Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1571903
MD5:9a2cc9d6c6282e7b2a0ff5649a70b0df
SHA1:99c7c3969c9ab39261b59f047514ff7de2bc4c07
SHA256:b08f2b65885b9ae1825d27ddf6dc9189641e0f8817999f4386da55ffcc548287
Tags:exeLummaStealeruser-Bitsight
Infos:

Detection

LummaC Stealer
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 7536 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 9A2CC9D6C6282E7B2A0FF5649A70B0DF)
    • conhost.exe (PID: 7544 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • file.exe (PID: 7596 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 9A2CC9D6C6282E7B2A0FF5649A70B0DF)
    • file.exe (PID: 7604 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 9A2CC9D6C6282E7B2A0FF5649A70B0DF)
  • cleanup
{"C2 url": ["impend-differ.biz", "zinc-sneark.biz", "drive-connect.cyou", "covery-mover.biz", "formy-spill.biz", "dare-curbys.biz", "se-blurry.biz", "dwell-exclaim.biz", "print-vexer.biz"], "Build id": "FATE99--test"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-09T20:40:59.709613+010020283713Unknown Traffic192.168.2.449730104.21.79.7443TCP
      2024-12-09T20:41:02.096133+010020283713Unknown Traffic192.168.2.449731104.21.79.7443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-09T20:41:00.823464+010020546531A Network Trojan was detected192.168.2.449730104.21.79.7443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-09T20:41:00.823464+010020498361A Network Trojan was detected192.168.2.449730104.21.79.7443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: https://drive-connect.cyou/apinAvira URL Cloud: Label: malware
      Source: drive-connect.cyouAvira URL Cloud: Label: malware
      Source: https://drive-connect.cyou/Avira URL Cloud: Label: malware
      Source: https://drive-connect.cyou/cAvira URL Cloud: Label: malware
      Source: https://drive-connect.cyou/apis&&4Avira URL Cloud: Label: malware
      Source: https://drive-connect.cyou/apiAvira URL Cloud: Label: malware
      Source: 00000000.00000002.1657324741.000000000273F000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["impend-differ.biz", "zinc-sneark.biz", "drive-connect.cyou", "covery-mover.biz", "formy-spill.biz", "dare-curbys.biz", "se-blurry.biz", "dwell-exclaim.biz", "print-vexer.biz"], "Build id": "FATE99--test"}
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 92.2% probability
      Source: file.exeJoe Sandbox ML: detected
      Source: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: impend-differ.biz
      Source: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: print-vexer.biz
      Source: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: dare-curbys.biz
      Source: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: covery-mover.biz
      Source: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: formy-spill.biz
      Source: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: dwell-exclaim.biz
      Source: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: zinc-sneark.biz
      Source: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: se-blurry.biz
      Source: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: drive-connect.cyou
      Source: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
      Source: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
      Source: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
      Source: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
      Source: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
      Source: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: FATE99--test
      Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 104.21.79.7:443 -> 192.168.2.4:49730 version: TLS 1.2
      Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004F0919 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_004F0919
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004F0868 FindFirstFileExW,2_2_004F0868
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004F0919 FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_004F0919
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+05h]3_2_0040A960
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, ecx3_2_00409CC0
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [edx], bl3_2_0040CE55
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_0042A060
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-0BF7BDDDh]3_2_00425F7D
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, ecx3_2_0041D074
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, ecx3_2_0041D087
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0042D085
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0042D085
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+79314A46h]3_2_00426170
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edi, byte ptr [esi+eax-000000BCh]3_2_0041597D
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edi, byte ptr [esi+eax-000000BCh]3_2_00416E97
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edi, eax3_2_00416E97
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ebx, eax3_2_00405910
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ebp, eax3_2_00405910
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], B430E561h3_2_00425920
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], cx3_2_004286F0
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edi, byte ptr [esi+eax-000000BCh]3_2_00417190
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, eax3_2_00422270
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [edi+ebx], 00000000h3_2_0040C274
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [00444284h]3_2_00425230
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]3_2_0043CAC0
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+1Ch]3_2_004292D0
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, ebx3_2_004292D0
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]3_2_0042AAD0
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [eax], cl3_2_00415ADC
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then push eax3_2_0040C36E
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebx, bx3_2_0042536C
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+esi]3_2_00402B70
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [ecx], dx3_2_00427307
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebp, word ptr [ecx+ebx*2]3_2_00436B20
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h3_2_0043DBD0
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]3_2_0043CBD6
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]3_2_00407470
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]3_2_00407470
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp eax3_2_0042B475
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], B430E561h3_2_00419C10
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]3_2_0043CCE0
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 29DF508Eh3_2_0043DCF0
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_0042B4BB
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]3_2_0043CD60
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_004345F0
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+2Ch]3_2_00427653
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]3_2_0043CE00
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h3_2_0042A630
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+36A27D27h]3_2_0042C6D7
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [esi], al3_2_0042C6D7
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+07540F19h]3_2_0042C6D7
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+07540F19h]3_2_0042C6D7
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-41h]3_2_004296D8
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edi, byte ptr [esi+ecx-000000BCh]3_2_00415EE0
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00421EE0
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp al, 2Eh3_2_004266E7
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], cx3_2_004286F0
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], dx3_2_00417E82
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 299A4ECDh3_2_0043E690
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edi, byte ptr [esi+eax-000000BCh]3_2_00416E97
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edi, eax3_2_00416E97
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp word ptr [ebp+edx+02h], 0000h3_2_0041CEA5
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then add ebx, 03h3_2_00428F5D
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-0BF7BDDDh]3_2_00425F7D
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [ecx+edx*8], B430E561h3_2_00414F08
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, edx3_2_00414F08
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00420717
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [ecx], dx3_2_00420717
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-51BA460Ah]3_2_0042BFD3
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-51BA460Ah]3_2_0042BFDA
      Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 2298EE00h3_2_0043DFB0

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49730 -> 104.21.79.7:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49730 -> 104.21.79.7:443
      Source: Malware configuration extractorURLs: impend-differ.biz
      Source: Malware configuration extractorURLs: zinc-sneark.biz
      Source: Malware configuration extractorURLs: drive-connect.cyou
      Source: Malware configuration extractorURLs: covery-mover.biz
      Source: Malware configuration extractorURLs: formy-spill.biz
      Source: Malware configuration extractorURLs: dare-curbys.biz
      Source: Malware configuration extractorURLs: se-blurry.biz
      Source: Malware configuration extractorURLs: dwell-exclaim.biz
      Source: Malware configuration extractorURLs: print-vexer.biz
      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49731 -> 104.21.79.7:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49730 -> 104.21.79.7:443
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: drive-connect.cyou
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: drive-connect.cyou
      Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: drive-connect.cyou
      Source: file.exe, 00000003.00000003.1697081822.00000000016E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.1697763562.00000000016E7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.1697297764.00000000016E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
      Source: file.exe, 00000003.00000003.1697081822.00000000016E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.1697763562.00000000016E7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.1697763562.00000000016BC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.1697297764.00000000016E6000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.1697081822.00000000016BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive-connect.cyou/
      Source: file.exe, 00000003.00000003.1697081822.00000000016E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.1697763562.00000000016E7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.1697297764.00000000016E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive-connect.cyou/api
      Source: file.exe, 00000003.00000003.1697081822.00000000016E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.1697763562.00000000016E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive-connect.cyou/apin
      Source: file.exe, 00000003.00000002.1697763562.00000000016BC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.1697081822.00000000016BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive-connect.cyou/apis&&4
      Source: file.exe, 00000003.00000003.1697081822.00000000016E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.1697763562.00000000016E7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.1697297764.00000000016E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive-connect.cyou/c
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
      Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
      Source: unknownHTTPS traffic detected: 104.21.79.7:443 -> 192.168.2.4:49730 version: TLS 1.2
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00431A30 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_00431A30
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00431A30 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_00431A30
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00431BB0 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,3_2_00431BB0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004D1B700_2_004D1B70
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004D10000_2_004D1000
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004E89000_2_004E8900
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004E21010_2_004E2101
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004F63620_2_004F6362
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004D4C000_2_004D4C00
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004DD4DB0_2_004DD4DB
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004D6D700_2_004D6D70
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004E35000_2_004E3500
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004F458A0_2_004F458A
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004D3E600_2_004D3E60
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004D10002_2_004D1000
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004E89002_2_004E8900
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004E21012_2_004E2101
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004D7AF02_2_004D7AF0
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004F63622_2_004F6362
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004D1B702_2_004D1B70
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004D4C002_2_004D4C00
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004DD4DB2_2_004DD4DB
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004D6D702_2_004D6D70
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004E35002_2_004E3500
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004F458A2_2_004F458A
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004D3E602_2_004D3E60
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0040A9603_2_0040A960
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004087F03_2_004087F0
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00436F903_2_00436F90
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00425F7D3_2_00425F7D
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004090703_2_00409070
