339136
                                      • Opcode ID: e2ef1f78d7ac0f0247cf27d29176a06a3da0d91fe8ad8e2b8a2eac6abd7fdfaf
                                      • Instruction ID: b03c1001ba2394df8d170c5a2cd891282fa68e0300e9b19adb67d56abf609379
                                      • Opcode Fuzzy Hash: e2ef1f78d7ac0f0247cf27d29176a06a3da0d91fe8ad8e2b8a2eac6abd7fdfaf
                                      • Instruction Fuzzy Hash: B641865AF0C6C645FBF64EF254B02B96B919B1BB84F0DD471CAD90B247DA1EE842D310
                                      APIs
                                      • iswspace.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FFD94519B92), ref: 00007FFD9451A585
                                      • iswxdigit.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FFD94519B92), ref: 00007FFD9451A5FA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: iswspaceiswxdigit
                                      • String ID: ($0
                                      • API String ID: 1229460652-506339136
                                      • Opcode ID: bdef79badc771c1f0ff5e8a20c9d4d2ce4eb6723a0feef1680779b9e07fe3076
                                      • Instruction ID: d343cb8388adec6abc042d9c99b8a7ca8b341e39a435db0b10d0fe65f6afb07a
                                      • Opcode Fuzzy Hash: bdef79badc771c1f0ff5e8a20c9d4d2ce4eb6723a0feef1680779b9e07fe3076
                                      • Instruction Fuzzy Hash: E6419456F1815784EBB76FE594B01B976A0EB09BD4B45C131DE8A4B1D6FB3CEC81C220
                                      APIs
                                        • Part of subcall function 00007FFD94519A10: ___lc_codepage_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A30
                                        • Part of subcall function 00007FFD94519A10: ___mb_cur_max_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A38
                                        • Part of subcall function 00007FFD94519A10: ___lc_locale_name_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A41
                                        • Part of subcall function 00007FFD94519A10: __pctype_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A5D
                                      • localeconv.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,?,?,?,?,?,?,00007FFD944FE478), ref: 00007FFD94502086
                                        • Part of subcall function 00007FFD944EBD64: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FFD945101F5,?,?,?,?,?,?,?,?,00000000,00007FFD9451132E), ref: 00007FFD944EBD8F
                                        • Part of subcall function 00007FFD944EBD64: memcpy.VCRUNTIME140(?,?,00000000,00007FFD945101F5,?,?,?,?,?,?,?,?,00000000,00007FFD9451132E), ref: 00007FFD944EBDAB
                                      • _Getvals.LIBCPMT ref: 00007FFD945020C3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Getvals___lc_codepage_func___lc_locale_name_func___mb_cur_max_func__pctype_funccalloclocaleconvmemcpy
                                      • String ID: $+xv$$+xv$+v$x+v$xv$+xv+$xv$+x+$vx+$vx$v+x+$vx$+vx+v $+v $v $+v +$v $++$ v+$ v$ v++$ v$+ v+xv$+ v$v$ +v+ $v$ ++x$v+ $v$v ++ $v$ +v
                                      • API String ID: 3848194746-3573081731
                                      • Opcode ID: 1ec5abaf6d247c21dd65d46c1376d9a6c6ce35e130d675db4465f8a48783e3d9
                                      • Instruction ID: bef28411fb4a9e6a115553ee37a49bea7cf9009078672902f0f728add7a6e9fa
                                      • Opcode Fuzzy Hash: 1ec5abaf6d247c21dd65d46c1376d9a6c6ce35e130d675db4465f8a48783e3d9
                                      • Instruction Fuzzy Hash: 3241B176A08B8187E772CBA5D0A036E7BA0FB56B41F148235D78E43A56DB3CF455CB00
                                      APIs
                                      • localeconv.API-MS-WIN-CRT-LOCALE-L1-1-0 ref: 00007FFD94502346
                                        • Part of subcall function 00007FFD94519A10: ___lc_codepage_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A30
                                        • Part of subcall function 00007FFD94519A10: ___mb_cur_max_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A38
                                        • Part of subcall function 00007FFD94519A10: ___lc_locale_name_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A41
                                        • Part of subcall function 00007FFD94519A10: __pctype_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A5D
                                      • _Maklocstr.LIBCPMT ref: 00007FFD945023BF
                                      • _Maklocstr.LIBCPMT ref: 00007FFD945023D5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Maklocstr$___lc_codepage_func___lc_locale_name_func___mb_cur_max_func__pctype_funclocaleconv
                                      • String ID: false$true
                                      • API String ID: 309754672-2658103896
                                      • Opcode ID: 8420a7fc07adde042e9aa853236ff2f15139374f13f4dc885c891cff135176ba
                                      • Instruction ID: ddd0fc03aa55cf2c138180192778d5659141bbf049c5509fac3b8fc9e3244239
                                      • Opcode Fuzzy Hash: 8420a7fc07adde042e9aa853236ff2f15139374f13f4dc885c891cff135176ba
                                      • Instruction Fuzzy Hash: 41415C22B18B55DAE721CFB0E4A01ED33B0FB49748B409126EE4D27B5AEF38D595C394
                                      APIs
                                      • GetCurrentProcessId.KERNEL32(00000000,00000000,?,00007FF7E3BD9C00), ref: 00007FF7E3BE0DEE
                                      • GetCurrentThreadId.KERNEL32 ref: 00007FF7E3BE0DF6
                                      • __stdio_common_vsprintf_s.API-MS-WIN-CRT-STDIO-L1-1-0(?,00007FF7E3BD9C00), ref: 00007FF7E3BE0E27
                                        • Part of subcall function 00007FF7E3BE0C90: __stdio_common_vsprintf_s.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7E3BE0CD3
                                      • OutputDebugStringA.KERNEL32(?,00007FF7E3BD9C00), ref: 00007FF7E3BE0E59
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Current__stdio_common_vsprintf_s$DebugOutputProcessStringThread
                                      • String ID: (Pid:%d Tid:%d) %s
                                      • API String ID: 160427554-3798064394
                                      • Opcode ID: 857a4afaca7148da064c214dea17dd104c927150d8877efe671ed6d275088f4a
                                      • Instruction ID: 01a778384ca3a6a72ccc9651545e7f7228946bffe78903fcdce151ca2059acb1
                                      • Opcode Fuzzy Hash: 857a4afaca7148da064c214dea17dd104c927150d8877efe671ed6d275088f4a
                                      • Instruction Fuzzy Hash: 9511B632A18B8581E660EB16F44479ABB74FB847C4F800236EACE53769DF3CD555CB11
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Current__stdio_common_vsprintf_s$MessageProcessThread
                                      • String ID: Log (Pid:%d Tid:%d)
                                      • API String ID: 2381413097-233322029
                                      • Opcode ID: 7b0c2db81a119c7272ae00332ae729ab3a4f3be0ebd202792762320b74d3949a
                                      • Instruction ID: b5a18755bed05598b5593ddf074311c0b90314f370baa34bcabecf1d67a1a81e
                                      • Opcode Fuzzy Hash: 7b0c2db81a119c7272ae00332ae729ab3a4f3be0ebd202792762320b74d3949a
                                      • Instruction Fuzzy Hash: BA118632A18B8581E760AB25F44079ABB60FB98784FC00237E5CE57658DF7CD145CB51
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Current$MessageProcessThread__stdio_common_vsprintf_s
                                      • String ID: Assert Error$Pid: %d Tid: %dExpr: %sFile: %sLine: %d
                                      • API String ID: 982897249-2518543418
                                      • Opcode ID: e0909f1a76138fb62ef89ea4caa9beb96132be26d373f8b136845926e9534370
                                      • Instruction ID: 69878dfc8274a0b047ea59bd8413432280af4db71f3967f66e2dd7cd968b4a34
                                      • Opcode Fuzzy Hash: e0909f1a76138fb62ef89ea4caa9beb96132be26d373f8b136845926e9534370
                                      • Instruction Fuzzy Hash: C3016531A18A8982E760AB2AF44439ABB64BB487C4FC00236EACE97755DE7CD5458B11
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ExceptionThrowstd::ios_base::failure::failure
                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                      • API String ID: 2003779279-1866435925
                                      • Opcode ID: 65f2a329a35e87765cd5ea0f00b2bfb6ac6d7c9b9a83f26788299c5baf829f51
                                      • Instruction ID: b0b7ab24a65345b4ef607ab62638cb12e3e9391cc3e8969ba9408c2aa4c17756
                                      • Opcode Fuzzy Hash: 65f2a329a35e87765cd5ea0f00b2bfb6ac6d7c9b9a83f26788299c5baf829f51
                                      • Instruction Fuzzy Hash: A9F0DF22B1850AC6FEB5C784E4E16AA2321FB51784F94C830D10D475ABEF7CE146C381
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189862502.00007FFDA3561000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3560000, based on PE: true
                                      • Associated: 00000005.00000002.2189849486.00007FFDA3560000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189887154.00007FFDA359D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189902000.00007FFDA35A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189916777.00007FFDA35AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189916777.00007FFDA35AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189942387.00007FFDA35B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189955378.00007FFDA35B3000.00000020.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2190056184.00007FFDA373C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda3560000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: AddressFreeHandleLibraryModuleProc
                                      • String ID: CorExitProcess$mscoree.dll
                                      • API String ID: 4061214504-1276376045
                                      • Opcode ID: 6db8ab84d2048a8725801e3fb6eb5a638b76bc0903a28801e32ec6b4e6f5ca1e
                                      • Instruction ID: b3d316128648bd423ba25a687412bb0f092fa5f872d24b923866d637386e132f
                                      • Opcode Fuzzy Hash: 6db8ab84d2048a8725801e3fb6eb5a638b76bc0903a28801e32ec6b4e6f5ca1e