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0043A0303_2_0043A030
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004038C03_2_004038C0
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004380D93_2_004380D9
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0041D8E03_2_0041D8E0
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042D0853_2_0042D085
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004280B03_2_004280B0
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004261703_2_00426170
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042297F3_2_0042297F
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042A1003_2_0042A100
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004379003_2_00437900
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00416E973_2_00416E97
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004059103_2_00405910
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004259203_2_00425920
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004301D03_2_004301D0
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004081F03_2_004081F0
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004089903_2_00408990
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004171903_2_00417190
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00414A403_2_00414A40
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0041BA483_2_0041BA48
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0040CA543_2_0040CA54
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004042703_2_00404270
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004222703_2_00422270
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004062003_2_00406200
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00423A003_2_00423A00
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0043CAC03_2_0043CAC0
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0043E2C03_2_0043E2C0
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004292D03_2_004292D0
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00415ADC3_2_00415ADC
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042BA8D3_2_0042BA8D
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0040E2A93_2_0040E2A9
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004192BA3_2_004192BA
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0040B3513_2_0040B351
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0041CB5A3_2_0041CB5A
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004093603_2_00409360
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0041C3603_2_0041C360
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00416B7E3_2_00416B7E
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00411B1B3_2_00411B1B
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0043533A3_2_0043533A
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0043CBD63_2_0043CBD6
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0043A3F03_2_0043A3F0
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00439B903_2_00439B90
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00404BA03_2_00404BA0
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004233A03_2_004233A0
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00436C403_2_00436C40
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0040D44C3_2_0040D44C
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00434C4D3_2_00434C4D
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004074703_2_00407470
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00419C103_2_00419C10
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00418C1E3_2_00418C1E
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0041D4203_2_0041D420
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0041DC203_2_0041DC20
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004364303_2_00436430
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0043CCE03_2_0043CCE0
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0043DCF03_2_0043DCF0
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00422CF83_2_00422CF8
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00427C9D3_2_00427C9D
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0043CD603_2_0043CD60
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004165713_2_00416571
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00423D303_2_00423D30
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004215F03_2_004215F0
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0041DE403_2_0041DE40
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004126703_2_00412670
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004256703_2_00425670
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0041AE003_2_0041AE00
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0043CE003_2_0043CE00
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00423E303_2_00423E30
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004156D03_2_004156D0
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042C6D73_2_0042C6D7
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00415EE03_2_00415EE0
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004266E73_2_004266E7
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004066903_2_00406690
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0043E6903_2_0043E690
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004366903_2_00436690
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00416E973_2_00416E97
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00402EA03_2_00402EA0
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004376B03_2_004376B0
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00426EBE3_2_00426EBE
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00428F5D3_2_00428F5D
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042B7633_2_0042B763
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00425F7D3_2_00425F7D
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00414F083_2_00414F08
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004207173_2_00420717
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004187313_2_00418731
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0041EF303_2_0041EF30
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042BFD33_2_0042BFD3
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00410FD63_2_00410FD6
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0042BFDA3_2_0042BFDA
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004167A53_2_004167A5
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00418FAD3_2_00418FAD
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004097B03_2_004097B0
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0043DFB03_2_0043DFB0
      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00414A30 appears 76 times
      Source: C:\Users\user\Desktop\file.exeCode function: String function: 004EB97D appears 40 times
      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00408000 appears 52 times
      Source: C:\Users\user\Desktop\file.exeCode function: String function: 004DD9E0 appears 102 times
      Source: C:\Users\user\Desktop\file.exeCode function: String function: 004E6C0B appears 42 times
      Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: file.exeStatic PE information: Section: .bss ZLIB complexity 1.0003383629931388
      Source: file.exeStatic PE information: Section: .bss ZLIB complexity 1.0003383629931388
      Source: classification engineClassification label: mal96.troj.evad.winEXE@6/0@1/1
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00436F90 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,3_2_00436F90
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7544:120:WilError_03
      Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"Jump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"Jump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: webio.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, TERMINAL_SERVER_AWARE
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004DDB9A push ecx; ret 0_2_004DDBAD
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004DDB9A push ecx; ret 2_2_004DDBAD
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00446061 push edx; retf 3_2_00446062
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0043CA60 push eax; mov dword ptr [esp], 11102FFEh3_2_0043CA63
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00445A2E push esi; ret 3_2_00445A31
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00442543 push esp; retf 3_2_00442549
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00439F70 push eax; mov dword ptr [esp], 60616263h3_2_00439F7F
      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\file.exe TID: 7624Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\file.exe TID: 7620Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004F0919 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_004F0919
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004F0868 FindFirstFileExW,2_2_004F0868
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004F0919 FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_004F0919
      Source: file.exe, 00000003.00000003.1697081822.00000000016E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.1697763562.00000000016E7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.1697763562.00000000016BC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.1697297764.00000000016E6000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.1697081822.00000000016BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0043B480 LdrInitializeThunk,3_2_0043B480
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004DD86F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004DD86F
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005061A9 mov edi, dword ptr fs:[00000030h]0_2_005061A9
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004D1B70 mov edi, dword ptr fs:[00000030h]0_2_004D1B70
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004D1B70 mov edi, dword ptr fs:[00000030h]2_2_004D1B70
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004EC275 GetProcessHeap,0_2_004EC275
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004DD86F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004DD86F
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004DD863 SetUnhandledExceptionFilter,0_2_004DD863
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004E695D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004E695D
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004DD4B3 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_004DD4B3
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004DD86F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_004DD86F
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004DD863 SetUnhandledExceptionFilter,2_2_004DD863
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004E695D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_004E695D
      Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004DD4B3 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_004DD4B3

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005061A9 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_005061A9
      Source: C:\Users\user\Desktop\file.exeMemory written: C:\Users\user\Desktop\file.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"Jump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"Jump to behavior
      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_004F0170
      Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_004F0111
      Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_004F0245
      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_004F0290
      Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_004EBB60
      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_004F0337
      Source: C:\Users\user\Desktop\file.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_004EFBD2
      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_004F043D
      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_004EB5BC
      Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_004EFE23
      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_004EFEBE
      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,2_2_004F0170
      Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,2_2_004F0111
      Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,2_2_004F0245
      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,2_2_004F0290
      Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,2_2_004EBB60
      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_004F0337
      Source: C:\Users\user\Desktop\file.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_004EFBD2
      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,2_2_004F043D
      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,2_2_004EB5BC
      Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,2_2_004EFE23
      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_004EFEBE
      Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004DE170 GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,0_2_004DE170
      Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Windows Management Instrumentation
      1
      DLL Side-Loading
      211
      Process Injection
      1
      Virtualization/Sandbox Evasion
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Screen Capture
      11
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      211
      Process Injection
      LSASS Memory21
      Security Software Discovery
      Remote Desktop Protocol1
      Archive Collected Data
      2
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      Deobfuscate/Decode Files or Information
      Security Account Manager1
      Virtualization/Sandbox Evasion
      SMB/Windows Admin Shares2
      Clipboard Data
      113
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
      Obfuscated Files or Information
      NTDS1
      File and Directory Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Software Packing
      LSA Secrets33
      System Information Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1571903 Sample: file.exe Startdate: 09/12/2024 Architecture: WINDOWS Score: 96 17 drive-connect.cyou 2->17 21 Suricata IDS alerts for network traffic 2->21 23 Found malware configuration 2->23 25 Antivirus detection for URL or domain 2->25 27 5 other signatures 2->27 7 file.exe 1 2->7         started        signatures3 process4 signatures5 29 Contains functionality to inject code into remote processes 7->29 31 Injects a PE file into a foreign processes 7->31 10 file.exe 7->10         started        13 conhost.exe 7->13         started        15 file.exe 7->15         started        process6 dnsIp7 19 drive-connect.cyou 104.21.79.7, 443, 49730, 49731 CLOUDFLARENETUS United States 10->19

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      file.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://drive-connect.cyou/apin100%Avira URL Cloudmalware
      drive-connect.cyou100%Avira URL Cloudmalware
      https://drive-connect.cyou/100%Avira URL Cloudmalware
      https://drive-connect.cyou/c100%Avira URL Cloudmalware
      https://drive-connect.cyou/apis&&4100%Avira URL Cloudmalware
      https://drive-connect.cyou/api100%Avira URL Cloudmalware
      NameIPActiveMaliciousAntivirus DetectionReputation
      drive-connect.cyou
      104.21.79.7
      truetrue
        unknown
        NameMaliciousAntivirus DetectionReputation
        dare-curbys.bizfalse
          high
          impend-differ.bizfalse
            high
            zinc-sneark.bizfalse
              high
              covery-mover.bizfalse
                high
                formy-spill.bizfalse
                  high
                  se-blurry.bizfalse
                    high
                    https://drive-connect.cyou/apitrue
                    • Avira URL Cloud: malware
                    unknown
                    print-vexer.bizfalse
                      high
                      dwell-exclaim.bizfalse
                        high
                        drive-connect.cyoutrue
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://crl.mfile.exe, 00000003.00000003.1697081822.00000000016E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.1697763562.00000000016E7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.1697297764.00000000016E6000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://drive-connect.cyou/apinfile.exe, 00000003.00000003.1697081822.00000000016E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.1697763562.00000000016E3000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://drive-connect.cyou/file.exe, 00000003.00000003.1697081822.00000000016E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.1697763562.00000000016E7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.1697763562.00000000016BC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.1697297764.00000000016E6000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.1697081822.00000000016BC000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://drive-connect.cyou/cfile.exe, 00000003.00000003.1697081822.00000000016E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.1697763562.00000000016E7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.1697297764.00000000016E6000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://drive-connect.cyou/apis&&4file.exe, 00000003.00000002.1697763562.00000000016BC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000003.1697081822.00000000016BC000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          104.21.79.7
                          drive-connect.cyouUnited States
                          13335CLOUDFLARENETUStrue
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1571903
                          Start date and time:2024-12-09 20:40:07 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 2m 33s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:4
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:file.exe
                          Detection:MAL
                          Classification:mal96.troj.evad.winEXE@6/0@1/1
                          EGA Information:
                          • Successful, ratio: 66.7%
                          HCA Information:
                          • Successful, ratio: 97%
                          • Number of executed functions: 30
                          • Number of non-executed functions: 167
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Stop behavior analysis, all processes terminated
                          • Execution Graph export aborted for target file.exe, PID 7596 because there are no executed function
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • VT rate limit hit for: file.exe
                          TimeTypeDescription
                          14:41:00API Interceptor2x Sleep call for process: file.exe modified
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          drive-connect.cyouBPzptjK1aF.exeGet hashmaliciousLummaC StealerBrowse
                          • 172.67.139.78
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC StealerBrowse
                          • 104.21.64.1
                          https://quiet-sun-5d9f.atmos4.workers.dev/loginGet hashmaliciousUnknownBrowse
                          • 104.21.50.75
                          attachDocx.docxGet hashmaliciousUnknownBrowse
                          • 104.17.25.14
                          Play_VM-NowCRQW.htmlGet hashmaliciousHTMLPhisherBrowse
                          • 104.17.25.14
                          file.exeGet hashmaliciousAmadey, LummaC Stealer, StealcBrowse
                          • 172.67.165.166
                          file.exeGet hashmaliciousLummaC StealerBrowse
                          • 172.67.165.166
                          http://www.polarinsight.online/tbGet hashmaliciousUnknownBrowse
                          • 172.67.166.58
                          https://www.aarp.org/money/scams-fraud/info-2024/title-theft-real-estate-fraud.htmlGet hashmaliciousHTMLPhisherBrowse
                          • 104.18.27.193
                          http://xn--gmq700hb9ir4byxw.shop/bnBkL2ViZml0c2JwY0F7Zm1mdy9idWp0cHMkbHYvcGQvem1xanVtYnNmZC9xbmJ3MDA7dHF1dWkGet hashmaliciousReCaptcha PhishBrowse
                          • 104.16.123.96
                          https://webservice.ucampaign.unear.net/UmailTracking/t.aspx?p=64620006&c=MTI2NjMxOA==&up=46435316&e=jlim@vvblawyers.com&l=MTczODQ=&i=1126&u=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Get hashmaliciousHTMLPhisherBrowse
                          • 104.17.25.14
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaC StealerBrowse
                          • 104.21.79.7
                          file.exeGet hashmaliciousAmadey, LummaC Stealer, StealcBrowse
                          • 104.21.79.7
                          file.exeGet hashmaliciousLummaC StealerBrowse
                          • 104.21.79.7
                          file.exeGet hashmaliciousLummaC StealerBrowse
                          • 104.21.79.7
                          SJqOoILabX.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, StealcBrowse
                          • 104.21.79.7
                          8GHb2yuPOk.exeGet hashmaliciousAmadey, LummaC StealerBrowse
                          • 104.21.79.7
                          W7ZBbzV7A5.exeGet hashmaliciousUnknownBrowse
                          • 104.21.79.7
                          BPzptjK1aF.exeGet hashmaliciousLummaC StealerBrowse
                          • 104.21.79.7
                          file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, StealcBrowse
                          • 104.21.79.7
                          file.exeGet hashmaliciousLummaC StealerBrowse
                          • 104.21.79.7
                          No context
                          No created / dropped files found
                          File type:PE32 executable (console) Intel 80386, for MS Windows
                          Entropy (8bit):7.805484562629924
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:file.exe
                          File size:828'416 bytes
                          MD5:9a2cc9d6c6282e7b2a0ff5649a70b0df
                          SHA1:99c7c3969c9ab39261b59f047514ff7de2bc4c07
                          SHA256:b08f2b65885b9ae1825d27ddf6dc9189641e0f8817999f4386da55ffcc548287
                          SHA512:b61aa465d601a75426129b2096e900c008faeee6d67b729bf3b2fdeef6957934e9bba7353ad55b499c2722f5381c9cc684f867e4c2b7958e743d1a459eae88d7
                          SSDEEP:12288:43+0sQQRz2L8CqyGAuDi5r5jBlhyyZzWDtkfDdEIHiyO+rBlhyyZzWDtkfDdEIH7:4BqSL8CWopBCyqXIdXBCyqXId5
                          TLSH:CD050141B8C14472C46326328C74E7BA5E3EF9744F31AEDBE3A45A3DDA316C18735A4A
                          File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....Vg............................r.............@.......................................@..................................<..<..
                          Icon Hash:90cececece8e8eb0
                          Entrypoint:0x40e572
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows cui
                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, TERMINAL_SERVER_AWARE
                          Time Stamp:0x6756FE8D [Mon Dec 9 14:28:29 2024 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:6
                          OS Version Minor:0
                          File Version Major:6
                          File Version Minor:0
                          Subsystem Version Major:6
                          Subsystem Version Minor:0
                          Import Hash:8f4e72561d4efc2a78f43ace5ca381df
                          Instruction
                          call 00007F39ECDEDDBAh
                          jmp 00007F39ECDEDC29h
                          mov ecx, dword ptr [00436900h]
                          push esi
                          push edi
                          mov edi, BB40E64Eh
                          mov esi, FFFF0000h
                          cmp ecx, edi
                          je 00007F39ECDEDDB6h
                          test esi, ecx
                          jne 00007F39ECDEDDD8h
                          call 00007F39ECDEDDE1h
                          mov ecx, eax
                          cmp ecx, edi
                          jne 00007F39ECDEDDB9h
                          mov ecx, BB40E64Fh
                          jmp 00007F39ECDEDDC0h
                          test esi, ecx
                          jne 00007F39ECDEDDBCh
                          or eax, 00004711h
                          shl eax, 10h
                          or ecx, eax
                          mov dword ptr [00436900h], ecx
                          not ecx
                          pop edi
                          mov dword ptr [00436940h], ecx
                          pop esi
                          ret
                          push ebp
                          mov ebp, esp
                          sub esp, 14h
                          lea eax, dword ptr [ebp-0Ch]
                          xorps xmm0, xmm0
                          push eax
                          movlpd qword ptr [ebp-0Ch], xmm0
                          call dword ptr [00433F48h]
                          mov eax, dword ptr [ebp-08h]
                          xor eax, dword ptr [ebp-0Ch]
                          mov dword ptr [ebp-04h], eax
                          call dword ptr [00433F00h]
                          xor dword ptr [ebp-04h], eax
                          call dword ptr [00433EFCh]
                          xor dword ptr [ebp-04h], eax
                          lea eax, dword ptr [ebp-14h]
                          push eax
                          call dword ptr [00433F90h]
                          mov eax, dword ptr [ebp-10h]
                          lea ecx, dword ptr [ebp-04h]
                          xor eax, dword ptr [ebp-14h]
                          xor eax, dword ptr [ebp-04h]
                          xor eax, ecx
                          leave
                          ret
                          mov eax, 00004000h
                          ret
                          push 00438008h
                          call dword ptr [00433F68h]
                          ret
                          push 00030000h
                          push 00010000h
                          push 00000000h
                          call 00007F39ECDF55DEh
                          add esp, 0Ch
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x33ce00x3c.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x3a0000x10.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x3b0000x1f88.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x2ff080x18.rdata
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2c2880xc0.rdata
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x33e940x178.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x29ec00x2a000ac710cf82f0bf7022a4aaa856b12d73eFalse0.5421084449404762data6.670829529851215IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x2b0000xa33c0xa400ee2f812185df99eb0802af6cb8092b28False0.42485232469512196data4.924236004008865IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0x360000x27d40x1800472cb0caa2519382f7c923808f8b67faFalse0.3839518229166667data4.8137648404324445IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .TLS0x390000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x3a0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x3b0000x1f880x2000accec0655340d78d26259bfb9ab151b5False0.7593994140625data6.543821280470182IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          .bss0x3d0000x48e000x48e00c6c4a18aacb63847a01d1ba3271bcb87False1.0003383629931388data7.999337628936504IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .bss0x860000x48e000x48e00c6c4a18aacb63847a01d1ba3271bcb87False1.0003383629931388data7.999337628936504IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          DLLImport
                          KERNEL32.dllAcquireSRWLockExclusive, CloseHandle, CompareStringW, CreateFileW, CreateThread, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, ExitThread, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryAcquireSRWLockExclusive, UnhandledExceptionFilter, WaitForSingleObjectEx, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile
                          USER32.dllCreateWindowExW, DefWindowProcW, GetMessageW, PostQuitMessage, RegisterClassW
                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                          2024-12-09T20:40:59.709613+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449730104.21.79.7443TCP
                          2024-12-09T20:41:00.823464+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449730104.21.79.7443TCP
                          2024-12-09T20:41:00.823464+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449730104.21.79.7443TCP
                          2024-12-09T20:41:02.096133+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449731104.21.79.7443TCP