                                      • Instruction Fuzzy Hash: 79F0C861F1AA4682EE164B2CE46C3395361FF44761F540635D66E573E1CF2ED048E308
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: _invalid_parameter_noinfo_noreturnstrcspn$localeconvmemmove
                                      • String ID:
                                      • API String ID: 1326169664-0
                                      • Opcode ID: 9e953c61862c5e7527a7cb08348f2cd9b6a06e1682f4418f765966c58fce3f4b
                                      • Instruction ID: be580027302ada7fde8fe7f4fc9596fdaa108a94290573514e1918b7ec83c7f3
                                      • Opcode Fuzzy Hash: 9e953c61862c5e7527a7cb08348f2cd9b6a06e1682f4418f765966c58fce3f4b
                                      • Instruction Fuzzy Hash: A5D19E72F08F8586EB25CBA5D4A02AC23B1FB4AB88F409526DE4D17B5ADF78D455C340
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: _invalid_parameter_noinfo_noreturnstrcspn$localeconvmemmove
                                      • String ID:
                                      • API String ID: 1326169664-0
                                      • Opcode ID: b5fa3a302d77243ae51deb93482cff022fd2aa1abbcd85ace62c26dc06459625
                                      • Instruction ID: b5a0e23e73025032ef34d2769e0d63a99615ba9eeca02aa70c1e6f853ef5cec3
                                      • Opcode Fuzzy Hash: b5fa3a302d77243ae51deb93482cff022fd2aa1abbcd85ace62c26dc06459625
                                      • Instruction Fuzzy Hash: 1ED1AD72B09B858AFB25CFA5D4A42AC2371FB4AB88F409532DE8D17B5ADF78D445C340
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CriticalSection$Leave_invalid_parameter_noinfo_noreturn$Enter
                                      • String ID:
                                      • API String ID: 1321135880-0
                                      • Opcode ID: 5335fc93e7284b94112b2c5e59369550a45d55f97ad4d5e78d17f1db379e1eee
                                      • Instruction ID: 0eff36e679c6ed8c0e76bc63aacb0e445bfd5629d549987e3f19e2b64e2d8f34
                                      • Opcode Fuzzy Hash: 5335fc93e7284b94112b2c5e59369550a45d55f97ad4d5e78d17f1db379e1eee
                                      • Instruction Fuzzy Hash: B071A1B2A04B8581EAA4AF16E0443BDB7A1FB44B85FC04033DB8E67A55DF7DD894C351
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: fgetwc
                                      • String ID:
                                      • API String ID: 2948136663-0
                                      • Opcode ID: 701cd75bf637ca5d98b2670aa6c63f8087bebde6221e7ec323a85e0cd14916ad
                                      • Instruction ID: 05cb9dd609d4dd9ac92f859351cde35e5c8e0393e85fcbebd0306fe92a075dad
                                      • Opcode Fuzzy Hash: 701cd75bf637ca5d98b2670aa6c63f8087bebde6221e7ec323a85e0cd14916ad
                                      • Instruction Fuzzy Hash: 24914B73705A81C9DB358FA6C4E42AC33A1FB59B88F519232EA4D47B8ADF79D454C340
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CriticalSection_invalid_parameter_noinfo_noreturn$EnterLeave
                                      • String ID:
                                      • API String ID: 4256121347-0
                                      • Opcode ID: 188fddb25781ebedb87022b21ba6229f6f0ad0d34a7937f8a505f5e2544429e0
                                      • Instruction ID: 45dde25c3a87a4c96e7e138cf5047b9f5ba2e3324ba8b252e5acb671b33baf8c
                                      • Opcode Fuzzy Hash: 188fddb25781ebedb87022b21ba6229f6f0ad0d34a7937f8a505f5e2544429e0
                                      • Instruction Fuzzy Hash: 0951C2A2A04B4582EAA4EF1AE0553BCB7A0FB05B84FC44533CB9E67685DF3DD894C311
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: memcpymemset$_invalid_parameter_noinfo_noreturn
                                      • String ID:
                                      • API String ID: 530858481-0
                                      • Opcode ID: fc8d300648ea8525804c2f8217ee1ec0008b30274db60c0014fca066bc4e0402
                                      • Instruction ID: 80686a422c77e80f081ff93dce8c2da9826733b643929dab325f7105116f7326
                                      • Opcode Fuzzy Hash: fc8d300648ea8525804c2f8217ee1ec0008b30274db60c0014fca066bc4e0402
                                      • Instruction Fuzzy Hash: 3531F861B18A9681EE35DF9699A83AF6351FB46BC0F548531EE5D0B79BCEBCE041C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeave$ItemQueueUserWork
                                      • String ID:
                                      • API String ID: 584243675-0
                                      • Opcode ID: 97a3bf7205502b4f90b0206b247d2cd4569c3649e9a2e3ef6bbb124b2f7188ab
                                      • Instruction ID: 76588488078f785a757e33382bdbfab1799c57305ccb5c70d783e0f4f1e5dd03
                                      • Opcode Fuzzy Hash: 97a3bf7205502b4f90b0206b247d2cd4569c3649e9a2e3ef6bbb124b2f7188ab
                                      • Instruction Fuzzy Hash: E7318F26604B4682EA94EF16E414229BBA0FF89F91BCD5532DE8F67714DF3CD446C312
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: free$_invalid_parameter_noinfo_noreturn
                                      • String ID:
                                      • API String ID: 1497960986-0
                                      • Opcode ID: db7573e215f22a3b806bd3e3102c887c95087c7f29d563968c276aae7f7ea7fa
                                      • Instruction ID: 5199bda4d2d4294f0af6c043eca3f6de789ebed84e9919b6d8433074b77f5160
                                      • Opcode Fuzzy Hash: db7573e215f22a3b806bd3e3102c887c95087c7f29d563968c276aae7f7ea7fa
                                      • Instruction Fuzzy Hash: 83318862B0468581EB84AB29D54437CB761EB44FC5FD04133DB9E5BA65CF3CD894C312
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeave$ItemQueueUserWork
                                      • String ID:
                                      • API String ID: 584243675-0
                                      • Opcode ID: 24c307da3dd24607d0a6f87ddf0488c674735f325de97e864aceef75d83bbc92
                                      • Instruction ID: 60528abaff3133df026b73335129054b9d08cc520ae4510d7ed990beb052dc46
                                      • Opcode Fuzzy Hash: 24c307da3dd24607d0a6f87ddf0488c674735f325de97e864aceef75d83bbc92
                                      • Instruction Fuzzy Hash: 16217422A1460582E690AB16B800279BB60FB84B91FC50132DE8F97B51DF3CE446C312
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeave$ItemQueueUserWork
                                      • String ID:
                                      • API String ID: 584243675-0
                                      • Opcode ID: f65b1761e145a531782616168f752e7e9cc756b31f917af7792742647df9e54f
                                      • Instruction ID: 4824d28ae81ceb41c610ff05e63fd5dca1c773c97c394c10e0a3d6c47e0c19a7
                                      • Opcode Fuzzy Hash: f65b1761e145a531782616168f752e7e9cc756b31f917af7792742647df9e54f
                                      • Instruction Fuzzy Hash: 06217122A18A0582E690AB16F800279BB60FB84B85FC50132DE8F57B55DF3CE446C312
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CriticalSection$Leave$CreateEnterThread
                                      • String ID:
                                      • API String ID: 2283434278-0
                                      • Opcode ID: 6eaf334f81def733ccc5755083f5a6f4ce26222943d9c790da9387a2592bbcbb
                                      • Instruction ID: 1d514e9474392ae9ca8a783903d4a636d476621cff1db27fc738255419aec094
                                      • Opcode Fuzzy Hash: 6eaf334f81def733ccc5755083f5a6f4ce26222943d9c790da9387a2592bbcbb
                                      • Instruction Fuzzy Hash: 34117023A08A4193EB90AF29F4043A9B760FB84744FC50236DB8E975A4DF3CD5E5C712
                                      APIs
                                        • Part of subcall function 00007FFD944F18D0: setlocale.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,?,00007FFD944E4DDE,?,?,00000000,00007FFD944E5C7B), ref: 00007FFD944F18DF
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FFD944E5C7B), ref: 00007FFD944E4DE7
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FFD944E5C7B), ref: 00007FFD944E4DFB
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FFD944E5C7B), ref: 00007FFD944E4E0F
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FFD944E5C7B), ref: 00007FFD944E4E23
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FFD944E5C7B), ref: 00007FFD944E4E37
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FFD944E5C7B), ref: 00007FFD944E4E4B
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: free$setlocale
                                      • String ID:
                                      • API String ID: 294139027-0
                                      • Opcode ID: d2e7043e20252bd936750b43ac23fb4c184814c266dbd0621457d1dd4fc7f9af
                                      • Instruction ID: fd602acf1fa2824bf3775e0e0063d6fc771cd70b2a72aef682c1b9aae6709466
                                      • Opcode Fuzzy Hash: d2e7043e20252bd936750b43ac23fb4c184814c266dbd0621457d1dd4fc7f9af
                                      • Instruction Fuzzy Hash: 4511C222B06A0589FB7A9FE580F573A6360EF45F08F189534C90E0954ACFADA894C280
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ErrorFileHandleLast$CloseCreateInformation
                                      • String ID:
                                      • API String ID: 1345328482-0
                                      • Opcode ID: 05425886c993fc501ae495a8fdb29354356a31b840f8f0bd33e2b840dcbfb4c1
                                      • Instruction ID: 672eadcee5e55ab681ff239dd64cd84763b89fed8a5c309241f9ce32e8317041
                                      • Opcode Fuzzy Hash: 05425886c993fc501ae495a8fdb29354356a31b840f8f0bd33e2b840dcbfb4c1
                                      • Instruction Fuzzy Hash: FD01D271B08744C3E7548BA6F9A411EB7A0FB85BE0F048631DB69437A5DFB8E815C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: __acrt_iob_func$abortfputcfputs
                                      • String ID:
                                      • API String ID: 2697642930-0
                                      • Opcode ID: 0fbbf0fef8b9dc84a3477e26ebb6aa8fc61991af6b0e094d9110ef42f1854896
                                      • Instruction ID: f2b62f66163b31737641c1837440c12e35867c4ffa5e283b79311ae8f7243c8a
                                      • Opcode Fuzzy Hash: 0fbbf0fef8b9dc84a3477e26ebb6aa8fc61991af6b0e094d9110ef42f1854896