                          TimestampSource PortDest PortSource IPDest IP
                          Dec 9, 2024 20:40:58.465059996 CET49730443192.168.2.4104.21.79.7
                          Dec 9, 2024 20:40:58.465111017 CET44349730104.21.79.7192.168.2.4
                          Dec 9, 2024 20:40:58.465230942 CET49730443192.168.2.4104.21.79.7
                          Dec 9, 2024 20:40:58.480856895 CET49730443192.168.2.4104.21.79.7
                          Dec 9, 2024 20:40:58.480870962 CET44349730104.21.79.7192.168.2.4
                          Dec 9, 2024 20:40:59.709430933 CET44349730104.21.79.7192.168.2.4
                          Dec 9, 2024 20:40:59.709613085 CET49730443192.168.2.4104.21.79.7
                          Dec 9, 2024 20:40:59.711924076 CET49730443192.168.2.4104.21.79.7
                          Dec 9, 2024 20:40:59.711934090 CET44349730104.21.79.7192.168.2.4
                          Dec 9, 2024 20:40:59.712173939 CET44349730104.21.79.7192.168.2.4
                          Dec 9, 2024 20:40:59.752245903 CET49730443192.168.2.4104.21.79.7
                          Dec 9, 2024 20:41:00.086533070 CET49730443192.168.2.4104.21.79.7
                          Dec 9, 2024 20:41:00.086563110 CET49730443192.168.2.4104.21.79.7
                          Dec 9, 2024 20:41:00.086684942 CET44349730104.21.79.7192.168.2.4
                          Dec 9, 2024 20:41:00.823477983 CET44349730104.21.79.7192.168.2.4
                          Dec 9, 2024 20:41:00.823575974 CET44349730104.21.79.7192.168.2.4
                          Dec 9, 2024 20:41:00.823687077 CET49730443192.168.2.4104.21.79.7
                          Dec 9, 2024 20:41:00.825874090 CET49730443192.168.2.4104.21.79.7
                          Dec 9, 2024 20:41:00.825897932 CET44349730104.21.79.7192.168.2.4
                          Dec 9, 2024 20:41:00.825911045 CET49730443192.168.2.4104.21.79.7
                          Dec 9, 2024 20:41:00.825916052 CET44349730104.21.79.7192.168.2.4
                          Dec 9, 2024 20:41:00.871098995 CET49731443192.168.2.4104.21.79.7
                          Dec 9, 2024 20:41:00.871155977 CET44349731104.21.79.7192.168.2.4
                          Dec 9, 2024 20:41:00.871252060 CET49731443192.168.2.4104.21.79.7
                          Dec 9, 2024 20:41:00.871548891 CET49731443192.168.2.4104.21.79.7
                          Dec 9, 2024 20:41:00.871565104 CET44349731104.21.79.7192.168.2.4
                          Dec 9, 2024 20:41:02.096132994 CET49731443192.168.2.4104.21.79.7
                          TimestampSource PortDest PortSource IPDest IP
                          Dec 9, 2024 20:40:58.126285076 CET5200553192.168.2.41.1.1.1
                          Dec 9, 2024 20:40:58.458127975 CET53520051.1.1.1192.168.2.4
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Dec 9, 2024 20:40:58.126285076 CET192.168.2.41.1.1.10x313fStandard query (0)drive-connect.cyouA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Dec 9, 2024 20:40:58.458127975 CET1.1.1.1192.168.2.40x313fNo error (0)drive-connect.cyou104.21.79.7A (IP address)IN (0x0001)false
                          Dec 9, 2024 20:40:58.458127975 CET1.1.1.1192.168.2.40x313fNo error (0)drive-connect.cyou172.67.139.78A (IP address)IN (0x0001)false
                          • drive-connect.cyou
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.449730104.21.79.74437604C:\Users\user\Desktop\file.exe
                          TimestampBytes transferredDirectionData
                          2024-12-09 19:41:00 UTC265OUTPOST /api HTTP/1.1
                          Connection: Keep-Alive
                          Content-Type: application/x-www-form-urlencoded
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                          Content-Length: 8
                          Host: drive-connect.cyou
                          2024-12-09 19:41:00 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                          Data Ascii: act=life
                          2024-12-09 19:41:00 UTC1022INHTTP/1.1 200 OK
                          Date: Mon, 09 Dec 2024 19:41:00 GMT
                          Content-Type: text/html; charset=UTF-8
                          Transfer-Encoding: chunked
                          Connection: close
                          Set-Cookie: PHPSESSID=1h69vlc94jel65eatqhhijps7u; expires=Fri, 04-Apr-2025 13:27:39 GMT; Max-Age=9999999; path=/
                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                          Cache-Control: no-store, no-cache, must-revalidate
                          Pragma: no-cache
                          CF-Cache-Status: DYNAMIC
                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LX64uhAbRcLK8jezdR1CM%2FUjhP8%2BjCln%2FwP1YrxsPUuT1bwxhrLaL4q0PLkTraG0GqJYn%2FJ2RYojE6USNrGRox%2FnF%2FMXK6A2eam1tWGHsbA1GBb4dT8bMZzhDnOx6Xf5HQP7eZs%3D"}],"group":"cf-nel","max_age":604800}
                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                          Server: cloudflare
                          CF-RAY: 8ef7785c89c543fe-EWR
                          alt-svc: h3=":443"; ma=86400
                          server-timing: cfL4;desc="?proto=TCP&rtt=1773&min_rtt=1766&rtt_var=676&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2845&recv_bytes=909&delivery_rate=1601755&cwnd=236&unsent_bytes=0&cid=de267d6f11d348b9&ts=1128&x=0"
                          2024-12-09 19:41:00 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                          Data Ascii: 2ok
                          2024-12-09 19:41:00 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Click to jump to process

                          Click to jump to process

                          Click to jump to process

                          Target ID:0
                          Start time:14:40:57
                          Start date:09/12/2024
                          Path:C:\Users\user\Desktop\file.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\file.exe"
                          Imagebase:0x4d0000
                          File size:828'416 bytes
                          MD5 hash:9A2CC9D6C6282E7B2A0FF5649A70B0DF
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true

                          Target ID:1
                          Start time:14:40:57
                          Start date:09/12/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff7699e0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:2
                          Start time:14:40:57
                          Start date:09/12/2024
                          Path:C:\Users\user\Desktop\file.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\file.exe"
                          Imagebase:0x4d0000
                          File size:828'416 bytes
                          MD5 hash:9A2CC9D6C6282E7B2A0FF5649A70B0DF
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true

                          Target ID:3
                          Start time:14:40:57
                          Start date:09/12/2024
                          Path:C:\Users\user\Desktop\file.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\file.exe"
                          Imagebase:0x4d0000
                          File size:828'416 bytes
                          MD5 hash:9A2CC9D6C6282E7B2A0FF5649A70B0DF
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:3.4%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:2.6%
                            Total number of Nodes:2000
                            Total number of Limit Nodes:35
                            execution_graph 24398 4db27f 24400 4db295 codecvt 24398->24400 24399 4db29b 24400->24399 24401 4db341 24400->24401 24404 4e7bf4 24400->24404 24401->24399 24403 4e7bf4 __fread_nolock 45 API calls 24401->24403 24403->24399 24407 4e7b57 24404->24407 24408 4e7b63 ___scrt_is_nonwritable_in_current_image 24407->24408 24409 4e7b9b 24408->24409 24410 4e7bad 24408->24410 24411 4e7b76 __fread_nolock 24408->24411 24409->24400 24420 4e13a4 EnterCriticalSection 24410->24420 24413 4e6211 __Wcrtomb 14 API calls 24411->24413 24415 4e7b90 24413->24415 24414 4e7bb7 24421 4e7c11 24414->24421 24417 4e68fc __strnicoll 29 API calls 24415->24417 24417->24409 24420->24414 24425 4e7c23 __fread_nolock 24421->24425 24427 4e7bce 24421->24427 24422 4e7c30 24423 4e6211 __Wcrtomb 14 API calls 24422->24423 24424 4e7c35 24423->24424 24426 4e68fc __strnicoll 29 API calls 24424->24426 24425->24422 24425->24427 24430 4e7c81 24425->24430 24426->24427 24435 4e7bec 24427->24435 24428 4f2fef __fread_nolock 43 API calls 24428->24430 24429 4e7dac __fread_nolock 24433 4e6211 __Wcrtomb 14 API calls 24429->24433 24430->24427 24430->24428 24430->24429 24431 4e7ad6 __fread_nolock 29 API calls 24430->24431 24432 4ee079 __fread_nolock 29 API calls 24430->24432 24434 4f38ad __fread_nolock 41 API calls 24430->24434 24431->24430 24432->24430 24433->24424 24434->24430 24438 4e13b8 LeaveCriticalSection 24435->24438 24437 4e7bf2 24437->24409 24438->24437 20022 4d1b70 GetPEB 20046 4d1000 20022->20046 20025 4d1bdc GetFileSize 20027 4d1bf0 20025->20027 20028 4d1e82 CloseHandle 20025->20028 20026 4d986f _ValidateLocalCookies 5 API calls 20029 4d1eb4 20026->20029 20030 4d1bf8 ReadFile 20027->20030 20035 4d1ea6 20028->20035 20031 4d1e79 20030->20031 20032 4d1c15 CloseHandle 20030->20032 20031->20028 20033 4d1e8b 20032->20033 20045 4d1c30 std::ios_base::_Ios_base_dtor codecvt _strlen 20032->20045 20057 4d1ab0 20033->20057 20035->20026 20036 4d1ebe 20069 4d34f0 20036->20069 20038 4d1ec3 20039 4e690c std::_Throw_Cpp_error 29 API calls 20038->20039 20041 4d1ec8 20039->20041 20040 4d97fb RaiseException EnterCriticalSection LeaveCriticalSection std::ios_base::_Init 20040->20045 20042 4d1ee6 20041->20042 20043 4d1ede PostQuitMessage 20041->20043 20044 4d1eeb DefWindowProcW 20041->20044 20043->20042 20045->20033 20045->20036 20045->20038 20045->20040 20052 4d102d std::ios_base::_Ios_base_dtor codecvt _strlen 20046->20052 20056 4d1290 20046->20056 20047 4d986f _ValidateLocalCookies 5 API calls 20048 4d12a9 CreateFileA 20047->20048 20048->20025 20048->20035 20049 4d12b3 20050 4d34f0 std::_Throw_Cpp_error 30 API calls 20049->20050 20051 4d12b8 20050->20051 20053 4e690c std::_Throw_Cpp_error 29 API calls 20051->20053 20052->20049 20052->20051 20054 4d97fb RaiseException EnterCriticalSection LeaveCriticalSection std::ios_base::_Init 20052->20054 20052->20056 20055 4d12bd 20053->20055 20054->20052 20056->20047 20058 4d1000 30 API calls 20057->20058 20059 4d1ad8 FreeConsole 20058->20059 20072 4d12c0 20059->20072 20062 4d12c0 78 API calls 20063 4d1b0a 20062->20063 20064 4d1000 30 API calls 20063->20064 20065 4d1b1d VirtualProtect 20064->20065 20066 4d1b36 20065->20066 20067 4d986f _ValidateLocalCookies 5 API calls 20066->20067 20068 4d1b40 20067->20068 20068->20035 20294 4da3cc 20069->20294 20074 4d12f0 20072->20074 20073 4d149f 20075 4d986f _ValidateLocalCookies 5 API calls 20073->20075 20074->20073 20078 4d14c0 20074->20078 20077 4d14ad 20075->20077 20077->20062 20079 4d14df _strlen 20078->20079 20084 4d1567 20079->20084 20092 4d154e 20079->20092 20100 4d2940 20079->20100 20080 4d1750 20128 4d3120 20080->20128 20084->20092 20096 4db367 20084->20096 20086 4d1729 20090 4d986f _ValidateLocalCookies 5 API calls 20086->20090 20087 4d1719 20087->20086 20116 4d3b30 20087->20116 20093 4d1746 20090->20093 20092->20080 20092->20087 20093->20073 20094 4d1792 20097 4db376 20096->20097 20098 4db389 codecvt 20096->20098 20097->20092 20098->20097 20099 4e7f3a 69 API calls 20098->20099 20099->20097 20101 4d29d9 20100->20101 20104 4d2964 20100->20104 20102 4d986f _ValidateLocalCookies 5 API calls 20101->20102 20103 4d29f6 20102->20103 20103->20084 20105 4d2940 39 API calls 20104->20105 20106 4d29c9 20104->20106 20107 4d2988 20104->20107 20105->20107 20106->20101 20109 4d3b30 39 API calls 20106->20109 20107->20106 20108 4d29ff 20107->20108 20110 4d3120 std::ios_base::_Init 38 API calls 20108->20110 20109->20101 20111 4d2a22 20110->20111 20112 4d3190 std::ios_base::_Init 30 API calls 20111->20112 20113 4d2a32 20112->20113 20114 4de6da std::_Throw_Cpp_error RaiseException 20113->20114 20115 4d2a3d 20114->20115 20117 4d3b4d 20116->20117 20118 4d3b83 20116->20118 20117->20118 20121 4d3b95 20117->20121 20119 4d986f _ValidateLocalCookies 5 API calls 20118->20119 20120 4d3b8e 20119->20120 20120->20086 20122 4d3120 std::ios_base::_Init 38 API calls 20121->20122 20123 4d3bb9 20122->20123 20124 4d3190 std::ios_base::_Init 30 API calls 20123->20124 20125 4d3bc9 20124->20125 20126 4de6da std::_Throw_Cpp_error RaiseException 20125->20126 20127 4d3bd4 20126->20127 20129 4d3154 20128->20129 20135 4d1777 20128->20135 20142 4d987d AcquireSRWLockExclusive 20129->20142 20131 4d3160 20131->20135 20147 4d9932 20131->20147 20136 4d3190 20135->20136 20196 4d35b0 20136->20196 20139 4de6da 20140 4de722 RaiseException 20139->20140 20141 4de6f4 20139->20141 20140->20094 20141->20140 20143 4d9891 20142->20143 20144 4d9896 ReleaseSRWLockExclusive 20143->20144 20151 4d991d SleepConditionVariableSRW 20143->20151 20144->20131 20152 4d9947 20147->20152 20150 4d98cc AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 20150->20135 20151->20143 20153 4d995d 20152->20153 20154 4d9956 20152->20154 20161 4e5ee8 20153->20161 20158 4e5f59 20154->20158 20157 4d3178 20157->20150 20159 4e5ee8 std::ios_base::_Init 32 API calls 20158->20159 20160 4e5f6b 20159->20160 20160->20157 20164 4e614b 20161->20164 20165 4e6157 ___scrt_is_nonwritable_in_current_image 20164->20165 20172 4e6bf4 EnterCriticalSection 20165->20172 20167 4e6165 20173 4e5f6f 20167->20173 20169 4e6172 20183 4e619a 20169->20183 20172->20167 20174 4e5ffd std::_Lockit::_Lockit 20173->20174 20175 4e5f8a 20173->20175 20174->20169 20175->20174 20182 4e5fdd 20175->20182 20186 4f11e3 20175->20186 20176 4f11e3 std::ios_base::_Init 32 API calls 20179 4e5ff3 20176->20179 20178 4e5fd3 20180 4ea897 ___free_lconv_mon 14 API calls 20178->20180 20181 4ea897 ___free_lconv_mon 14 API calls 20179->20181 20180->20182 20181->20174 20182->20174 20182->20176 20195 4e6c0b LeaveCriticalSection 20183->20195 20185 4e5f19 20185->20157 20187 4f120b 20186->20187 20188 4f11f0 20186->20188 20190 4f121a 20187->20190 20192 4f8624 std::ios_base::_Init 30 API calls 20187->20192 20188->20187 20189 4f11fc 20188->20189 20191 4e6211 __Wcrtomb 14 API calls 20189->20191 20193 4f4bcc std::ios_base::_Init 16 API calls 20190->20193 20194 4f1201 __fread_nolock 20191->20194 20192->20190 20193->20194 20194->20178 20195->20185 20197 4d35dd _strlen 20196->20197 20198 4d35e8 20197->20198 20199 4d36d7 20197->20199 20201 4d362e 20198->20201 20202 4d3645 20198->20202 