                                      • Instruction Fuzzy Hash: A6E01290B0461AC2E6AD17E1ECBC33452569F4EB62F00A838C90F47352CD1C6444C311
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                      • String ID: csm
                                      • API String ID: 2395640692-1018135373
                                      • Opcode ID: 96c56ec7d8cc293d62316485b9ebe4bcfbdb4d099f55161506c53fe0a434f69e
                                      • Instruction ID: fd08a1fc8e34fd5c085e88aaab4f394f071bd29a37c2a680e110889fbec40397
                                      • Opcode Fuzzy Hash: 96c56ec7d8cc293d62316485b9ebe4bcfbdb4d099f55161506c53fe0a434f69e
                                      • Instruction Fuzzy Hash: 9951C032B5AA028AEB94AB15E0B5A783391EF55B88F504130EA4E477B6DF7CF841C704
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: abort$CreateFrameInfo__except_validate_context_record
                                      • String ID: csm
                                      • API String ID: 444109036-1018135373
                                      • Opcode ID: 3dd928b7c3049e9f6d6a7e0485469c82e72a83be9bf96436503cdb34a153642a
                                      • Instruction ID: 8b006120299acdbc80f3870fa47ccb9fd9422806f71eac6981bcbaa0f650c585
                                      • Opcode Fuzzy Hash: 3dd928b7c3049e9f6d6a7e0485469c82e72a83be9bf96436503cdb34a153642a
                                      • Instruction Fuzzy Hash: 87514D3375AB4186E660AB15E5A426D7BA4FB8AB90F101535EB8D07B76CF3CF450CB04
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190160805.00007FFDA54B1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA54B0000, based on PE: true
                                      • Associated: 00000005.00000002.2190144253.00007FFDA54B0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190175865.00007FFDA54B5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190190132.00007FFDA54B8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190204054.00007FFDA54B9000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda54b0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: abort$CreateFrameInfo__except_validate_context_record
                                      • String ID: csm
                                      • API String ID: 444109036-1018135373
                                      • Opcode ID: d162b4603133bf800387f962ef13f6d5d9079899ac8f32fc4e33d67874740c9a
                                      • Instruction ID: 7aafbebc3b324e404a31a0d16b6500cf5aa57f3c3f3d39e1d20490ca72094ebe
                                      • Opcode Fuzzy Hash: d162b4603133bf800387f962ef13f6d5d9079899ac8f32fc4e33d67874740c9a
                                      • Instruction Fuzzy Hash: FB516A3271A74986EA60DB26E45036E77A4FB8AF90F111235EB8D07B56CF7CE460CB04
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Exception$RaiseThrowabort
                                      • String ID: csm
                                      • API String ID: 3758033050-1018135373
                                      • Opcode ID: 8519cbd4643cf92263e7e99b7e375c9fca1cb8890e42fe543ea236e958cb777b
                                      • Instruction ID: 1b86bf001b919e9a1fba93cb74f4c8a2e5071d92bb192f3dabb6852d4d429413
                                      • Opcode Fuzzy Hash: 8519cbd4643cf92263e7e99b7e375c9fca1cb8890e42fe543ea236e958cb777b
                                      • Instruction Fuzzy Hash: 02518F22A04B89C6EB65CF68C4A02A93360FB59B5CF15D321DA5D0779ADF39E5D6C300
                                      APIs
                                      • setlocale.API-MS-WIN-CRT-LOCALE-L1-1-0 ref: 00007FFD944EF144
                                      • setlocale.API-MS-WIN-CRT-LOCALE-L1-1-0 ref: 00007FFD944EF156
                                      • setlocale.API-MS-WIN-CRT-LOCALE-L1-1-0 ref: 00007FFD944EF1DB
                                        • Part of subcall function 00007FFD944E4F00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FFD944F1894,?,?,?,00007FFD944E455B,?,?,?,00007FFD944E5C51), ref: 00007FFD944E4F22
                                        • Part of subcall function 00007FFD944E4F00: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FFD944F1894,?,?,?,00007FFD944E455B,?,?,?,00007FFD944E5C51), ref: 00007FFD944E4F48
                                        • Part of subcall function 00007FFD944E4F00: memcpy.VCRUNTIME140(?,?,?,00007FFD944F1894,?,?,?,00007FFD944E455B,?,?,?,00007FFD944E5C51), ref: 00007FFD944E4F60
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: setlocale$freemallocmemcpy
                                      • String ID: bad locale name
                                      • API String ID: 1663771476-1405518554
                                      • Opcode ID: 220187c5690fcbf4f8dd213c6c71a1c00fc1a50971ecb65bb71238da8f289664
                                      • Instruction ID: f8a5565800e4a23b038d327cf81c434a45a0cdd5a704caef0177d182c5486b5c
                                      • Opcode Fuzzy Hash: 220187c5690fcbf4f8dd213c6c71a1c00fc1a50971ecb65bb71238da8f289664
                                      • Instruction Fuzzy Hash: 0E31C562F0868691FB758FD5E4A017BA291EF86BC0F48C035DA4D4779ADEADE881C340
                                      APIs
                                        • Part of subcall function 00007FFD94519A10: ___lc_codepage_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A30
                                        • Part of subcall function 00007FFD94519A10: ___mb_cur_max_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A38
                                        • Part of subcall function 00007FFD94519A10: ___lc_locale_name_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A41
                                        • Part of subcall function 00007FFD94519A10: __pctype_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A5D
                                      • localeconv.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,?,?,?,?,?,?,00007FFD944FE2C8), ref: 00007FFD94501F3E
                                        • Part of subcall function 00007FFD944EBD64: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FFD945101F5,?,?,?,?,?,?,?,?,00000000,00007FFD9451132E), ref: 00007FFD944EBD8F
                                        • Part of subcall function 00007FFD944EBD64: memcpy.VCRUNTIME140(?,?,00000000,00007FFD945101F5,?,?,?,?,?,?,?,?,00000000,00007FFD9451132E), ref: 00007FFD944EBDAB
                                        • Part of subcall function 00007FFD944F6E70: _Maklocstr.LIBCPMT ref: 00007FFD944F6EA0
                                        • Part of subcall function 00007FFD944F6E70: _Maklocstr.LIBCPMT ref: 00007FFD944F6EBF
                                        • Part of subcall function 00007FFD944F6E70: _Maklocstr.LIBCPMT ref: 00007FFD944F6EDE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Maklocstr$___lc_codepage_func___lc_locale_name_func___mb_cur_max_func__pctype_funccalloclocaleconvmemcpy
                                      • String ID: $+xv$$+xv$+v$x+v$xv$+xv+$xv$+x+$vx+$vx$v+x+$vx$+vx+v $+v $v $+v +$v $++$ v+$ v$ v++$ v$+ v+xv$+ v$v$ +v+ $v$ ++x$v+ $v$v ++ $v$ +v
                                      • API String ID: 2904694926-3573081731
                                      • Opcode ID: defede8f075050fc822dce0c0fa22958d0bd6f69e457ddebf30ac2eacdb70a1a
                                      • Instruction ID: 1bca428e529c9d04ce91eaf36625dacbd6cca54c5ace0727a2cc0ba19c420692
                                      • Opcode Fuzzy Hash: defede8f075050fc822dce0c0fa22958d0bd6f69e457ddebf30ac2eacdb70a1a
                                      • Instruction Fuzzy Hash: 2C417C66A08B818BE771CFA1D0A076E7BA0FB56B81F048225D78E43A56DB39F555CB00
                                      APIs
                                        • Part of subcall function 00007FFD94519A10: ___lc_codepage_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A30
                                        • Part of subcall function 00007FFD94519A10: ___mb_cur_max_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A38
                                        • Part of subcall function 00007FFD94519A10: ___lc_locale_name_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A41
                                        • Part of subcall function 00007FFD94519A10: __pctype_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A5D
                                      • localeconv.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,?,?,?,?,?,?,00007FFD94511168), ref: 00007FFD94512C8A
                                        • Part of subcall function 00007FFD944EBD64: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FFD945101F5,?,?,?,?,?,?,?,?,00000000,00007FFD9451132E), ref: 00007FFD944EBD8F
                                        • Part of subcall function 00007FFD944EBD64: memcpy.VCRUNTIME140(?,?,00000000,00007FFD945101F5,?,?,?,?,?,?,?,?,00000000,00007FFD9451132E), ref: 00007FFD944EBDAB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ___lc_codepage_func___lc_locale_name_func___mb_cur_max_func__pctype_funccalloclocaleconvmemcpy
                                      • String ID: $+xv$$+xv$+v$x+v$xv$+xv+$xv$+x+$vx+$vx$v+x+$vx$+vx+v $+v $v $+v +$v $++$ v+$ v$ v++$ v$+ v+xv$+ v$v$ +v+ $v$ ++x$v+ $v$v ++ $v$ +v
                                      • API String ID: 3376215315-3573081731
                                      • Opcode ID: 2af0ff666ab270944890a569ef3d4b8a35c965d2adbf646579e3d4d016b84006
                                      • Instruction ID: e7c259348620ffd10ad45b9c473d701cc608797c467ca92519363b56155d94ee
                                      • Opcode Fuzzy Hash: 2af0ff666ab270944890a569ef3d4b8a35c965d2adbf646579e3d4d016b84006
                                      • Instruction Fuzzy Hash: 63419372A08B859BE771CB65D0A036E7BA0FB4AB45F048235D78953A52DF3CF556CB00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: NameName::
                                      • String ID: %lf
                                      • API String ID: 1333004437-2891890143
                                      • Opcode ID: be338f3a3db10e9858707f145352c81abeba358ae89b312f9819554b5fcef1be
                                      • Instruction ID: 2b06d42ce383e047c682455c62144ed42c5afba6d423164bb3a18b3c13700a0a
                                      • Opcode Fuzzy Hash: be338f3a3db10e9858707f145352c81abeba358ae89b312f9819554b5fcef1be
                                      • Instruction Fuzzy Hash: 2D31A562F4EE8685E610EB21A4B00FA6350BF57B85F448131EA8F577B2DE2CF141C708
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: FileFindNext$wcscpy_s
                                      • String ID: .