20207 4d35f7 codecvt 20198->20207 20200 4d34f0 std::_Throw_Cpp_error 30 API calls 20199->20200 20203 4d36dc 20200->20203 20214 4d97fb 20201->20214 20205 4d97fb std::ios_base::_Init 3 API calls 20202->20205 20206 4e690c std::_Throw_Cpp_error 29 API calls 20203->20206 20205->20207 20208 4d36e1 20206->20208 20225 4d36f0 20207->20225 20211 4d36a9 std::ios_base::_Ios_base_dtor 20212 4d986f _ValidateLocalCookies 5 API calls 20211->20212 20213 4d1787 20212->20213 20213->20139 20216 4d9800 _Yarn 20214->20216 20215 4d981a 20215->20207 20216->20215 20217 4e439c std::ios_base::_Init 2 API calls 20216->20217 20218 4d981c 20216->20218 20217->20216 20219 4dd2be std::ios_base::_Init 20218->20219 20221 4d9826 Concurrency::cancel_current_task 20218->20221 20220 4de6da std::_Throw_Cpp_error RaiseException 20219->20220 20222 4dd2da 20220->20222 20223 4de6da std::_Throw_Cpp_error RaiseException 20221->20223 20224 4da3cb 20223->20224 20226 4d3728 20225->20226 20227 4d385f 20226->20227 20228 4d3732 20226->20228 20229 4d34f0 std::_Throw_Cpp_error 30 API calls 20227->20229 20231 4d376e 20228->20231 20232 4d3787 20228->20232 20237 4d373a codecvt 20228->20237 20230 4d3864 20229->20230 20234 4e690c std::_Throw_Cpp_error 29 API calls 20230->20234 20235 4d97fb std::ios_base::_Init 3 API calls 20231->20235 20236 4d97fb std::ios_base::_Init 3 API calls 20232->20236 20239 4d3869 20234->20239 20235->20237 20236->20237 20245 4d3870 20237->20245 20242 4d3826 std::ios_base::_Ios_base_dtor 20243 4d986f _ValidateLocalCookies 5 API calls 20242->20243 20244 4d3685 20243->20244 20244->20203 20244->20211 20246 4d3896 20245->20246 20248 4d38ca 20245->20248 20246->20248 20263 4d39e0 20246->20263 20249 4d39e0 std::_Throw_Cpp_error 30 API calls 20248->20249 20250 4d3934 codecvt 20248->20250 20249->20250 20252 4d398a std::ios_base::_Ios_base_dtor 20250->20252 20253 4d39d1 20250->20253 20251 4d986f _ValidateLocalCookies 5 API calls 20254 4d37c3 20251->20254 20252->20251 20255 4e690c std::_Throw_Cpp_error 29 API calls 20253->20255 20257 4decb7 20254->20257 20256 4d39d6 20255->20256 20258 4decc4 _Yarn 20257->20258 20262 4d37fa 20257->20262 20259 4decf1 20258->20259 20258->20262 20282 4ea50c 20258->20282 20291 4e7dea 20259->20291 20262->20230 20262->20242 20264 4d3b25 20263->20264 20270 4d39fd 20263->20270 20265 4d34f0 std::_Throw_Cpp_error 30 API calls 20264->20265 20267 4d3a2c codecvt 20265->20267 20266 4d3a21 20268 4d97fb std::ios_base::_Init 3 API calls 20266->20268 20269 4e690c std::_Throw_Cpp_error 29 API calls 20267->20269 20276 4d3a91 std::ios_base::_Ios_base_dtor codecvt 20267->20276 20268->20267 20272 4d3b2f 20269->20272 20270->20266 20270->20267 20271 4d3b11 20270->20271 20273 4d3b0c 20270->20273 20274 4d97fb std::ios_base::_Init 3 API calls 20271->20274 20277 4d3500 20273->20277 20274->20267 20276->20248 20278 4de6da std::_Throw_Cpp_error RaiseException 20277->20278 20279 4d3527 20278->20279 20280 4decb7 ___std_exception_copy 29 API calls 20279->20280 20281 4d3558 20280->20281 20281->20271 20283 4ea51a 20282->20283 20284 4ea528 20282->20284 20283->20284 20289 4ea540 20283->20289 20285 4e6211 __Wcrtomb 14 API calls 20284->20285 20286 4ea530 20285->20286 20287 4e68fc __strnicoll 29 API calls 20286->20287 20288 4ea53a 20287->20288 20288->20259 20289->20288 20290 4e6211 __Wcrtomb 14 API calls 20289->20290 20290->20286 20292 4ea897 ___free_lconv_mon 14 API calls 20291->20292 20293 4e7e02 20292->20293 20293->20262 20299 4da474 20294->20299 20297 4de6da std::_Throw_Cpp_error RaiseException 20298 4da3eb 20297->20298 20302 4da013 20299->20302 20303 4decb7 ___std_exception_copy 29 API calls 20302->20303 20304 4da03f 20303->20304 20304->20297 21350 4e700a 21351 4e701c 21350->21351 21354 4e7025 ___scrt_uninitialize_crt 21350->21354 21352 4e7188 ___scrt_uninitialize_crt 68 API calls 21351->21352 21353 4e7022 21352->21353 21355 4e7034 21354->21355 21358 4e730d 21354->21358 21359 4e7319 ___scrt_is_nonwritable_in_current_image 21358->21359 21366 4e13a4 EnterCriticalSection 21359->21366 21361 4e7327 21362 4e7066 ___scrt_uninitialize_crt 68 API calls 21361->21362 21363 4e7338 21362->21363 21367 4e7361 21363->21367 21366->21361 21370 4e13b8 LeaveCriticalSection 21367->21370 21369 4e705b 21370->21369 23435 4db508 23436 4db52a 23435->23436 23440 4db53f 23435->23440 23441 4db6bb 23436->23441 23444 4db6d5 23441->23444 23446 4db724 23441->23446 23442 4d986f _ValidateLocalCookies 5 API calls 23443 4db52f 23442->23443 23443->23440 23447 4e7eff 23443->23447 23445 4e7f3a 69 API calls 23444->23445 23444->23446 23445->23446 23446->23442 23448 4e7f1f 23447->23448 23449 4e7f0a 23447->23449 23448->23449 23450 4e7f26 23448->23450 23451 4e6211 __Wcrtomb 14 API calls 23449->23451 23457 4e62c1 23450->23457 23453 4e7f0f 23451->23453 23455 4e68fc __strnicoll 29 API calls 23453->23455 23454 4e7f35 23454->23440 23456 4e7f1a 23455->23456 23456->23440 23458 4e62d4 _Fputc 23457->23458 23461 4e653a 23458->23461 23460 4e62e9 _Fputc 23460->23454 23463 4e6546 ___scrt_is_nonwritable_in_current_image 23461->23463 23462 4e654c 23464 4e6aa5 _Fputc 29 API calls 23462->23464 23463->23462 23466 4e658f 23463->23466 23465 4e6567 23464->23465 23465->23460 23472 4e13a4 EnterCriticalSection 23466->23472 23468 4e659b 23473 4e644e 23468->23473 23470 4e65b1 23484 4e65da 23470->23484 23472->23468 23474 4e6474 23473->23474 23475 4e6461 23473->23475 23487 4e6375 23474->23487 23475->23470 23477 4e6525 23477->23470 23478 4e64b2 23481 4e70cb ___scrt_uninitialize_crt 64 API calls 23478->23481 23479 4e6497 23479->23477 23479->23478 23491 4f14ea 23479->23491 23482 4e64c5 23481->23482 23483 4f12d0 _Fputc 31 API calls 23482->23483 23483->23477 23505 4e13b8 LeaveCriticalSection 23484->23505 23486 4e65e2 23486->23465 23488 4e6386 23487->23488 23490 4e63de 23487->23490 23489 4f1290 __fread_nolock 31 API calls 23488->23489 23488->23490 23489->23490 23490->23479 23492 4f18bc 23491->23492 23493 4f18cb 23492->23493 23494 4f18f3 23492->23494 23495 4e6aa5 _Fputc 29 API calls 23493->23495 23496 4ee079 __fread_nolock 29 API calls 23494->23496 23504 4f18e6 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 23495->23504 23497 4f18fc 23496->23497 23498 4f12ee 33 API calls 23497->23498 23499 4f191a 23498->23499 23500 4f19a6 23499->23500 23502 4f19bd 23499->23502 23499->23504 23501 4f1546 34 API calls 23500->23501 23501->23504 23503 4f16f1 33 API calls 23502->23503 23502->23504 23503->23504 23504->23478 23505->23486 24527 4e8614 24528 4e8627 _Fputc 24527->24528 24531 4e8681 24528->24531 24530 4e863c _Fputc 24532 4e86b6 24531->24532 24533 4e8693 24531->24533 24532->24533 24536 4e86dd 24532->24536 24534 4e6aa5 _Fputc 29 API calls 24533->24534 24535 4e86ae 24534->24535 24535->24530 24539 4e87b7 24536->24539 24540 4e87c3 ___scrt_is_nonwritable_in_current_image 24539->24540 24547 4e13a4 EnterCriticalSection 24540->24547 24542 4e87d1 24548 4e8717 24542->24548 24544 4e87de 24557 4e8806 24544->24557 24547->24542 24549 4e70cb ___scrt_uninitialize_crt 64 API calls 24548->24549 24550 4e8732 24549->24550 24551 4ed1d2 14 API calls 24550->24551 24552 4e873c 24551->24552 24553 4ebc50 __dosmaperr 14 API calls 24552->24553 24556 4e8757 24552->24556 24554 4e877b 24553->24554 24555 4ea897 ___free_lconv_mon 14 API calls 24554->24555 24555->24556 24556->24544 24560 4e13b8 LeaveCriticalSection 24557->24560 24559 4e8715 24559->24530 24560->24559 19523 4d8111 19526 4d8110 19523->19526 19524 4d8162 std::ios_base::_Ios_base_dtor 19527 4d827c 19524->19527 19530 4d824c std::ios_base::_Ios_base_dtor 19524->19530 19526->19523 19526->19524 19534 4daf05 19526->19534 19543 4daee7 19526->19543 19562 4e690c 19527->19562 19528 4d8268 19555 4d986f 19530->19555 19537 4daf28 19534->19537 19539 4daf21 19534->19539 19535 4d986f _ValidateLocalCookies 5 API calls 19536 4db00d 19535->19536 19536->19526 19537->19539 19540 4dafce 19537->19540 19541 4daf6e 19537->19541 19539->19535 19540->19539 19570 4e7f3a 19540->19570 19541->19539 19567 4da866 19541->19567 19544 4daeee 19543->19544 19550 4daf3a 19543->19550 20020 4e13a4 EnterCriticalSection 19544->20020 19546 4daef3 19546->19526 19547 4daf3e 19548 4d986f _ValidateLocalCookies 5 API calls 19547->19548 19549 4db00d 19548->19549 19549->19526 19550->19547 19552 4dafce 19550->19552 19553 4daf6e 19550->19553 19551 4da866 _Fputc 68 API calls 19551->19547 19552->19547 19554 4e7f3a 69 API calls 19552->19554 19553->19547 19553->19551 19554->19547 19556 4d9878 IsProcessorFeaturePresent 19555->19556 19557 4d9877 19555->19557 19559 4dd3cd 19556->19559 19557->19528 20021 4dd4b3 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 19559->20021 19561 4dd4b0 19561->19528 19563 4e6b4b __strnicoll 29 API calls 19562->19563 19564 4e691b 19563->19564 19565 4e6929 __Getctype 11 API calls 19564->19565 19566 4e6928 19565->19566 19574 4e770f 19567->19574 19569 4da876 19569->19539 19571 4e7f4d _Fputc 19570->19571 19958 4e811b 19571->19958 19573 4e7f62 _Fputc 19573->19539 19575 4e7722 _Fputc 19574->19575 19578 4e7770 19575->19578 19577 4e7731 _Fputc 19577->19569 19579 4e777c ___scrt_is_nonwritable_in_current_image 19578->19579 19580 4e77a9 19579->19580 19581 4e7785 19579->19581 19594 4e13a4 EnterCriticalSection 19580->19594 19600 4e6aa5 19581->19600 19584 4e77b2 19593 4e77c7 19584->19593 19609 4ee079 19584->19609 19586 4e7864 19595 4e7743 19586->19595 19587 4e7833 19589 4e6aa5 _Fputc 29 API calls 19587->19589 19591 4e779e _Fputc 19589->19591 19590 4e7870 19616 4e789c 19590->19616 19591->19577 19593->19586 19593->19587 19594->19584 19596 4e7762 19595->19596 19597 4e7751 19595->19597 19596->19590 19619 4f3363 19597->19619 19599 4e775d 19599->19590 19601 4e6ab5 19600->19601 19602 4e6abc 19600->19602 19862 4e18a0 GetLastError 19601->19862 19607 4e6aca 19602->19607 19866 4e6b22 19602->19866 19605 4e6af1 19605->19607 19869 4e6929 IsProcessorFeaturePresent 19605->19869 19607->19591 19608 4e6b21 19610 4ee09a 19609->19610 19611 4ee085 19609->19611 19610->19593 19612 4e6211 __Wcrtomb 14 API calls 19611->19612 19613 4ee08a 19612->19613 19614 4e68fc __strnicoll 29 API calls 19613->19614 19615 4ee095 19614->19615 19615->19593 19957 4e13b8 LeaveCriticalSection 19616->19957 19618 4e78a2 19618->19591 19620 4f33fe 19619->19620 19621 4ee079 __fread_nolock 29 API calls 19620->19621 19623 4f340b 19621->19623 19622 4f3417 19622->19599 19623->19622 19624 4f3463 19623->19624 19643 4f3379 19623->19643 19624->19622 19625 4f34c5 19624->19625 19651 4ed0ab 19624->19651 19632 4f35ee 19625->19632 19629 4f34b8 19629->19625 19658 4f538f 19629->19658 19633 4ee079 __fread_nolock 29 API calls 19632->19633 19634 4f35fd 19633->19634 19635 4f36a3 19634->19635 19636 4f3610 19634->19636 19663 4f273c 19635->19663 19638 4f362d 19636->19638 19641 4f3654 19636->19641 19639 4f273c _Fputc 64 API calls 19638->19639 19640 4f34d6 19639->19640 19640->19599 19641->19640 19674 4f1250 19641->19674 19644 4f338f 19643->19644 19645 4f3393 19643->19645 19644->19624 19650 4f33e2 19645->19650 19782 4f1f4d 19645->19782 19647 4f33b4 19648 4f33bc SetFilePointerEx 19647->19648 19647->19650 19649 4f33d3 GetFileSizeEx 19648->19649 19648->19650 19649->19650 19650->19624 19652 4ed0b7 _Fputc 19651->19652 19653 4ed0e1 19652->19653 19654 4ee079 __fread_nolock 29 API calls 19652->19654 19653->19629 19655 4ed0d2 19654->19655 19831 4f6024 19655->19831 19657 4ed0d8 19657->19629 19840 4ebc50 19658->19840 19664 4f2748 ___scrt_is_nonwritable_in_current_image 19663->19664 19665 4f2789 19664->19665 19667 4f27cf 19664->19667 19673 4f2750 19664->19673 19666 4e6aa5 _Fputc 29 API calls 19665->19666 19666->19673 19678 4f2196 EnterCriticalSection 19667->19678 19669 4f27d5 19670 4f27f3 19669->19670 19679 4f2520 19669->19679 19707 4f2845 19670->19707 19673->19640 19675 4f1264 _Fputc 19674->19675 19761 4f130c 19675->19761 19677 4f1279 _Fputc 19677->19640 19678->19669 19680 4f2548 19679->19680 19702 4f256b __fread_nolock 19679->19702 19681 4f254c 19680->19681 19683 4f25a7 19680->19683 19682 4e6aa5 _Fputc 29 API calls 19681->19682 19682->19702 19684 4f25c5 19683->19684 19724 4f12d0 19683->19724 19710 4f284d 19684->19710 19688 4f25dd 19692 4f260c 19688->19692 19693 4f25e5 19688->19693 19689 4f2624 19690 4f268d WriteFile 19689->19690 19691 4f2638 19689->19691 19694 4f26af GetLastError 19690->19694 19706 4f261f 19690->19706 19696 4f2679 19691->19696 19697 4f2640 19691->19697 19732 4f28ca GetConsoleOutputCP 19692->19732 19693->19702 19727 4f2c91 19693->19727 19694->19706 19717 4f2cf9 19696->19717 19698 4f2665 19697->19698 19699 4f2645 19697->19699 19752 4f2ebd 19698->19752 19699->19702 19703 4f264e 19699->19703 19702->19670 19745 4f2dd4 19703->19745 19706->19702 19760 4f21b9 LeaveCriticalSection 19707->19760 19709 4f284b 19709->19673 19711 4f6024 __fread_nolock 29 API calls 19710->19711 19713 4f285f 19711->19713 19712 4f25d7 19712->19688 19712->19689 19713->19712 19714 4e1840 _Fputc 39 API calls 19713->19714 19715 4f288d 19713->19715 19714->19715 19715->19712 19716 4f28a7 GetConsoleMode 19715->19716 19716->19712 19722 4f2d08 _Fputc 19717->19722 19718 4f2db9 19719 4d986f _ValidateLocalCookies 5 API calls 19718->19719 19720 4f2dd2 19719->19720 19720->19702 19721 4f2d78 WriteFile 19721->19722 19723 4f2dbb GetLastError 19721->19723 19722->19718 19722->19721 19723->19718 19725 4f1431 __fread_nolock 31 API calls 19724->19725 19726 4f12e9 19725->19726 19726->19684 19728 4f2cb3 19727->19728 19731 4f2ce8 19727->19731 19729 4f2cea GetLastError 19728->19729 19730 4f8ea1 5 API calls _Fputc 19728->19730 19728->19731 19729->19731 19730->19728 19731->19702 19733 4f293c 19732->19733 19738 4f2943 codecvt 19732->19738 19734 4e1840 _Fputc 39 API calls 19733->19734 19734->19738 19735 4f2bf9 19736 4d986f _ValidateLocalCookies 5 API calls 19735->19736 19737 4f2c8a 19736->19737 19737->19706 19738->19735 19739 4edf46 40 API calls _Fputc 19738->19739 19740 4f7ba5 5 API calls std::_Locinfo::_Locinfo_dtor 19738->19740 19741 4ea9e1 _Fputc WideCharToMultiByte 19738->19741 19742 4f2b72 WriteFile 19738->19742 19744 4f2bb0 WriteFile 19738->19744 19739->19738 19740->19738 19741->19738 19742->19738 19743 4f2c68 GetLastError 19742->19743 19743->19735 19744->19738 19744->19743 19749 4f2de3 _Fputc 19745->19749 19746 4f2ea2 19748 4d986f _ValidateLocalCookies 5 API calls 19746->19748 19747 4f2e58 WriteFile 19747->19749 19750 4f2ea4 GetLastError 19747->19750 19751 4f2ebb 19748->19751 19749->19746 19749->19747 19750->19746 19751->19702 19759 4f2ecc _Fputc 19752->19759 19753 4f2fd4 19754 4d986f _ValidateLocalCookies 5 API calls 19753->19754 19755 4f2fed 19754->19755 19755->19706 19756 4ea9e1 _Fputc WideCharToMultiByte 19756->19759 19757 4f2fd6 GetLastError 19757->19753 19758 4f2f8b WriteFile 19758->19757 19758->19759 19759->19753 19759->19756 19759->19757 19759->19758 19760->19709 19762 4f1318 ___scrt_is_nonwritable_in_current_image 19761->19762 19763 4f135b 19762->19763 19765 4f13a1 19762->19765 19771 4f1320 19762->19771 19764 4e6aa5 _Fputc 29 API calls 19763->19764 19764->19771 19772 4f2196 EnterCriticalSection 19765->19772 19767 4f13a7 19768 4f13c8 19767->19768 19773 4f1431 19767->19773 19779 4f1429 19768->19779 19771->19677 19772->19767 19774 4f1f4d __fread_nolock 29 API calls 19773->19774 19775 4f1443 19774->19775 19776 4f145f SetFilePointerEx 19775->19776 19778 4f144b __fread_nolock 19775->19778 19777 4f1477 GetLastError 19776->19777 19776->19778 19777->19778 19778->19768 19780 4f21b9 __fread_nolock LeaveCriticalSection 19779->19780 19781 4f142f 19780->19781 19781->19771 19783 4f1f6f 19782->19783 19784 4f1f5a 19782->19784 19787 4e6224 __dosmaperr 14 API calls 19783->19787 19789 4f1f94 19783->19789 19795 4e6224 19784->19795 19790 4f1f9f 19787->19790 19789->19647 19792 4e6211 __Wcrtomb 14 API calls 19790->19792 19791 4f1f67 19791->19647 19793 4f1fa7 19792->19793 19801 4e68fc 19793->19801 19804 4eac74 GetLastError 19795->19804 19797 4e6229 19798 4e6211 19797->19798 19799 4eac74 __dosmaperr 14 API calls 19798->19799 19800 4e6216 19799->19800 19800->19791 19827 4e6b4b 19801->19827 19803 4e6908 19803->19791 19805 4eac8a 19804->19805 19809 4eac90 19804->19809 19806 4eb53b __dosmaperr 6 API calls 19805->19806 19806->19809 19807 4eb57a __dosmaperr 6 API calls 19808 4eacac 19807->19808 19811 4ebc50 __dosmaperr 12 API calls 19808->19811 19824 4eac94 SetLastError 19808->19824 19809->19807 19809->19824 19812 4eacc1 19811->19812 19813 4eacda 19812->19813 19814 4eacc9 19812->19814 19816 4eb57a __dosmaperr 6 API calls 19813->19816 19815 4eb57a __dosmaperr 6 API calls 19814->19815 19817 4eacd7 19815->19817 19818 4eace6 19816->19818 19822 4ea897 ___free_lconv_mon 12 API calls 19817->19822 19819 4eacea 19818->19819 19820 4ead01 19818->19820 19821 4eb57a __dosmaperr 6 API calls 19819->19821 19823 4eae34 __dosmaperr 12 API calls 19820->19823 19821->19817 19822->19824 19825 4ead0c 19823->19825 19824->19797 19826 4ea897 ___free_lconv_mon 12 API calls 19825->19826 19826->19824 19828 4e6b5d _Fputc 19827->19828 19829 4e6aa5 _Fputc 29 API calls 19828->19829 19830 4e6b75 _Fputc 19829->19830 19830->19803 19832 4f603e 19831->19832 19833 4f6031 19831->19833 19836 4f604a 19832->19836 19837 4e6211 __Wcrtomb 14 API calls 19832->19837 19834 4e6211 __Wcrtomb 14 API calls 19833->19834 19835 4f6036 19834->19835 19835->19657 19836->19657 19838 4f606b 19837->19838 19839 4e68fc __strnicoll 29 API calls 19838->19839 19839->19835 19845 4ebc5d __dosmaperr 19840->19845 19841 4ebc9d 19844 4e6211 __Wcrtomb 13 API calls 19841->19844 19842 4ebc88 RtlAllocateHeap 19843 4ebc9b 19842->19843 19842->19845 19847 4ea897 19843->19847 19844->19843 19845->19841 19845->19842 19853 4e439c 19845->19853 19848 4ea8cc 19847->19848 19849 4ea8a2 HeapFree 19847->19849 19848->19625 19849->19848 19850 4ea8b7 GetLastError 19849->19850 19851 4ea8c4 __dosmaperr 19850->19851 19852 4e6211 __Wcrtomb 12 API calls 19851->19852 19852->19848 19856 4e43d7 19853->19856 19857 4e43e3 ___scrt_is_nonwritable_in_current_image 19856->19857 19858 4e6bf4 std::_Lockit::_Lockit EnterCriticalSection 19857->19858 19859 4e43ee __CreateFrameInfo 19858->19859 19860 4e4425 std::ios_base::_Init LeaveCriticalSection 19859->19860 19861 4e43a7 19860->19861 19861->19845 19863 4e18b9 19862->19863 19873 4ead25 19863->19873 19867 4e6b2d GetLastError SetLastError 19866->19867 19868 4e6b46 19866->19868 19867->19605 19868->19605 19870 4e6935 19869->19870 19951 4e695d 19870->19951 19874 4ead38 19873->19874 19875 4ead3e 19873->19875 19895 4eb53b 19874->19895 19894 4e18d5 SetLastError 19875->19894 19900 4eb57a 19875->19900 19879 4ebc50 __dosmaperr 14 API calls 19880 4ead68 19879->19880 19881 4ead85 19880->19881 19882 4ead70 19880->19882 19884 4eb57a __dosmaperr 6 API calls 19881->19884 19883 4eb57a __dosmaperr 6 API calls 19882->19883 19891 4ead7c 19883->19891 19885 4ead91 19884->19885 19886 4eada4 19885->19886 19887 4ead95 19885->19887 19905 4eae34 19886->19905 19888 4eb57a __dosmaperr 6 API calls 19887->19888 19888->19891 19890 4ea897 ___free_lconv_mon 14 API calls 19890->19894 19891->19890 19893 4ea897 ___free_lconv_mon 14 API calls 19893->19894 19894->19602 19910 4eb97d 19895->19910 19898 4eb572 TlsGetValue 19899 4eb560 19899->19875 19901 4eb97d std::_Lockit::_Lockit 5 API calls 19900->19901 19902 4eb596 19901->19902 19903 4ead58 19902->19903 19904 4eb5b4 TlsSetValue 19902->19904 19903->19879 19903->19894 19925 4eaf9a 19905->19925 19911 4eb9ad 19910->19911 19915 4eb557 19910->19915 19911->19915 19917 4eb8b2 19911->19917 19914 4eb9c7 GetProcAddress 19914->19915 19916 4eb9d7 std::_Lockit::_Lockit 19914->19916 19915->19898 19915->19899 19916->19915 19923 4eb8c3 ___vcrt_FlsFree 19917->19923 19918 4eb959 19918->19914 19918->19915 19919 4eb8e1 LoadLibraryExW 19920 4eb8fc GetLastError 19919->19920 19921 4eb960 19919->19921 19920->19923 19921->19918 19922 4eb972 FreeLibrary 19921->19922 19922->19918 19923->19918 19923->19919 19924 4eb92f LoadLibraryExW 19923->19924 19924->19921 19924->19923 19926 4eafa6 ___scrt_is_nonwritable_in_current_image 19925->19926 19939 4e6bf4 EnterCriticalSection 19926->19939 19928 4eafb0 19940 4eafe0 19928->19940 19931 4eafec 19932 4eaff8 ___scrt_is_nonwritable_in_current_image 19931->19932 19943 4e6bf4 EnterCriticalSection 19932->19943 19934 4eb002 19944 4eade9 19934->19944 19936 4eb01a 19948 4eb03a 19936->19948 19939->19928 19941 4e6c0b std::_Lockit::~_Lockit LeaveCriticalSection 19940->19941 19942 4eaea2 19941->19942 19942->19931 19943->19934 19945 4eae1f __Getctype 19944->19945 19946 4eadf8 __Getctype 19944->19946 19945->19936 19946->19945 19947 4ef03a __Getctype 14 API calls 19946->19947 19947->19945 19949 4e6c0b std::_Lockit::~_Lockit LeaveCriticalSection 19948->19949 19950 4eadaf 19949->19950 19950->19893 19952 4e6979 __fread_nolock __CreateFrameInfo 19951->19952 19953 4e69a5 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 19952->19953 19954 4e6a76 __CreateFrameInfo 19953->19954 19955 4d986f _ValidateLocalCookies 5 API calls 19954->19955 19956 4e694a GetCurrentProcess TerminateProcess 19955->19956 19956->19608 19957->19618 19959 4e8129 19958->19959 19960 4e8151 19958->19960 19959->19960 19961 4e8158 19959->19961 19962 4e8136 19959->19962 19960->19573 19966 4e81de 19961->19966 19963 4e6aa5 _Fputc 29 API calls 19962->19963 19963->19960 19967 4e81ea ___scrt_is_nonwritable_in_current_image 19966->19967 19974 4e13a4 EnterCriticalSection 19967->19974 19969 4e81f8 19975 4e8192 19969->19975 19974->19969 19985 4ed000 19975->19985 19982 4e822d 20019 4e13b8 LeaveCriticalSection 19982->20019 19984 4e8190 19984->19573 19986 4ed0ab _Fputc 29 API calls 19985->19986 19988 4ed011 _Fputc 19986->19988 19987 4e81aa 19992 4e7f74 19987->19992 19988->19987 20006 4ea8d1 19988->20006 19991 4ea897 ___free_lconv_mon 14 API calls 19991->19987 19993 4e7faf 19992->19993 19995 4e7f86 19992->19995 20002 4ed0e9 19993->20002 19994 4e7f94 19996 4e6aa5 _Fputc 29 API calls 19994->19996 19995->19993 19995->19994 19997 4e7fca codecvt 19995->19997 19996->19993 19997->19993 19998 4f3363 _Fputc 66 API calls 19997->19998 20000 4ee079 __fread_nolock 29 API calls 19997->20000 20001 4f273c _Fputc 64 API calls 19997->20001 20013 4e70cb 19997->20013 19998->19997 20000->19997 20001->19997 20003 4ed0f4 20002->20003 20004 4e81d4 20002->20004 20003->20004 20005 4e70cb ___scrt_uninitialize_crt 64 API calls 20003->20005 20004->19982 20005->20004 20007 4ea90f 20006->20007 20011 4ea8df __dosmaperr 20006->20011 20008 4e6211 __Wcrtomb 14 API calls 20007->20008 20010 4ea90d 20008->20010 20009 4ea8fa RtlAllocateHeap 20009->20010 20009->20011 20010->19991 20011->20007 20011->20009 20012 4e439c std::ios_base::_Init 2 API calls 20011->20012 20012->20011 20014 4e70e4 20013->20014 20018 4e710b 20013->20018 20015 4ee079 __fread_nolock 29 API calls 20014->20015 20014->20018 20016 4e7100 20015->20016 20017 4f273c _Fputc 64 API calls 20016->20017 20017->20018 20018->19997 20019->19984 20020->19546 20021->19561 21419 4db011 21420 4db028 21419->21420 21422 4db03b 21420->21422 21423 4e8de7 21420->21423 21424 4e8df3 ___scrt_is_nonwritable_in_current_image 21423->21424 21425 4e8e0f 21424->21425 21426 4e8dfa 21424->21426 21436 4e13a4 EnterCriticalSection 21425->21436 21428 4e6211 __Wcrtomb 14 API calls 21426->21428 21430 4e8dff 21428->21430 21429 4e8e19 21437 4e8e5a 21429->21437 21432 4e68fc __strnicoll 29 API calls 21430->21432 21434 4e8e0a 21432->21434 21434->21422 21436->21429 21438 4e8e72 21437->21438 21440 4e8ee2 21437->21440 21439 4ee079 __fread_nolock 29 API calls 21438->21439 21444 4e8e78 21439->21444 21441 4f538f _Ungetc 14 API calls 21440->21441 21442 4e8e27 21440->21442 21441->21442 21448 4e8e52 21442->21448 21443 4e8eca 21445 4e6211 __Wcrtomb 14 API calls 21443->21445 21444->21440 21444->21443 21446 4e8ecf 21445->21446 21447 4e68fc __strnicoll 29 API calls 21446->21447 21447->21442 21451 4e13b8 LeaveCriticalSection 21448->21451 21450 4e8e58 21450->21434 21451->21450 25490 4dc311 25491 4dc32c 25490->25491 25493 4dc33e 25491->25493 25494 4dbe21 25491->25494 25497 4e8f4e 25494->25497 25498 4e8f5a ___scrt_is_nonwritable_in_current_image 25497->25498 25499 4e8f78 25498->25499 25500 4e8f61 25498->25500 25510 4e13a4 EnterCriticalSection 25499->25510 25501 4e6211 __Wcrtomb 14 API calls 25500->25501 25503 4e8f66 25501->25503 25505 4e68fc __strnicoll 29 API calls 25503->25505 25504 4e8f87 25511 4e8fcc 25504->25511 25509 4dbe33 25505->25509 25507 4e8f95 25523 4e8fc4 25507->25523 25509->25493 25510->25504 25512 4e8fe2 25511->25512 25515 4e9045 _Ungetc 25511->25515 25513 4e9010 25512->25513 25514 4f538f _Ungetc 14 API calls 25512->25514 25512->25515 25513->25515 25516 4ee079 __fread_nolock 29 API calls 25513->25516 25514->25513 25515->25507 25517 4e9022 25516->25517 25517->25515 25518 4ee079 __fread_nolock 29 API calls 25517->25518 25519 4e902e 25518->25519 25519->25515 25520 4ee079 __fread_nolock 29 API calls 25519->25520 25521 4e903a 25520->25521 25522 4ee079 __fread_nolock 29 API calls 25521->25522 25522->25515 25526 4e13b8 LeaveCriticalSection 25523->25526 25525 4e8fca 25525->25509 25526->25525 21645 4e74cd 21646 4e74ed 21645->21646 21647 4e74d8 21645->21647 21649 4e750a 21646->21649 21650 4e74f5 21646->21650 21648 4e6211 __Wcrtomb 14 API calls 21647->21648 21651 4e74dd 21648->21651 21659 4f14b4 21649->21659 21652 4e6211 __Wcrtomb 14 API calls 21650->21652 21655 4e68fc __strnicoll 29 API calls 21651->21655 21656 4e74fa 21652->21656 21654 4e7505 21657 4e74e8 21655->21657 21658 4e68fc __strnicoll 29 API calls 21656->21658 21658->21654 21660 4f14c8 _Fputc 21659->21660 21663 4f1a5d 21660->21663 21662 4f14d4 _Fputc 21662->21654 21664 4f1a69 ___scrt_is_nonwritable_in_current_image 21663->21664 21665 4f1a93 21664->21665 21666 4f1a70 21664->21666 21674 4e13a4 EnterCriticalSection 21665->21674 21667 4e6aa5 _Fputc 29 API calls 21666->21667 21670 4f1a89 21667->21670 21669 4f1aa1 21675 4f18bc 21669->21675 21670->21662 21672 4f1ab0 21688 4f1ae2 21672->21688 21674->21669 21676 4f18cb 21675->21676 21677 4f18f3 21675->21677 21678 4e6aa5 _Fputc 29 API calls 21676->21678 21679 4ee079 __fread_nolock 29 API calls 21677->21679 21681 4f18e6 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21678->21681 21680 4f18fc 21679->21680 21691 4f12ee 21680->21691 21681->21672 21684 4f19a6 21694 4f1546 21684->21694 21686 4f19bd 21686->21681 21706 4f16f1 21686->21706 21713 4e13b8 LeaveCriticalSection 21688->21713 21690 4f1aea 21690->21670 21692 4f130c _Fputc 33 API calls 21691->21692 21693 4f1307 21692->21693 21693->21681 21693->21684 21693->21686 21695 4f1555 _Fputc 21694->21695 21696 4ee079 __fread_nolock 29 API calls 21695->21696 21698 4f1571 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21696->21698 21697 4d986f _ValidateLocalCookies 5 API calls 21699 4f16ef 21697->21699 21700 4f12ee 33 API calls 21698->21700 21705 4f157d 21698->21705 21699->21681 21701 4f15d1 21700->21701 21702 4f1603 ReadFile 21701->21702 21701->21705 21703 4f162a 21702->21703 21702->21705 21704 4f12ee 33 API calls 21703->21704 21704->21705 21705->21697 21707 4ee079 __fread_nolock 29 API calls 21706->21707 21708 4f1704 21707->21708 21709 4f174e __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21708->21709 21710 4f12ee 33 API calls 21708->21710 21709->21681 21711 4f17ab 21710->21711 21711->21709 21712 4f12ee 33 API calls 21711->21712 21712->21709 21713->21690 24134 4dc1e1 24136 4dc208 24134->24136 24138 4dc20f 24134->24138 24135 4d986f _ValidateLocalCookies 5 API calls 24137 4dc30d 24135->24137 24136->24135 24138->24136 24140 4dc2c1 24138->24140 24141 4dc25a 24138->24141 24140->24136 24142 4e7f3a 69 API calls 24140->24142 24141->24136 24143 4dbe04 24141->24143 24142->24136 24146 4e78a4 24143->24146 24145 4dbe12 24145->24136 24147 4e78b7 _Fputc 24146->24147 24150 4e7a46 24147->24150 24149 4e78c6 _Fputc 24149->24145 24151 4e7a52 ___scrt_is_nonwritable_in_current_image 24150->24151 24152 4e7a7e 24151->24152 24153 4e7a59 24151->24153 24161 4e13a4 EnterCriticalSection 24152->24161 24154 4e6aa5 _Fputc 29 API calls 24153->24154 24160 4e7a74 24154->24160 24156 4e7a8d 24162 4e78da 24156->24162 24160->24149 24161->24156 24163 4e78ff 24162->24163 24164 4e7911 24162->24164 24194 4e7a12 24163->24194 24166 4ee079 __fread_nolock 29 API calls 24164->24166 24168 4e7918 24166->24168 24167 4e7909 24169 4d986f _ValidateLocalCookies 5 API calls 24167->24169 24170 4ee079 __fread_nolock 29 API calls 24168->24170 24174 4e7940 24168->24174 24172 4e7a10 24169->24172 24171 4e7929 24170->24171 24171->24174 24176 4ee079 __fread_nolock 29 API calls 24171->24176 24191 4e7ace 24172->24191 24173 4e79f6 24175 4e7a12 _Fputc 66 API calls 24173->24175 24174->24173 24177 4ee079 __fread_nolock 29 API calls 24174->24177 24175->24167 24178 4e7935 24176->24178 24179 4e7973 24177->24179 24180 4ee079 __fread_nolock 29 API calls 24178->24180 24182 4ee079 __fread_nolock 29 API calls 24179->24182 24190 4e7996 24179->24190 24180->24174 24181 4e79ae 24183 4edda5 _Fputc 41 API calls 24181->24183 24184 4e797f 24182->24184 24186 4e79c0 24183->24186 24185 4ee079 __fread_nolock 29 API calls 24184->24185 24184->24190 24187 4e798b 24185->24187 24186->24167 24189 4e7743 _Fputc 66 API calls 24186->24189 24188 4ee079 __fread_nolock 29 API calls 24187->24188 24188->24190 24189->24186 24190->24173 24190->24181 24223 4e13b8 LeaveCriticalSection 24191->24223 24193 4e7ad4 24193->24160 24195 4e7a35 24194->24195 24196 4e7a20 24194->24196 24195->24167 24199 4f336e 24196->24199 24198 4e7a30 24198->24167 24200 4f34f4 24199->24200 24201 4ee079 __fread_nolock 29 API calls 24200->24201 24204 4f3501 