                                      • API String ID: 544952861-248832578
                                      • Opcode ID: 716860af65acf47e417f37e93fd7edbc51e3725a7b7e3a6786a5fcad46b417ae
                                      • Instruction ID: 17ad7895290e6b01d45f0b53c7e020fa720021df8a1384385dd16c9687fef6b8
                                      • Opcode Fuzzy Hash: 716860af65acf47e417f37e93fd7edbc51e3725a7b7e3a6786a5fcad46b417ae
                                      • Instruction Fuzzy Hash: B0219662B0C681C1FB709FA1E8A43B763A0EB56794F44C231DA8E56689DF7CD45ACB40
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: String$AllocXlength_error@std@@
                                      • String ID: deque<T> too long
                                      • API String ID: 2781488754-309773918
                                      • Opcode ID: 561f06699cc290121a499b0a5518529f723fcd6cf11ecefa87cb0a2ace427721
                                      • Instruction ID: 7ad2250cdc9f6e7f69692fbae1e626e53888a8bc469db545cab81edcd27e2b5d
                                      • Opcode Fuzzy Hash: 561f06699cc290121a499b0a5518529f723fcd6cf11ecefa87cb0a2ace427721
                                      • Instruction Fuzzy Hash: 6CF09665F1494582EF48DB1BF594229B7A1EF88B90F948136DE5F8B728DE3CC8D18301
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ExceptionThrow$std::ios_base::failure::failure
                                      • String ID: ios_base::badbit set
                                      • API String ID: 1099746521-3882152299
                                      • Opcode ID: 9747cd74c217981d7daf45f5586b8cec7677d6dc2ad07acec38f9bfb06e3ade7
                                      • Instruction ID: 5f2f0e05839a041e8771d1cfff53857334d19a5fd61a6d83c74d9b20981d9075
                                      • Opcode Fuzzy Hash: 9747cd74c217981d7daf45f5586b8cec7677d6dc2ad07acec38f9bfb06e3ade7
                                      • Instruction Fuzzy Hash: C901A222F2C90A91FA788AA5D4F19BF1312AF92784FD4C531E50D0A99FDEADE506C240
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: __current_exception__current_exception_contextterminate
                                      • String ID: csm
                                      • API String ID: 2542180945-1018135373
                                      • Opcode ID: bf2d0a00859b47aab0760f73fe020dcb5bd6b5009f6e0c1c400aae04700dd751
                                      • Instruction ID: 07b76fb73e8ca76c9c4b330819981c6518551b275a357523745f2c7f08068684
                                      • Opcode Fuzzy Hash: bf2d0a00859b47aab0760f73fe020dcb5bd6b5009f6e0c1c400aae04700dd751
                                      • Instruction Fuzzy Hash: EFF04937505B48CAC754AF26EC902AC3B64F748B88F895232FA8E9B715CF38C890C711
                                      APIs
                                        • Part of subcall function 00007FFDA4335508: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FFDA433108E), ref: 00007FFDA4335516
                                      • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFDA433112E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: abortterminate
                                      • String ID: MOC$RCC$csm
                                      • API String ID: 661698970-2671469338
                                      • Opcode ID: 1e1d061888eb5ed8958d1a3f543fee4a516cb38e8faaed4a66704169c3245728
                                      • Instruction ID: 64e060a492f7e1899d4acb4af5711e128e99caaaaa8f33ac66535c83fa7bc0f7
                                      • Opcode Fuzzy Hash: 1e1d061888eb5ed8958d1a3f543fee4a516cb38e8faaed4a66704169c3245728
                                      • Instruction Fuzzy Hash: C7F03C36A5AA0681EB507B51A1E50AC3774EB49B41F095031D75907377CF3CF890CB05
                                      APIs
                                        • Part of subcall function 00007FFDA54B3374: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,00007FFDA54B1082), ref: 00007FFDA54B33B4
                                      • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFDA54B1106
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190160805.00007FFDA54B1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA54B0000, based on PE: true
                                      • Associated: 00000005.00000002.2190144253.00007FFDA54B0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190175865.00007FFDA54B5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190190132.00007FFDA54B8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190204054.00007FFDA54B9000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda54b0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: abortterminate
                                      • String ID: MOC$RCC$csm
                                      • API String ID: 661698970-2671469338
                                      • Opcode ID: ca51088715bf3844d48b5c06903f8b8eb823dd269a3803ff4c574b3ed0b2560c
                                      • Instruction ID: f87f958225173623efbc4719853796ac7cb2056bda6b0d8640505e2685e91fb9
                                      • Opcode Fuzzy Hash: ca51088715bf3844d48b5c06903f8b8eb823dd269a3803ff4c574b3ed0b2560c
                                      • Instruction Fuzzy Hash: A7F06232E1964AC2EF505F25E19526DB6A4FF4AF84F0A6231D74846353CFBCE4A0CB45
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Name::operator+
                                      • String ID:
                                      • API String ID: 2943138195-0
                                      • Opcode ID: 19b161106a3369107c0e03fa813edb52c834a35bcb1cd88136b61b6fcda9d079
                                      • Instruction ID: 735d2d905745a44b9ad126de1460b106104569b8e2131fbad72a8a67800698f5
                                      • Opcode Fuzzy Hash: 19b161106a3369107c0e03fa813edb52c834a35bcb1cd88136b61b6fcda9d079
                                      • Instruction Fuzzy Hash: 5D918E26F4AE5289FB14AB60D8B03AC37A1BB16748F548035DA4D177B6DFBCB845C344
                                      APIs
                                      • EnterCriticalSection.KERNEL32 ref: 00007FF7E3BDA3BD
                                        • Part of subcall function 00007FF7E3BD9810: GetCurrentProcessId.KERNEL32(?,00000000,?,?,?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 00007FF7E3BD984A
                                        • Part of subcall function 00007FF7E3BD9810: GetCurrentThreadId.KERNEL32 ref: 00007FF7E3BD9852
                                        • Part of subcall function 00007FF7E3BD9810: MessageBoxA.USER32 ref: 00007FF7E3BD98A3
                                        • Part of subcall function 00007FF7E3BD9810: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 00007FF7E3BD98AD
                                        • Part of subcall function 00007FF7E3BD9810: _wcsnicmp.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 00007FF7E3BD98E2
                                        • Part of subcall function 00007FF7E3BD9810: LeaveCriticalSection.KERNEL32(?,00000000,?,?,?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 00007FF7E3BD98FE
                                      • SetEvent.KERNEL32 ref: 00007FF7E3BDA5DD
                                      • SetEvent.KERNEL32 ref: 00007FF7E3BDA614
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CriticalSection$CurrentEnterEvent$LeaveMessageProcessThread_wcsnicmp
                                      • String ID:
                                      • API String ID: 1791567320-0
                                      • Opcode ID: 5ddb726781f3ecf8bd8e66973cf05188ad89204ba0090ad3b48b34ace03343a8
                                      • Instruction ID: 336c962812cc38b472aeb523dfb03c0acdc13156ef9288e364587cb2a58eee67
                                      • Opcode Fuzzy Hash: 5ddb726781f3ecf8bd8e66973cf05188ad89204ba0090ad3b48b34ace03343a8
                                      • Instruction Fuzzy Hash: C8819232A0864286EBA0AB15D544379BBB1FB84744FC48137CA8FA7685CF3CE451C752
                                      APIs
                                        • Part of subcall function 00007FF7E3BD2B90: memcpy.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,?,00000000,?,?,?,00000000), ref: 00007FF7E3BD2BFB
                                        • Part of subcall function 00007FF7E3BD2B90: memcpy.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,?,00000000,?,?,?,00000000), ref: 00007FF7E3BD2CA7
                                        • Part of subcall function 00007FF7E3BD2B90: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7E3BD2CD3
                                      • wcscpy_s.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7E3BD70AD
                                      • wcscpy_s.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7E3BD70D1
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E3BD7119
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E3BD716D
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: _invalid_parameter_noinfo_noreturnmemcpywcscpy_s$Concurrency::cancel_current_task
                                      • String ID:
                                      • API String ID: 2602432049-0
                                      • Opcode ID: ae660a2dca2fbb32ed2d38d729118612c5d603f18326a872d53dd6d4371359f9
                                      • Instruction ID: 82cc77e50b70f202a2ee793bcfe34ba06025c364557aba6876fc7091dcb568c6
                                      • Opcode Fuzzy Hash: ae660a2dca2fbb32ed2d38d729118612c5d603f18326a872d53dd6d4371359f9
                                      • Instruction Fuzzy Hash: C261AF62B04A5694FB40EFA5E4453EDBBB1AB44798FD00532CE9E66A88DE39E045C312
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: _invalid_parameter_noinfo_noreturn$CriticalInitializeSection
                                      • String ID:
                                      • API String ID: 4074537433-0
                                      • Opcode ID: 7a62151007dbf306daeb6640956b7bfd05e3adb4e00a292b69a8167b885ed84a
                                      • Instruction ID: fc54a1a2681f9f7648d1f5830f7898d466eada4696d5438edc27d38c9e2715f2
                                      • Opcode Fuzzy Hash: 7a62151007dbf306daeb6640956b7bfd05e3adb4e00a292b69a8167b885ed84a
                                      • Instruction Fuzzy Hash: 9851BE72A04BC495EA40DF19E8487AEB7A9FB48B84FD14036DA8D5B754EF3DD484C301
                                      APIs
                                      • EnterCriticalSection.KERNEL32(?,?,00000000,?,?,00007FF7E3BDAA21,?,?,?,?,?,?,?,00000000), ref: 00007FF7E3BDC960
                                      • LeaveCriticalSection.KERNEL32(?,?,00000000,?,?,00007FF7E3BDAA21,?,?,?,?,?,?,?,00000000), ref: 00007FF7E3BDC992
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,?,?,00007FF7E3BDAA21,?,?,?,?,?,?,?,00000000), ref: 00007FF7E3BDC9E3
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,?,?,00007FF7E3BDAA21,?,?,?,?,?,?,?,00000000), ref: 00007FF7E3BDCA6E
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CriticalSection_invalid_parameter_noinfo_noreturn$EnterLeave
                                      • String ID:
                                      • API String ID: 4256121347-0
                                      • Opcode ID: f8c14e5b29ba14d1cb6cd29f75e041db3b3fb8e103da75009c28ebfe8af2e0e2
                                      • Instruction ID: 1f788ef7d041901d3cbfa28286f95e650a7253ba8bb691bc91941bb51c0f38a0
                                      • Opcode Fuzzy Hash: f8c14e5b29ba14d1cb6cd29f75e041db3b3fb8e103da75009c28ebfe8af2e0e2
                                      • Instruction Fuzzy Hash: BC419E62B09B8181EA84EB2AE45432DBB61FB85FD1FD45132DA8F67B58DF3CD8418311
                                      APIs
                                      • memmove.VCRUNTIME140(?,?,?,?,?,?,?,00000000,00000000,?,00000000,?,?,?,00000000), ref: 00007FF7E3BDB701
                                      • memmove.VCRUNTIME140(?,?,?,?,?,?,?,00000000,00000000,?,00000000,?,?,?,00000000), ref: 00007FF7E3BDB714
                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,?,00000000,?,?,?,00000000), ref: 00007FF7E3BDB787
                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7E3BDB794
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                      • String ID:
                                      • API String ID: 2016347663-0
                                      • Opcode ID: ccff0db430de2e3805d70e3db2c75d5f26908b08c0ac9edc04c1d2c782fcfc11
                                      • Instruction ID: bd3ff2eadae55f8c10824f553c76dadcb63a0942a3b7997d1585a4316bd8bb1c
                                      • Opcode Fuzzy Hash: ccff0db430de2e3805d70e3db2c75d5f26908b08c0ac9edc04c1d2c782fcfc11
                                      • Instruction Fuzzy Hash: E441B122B04A8982DE54EB66D4443A9B760FB48BE4FD44636DBAE277C5CF3CE091C311
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID:
                                      • API String ID: 3510742995-0
                                      • Opcode ID: a2214095b1861897e84e4c847000920349271a397e259a4d4b9396febdf6c71f
                                      • Instruction ID: 17dc714f3b622eb31e63c203059f99da7cf28ecfa983f1ba5e16cfeddb071583
                                      • Opcode Fuzzy Hash: a2214095b1861897e84e4c847000920349271a397e259a4d4b9396febdf6c71f
                                      • Instruction Fuzzy Hash: F5419851F0958541FDA1BA1591143BEFA629F01BF8FD84733D9BF2A2C1DE3CE4458222
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                      • String ID:
                                      • API String ID: 1155477157-0
                                      • Opcode ID: c738188da5cfe384b6bd0d97a1f7eb18b877b82b574a0dbff08e6b31618e263c
                                      • Instruction ID: 067ab43333d216507223f60713e35b034fd248a8743213b7c68ed2c051157ab5
                                      • Opcode Fuzzy Hash: c738188da5cfe384b6bd0d97a1f7eb18b877b82b574a0dbff08e6b31618e263c
                                      • Instruction Fuzzy Hash: 9C414622B08A9181E924DF96E0A417A6654FF06FE4F548631EE7C07BDEEEBCD041C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                      • String ID:
                                      • API String ID: 1155477157-0
                                      • Opcode ID: a20fff99b7b240ae7cd13c59c0fbb6b1b47120c295fc59deeb36b105bf3e74f0
                                      • Instruction ID: 3fd51d038455ed096e5280a85fcae0682efd1cce8e5a1b5a8985cb40f5d2ff74
                                      • Opcode Fuzzy Hash: a20fff99b7b240ae7cd13c59c0fbb6b1b47120c295fc59deeb36b105bf3e74f0
                                      • Instruction Fuzzy Hash: E431D522B05A4581EA90EB12E400369B6A4FB44BF4FD54732DEBE5B7D5EE3CE181C311
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Xp_movx$Xp_setw_errnoldexpmemcpy
                                      • String ID:
                                      • API String ID: 2233944734-0
                                      • Opcode ID: e30d48e6140432e959ccec004b3f231757e6d9c53087eac7292650d316a6c3d3
                                      • Instruction ID: 535d74f822937d73bee58655f45730428fe80669291b163c559bb6ddface502c
                                      • Opcode Fuzzy Hash: e30d48e6140432e959ccec004b3f231757e6d9c53087eac7292650d316a6c3d3
                                      • Instruction Fuzzy Hash: FE41CA2AB0C68686E6B39BD594F11B96350AF9A740F64C631EA5D1339BDF3CE906C600
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ___lc_codepage_func___lc_locale_name_func__pctype_funcislower
                                      • String ID:
                                      • API String ID: 2234106055-0
                                      • Opcode ID: 59f3949629db58b4166e44a747e06bdadc1b2773ec60b276cd5782dca8858ee3
                                      • Instruction ID: 54bd0396b8f3cdf71ead58518e806a7569cd7e150059a72d057499f236cc3eba
                                      • Opcode Fuzzy Hash: 59f3949629db58b4166e44a747e06bdadc1b2773ec60b276cd5782dca8858ee3
                                      • Instruction Fuzzy Hash: 9731A962B0C74181F7269B56A4A027FA751FB81B91F588035DAC90775FDE7DE444CB10
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ___lc_codepage_func___lc_locale_name_func__pctype_funcisupper
                                      • String ID:
                                      • API String ID: 3857474680-0
                                      • Opcode ID: 43f0576a5bb13b0c72acb974cb94fa4bda6fe4f460c2490a34e6a1ccf9e01767
                                      • Instruction ID: 99b5b46e021479a81932195084cf8c9fd6a9887aabd1168b5650dcfd214c6882
                                      • Opcode Fuzzy Hash: 43f0576a5bb13b0c72acb974cb94fa4bda6fe4f460c2490a34e6a1ccf9e01767
                                      • Instruction Fuzzy Hash: FE31E772B0C74186F7268B5594E037FA6A1EB81BD1F588035DA8E0779EDEBDE484CB10
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Name::operator+$Replicator::operator[]
                                      • String ID:
                                      • API String ID: 3863519203-0
                                      • Opcode ID: 01866aae00d41701eefb340061b2b619c817205046dac5a42adf5370d2948f3c
                                      • Instruction ID: a1aaeb578c86383c412e6d77a567329cb7ab11496a517976e0c2590c7002e1fb
                                      • Opcode Fuzzy Hash: 01866aae00d41701eefb340061b2b619c817205046dac5a42adf5370d2948f3c
                                      • Instruction Fuzzy Hash: 29416672B49B8589EB00AFA4C8A13AC37A0FB4AB88F548025DA4D57776DF7CA440C314
                                      APIs
                                      • ___lc_locale_name_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,00000000,?,?,?,00007FFD9450D174), ref: 00007FFD94519937
                                      • memcpy.VCRUNTIME140(?,00000000,?,?,?,00007FFD9450D174), ref: 00007FFD9451995B
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?,?,00007FFD9450D174), ref: 00007FFD94519968
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?,?,00007FFD9450D174), ref: 00007FFD945199DB
                                        • Part of subcall function 00007FFD944E2E80: wcsnlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FFD944E2EAA
                                        • Part of subcall function 00007FFD944E2E80: LCMapStringEx.KERNEL32 ref: 00007FFD944E2EEE
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: String___lc_locale_name_funcfreemallocmemcpywcsnlen
                                      • String ID:
                                      • API String ID: 2888714520-0
                                      • Opcode ID: 67641bf41084d92b3c967ab0d3a146a93def77804a3b88cee96e63fdebeb0246
                                      • Instruction ID: f2ed26d098e75f3c5f98f21df68a239db7e1c09643ddcf860142b4653a8510fe
                                      • Opcode Fuzzy Hash: 67641bf41084d92b3c967ab0d3a146a93def77804a3b88cee96e63fdebeb0246
                                      • Instruction Fuzzy Hash: DA215921708B9285E6719F93A4A047AAB90FB4AFE0F188631DE9D177DAEF3CD001C340
                                      APIs
                                      • ___lc_locale_name_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,?,?,?,00000000,00007FFD94513F4B), ref: 00007FFD94518F84
                                      • ___lc_collate_cp_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,?,?,?,00000000,00007FFD94513F4B), ref: 00007FFD94518F8E
                                        • Part of subcall function 00007FFD944E2740: __strncnt.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FFD944E278A
                                        • Part of subcall function 00007FFD944E2740: __strncnt.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FFD944E27AF
                                        • Part of subcall function 00007FFD944E2740: GetCPInfo.KERNEL32 ref: 00007FFD944E27EF
                                      • memcmp.VCRUNTIME140(?,?,?,?,?,?,00000000,00007FFD94513F4B), ref: 00007FFD94518FB1
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00000000,00007FFD94513F4B), ref: 00007FFD94518FEF
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: __strncnt$Info___lc_collate_cp_func___lc_locale_name_func_errnomemcmp
                                      • String ID:
                                      • API String ID: 3421985146-0
                                      • Opcode ID: 3693cc1dc38747932e88ab34b28703adfef4dff46cfbb96f5da2cfa7dbf71c69
                                      • Instruction ID: 7d07b7bd7f1b93d3d3fed910d7299e76418c6bb0c504d4f4da07d1621104b651
                                      • Opcode Fuzzy Hash: 3693cc1dc38747932e88ab34b28703adfef4dff46cfbb96f5da2cfa7dbf71c69
                                      • Instruction Fuzzy Hash: BA219231B0874286EB758F9A94A0029B6A5FB89FD0F498135EA5D57B9AEF3CE401C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CriticalSection$Leave$DeleteEnter
                                      • String ID:
                                      • API String ID: 122283594-0
                                      • Opcode ID: 25492621674aae5e867b76885542ee1a2b33ecfc0cd9017919ef95b64a184f0c
                                      • Instruction ID: 0d09b755e6c99d4af6a6cc16122c504f706c7578ed2f82cba7641f97da4750a4
                                      • Opcode Fuzzy Hash: 25492621674aae5e867b76885542ee1a2b33ecfc0cd9017919ef95b64a184f0c
                                      • Instruction Fuzzy Hash: 5111A222628A4582D750EB2AF140339F7A0FB84BA4F900232DB8F57B64CF3CE4458711
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CriticalSection$Leave$DeleteEnter
                                      • String ID:
                                      • API String ID: 122283594-0
                                      • Opcode ID: d46c796569298d265d15c05eb6b21ed46c4bc9ef9cf44ba00c050c16ef47a7b7
                                      • Instruction ID: 425fd7d0a4cf6277082e014cd1ca09379df08dc7ef5b1d2d70a4ff914a399537
                                      • Opcode Fuzzy Hash: d46c796569298d265d15c05eb6b21ed46c4bc9ef9cf44ba00c050c16ef47a7b7
                                      • Instruction Fuzzy Hash: FC117232618A4583E740EB2AE58432DB760FB84B91F900632DB9F97B64DF3CE4528752
                                      APIs
                                      • ___lc_codepage_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A30
                                      • ___mb_cur_max_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A38
                                      • ___lc_locale_name_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A41
                                      • __pctype_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A5D
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ___lc_codepage_func___lc_locale_name_func___mb_cur_max_func__pctype_func
                                      • String ID:
                                      • API String ID: 3203701943-0
                                      • Opcode ID: 45e55d3acf2230828d6510e7691de68b154f67769c7b9c90f7c9d5855befa728
                                      • Instruction ID: f29480cead23682f8e58aad1cd16077fe3d677056dd072ffdd30b8ff2028a9a7
                                      • Opcode Fuzzy Hash: 45e55d3acf2230828d6510e7691de68b154f67769c7b9c90f7c9d5855befa728
                                      • Instruction Fuzzy Hash: 9C0148A2F0479582DB5A8FF9D460068B7A0FB59F84B14D232DA0E87315DE3CD0C2C300
                                      APIs
                                      • memcpy.VCRUNTIME140(?,?,?,?,00007FF7E3BE0F22), ref: 00007FF7E3BE144B
                                      • memset.VCRUNTIME140(?,?,?,?,00007FF7E3BE0F22), ref: 00007FF7E3BE145D