24201->24204 24202 4f350d 24202->24198 24203 4f355b 24203->24202 24205 4f35bd 24203->24205 24207 4ed0ab _Fputc 29 API calls 24203->24207 24204->24202 24204->24203 24206 4f3379 _Fputc 31 API calls 24204->24206 24212 4f36c0 24205->24212 24206->24203 24209 4f35b0 24207->24209 24209->24205 24211 4f538f _Ungetc 14 API calls 24209->24211 24211->24205 24213 4ee079 __fread_nolock 29 API calls 24212->24213 24214 4f36cf 24213->24214 24215 4f3778 24214->24215 24216 4f36e2 24214->24216 24217 4f273c _Fputc 64 API calls 24215->24217 24218 4f3703 24216->24218 24221 4f3729 24216->24221 24220 4f35ce 24217->24220 24219 4f273c _Fputc 64 API calls 24218->24219 24219->24220 24220->24198 24221->24220 24222 4f1250 _Fputc 33 API calls 24221->24222 24222->24220 24223->24193 22130 4db0e0 22131 4db0ec __EH_prolog3_GS 22130->22131 22134 4db13c 22131->22134 22135 4db155 22131->22135 22139 4db106 std::_Throw_Cpp_error 22131->22139 22132 4ddbae std::_Throw_Cpp_error 5 API calls 22133 4db22d 22132->22133 22144 4da846 22134->22144 22147 4e736d 22135->22147 22139->22132 22140 4db174 22140->22139 22142 4e736d 45 API calls 22140->22142 22143 4db249 22140->22143 22167 4da55f 22140->22167 22141 4e8de7 31 API calls 22141->22143 22142->22140 22143->22139 22143->22141 22145 4e736d 45 API calls 22144->22145 22146 4da851 22145->22146 22146->22139 22148 4e7379 ___scrt_is_nonwritable_in_current_image 22147->22148 22149 4e739b 22148->22149 22150 4e7383 22148->22150 22171 4e13a4 EnterCriticalSection 22149->22171 22151 4e6211 __Wcrtomb 14 API calls 22150->22151 22153 4e7388 22151->22153 22155 4e68fc __strnicoll 29 API calls 22153->22155 22154 4e73a6 22156 4ee079 __fread_nolock 29 API calls 22154->22156 22159 4e73be 22154->22159 22166 4e7393 _Fputc 22155->22166 22156->22159 22157 4e744e 22172 4e7486 22157->22172 22158 4e7426 22160 4e6211 __Wcrtomb 14 API calls 22158->22160 22159->22157 22159->22158 22163 4e742b 22160->22163 22162 4e7454 22182 4e747e 22162->22182 22165 4e68fc __strnicoll 29 API calls 22163->22165 22165->22166 22166->22140 22168 4da593 22167->22168 22170 4da56f 22167->22170 22334 4db9bb 22168->22334 22170->22140 22171->22154 22173 4e74a7 22172->22173 22174 4e7492 22172->22174 22176 4e74b6 22173->22176 22185 4f2fef 22173->22185 22175 4e6211 __Wcrtomb 14 API calls 22174->22175 22177 4e7497 22175->22177 22176->22162 22179 4e68fc __strnicoll 29 API calls 22177->22179 22181 4e74a2 22179->22181 22181->22162 22333 4e13b8 LeaveCriticalSection 22182->22333 22184 4e7484 22184->22166 22186 4f3005 22185->22186 22187 4f3012 22186->22187 22190 4f302a 22186->22190 22188 4e6211 __Wcrtomb 14 API calls 22187->22188 22189 4f3017 22188->22189 22191 4e68fc __strnicoll 29 API calls 22189->22191 22192 4f3089 22190->22192 22193 4f538f _Ungetc 14 API calls 22190->22193 22200 4e74b3 22190->22200 22191->22200 22194 4ee079 __fread_nolock 29 API calls 22192->22194 22193->22192 22195 4f30a2 22194->22195 22206 4f3794 22195->22206 22198 4ee079 __fread_nolock 29 API calls 22199 4f30db 22198->22199 22199->22200 22201 4ee079 __fread_nolock 29 API calls 22199->22201 22200->22162 22202 4f30e9 22201->22202 22202->22200 22203 4ee079 __fread_nolock 29 API calls 22202->22203 22204 4f30f7 22203->22204 22205 4ee079 __fread_nolock 29 API calls 22204->22205 22205->22200 22207 4f37a0 ___scrt_is_nonwritable_in_current_image 22206->22207 22208 4f37a8 22207->22208 22213 4f37c3 22207->22213 22209 4e6224 __dosmaperr 14 API calls 22208->22209 22210 4f37ad 22209->22210 22211 4e6211 __Wcrtomb 14 API calls 22210->22211 22215 4f30aa 22211->22215 22212 4f37da 22214 4e6224 __dosmaperr 14 API calls 22212->22214 22213->22212 22216 4f3815 22213->22216 22217 4f37df 22214->22217 22215->22198 22215->22200 22218 4f381e 22216->22218 22219 4f3833 22216->22219 22220 4e6211 __Wcrtomb 14 API calls 22217->22220 22221 4e6224 __dosmaperr 14 API calls 22218->22221 22236 4f2196 EnterCriticalSection 22219->22236 22224 4f37e7 22220->22224 22225 4f3823 22221->22225 22223 4f3839 22226 4f386d 22223->22226 22227 4f3858 22223->22227 22230 4e68fc __strnicoll 29 API calls 22224->22230 22228 4e6211 __Wcrtomb 14 API calls 22225->22228 22237 4f38ad 22226->22237 22229 4e6211 __Wcrtomb 14 API calls 22227->22229 22228->22224 22232 4f385d 22229->22232 22230->22215 22233 4e6224 __dosmaperr 14 API calls 22232->22233 22234 4f3868 22233->22234 22300 4f38a5 22234->22300 22236->22223 22238 4f38bf 22237->22238 22239 4f38d7 22237->22239 22240 4e6224 __dosmaperr 14 API calls 22238->22240 22241 4f3c19 22239->22241 22246 4f391a 22239->22246 22242 4f38c4 22240->22242 22243 4e6224 __dosmaperr 14 API calls 22241->22243 22244 4e6211 __Wcrtomb 14 API calls 22242->22244 22245 4f3c1e 22243->22245 22247 4f38cc 22244->22247 22248 4e6211 __Wcrtomb 14 API calls 22245->22248 22246->22247 22249 4f3925 22246->22249 22253 4f3955 22246->22253 22247->22234 22250 4f3932 22248->22250 22251 4e6224 __dosmaperr 14 API calls 22249->22251 22254 4e68fc __strnicoll 29 API calls 22250->22254 22252 4f392a 22251->22252 22255 4e6211 __Wcrtomb 14 API calls 22252->22255 22256 4f396e 22253->22256 22257 4f397b 22253->22257 22258 4f39a9 22253->22258 22254->22247 22255->22250 22256->22257 22292 4f3997 22256->22292 22259 4e6224 __dosmaperr 14 API calls 22257->22259 22260 4ea8d1 __fread_nolock 15 API calls 22258->22260 22261 4f3980 22259->22261 22262 4f39ba 22260->22262 22263 4e6211 __Wcrtomb 14 API calls 22261->22263 22265 4ea897 ___free_lconv_mon 14 API calls 22262->22265 22266 4f3987 22263->22266 22264 4f6024 __fread_nolock 29 API calls 22267 4f3af5 22264->22267 22268 4f39c3 22265->22268 22269 4e68fc __strnicoll 29 API calls 22266->22269 22270 4f3b69 22267->22270 22273 4f3b0e GetConsoleMode 22267->22273 22271 4ea897 ___free_lconv_mon 14 API calls 22268->22271 22299 4f3992 __fread_nolock 22269->22299 22272 4f3b6d ReadFile 22270->22272 22274 4f39ca 22271->22274 22275 4f3b85 22272->22275 22276 4f3be1 GetLastError 22272->22276 22273->22270 22277 4f3b1f 22273->22277 22279 4f39ef 22274->22279 22280 4f39d4 22274->22280 22275->22276 22283 4f3b5e 22275->22283 22281 4f3bee 22276->22281 22284 4f3b45 22276->22284 22277->22272 22278 4f3b25 ReadConsoleW 22277->22278 22282 4f3b3f GetLastError 22278->22282 22278->22283 22303 4f1290 22279->22303 22286 4e6211 __Wcrtomb 14 API calls 22280->22286 22287 4e6211 __Wcrtomb 14 API calls 22281->22287 22282->22284 22293 4f3baa 22283->22293 22294 4f3bc1 22283->22294 22283->22299 22289 4e6237 __dosmaperr 14 API calls 22284->22289 22284->22299 22285 4ea897 ___free_lconv_mon 14 API calls 22285->22247 22290 4f39d9 22286->22290 22291 4f3bf3 22287->22291 22289->22299 22295 4e6224 __dosmaperr 14 API calls 22290->22295 22296 4e6224 __dosmaperr 14 API calls 22291->22296 22292->22264 22307 4f3cb6 22293->22307 22294->22299 22320 4f3f5a 22294->22320 22295->22299 22296->22299 22299->22285 22332 4f21b9 LeaveCriticalSection 22300->22332 22302 4f38ab 22302->22215 22304 4f12a4 _Fputc 22303->22304 22305 4f1431 __fread_nolock 31 API calls 22304->22305 22306 4f12b9 _Fputc 22305->22306 22306->22292 22326 4f3e0d 22307->22326 22309 4ea91f __fread_nolock MultiByteToWideChar 22311 4f3dca 22309->22311 22314 4f3dd3 GetLastError 22311->22314 22317 4f3cfe 22311->22317 22312 4f3d58 22318 4f1290 __fread_nolock 31 API calls 22312->22318 22319 4f3d12 22312->22319 22313 4f3d48 22315 4e6211 __Wcrtomb 14 API calls 22313->22315 22316 4e6237 __dosmaperr 14 API calls 22314->22316 22315->22317 22316->22317 22317->22299 22318->22319 22319->22309 22321 4f3f94 22320->22321 22322 4f402a ReadFile 22321->22322 22323 4f4025 22321->22323 22322->22323 22324 4f4047 22322->22324 22323->22299 22324->22323 22325 4f1290 __fread_nolock 31 API calls 22324->22325 22325->22323 22327 4f3e41 22326->22327 22328 4f3eb2 ReadFile 22327->22328 22329 4f3ccd 22327->22329 22328->22329 22330 4f3ecb 22328->22330 22329->22312 22329->22313 22329->22317 22329->22319 22330->22329 22331 4f1290 __fread_nolock 31 API calls 22330->22331 22331->22329 22332->22302 22333->22184 22335 4dba6f 22334->22335 22336 4db9df std::_Throw_Cpp_error 22334->22336 22337 4d34f0 std::_Throw_Cpp_error 30 API calls 22335->22337 22339 4da346 std::_Throw_Cpp_error 30 API calls 22336->22339 22338 4dba74 22337->22338 22340 4db9fc std::_Throw_Cpp_error _Deallocate codecvt 22339->22340 22340->22170 25752 4dc3f8 25753 4dc404 __EH_prolog3_GS 25752->25753 25756 4dc456 25753->25756 25757 4dc470 25753->25757 25761 4dc41e std::_Throw_Cpp_error 25753->25761 25754 4ddbae std::_Throw_Cpp_error 5 API calls 25755 4dc547 25754->25755 25766 4dbddd 25756->25766 25758 4e736d 45 API calls 25757->25758 25763 4dc48f 25758->25763 25760 4da55f 30 API calls 25760->25763 25761->25754 25762 4dc566 25762->25761 25765 4e8de7 31 API calls 25762->25765 25763->25760 25763->25761 25763->25762 25764 4e736d 45 API calls 25763->25764 25764->25763 25765->25762 25769 4e7528 25766->25769 25770 4e7534 ___scrt_is_nonwritable_in_current_image 25769->25770 25771 4e753b 25770->25771 25772 4e7552 25770->25772 25773 4e6211 __Wcrtomb 14 API calls 25771->25773 25782 4e13a4 EnterCriticalSection 25772->25782 25775 4e7540 25773->25775 25777 4e68fc __strnicoll 29 API calls 25775->25777 25776 4e755e 25783 4e759f 25776->25783 25781 4dbde8 25777->25781 25779 4e7569 25813 4e7597 25779->25813 25781->25761 25782->25776 25784 4e75bc 25783->25784 25793 4e75e5 25783->25793 25786 4ee079 __fread_nolock 29 API calls 25784->25786 25785 4e76e9 25801 4e7600 25785->25801 25820 4f2ffa 25785->25820 25787 4e75c2 25786->25787 25790 4ee079 __fread_nolock 29 API calls 25787->25790 25787->25793 25788 4ee079 __fread_nolock 29 API calls 25791 4e7637 25788->25791 25794 4e75ce 25790->25794 25792 4e765a 25791->25792 25795 4ee079 __fread_nolock 29 API calls 25791->25795 25792->25785 25798 4e7671 25792->25798 25793->25785 25793->25788 25793->25801 25794->25793 25797 4ee079 __fread_nolock 29 API calls 25794->25797 25796 4e7643 25795->25796 25796->25792 25800 4ee079 __fread_nolock 29 API calls 25796->25800 25799 4e75da 25797->25799 25798->25801 25802 4e150b __Getctype 39 API calls 25798->25802 25803 4ee079 __fread_nolock 29 API calls 25799->25803 25804 4e764f 25800->25804 25801->25779 25808 4e7692 25802->25808 25803->25793 25805 4ee079 __fread_nolock 29 API calls 25804->25805 25805->25792 25806 4e76bc 25816 4edf0f 25806->25816 25808->25806 25810 4e76a9 25808->25810 25809 4e76d0 25809->25801 25811 4e6211 __Wcrtomb 14 API calls 25809->25811 25812 4e8de7 31 API calls 25810->25812 25811->25801 25812->25801 25860 4e13b8 LeaveCriticalSection 25813->25860 25815 4e759d 25815->25781 25817 4edf22 _Fputc 25816->25817 25841 4edf46 25817->25841 25819 4edf34 _Fputc 25819->25809 25821 4f3194 25820->25821 25822 4f31a3 25821->25822 25826 4f31b8 25821->25826 25823 4e6211 __Wcrtomb 14 API calls 25822->25823 25824 4f31a8 25823->25824 25825 4e68fc __strnicoll 29 API calls 25824->25825 25835 4f31b3 25825->25835 25827 4f538f _Ungetc 14 API calls 25826->25827 25828 4f3216 25826->25828 25826->25835 25827->25828 25829 4ee079 __fread_nolock 29 API calls 25828->25829 25830 4f3246 25829->25830 25831 4f3794 __fread_nolock 43 API calls 25830->25831 25832 4f324e 25831->25832 25833 4ee079 __fread_nolock 29 API calls 25832->25833 25832->25835 25834 4f3288 25833->25834 25834->25835 25836 4ee079 __fread_nolock 29 API calls 25834->25836 25835->25801 25837 4f3296 25836->25837 25837->25835 25838 4ee079 __fread_nolock 29 API calls 25837->25838 25839 4f32a4 25838->25839 25840 4ee079 __fread_nolock 29 API calls 25839->25840 25840->25835 25843 4edf5a 25841->25843 25851 4edf6a 25841->25851 25842 4edf8f 25844 4edfc3 25842->25844 25845 4edfa0 25842->25845 25843->25842 25846 4e1840 _Fputc 39 API calls 25843->25846 25843->25851 25848 4ee03f 25844->25848 25849 4edfeb 25844->25849 25844->25851 25853 4f7b62 25845->25853 25846->25842 25850 4ea91f __fread_nolock MultiByteToWideChar 25848->25850 25849->25851 25852 4ea91f __fread_nolock MultiByteToWideChar 25849->25852 25850->25851 25851->25819 25852->25851 25856 4f93e3 25853->25856 25859 4f9411 _Fputc 25856->25859 25857 4d986f _ValidateLocalCookies 5 API calls 25858 4f7b7d 25857->25858 25858->25851 25859->25857 25860->25815 20305 4de3f0 20306 4de3fc ___scrt_is_nonwritable_in_current_image 20305->20306 20331 4d9a58 20306->20331 20308 4de403 20309 4de55c 20308->20309 20318 4de42d ___scrt_is_nonwritable_in_current_image __CreateFrameInfo ___scrt_release_startup_lock 20308->20318 20397 4dd86f IsProcessorFeaturePresent 20309->20397 20311 4de563 20401 4e406a 20311->20401 20316 4de44c 20317 4de4cd 20342 4e65e9 20317->20342 20318->20316 20318->20317 20379 4e40b4 20318->20379 20321 4de4d3 20346 4d20d0 GetModuleHandleW GetModuleFileNameA 20321->20346 20323 4de4ea 20386 4dd81c GetModuleHandleW 20323->20386 20326 4de4f8 20327 4de501 20326->20327 20388 4e4096 20326->20388 20391 4d9a91 20327->20391 20332 4d9a61 20331->20332 20407 4dd4db IsProcessorFeaturePresent 20332->20407 20336 4d9a72 20337 4d9a76 20336->20337 20417 4e12bf 20336->20417 20337->20308 20340 4d9a8d 20340->20308 20343 4e65f7 20342->20343 20344 4e65f2 20342->20344 20343->20321 20489 4e6712 20344->20489 20347 4d97fb std::ios_base::_Init 3 API calls 20346->20347 20348 4d2106 20347->20348 20349 4d97fb std::ios_base::_Init 3 API calls 20348->20349 20350 4d2112 20349->20350 21062 4e3e7d 20350->21062 20352 4d2133 20353 4d21fc 20352->20353 20355 4d214a GetCurrentThreadId 20352->20355 20356 4d21e7 20352->20356 20354 4da1d4 std::_Throw_Cpp_error 30 API calls 20353->20354 20358 4d2209 20354->20358 20359 4d21ee 20355->20359 20360 4d2157 20355->20360 21083 4da1d4 20356->21083 20363 4da1d4 std::_Throw_Cpp_error 30 API calls 20358->20363 20362 4da1d4 std::_Throw_Cpp_error 30 API calls 20359->20362 21077 4dd0b6 WaitForSingleObjectEx 20360->21077 20364 4d21f5 20362->20364 20365 4d2218 20363->20365 20366 4da1d4 std::_Throw_Cpp_error 30 API calls 20364->20366 20365->20323 20366->20353 20367 4d2163 20367->20364 20368 4d97fb std::ios_base::_Init 3 API calls 20367->20368 20369 4d217e 20368->20369 20370 4e3e7d 49 API calls 20369->20370 20371 4d219d 20370->20371 20371->20356 20371->20358 20372 4d21af GetCurrentThreadId 20371->20372 20372->20359 20373 4d21b8 20372->20373 20374 4dd0b6 3 API calls 20373->20374 20375 4d21c7 20374->20375 20375->20364 20376 4d21ce 20375->20376 20377 4d986f _ValidateLocalCookies 5 API calls 20376->20377 20378 4d21dc 20377->20378 20378->20323 20380 4e40ca std::_Lockit::_Lockit 20379->20380 20381 4e8dab ___scrt_is_nonwritable_in_current_image 20379->20381 20380->20317 20382 4eab23 __Getctype 39 API calls 20381->20382 20385 4e8dbc 20382->20385 20383 4e6e66 CallUnexpected 39 API calls 20384 4e8de6 20383->20384 20385->20383 20387 4dd828 20386->20387 20387->20311 20387->20326 21184 4e41b5 20388->21184 20392 4d9a9d 20391->20392 20396 4d9ab3 20392->20396 21255 4e12d1 