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF7E3BE0F22), ref: 00007FF7E3BE1462
                                      • _invalid_parameter_noinfo.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF7E3BE0F22), ref: 00007FF7E3BE146E
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: _errno_invalid_parameter_noinfomemcpymemset
                                      • String ID:
                                      • API String ID: 187659361-0
                                      • Opcode ID: ebf23ef8b71edef924d49ebb7069060e3e24f74a27f982230615419ca1546f03
                                      • Instruction ID: aa0fba3aec75a6adfbad961d0d209031df4256df3ac4b12fa572cfa2ba4306a4
                                      • Opcode Fuzzy Hash: ebf23ef8b71edef924d49ebb7069060e3e24f74a27f982230615419ca1546f03
                                      • Instruction Fuzzy Hash: 86015162E0560941ED947B1AD5002B8BA60BF887B4FD44732C9BFA73D1DE3C91408623
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID: MOC$RCC$csm
                                      • API String ID: 2803490479-2671469338
                                      • Opcode ID: 360c7e9538baccfc62aa58613caaaec6b60e65dd6ea867dc3ee0ae363a7b998f
                                      • Instruction ID: b4dd5f6be83ddfe1fb08f11c8e9730e2085cff3bdd7e43baa9181232298a0d75
                                      • Opcode Fuzzy Hash: 360c7e9538baccfc62aa58613caaaec6b60e65dd6ea867dc3ee0ae363a7b998f
                                      • Instruction Fuzzy Hash: 58012562B0850586EBB55E9192F417B62A1FF5AB84F18D035DA0E0769FCE6CE581C702
                                      APIs
                                      • memcpy.VCRUNTIME140(?,?,?,?,00007FF7E3BD6D59,?,?,?,?,?,?,?,00000000,00000000,00000000,0000001F), ref: 00007FF7E3BDB44A
                                      • memset.VCRUNTIME140(?,?,?,?,00007FF7E3BD6D59,?,?,?,?,?,?,?,00000000,00000000,00000000,0000001F), ref: 00007FF7E3BDB45E
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF7E3BD6D59,?,?,?,?,?,?,?,00000000,00000000,00000000,0000001F), ref: 00007FF7E3BDB463
                                      • _invalid_parameter_noinfo.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF7E3BD6D59,?,?,?,?,?,?,?,00000000,00000000,00000000,0000001F), ref: 00007FF7E3BDB46F
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: _errno_invalid_parameter_noinfomemcpymemset
                                      • String ID:
                                      • API String ID: 187659361-0
                                      • Opcode ID: e67690b363ce72daef073659b7df3014825dbf5cac14bacb74bde6acf0405626
                                      • Instruction ID: 8a777eee2e69201feb53d2aa272ab54fcd75384502989f7a86df7c9f8aa86f00
                                      • Opcode Fuzzy Hash: e67690b363ce72daef073659b7df3014825dbf5cac14bacb74bde6acf0405626
                                      • Instruction Fuzzy Hash: 7401B561F0570581EE94FF0AD5403687AA1BF85BA4FC80332CAAE2A3C5CF3CE5518B21
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                      • String ID:
                                      • API String ID: 2933794660-0
                                      • Opcode ID: b536abb6d9712bf97fb487a0f8cba51c41b2271e3d3d5caf7de0eb85f2cb5b90
                                      • Instruction ID: 2a41d2e0565cfca3a1688fb68bf3a71206622d894b938382f18db64ec1e3a066
                                      • Opcode Fuzzy Hash: b536abb6d9712bf97fb487a0f8cba51c41b2271e3d3d5caf7de0eb85f2cb5b90
                                      • Instruction Fuzzy Hash: 3111A026B14F058AEB40DF65E8443B977A0F719718F800F32DAAE967A4DF3CE1548351
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189862502.00007FFDA3561000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3560000, based on PE: true
                                      • Associated: 00000005.00000002.2189849486.00007FFDA3560000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189887154.00007FFDA359D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189902000.00007FFDA35A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189916777.00007FFDA35AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189916777.00007FFDA35AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189942387.00007FFDA35B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2189955378.00007FFDA35B3000.00000020.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2190056184.00007FFDA373C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda3560000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                      • String ID:
                                      • API String ID: 2933794660-0
                                      • Opcode ID: 483c91bdf6aa179818ca65be3deb0b48645d80d80ba49af5a09b028e55c4579b
                                      • Instruction ID: 15e79e1020b1e6e1d37b562bfcc870a98e247904862edf6cf843d1016d099076
                                      • Opcode Fuzzy Hash: 483c91bdf6aa179818ca65be3deb0b48645d80d80ba49af5a09b028e55c4579b
                                      • Instruction Fuzzy Hash: E6115A22F15F468AEB00CF64E8682B833A4FB58758F441E31DA2D937A5DF3CD1949340
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                      • String ID:
                                      • API String ID: 2933794660-0
                                      • Opcode ID: 6fc51a19867c61e498e8a0b288e385d7448d9ab26600c32b2e1834bebe01e820
                                      • Instruction ID: 16c577c44883eb0f0a66925c10497ac8c3f7e7a989a6752c6f95ecd921c7e632
                                      • Opcode Fuzzy Hash: 6fc51a19867c61e498e8a0b288e385d7448d9ab26600c32b2e1834bebe01e820
                                      • Instruction Fuzzy Hash: CD113C22B15F058AEB51CFE0E8A42B933A4FB1A768F441E31EE6D867A5DF78D154C340
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                      • String ID:
                                      • API String ID: 2933794660-0
                                      • Opcode ID: bc35b6ed073f65f8b319c9a0e8033d1cee1b856b8545af56da748e53b0dccc00
                                      • Instruction ID: f2a9467d4a4cb14076581fc4b00c1eb4e9f55603b3c324538db39d0ede8445dc
                                      • Opcode Fuzzy Hash: bc35b6ed073f65f8b319c9a0e8033d1cee1b856b8545af56da748e53b0dccc00
                                      • Instruction Fuzzy Hash: 2B111C26B55F018AEB00DF60E8A42A833A4FB5A759F440E31DA6E467A6DF7CD1688340
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190160805.00007FFDA54B1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA54B0000, based on PE: true
                                      • Associated: 00000005.00000002.2190144253.00007FFDA54B0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190175865.00007FFDA54B5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190190132.00007FFDA54B8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190204054.00007FFDA54B9000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda54b0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                      • String ID:
                                      • API String ID: 2933794660-0
                                      • Opcode ID: 2c5dffd0f2cc85d270ced0de20c0162c6b2e3c342d3c7386e2897285ed641fe7
                                      • Instruction ID: 7d6a7bf8c2a968fab860e135388da7730a6c6a5a969f265a4ef2af7eadb3a337
                                      • Opcode Fuzzy Hash: 2c5dffd0f2cc85d270ced0de20c0162c6b2e3c342d3c7386e2897285ed641fe7
                                      • Instruction Fuzzy Hash: 5A111C32B15B058AEF408B64E8643A833B4FB1AB58F450E35DA6D467A5EFBCD1588380
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: rand_s
                                      • String ID: invalid random_device value
                                      • API String ID: 863162693-3926945683
                                      • Opcode ID: e484c5abde7d48d606a022d527497e74293cb90d49ae6f96b22294eda17346e0
                                      • Instruction ID: 82bdd489cab556cc5a9a33ec1649467e3934189d7deb95fb8dc19e761a739260
                                      • Opcode Fuzzy Hash: e484c5abde7d48d606a022d527497e74293cb90d49ae6f96b22294eda17346e0
                                      • Instruction Fuzzy Hash: BA51D726F18A46C6E2E39BF844F11BA6354BF1B384F14C732E55E265A7DF28E591C200
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: swprintf_s
                                      • String ID: %$+
                                      • API String ID: 3896565401-2626897407
                                      • Opcode ID: 3983ff7f8527b06e959803e054c32886bd5193924816245db56764c676303a1c
                                      • Instruction ID: 842a8eddc0faef9e209aa0f7273f104fc489b57aea8bbcbaac23c2e4c26b6d57
                                      • Opcode Fuzzy Hash: 3983ff7f8527b06e959803e054c32886bd5193924816245db56764c676303a1c
                                      • Instruction Fuzzy Hash: 6A21C312B087C486F7A28B91E4A53EAA791EB96784F58C135EB8C07B8ADF7CD445C701
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: swprintf_s
                                      • String ID: %$+
                                      • API String ID: 3896565401-2626897407
                                      • Opcode ID: 33f50c9b317098a5be6598ec241270d3e8084a492949c3b9cec7e8738ac1a517
                                      • Instruction ID: 7c1211d63434911a4d90f2d94048f2a2d1c5ff85ffd254ca6e9058585e13c37e
                                      • Opcode Fuzzy Hash: 33f50c9b317098a5be6598ec241270d3e8084a492949c3b9cec7e8738ac1a517
                                      • Instruction Fuzzy Hash: A121D512B0C7C486E7A28B95E4953EAA791EB96784F58C035EF8C07B8ADF7CD445CB01
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: swprintf_s
                                      • String ID: %$+
                                      • API String ID: 3896565401-2626897407
                                      • Opcode ID: fee8ecfa3f5c0c75fbe5ee01e01a748e99962c5bc3a79a07a219c5158d199638
                                      • Instruction ID: 9e13186927fb273514bdae0b1fded009d9d3dceb70ba4c96484c918ef38566d3
                                      • Opcode Fuzzy Hash: fee8ecfa3f5c0c75fbe5ee01e01a748e99962c5bc3a79a07a219c5158d199638
                                      • Instruction Fuzzy Hash: EF31A0127087C585FB718B95E4A03EBAB51EBDA788F488035DB8C07B8ACB7CD409C741
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: swprintf_s
                                      • String ID: %$+
                                      • API String ID: 3896565401-2626897407
                                      • Opcode ID: 104804bf455e10cebfe67cad850d6cbd0152893b9332d4fed4827efd08ba701a
                                      • Instruction ID: 120a523162f315661ecf3e02b8456ef85ebb3e291c2a8c9917d0f74350eaab2c
                                      • Opcode Fuzzy Hash: 104804bf455e10cebfe67cad850d6cbd0152893b9332d4fed4827efd08ba701a
                                      • Instruction Fuzzy Hash: C831D1127087C189EB318B95E4A03EBAB51EB96788F58C135EB8C07B8ACB7CD408C751
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: swprintf_s
                                      • String ID: %$+
                                      • API String ID: 3896565401-2626897407
                                      • Opcode ID: 0d8b807a31d15b51715031f0d1b1e024bee4514540a1948720ad51a1df99f742
                                      • Instruction ID: 260e82b13efef8ae12c6dd7169c2760c65f4b7a26c82694664c74ec3c7e4b3c0
                                      • Opcode Fuzzy Hash: 0d8b807a31d15b51715031f0d1b1e024bee4514540a1948720ad51a1df99f742
                                      • Instruction Fuzzy Hash: A221932270D7C585E7718B95E4903EAA791EBDA798F18C071DA8C07B8ACF7CD446CB41
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: swprintf_s
                                      • String ID: %$+
                                      • API String ID: 3896565401-2626897407
                                      • Opcode ID: 2579b0c73e0ff24d1b6f575f4cbad154f9ee2200692dddcc3f27c9501e15a005
                                      • Instruction ID: 62ea13ec5734ab89a9955d935ca0397aa8f1330f7a9427db4ca14b39301ad130
                                      • Opcode Fuzzy Hash: 2579b0c73e0ff24d1b6f575f4cbad154f9ee2200692dddcc3f27c9501e15a005
                                      • Instruction Fuzzy Hash: EA21D512B087C485E7728BD5E4903EAA761EBAA784F58C031DA8C07B9EDF3CD445C741
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: swprintf_s
                                      • String ID: %$+
                                      • API String ID: 3896565401-2626897407
                                      • Opcode ID: 2f4393c9c9e5bf2cb57e01531cd8db7fc7b9417217bc379eb2c68939b4944a98
                                      • Instruction ID: fe37ef25a17eea1a408fc99e0c8e8e762dbe0ebf58f8c1e7849b13f4ebee5e7c
                                      • Opcode Fuzzy Hash: 2f4393c9c9e5bf2cb57e01531cd8db7fc7b9417217bc379eb2c68939b4944a98
                                      • Instruction Fuzzy Hash: 07218122B0C7C585E7318B95E4903EBA761EBDA788F588171EA8C07B8ACB7CD445C741
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: swprintf_s
                                      • String ID: %$+
                                      • API String ID: 3896565401-2626897407
                                      • Opcode ID: 43072b9d08070bb552e0b93a083ac2b1bd20d1c490dd43024381f6b0ada664d0
                                      • Instruction ID: 68f77c2ddb4474fbf9359d9cb3bd1370069c11c2b948b7ca4d04ba3ffdd6a712
                                      • Opcode Fuzzy Hash: 43072b9d08070bb552e0b93a083ac2b1bd20d1c490dd43024381f6b0ada664d0
                                      • Instruction Fuzzy Hash: C421C1127087C585E7628AD5E4903EAA791EBAA798F58C031EACC03B8ADF7CD446C701
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: swprintf_s
                                      • String ID: %$+
                                      • API String ID: 3896565401-2626897407
                                      • Opcode ID: 3a66c90742b035315fd415ed1e3735a2b8f7dc6cdb06a228b2945cf8385c5acb
                                      • Instruction ID: 633f86bfd952ad49733707abe85b5cb0d68d7a813bd8ab3eec0bef4109b30f89
                                      • Opcode Fuzzy Hash: 3a66c90742b035315fd415ed1e3735a2b8f7dc6cdb06a228b2945cf8385c5acb
                                      • Instruction Fuzzy Hash: 9321D5127187C485E7768B95E4903EAA7A1EBAB748F58C031EA8C47B8EDF7CD446C701
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: Name::operator+
                                      • String ID: void$void
                                      • API String ID: 2943138195-3746155364
                                      • Opcode ID: f30d46f5536ef0c3f3ebc9a4d766d43ef2cbe5712fe6c79626000809cc062bc5
                                      • Instruction ID: f9def0e51f5299ec0b3b6290f6ce5078ede5a0345bc7a43e82bf84053c37d107
                                      • Opcode Fuzzy Hash: f30d46f5536ef0c3f3ebc9a4d766d43ef2cbe5712fe6c79626000809cc062bc5
                                      • Instruction Fuzzy Hash: 3D315E66F5AE5598FB00EB60D8A00FC77B0BB49748B440135DE4E5677ADF7CA144C708
                                      APIs
                                      • localeconv.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FFD944EE8E4), ref: 00007FFD944EEA24
                                        • Part of subcall function 00007FFD94519A10: ___lc_codepage_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A30
                                        • Part of subcall function 00007FFD94519A10: ___mb_cur_max_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A38
                                        • Part of subcall function 00007FFD94519A10: ___lc_locale_name_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A41
                                        • Part of subcall function 00007FFD94519A10: __pctype_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FFD944E61B3), ref: 00007FFD94519A5D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ___lc_codepage_func___lc_locale_name_func___mb_cur_max_func__pctype_funclocaleconv
                                      • String ID: false$true
                                      • API String ID: 2502581279-2658103896
                                      • Opcode ID: e1dc05f66a48970e7ffdf649c319dd4d92df2dbb8d4a814aea9668b504f98174
                                      • Instruction ID: dacb3260279ac1b7ebb1a6249974e8c6dec1af5943dc63d4b356783d0c815af2
                                      • Opcode Fuzzy Hash: e1dc05f66a48970e7ffdf649c319dd4d92df2dbb8d4a814aea9668b504f98174
                                      • Instruction Fuzzy Hash: 20218562708B85C1E731DFA0E0A03AA77A0FB59B94F548536DA8D0736ADF38D155C780
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: FileHeader$ExceptionRaise
                                      • String ID: Access violation - no RTTI data!$Bad dynamic_cast!
                                      • API String ID: 3685223789-3176238549
                                      • Opcode ID: 31c157b8eb2ec39060d8679ded3c8c7a40717f4d930d4d3a676af0386f3d6913
                                      • Instruction ID: 255b35563b19808e05f2a934ae7c0555748faf4aab444c476238b66530f03553
                                      • Opcode Fuzzy Hash: 31c157b8eb2ec39060d8679ded3c8c7a40717f4d930d4d3a676af0386f3d6913
                                      • Instruction Fuzzy Hash: 0F015E61BABE46A1EE40EB10E4F01B86360FFA1B45F605431E64E07776EF6CE505C708
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ExceptionFileHeaderRaise
                                      • String ID: csm
                                      • API String ID: 2573137834-1018135373
                                      • Opcode ID: 24fc685d9c18a97879a9043e169dd32e9d23318a9617333a79ec660fdc06252e
                                      • Instruction ID: bfad133c048e1261e8d8fdc0867e5749a219caa7b949d2e3145e6d1eb81cacc3
                                      • Opcode Fuzzy Hash: 24fc685d9c18a97879a9043e169dd32e9d23318a9617333a79ec660fdc06252e
                                      • Instruction Fuzzy Hash: 23118B3260AF8082EB218B14F4A0269B7E0FB98B84F184230DE8D4776ADF3CD5518B04
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190160805.00007FFDA54B1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA54B0000, based on PE: true
                                      • Associated: 00000005.00000002.2190144253.00007FFDA54B0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190175865.00007FFDA54B5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190190132.00007FFDA54B8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190204054.00007FFDA54B9000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda54b0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ExceptionFileHeaderRaise
                                      • String ID: csm
                                      • API String ID: 2573137834-1018135373
                                      • Opcode ID: 1ac58e26bfc09764eb6bcbbdd6c3602ecce448ff3c9057d3ecc8faea2f5e0755
                                      • Instruction ID: edf5da5fc494ace9c6f6667f7fb05dba3e71944cc393c38d548eacfce1906ad2
                                      • Opcode Fuzzy Hash: 1ac58e26bfc09764eb6bcbbdd6c3602ecce448ff3c9057d3ecc8faea2f5e0755
                                      • Instruction Fuzzy Hash: BC116732609B8882EF218B16F450269B7E0FB88B84F594230EA8C07769EF7CD4518B04
                                      APIs
                                        • Part of subcall function 00007FFDA433E530: __except_validate_context_record.LIBVCRUNTIME ref: 00007FFDA433E55B
                                        • Part of subcall function 00007FFDA4335508: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FFDA433108E), ref: 00007FFDA4335516
                                      • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFDA433E31A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: __except_validate_context_recordabortterminate
                                      • String ID: csm$f
                                      • API String ID: 339134311-629598281
                                      • Opcode ID: 87b715e71dc7a4db9f561d6577bcf3276f84fe0821628dcd164645869c85632a
                                      • Instruction ID: fb9e4d20ed81596d49a27923065763382e0e509477448448719219aace870df5
                                      • Opcode Fuzzy Hash: 87b715e71dc7a4db9f561d6577bcf3276f84fe0821628dcd164645869c85632a
                                      • Instruction Fuzzy Hash: ABE03022E5AA4281E6607B61B2E527C2AA4AF17764F548034DA8907777CE3CF4908609
                                      APIs
                                      • _W_Getdays.API-MS-WIN-CRT-TIME-L1-1-0 ref: 00007FFD944E6B1D
                                        • Part of subcall function 00007FFD944E4F80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FFD944F718D,?,?,?,?,?,?,?,?,?,00007FFD944FEBBE), ref: 00007FFD944E4FA9
                                        • Part of subcall function 00007FFD944E4F80: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FFD944F718D,?,?,?,?,?,?,?,?,?,00007FFD944FEBBE), ref: 00007FFD944E4FD8
                                        • Part of subcall function 00007FFD944E4F80: memcpy.VCRUNTIME140(?,?,00000000,00007FFD944F718D,?,?,?,?,?,?,?,?,?,00007FFD944FEBBE), ref: 00007FFD944E4FEF
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FFD944E6B3A
                                      Strings
                                      • :Sun:Sunday:Mon:Monday:Tue:Tuesday:Wed:Wednesday:Thu:Thursday:Fri:Friday:Sat:Saturday, xrefs: 00007FFD944E6B45
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: free$Getdaysmallocmemcpy
                                      • String ID: :Sun:Sunday:Mon:Monday:Tue:Tuesday:Wed:Wednesday:Thu:Thursday:Fri:Friday:Sat:Saturday
                                      • API String ID: 1347072587-3283725177
                                      • Opcode ID: 6393d89942637662d5866c68ffb09c737c725aeba2fa33456e4fb2950fdb48db
                                      • Instruction ID: f388e39843c3ec6d7176ba504c379ffcee05469e991fe8584c5104aee56a47bc
                                      • Opcode Fuzzy Hash: 6393d89942637662d5866c68ffb09c737c725aeba2fa33456e4fb2950fdb48db
                                      • Instruction Fuzzy Hash: 47E06D62B09B45C5EB659F91E4E436A63B0EF09BA4F94A030DA0D0635AEF3CD884C780
                                      APIs
                                      • _W_Getmonths.API-MS-WIN-CRT-TIME-L1-1-0 ref: 00007FFD944E6B6D
                                        • Part of subcall function 00007FFD944E4F80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FFD944F718D,?,?,?,?,?,?,?,?,?,00007FFD944FEBBE), ref: 00007FFD944E4FA9
                                        • Part of subcall function 00007FFD944E4F80: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FFD944F718D,?,?,?,?,?,?,?,?,?,00007FFD944FEBBE), ref: 00007FFD944E4FD8
                                        • Part of subcall function 00007FFD944E4F80: memcpy.VCRUNTIME140(?,?,00000000,00007FFD944F718D,?,?,?,?,?,?,?,?,?,00007FFD944FEBBE), ref: 00007FFD944E4FEF
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FFD944E6B8A
                                      Strings
                                      • :Jan:January:Feb:February:Mar:March:Apr:April:May:May:Jun:June:Jul:July:Aug:August:Sep:September:Oct:October:Nov:November:Dec:Dece, xrefs: 00007FFD944E6B95
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: free$Getmonthsmallocmemcpy
                                      • String ID: :Jan:January:Feb:February:Mar:March:Apr:April:May:May:Jun:June:Jul:July:Aug:August:Sep:September:Oct:October:Nov:November:Dec:Dece
                                      • API String ID: 1628830074-2030377133
                                      • Opcode ID: 88080eb06a95627c39d53d7de312f27508715a5627518dbe34d3c533cb049458
                                      • Instruction ID: b3ba3aad8938d5d6545b92b11206b59aa44f11c7473f8fe3c1929527f4439ab2
                                      • Opcode Fuzzy Hash: 88080eb06a95627c39d53d7de312f27508715a5627518dbe34d3c533cb049458
                                      • Instruction Fuzzy Hash: B9E06D22B09A05C9EBA58F91E5E436A63A4EF09B94F849434DA0E0635ADF3CD8C4C380
                                      APIs
                                      • _Getmonths.API-MS-WIN-CRT-TIME-L1-1-0 ref: 00007FFD944E645D
                                        • Part of subcall function 00007FFD944E4F00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FFD944F1894,?,?,?,00007FFD944E455B,?,?,?,00007FFD944E5C51), ref: 00007FFD944E4F22
                                        • Part of subcall function 00007FFD944E4F00: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FFD944F1894,?,?,?,00007FFD944E455B,?,?,?,00007FFD944E5C51), ref: 00007FFD944E4F48
                                        • Part of subcall function 00007FFD944E4F00: memcpy.VCRUNTIME140(?,?,?,00007FFD944F1894,?,?,?,00007FFD944E455B,?,?,?,00007FFD944E5C51), ref: 00007FFD944E4F60
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FFD944E647A
                                      Strings
                                      • :Jan:January:Feb:February:Mar:March:Apr:April:May:May:Jun:June:Jul:July:Aug:August:Sep:September:Oct:October:Nov:November:Dec:December, xrefs: 00007FFD944E6485
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: free$Getmonthsmallocmemcpy
                                      • String ID: :Jan:January:Feb:February:Mar:March:Apr:April:May:May:Jun:June:Jul:July:Aug:August:Sep:September:Oct:October:Nov:November:Dec:December
                                      • API String ID: 1628830074-4232081075
                                      • Opcode ID: 03d87f0082024f178d2b1371c194030430f53630ea0c12e080eb857d0d6bc8c4
                                      • Instruction ID: 88b0475cb4f1fe49d8a36d9f258f6684b4d798c0ec4d1c2cc6d0e02bdf3529ef
                                      • Opcode Fuzzy Hash: 03d87f0082024f178d2b1371c194030430f53630ea0c12e080eb857d0d6bc8c4
                                      • Instruction Fuzzy Hash: 44E06D62B09A05C1EF6A9F91F4E536A6360EF45F84F849430DA0D0639ADF3CD894C3C0
                                      APIs
                                      • _Getdays.API-MS-WIN-CRT-TIME-L1-1-0 ref: 00007FFD944E63ED
                                        • Part of subcall function 00007FFD944E4F00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FFD944F1894,?,?,?,00007FFD944E455B,?,?,?,00007FFD944E5C51), ref: 00007FFD944E4F22
                                        • Part of subcall function 00007FFD944E4F00: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FFD944F1894,?,?,?,00007FFD944E455B,?,?,?,00007FFD944E5C51), ref: 00007FFD944E4F48
                                        • Part of subcall function 00007FFD944E4F00: memcpy.VCRUNTIME140(?,?,?,00007FFD944F1894,?,?,?,00007FFD944E455B,?,?,?,00007FFD944E5C51), ref: 00007FFD944E4F60
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FFD944E640A
                                      Strings
                                      • :Sun:Sunday:Mon:Monday:Tue:Tuesday:Wed:Wednesday:Thu:Thursday:Fri:Friday:Sat:Saturday, xrefs: 00007FFD944E6415
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: free$Getdaysmallocmemcpy
                                      • String ID: :Sun:Sunday:Mon:Monday:Tue:Tuesday:Wed:Wednesday:Thu:Thursday:Fri:Friday:Sat:Saturday
                                      • API String ID: 1347072587-3283725177
                                      • Opcode ID: c6f2691f1da384d8993644746fcbeff44511dd7bf06d5a1a74113e135da07c40
                                      • Instruction ID: d730dfcae5a90dc86d94d8527ecc0456e0c1ab16ace332df6d20fd93a7c7402b
                                      • Opcode Fuzzy Hash: c6f2691f1da384d8993644746fcbeff44511dd7bf06d5a1a74113e135da07c40
                                      • Instruction Fuzzy Hash: D8E06511719A45C1DB658F91F4E437A6360EF45F84F88C430DA0D0A35ADF3CD884C350
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterInitializeLeave
                                      • String ID:
                                      • API String ID: 3991485460-0
                                      • Opcode ID: de2b700b7462c5f4e6467127e767c4bc04797d0d9bad0eb269c19cca45e7f8bb
                                      • Instruction ID: 8ea412b013ec382ff1dedc8aaf8afcf5a98730b3522e537e7dcd9faeed5d5868
                                      • Opcode Fuzzy Hash: de2b700b7462c5f4e6467127e767c4bc04797d0d9bad0eb269c19cca45e7f8bb
                                      • Instruction Fuzzy Hash: 21417972A08B4592DB90EF2AE44022DB7A0FB84B90BC44136CBCE57B54EF3CE4A5C711
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189694792.00007FF7E3BD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7E3BD0000, based on PE: true
                                      • Associated: 00000005.00000002.2189681031.00007FF7E3BD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189711554.00007FF7E3BE4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189725309.00007FF7E3BEC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2189737880.00007FF7E3BEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ff7e3bd0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterInitializeLeave
                                      • String ID:
                                      • API String ID: 3991485460-0
                                      • Opcode ID: 7c396940b14e45bee96ad5e082efc348c8d0f883345ebc83e979db48e2160e69
                                      • Instruction ID: 311bb24fa38afdec2f1e3339bd9af01e34c3356ada4f673dc20517e0eb4f7fee
                                      • Opcode Fuzzy Hash: 7c396940b14e45bee96ad5e082efc348c8d0f883345ebc83e979db48e2160e69
                                      • Instruction Fuzzy Hash: EE418273A04B4682EB54DF2AE44426DB7A0FB84B84BD44532DB8E97B54DF3CE4A5C311
                                      APIs
                                      • GetLastError.KERNEL32(?,?,?,00007FFDA43353A9,?,?,?,?,00007FFDA433F44F,?,?,?,?,?), ref: 00007FFDA4335543
                                      • SetLastError.KERNEL32(?,?,?,00007FFDA43353A9,?,?,?,?,00007FFDA433F44F,?,?,?,?,?), ref: 00007FFDA43355CC
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190083038.00007FFDA4331000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFDA4330000, based on PE: true
                                      • Associated: 00000005.00000002.2190069974.00007FFDA4330000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190099763.00007FFDA4344000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190113951.00007FFDA4349000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                      • Associated: 00000005.00000002.2190129204.00007FFDA434A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda4330000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ErrorLast
                                      • String ID:
                                      • API String ID: 1452528299-0
                                      • Opcode ID: 550cea5c84bc0485e2971ce80c0edd506865995108a692b5126701225aaf57c4
                                      • Instruction ID: 6fe64b3db397f032e1d4b067d7d37144033345bcf27ddfa1ff246d2dc3b4cf9b
                                      • Opcode Fuzzy Hash: 550cea5c84bc0485e2971ce80c0edd506865995108a692b5126701225aaf57c4
                                      • Instruction Fuzzy Hash: FD112420B4BF4241FA14A731A8B81786292AF56BA1F158634D92F063F7DE2CF445C608
                                      APIs
                                      • GetLastError.KERNEL32(?,?,?,00007FFDA54B3175,?,?,?,?,00007FFDA54B4057,?,?,?,?,?), ref: 00007FFDA54B32D3
                                      • SetLastError.KERNEL32(?,?,?,00007FFDA54B3175,?,?,?,?,00007FFDA54B4057,?,?,?,?,?), ref: 00007FFDA54B335B
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2190160805.00007FFDA54B1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA54B0000, based on PE: true
                                      • Associated: 00000005.00000002.2190144253.00007FFDA54B0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190175865.00007FFDA54B5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190190132.00007FFDA54B8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                      • Associated: 00000005.00000002.2190204054.00007FFDA54B9000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffda54b0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: ErrorLast
                                      • String ID:
                                      • API String ID: 1452528299-0
                                      • Opcode ID: bfb27b7b45ffb3c1d040ad31652f38837651550378899a0c7940be1c99b38e59
                                      • Instruction ID: c0b94f23408f89f3a94383b445feced501d96592d1402aa7aa2773a4d6a38cab
                                      • Opcode Fuzzy Hash: bfb27b7b45ffb3c1d040ad31652f38837651550378899a0c7940be1c99b38e59
                                      • Instruction Fuzzy Hash: 46111D30F0B60E85EE545766B8703796291AF5AFA0F0B5734D92E477D7EEACA4018608
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 4a48f1c4d7c03260f7f70a3d97dc08880775d18e037ccc3144df3fe31efa8da6
                                      • Instruction ID: a1e00adf31cfd2004aa68bac3df728cee3676c206d7cd0bd33a1f1807fd3ff0f
                                      • Opcode Fuzzy Hash: 4a48f1c4d7c03260f7f70a3d97dc08880775d18e037ccc3144df3fe31efa8da6
                                      • Instruction Fuzzy Hash: 5AF03121718B45DAD7959F95E5F41287320FF89F80B408431CA4D43B22DF2CD4A5C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: ffd378a4487c384eca31b3fb56f6a558adced883053d3b0a087f6b06aa324480
                                      • Instruction ID: 17c9a2760cd8ea472b84e134eb8f542fe0f97eccbbca68e40f0787850c7e7142
                                      • Opcode Fuzzy Hash: ffd378a4487c384eca31b3fb56f6a558adced883053d3b0a087f6b06aa324480
                                      • Instruction Fuzzy Hash: 9FF03125718B05DADB958F95E9F41287320FF89B80B449430CA4D43B65DF6CD465C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: eee7fe0f3556fb421fff62f8d28dd5218fae23df9bd88b3103c0db358813fed1
                                      • Instruction ID: 426b1e762158d8c1508d6ac49582dc9ed090df10a3d5b4ab22c0c5bb7c0a3a67
                                      • Opcode Fuzzy Hash: eee7fe0f3556fb421fff62f8d28dd5218fae23df9bd88b3103c0db358813fed1
                                      • Instruction Fuzzy Hash: 82F03121718B05DADB958F95E9F41287320FF89B80B409430CA4D43B66DF6CD465C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2189764442.00007FFD944E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFD944E0000, based on PE: true
                                      • Associated: 00000005.00000002.2189751874.00007FFD944E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189796846.00007FFD94535000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189821761.00007FFD94563000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                      • Associated: 00000005.00000002.2189835177.00007FFD94567000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffd944e0000_svaulpzg.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 4627c1aaf56b1667bf9f68b9fd75585d0c02053b0e3b263439d6d713141ea6bb
                                      • Instruction ID: 45c3a576404e312f6f0d7cbe7fb4e0acecd1d24d28cbad789118001c8264d556
                                      • Opcode Fuzzy Hash: 4627c1aaf56b1667bf9f68b9fd75585d0c02053b0e3b263439d6d713141ea6bb
                                      • Instruction Fuzzy Hash: A7E0BFA2B14A05DAEB699FA1D8F40387330FF89F55B586431CE0E46226CF68D494C300