20392->21255 20394 4d9aab 20395 4deda8 ___scrt_uninitialize_crt 7 API calls 20394->20395 20395->20396 20396->20316 20398 4dd885 __fread_nolock __CreateFrameInfo 20397->20398 20399 4dd930 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 20398->20399 20400 4dd974 __CreateFrameInfo 20399->20400 20400->20311 20402 4e41b5 __CreateFrameInfo 21 API calls 20401->20402 20403 4de569 20402->20403 20404 4e4080 20403->20404 20405 4e41b5 __CreateFrameInfo 21 API calls 20404->20405 20406 4de571 20405->20406 20408 4d9a6d 20407->20408 20409 4ded89 20408->20409 20426 4ea566 20409->20426 20413 4ded9a 20414 4deda5 20413->20414 20440 4ea5a2 20413->20440 20414->20336 20416 4ded92 20416->20336 20480 4ecc5e 20417->20480 20420 4deda8 20421 4dedbb 20420->20421 20422 4dedb1 20420->20422 20421->20337 20423 4e963b ___vcrt_uninitialize_ptd 6 API calls 20422->20423 20424 4dedb6 20423->20424 20425 4ea5a2 ___vcrt_uninitialize_locks DeleteCriticalSection 20424->20425 20425->20421 20427 4ea56f 20426->20427 20429 4ea598 20427->20429 20430 4ded8e 20427->20430 20444 4f54da 20427->20444 20431 4ea5a2 ___vcrt_uninitialize_locks DeleteCriticalSection 20429->20431 20430->20416 20432 4e9608 20430->20432 20431->20430 20461 4f53eb 20432->20461 20436 4e9638 20436->20413 20439 4e961d 20439->20413 20441 4ea5cc 20440->20441 20442 4ea5ad 20440->20442 20441->20416 20443 4ea5b7 DeleteCriticalSection 20442->20443 20443->20441 20443->20443 20449 4f556c 20444->20449 20447 4f5512 InitializeCriticalSectionAndSpinCount 20448 4f54fd 20447->20448 20448->20427 20450 4f54f4 20449->20450 20453 4f558d 20449->20453 20450->20447 20450->20448 20451 4f55f5 GetProcAddress 20451->20450 20453->20450 20453->20451 20454 4f55e6 20453->20454 20456 4f5521 LoadLibraryExW 20453->20456 20454->20451 20455 4f55ee FreeLibrary 20454->20455 20455->20451 20457 4f5568 20456->20457 20458 4f5538 GetLastError 20456->20458 20457->20453 20458->20457 20459 4f5543 ___vcrt_FlsFree 20458->20459 20459->20457 20460 4f5559 LoadLibraryExW 20459->20460 20460->20453 20462 4f556c ___vcrt_FlsFree 5 API calls 20461->20462 20463 4f5405 20462->20463 20464 4f541e TlsAlloc 20463->20464 20465 4e9612 20463->20465 20465->20439 20466 4f549c 20465->20466 20467 4f556c ___vcrt_FlsFree 5 API calls 20466->20467 20468 4f54b6 20467->20468 20469 4f54d1 TlsSetValue 20468->20469 20470 4e962b 20468->20470 20469->20470 20470->20436 20471 4e963b 20470->20471 20472 4e9645 20471->20472 20473 4e964b 20471->20473 20475 4f5426 20472->20475 20473->20439 20476 4f556c ___vcrt_FlsFree 5 API calls 20475->20476 20477 4f5440 20476->20477 20478 4f544c 20477->20478 20479 4f5458 TlsFree 20477->20479 20478->20473 20479->20478 20481 4ecc6e 20480->20481 20482 4d9a7f 20480->20482 20481->20482 20484 4ec3d2 20481->20484 20482->20340 20482->20420 20486 4ec3d9 20484->20486 20485 4ec41c GetStdHandle 20485->20486 20486->20485 20487 4ec47e 20486->20487 20488 4ec42f GetFileType 20486->20488 20487->20481 20488->20486 20490 4e671b 20489->20490 20493 4e6731 20489->20493 20490->20493 20495 4e6653 20490->20495 20492 4e6728 20492->20493 20512 4e6820 20492->20512 20493->20343 20496 4e665f 20495->20496 20497 4e665c 20495->20497 20521 4ec495 20496->20521 20497->20492 20502 4e667c 20548 4e673e 20502->20548 20503 4e6670 20505 4ea897 ___free_lconv_mon 14 API calls 20503->20505 20507 4e6676 20505->20507 20507->20492 20508 4ea897 ___free_lconv_mon 14 API calls 20509 4e66a0 20508->20509 20510 4ea897 ___free_lconv_mon 14 API calls 20509->20510 20511 4e66a6 20510->20511 20511->20492 20517 4e6891 20512->20517 20518 4e682f 20512->20518 20513 4ea9e1 WideCharToMultiByte _Fputc 20513->20518 20514 4ebc50 __dosmaperr 14 API calls 20514->20518 20515 4e6895 20516 4ea897 ___free_lconv_mon 14 API calls 20515->20516 20516->20517 20517->20493 20518->20513 20518->20514 20518->20515 20518->20517 20520 4ea897 ___free_lconv_mon 14 API calls 20518->20520 20878 4f1bc3 20518->20878 20520->20518 20522 4ec49e 20521->20522 20526 4e6665 20521->20526 20570 4eabde 20522->20570 20527 4f1aec GetEnvironmentStringsW 20526->20527 20528 4f1b04 20527->20528 20533 4e666a 20527->20533 20529 4ea9e1 _Fputc WideCharToMultiByte 20528->20529 20530 4f1b21 20529->20530 20531 4f1b2b FreeEnvironmentStringsW 20530->20531 20532 4f1b36 20530->20532 20531->20533 20534 4ea8d1 __fread_nolock 15 API calls 20532->20534 20533->20502 20533->20503 20535 4f1b3d 20534->20535 20536 4f1b56 20535->20536 20537 4f1b45 20535->20537 20539 4ea9e1 _Fputc WideCharToMultiByte 20536->20539 20538 4ea897 ___free_lconv_mon 14 API calls 20537->20538 20540 4f1b4a FreeEnvironmentStringsW 20538->20540 20541 4f1b66 20539->20541 20540->20533 20542 4f1b6d 20541->20542 20543 4f1b75 20541->20543 20544 4ea897 ___free_lconv_mon 14 API calls 20542->20544 20545 4ea897 ___free_lconv_mon 14 API calls 20543->20545 20546 4f1b73 FreeEnvironmentStringsW 20544->20546 20545->20546 20546->20533 20549 4e6753 20548->20549 20550 4ebc50 __dosmaperr 14 API calls 20549->20550 20551 4e677a 20550->20551 20552 4e6782 20551->20552 20561 4e678c 20551->20561 20553 4ea897 ___free_lconv_mon 14 API calls 20552->20553 20569 4e6683 20553->20569 20554 4e67e9 20555 4ea897 ___free_lconv_mon 14 API calls 20554->20555 20555->20569 20556 4ebc50 __dosmaperr 14 API calls 20556->20561 20557 4e67f8 20872 4e66e3 20557->20872 20559 4ea50c ___std_exception_copy 29 API calls 20559->20561 20561->20554 20561->20556 20561->20557 20561->20559 20563 4e6813 20561->20563 20564 4ea897 ___free_lconv_mon 14 API calls 20561->20564 20562 4ea897 ___free_lconv_mon 14 API calls 20566 4e6805 20562->20566 20565 4e6929 __Getctype 11 API calls 20563->20565 20564->20561 20567 4e681f 20565->20567 20568 4ea897 ___free_lconv_mon 14 API calls 20566->20568 20568->20569 20569->20508 20571 4eabe9 20570->20571 20572 4eabef 20570->20572 20573 4eb53b __dosmaperr 6 API calls 20571->20573 20574 4eb57a __dosmaperr 6 API calls 20572->20574 20591 4eabf5 20572->20591 20573->20572 20575 4eac09 20574->20575 20577 4ebc50 __dosmaperr 14 API calls 20575->20577 20575->20591 20579 4eac19 20577->20579 20580 4eac36 20579->20580 20581 4eac21 20579->20581 20582 4eb57a __dosmaperr 6 API calls 20580->20582 20583 4eb57a __dosmaperr 6 API calls 20581->20583 20584 4eac42 20582->20584 20585 4eac2d 20583->20585 20586 4eac46 20584->20586 20587 4eac55 20584->20587 20588 4ea897 ___free_lconv_mon 14 API calls 20585->20588 20589 4eb57a __dosmaperr 6 API calls 20586->20589 20590 4eae34 __dosmaperr 14 API calls 20587->20590 20588->20591 20589->20585 20592 4eac60 20590->20592 20594 4eabfa 20591->20594 20617 4e6e66 20591->20617 20593 4ea897 ___free_lconv_mon 14 API calls 20592->20593 20593->20594 20595 4ec856 20594->20595 20596 4ec880 20595->20596 20703 4ec6e2 20596->20703 20599 4ea8d1 __fread_nolock 15 API calls 20600 4ec8aa 20599->20600 20601 4ec8b2 20600->20601 20602 4ec8c0 20600->20602 20604 4ea897 ___free_lconv_mon 14 API calls 20601->20604 20710 4ec4dd 20602->20710 20606 4ec899 20604->20606 20606->20526 20607 4ec8f8 20608 4e6211 __Wcrtomb 14 API calls 20607->20608 20609 4ec8fd 20608->20609 20612 4ea897 ___free_lconv_mon 14 API calls 20609->20612 20610 4ec93f 20611 4ec988 20610->20611 20721 4ecc11 20610->20721 20615 4ea897 ___free_lconv_mon 14 API calls 20611->20615 20612->20606 20613 4ec913 20613->20610 20616 4ea897 ___free_lconv_mon 14 API calls 20613->20616 20615->20606 20616->20610 20628 4ecd15 20617->20628 20620 4e6e76 20621 4e6e80 IsProcessorFeaturePresent 20620->20621 20627 4e6e9f 20620->20627 20623 4e6e8c 20621->20623 20625 4e695d __CreateFrameInfo 8 API calls 20623->20625 20624 4e4080 __CreateFrameInfo 21 API calls 20626 4e6ea9 20624->20626 20625->20627 20627->20624 20658 4ecf98 20628->20658 20631 4ecd3c 20635 4ecd48 ___scrt_is_nonwritable_in_current_image 20631->20635 20632 4eac74 __dosmaperr 14 API calls 20639 4ecd79 __CreateFrameInfo 20632->20639 20633 4ecd98 20634 4e6211 __Wcrtomb 14 API calls 20633->20634 20637 4ecd9d 20634->20637 20635->20632 20635->20633 20636 4ecdaa __CreateFrameInfo 20635->20636 20635->20639 20638 4ecde0 __CreateFrameInfo 20636->20638 20669 4e6bf4 EnterCriticalSection 20636->20669 20640 4e68fc __strnicoll 29 API calls 20637->20640 20643 4ece1d 20638->20643 20644 4ecf1a 20638->20644 20654 4ece4b 20638->20654 20639->20633 20639->20636 20657 4ecd82 20639->20657 20640->20657 20643->20654 20670 4eab23 GetLastError 20643->20670 20646 4ecf25 20644->20646 20701 4e6c0b LeaveCriticalSection 20644->20701 20647 4e4080 __CreateFrameInfo 21 API calls 20646->20647 20649 4ecf2d 20647->20649 20651 4eab23 __Getctype 39 API calls 20655 4ecea0 20651->20655 20653 4eab23 __Getctype 39 API calls 20653->20654 20697 4ecec6 20654->20697 20656 4eab23 __Getctype 39 API calls 20655->20656 20655->20657 20656->20657 20657->20620 20659 4ecfa4 ___scrt_is_nonwritable_in_current_image 20658->20659 20664 4e6bf4 EnterCriticalSection 20659->20664 20661 4ecfb2 20665 4ecff4 20661->20665 20664->20661 20668 4e6c0b LeaveCriticalSection 20665->20668 20667 4e6e6b 20667->20620 20667->20631 20668->20667 20669->20638 20671 4eab39 20670->20671 20672 4eab3f 20670->20672 20674 4eb53b __dosmaperr 6 API calls 20671->20674 20673 4eb57a __dosmaperr 6 API calls 20672->20673 20676 4eab43 SetLastError 20672->20676 20675 4eab5b 20673->20675 20674->20672 20675->20676 20678 4ebc50 __dosmaperr 14 API calls 20675->20678 20680 4eabd8 20676->20680 20681 4eabd3 20676->20681 20679 4eab70 20678->20679 20682 4eab78 20679->20682 20683 4eab89 20679->20683 20684 4e6e66 CallUnexpected 37 API calls 20680->20684 20681->20653 20685 4eb57a __dosmaperr 6 API calls 20682->20685 20686 4eb57a __dosmaperr 6 API calls 20683->20686 20687 4eabdd 20684->20687 20689 4eab86 20685->20689 20688 4eab95 20686->20688 20690 4eab99 20688->20690 20691 4eabb0 20688->20691 20692 4ea897 ___free_lconv_mon 14 API calls 20689->20692 20694 4eb57a __dosmaperr 6 API calls 20690->20694 20693 4eae34 __dosmaperr 14 API calls 20691->20693 20692->20676 20695 4eabbb 20693->20695 20694->20689 20696 4ea897 ___free_lconv_mon 14 API calls 20695->20696 20696->20676 20698 4ececa 20697->20698 20699 4ece92 20697->20699 20702 4e6c0b LeaveCriticalSection 20698->20702 20699->20651 20699->20655 20699->20657 20701->20646 20702->20699 20729 4e0a3a 20703->20729 20706 4ec715 20708 4ec72c 20706->20708 20709 4ec71a GetACP 20706->20709 20707 4ec703 GetOEMCP 20707->20708 20708->20599 20708->20606 20709->20708 20711 4ec6e2 41 API calls 20710->20711 20712 4ec4fd 20711->20712 20713 4ec602 20712->20713 20715 4ec53a IsValidCodePage 20712->20715 20720 4ec555 __fread_nolock 20712->20720 20714 4d986f _ValidateLocalCookies 5 API calls 20713->20714 20716 4ec6e0 20714->20716 20715->20713 20717 4ec54c 20715->20717 20716->20607 20716->20613 20718 4ec575 GetCPInfo 20717->20718 20717->20720 20718->20713 20718->20720 20769 4eca6c 20720->20769 20722 4ecc1d ___scrt_is_nonwritable_in_current_image 20721->20722 20846 4e6bf4 EnterCriticalSection 20722->20846 20724 4ecc27 20847 4ec9ab 20724->20847 20730 4e0a58 20729->20730 20736 4e0a51 20729->20736 20731 4eab23 __Getctype 39 API calls 20730->20731 20730->20736 20732 4e0a79 20731->20732 20737 4eb106 20732->20737 20736->20706 20736->20707 20738 4eb119 20737->20738 20740 4e0a8f 20737->20740 20738->20740 20745 4ef205 20738->20745 20741 4eb133 20740->20741 20742 4eb15b 20741->20742 20743 4eb146 20741->20743 20742->20736 20743->20742 20766 4ec482 20743->20766 20746 4ef211 ___scrt_is_nonwritable_in_current_image 20745->20746 20747 4eab23 __Getctype 39 API calls 20746->20747 20748 4ef21a 20747->20748 20755 4ef260 20748->20755 20758 4e6bf4 EnterCriticalSection 20748->20758 20750 4ef238 20759 4ef286 20750->20759 20755->20740 20756 4e6e66 CallUnexpected 39 API calls 20757 4ef285 20756->20757 20758->20750 20760 4ef249 20759->20760 20761 4ef294 __Getctype 20759->20761 20763 4ef265 20760->20763 20761->20760 20762 4ef03a __Getctype 14 API calls 20761->20762 20762->20760 20764 4e6c0b std::_Lockit::~_Lockit LeaveCriticalSection 20763->20764 20765 4ef25c 20764->20765 20765->20755 20765->20756 20767 4eab23 __Getctype 39 API calls 20766->20767 20768 4ec487 20767->20768 20768->20742 20770 4eca94 GetCPInfo 20769->20770 20779 4ecb5d 20769->20779 20775 4ecaac 20770->20775 20770->20779 20771 4d986f _ValidateLocalCookies 5 API calls 20773 4ecc0f 20771->20773 20773->20713 20780 4ebf3c 20775->20780 20779->20771 20781 4e0a3a __strnicoll 39 API calls 20780->20781 20782 4ebf5c 20781->20782 20800 4ea91f 20782->20800 20784 4d986f _ValidateLocalCookies 5 API calls 20785 4ebf89 20786 4ec010 20785->20786 20787 4ea8d1 __fread_nolock 15 API calls 20785->20787 20790 4ec018 20785->20790 20791 4ebfae __fread_nolock __alloca_probe_16 20785->20791 20803 4dde67 20786->20803 20787->20791 20790->20784 20791->20786 20792 4ea91f __fread_nolock MultiByteToWideChar 20791->20792 20807 4ea949 20800->20807 20804 4dde71 20803->20804 20805 4dde82 20803->20805 20804->20805 20805->20790 20808 4ea93b MultiByteToWideChar 20807->20808 20808->20785 20846->20724 20857 4e7ad6 20847->20857 20849 4ec9cd 20858 4e7ae7 20857->20858 20867 4e7ae3 codecvt 20857->20867 20859 4e7aee 20858->20859 20863 4e7b01 __fread_nolock 20858->20863 20863->20867 20867->20849 20873 4e670d 20872->20873 20874 4e66f0 20872->20874 20873->20562 20875 4e6707 20874->20875 20877 4ea897 ___free_lconv_mon 14 API calls 20874->20877 20876 4ea897 ___free_lconv_mon 14 API calls 20875->20876 20876->20873 20877->20874 20879 4f1bce 20878->20879 20880 4f1bdf 20879->20880 20882 4f1bf2 ___from_strstr_to_strchr 20879->20882 20881 4e6211 __Wcrtomb 14 API calls 20880->20881 20890 4f1be4 20881->20890 20883 4f1e09 20882->20883 20885 4f1c12 20882->20885 20884 4e6211 __Wcrtomb 14 API calls 20883->20884 20886 4f1e0e 20884->20886 20941 4f1e2e 20885->20941 20888 4ea897 ___free_lconv_mon 14 API calls 20886->20888 20888->20890 20890->20518 20891 4f1c56 20892 4f1c42 20891->20892 20945 4f1e48 20891->20945 20898 4ea897 ___free_lconv_mon 14 API calls 20892->20898 20893 4f1c58 20893->20892 20897 4ebc50 __dosmaperr 14 API calls 20893->20897 20894 4f1c34 20900 4f1c3d 20894->20900 20901 4f1c51 20894->20901 20899 4f1c66 20897->20899 20898->20890 20903 4ea897 ___free_lconv_mon 14 API calls 20899->20903 20905 4e6211 __Wcrtomb 14 API calls 20900->20905 20906 4f1e2e 39 API calls 20901->20906 20902 4f1ccb 20907 4ea897 ___free_lconv_mon 14 API calls 20902->20907 20904 4f1c71 20903->20904 20904->20891 20904->20892 20910 4ebc50 __dosmaperr 14 API calls 20904->20910 20905->20892 20906->20891 20912 4f1cd3 20907->20912 20908 4f1d16 20908->20892 20909 4f11e3 std::ios_base::_Init 32 API calls 20908->20909 20911 4f1d44 20909->20911 20913 4f1c8d 20910->20913 20914 4ea897 ___free_lconv_mon 14 API calls 20911->20914 20915 4f11e3 std::ios_base::_Init 32 API calls 20912->20915 20917 4f1d00 20912->20917 20916 4ea897 ___free_lconv_mon 14 API calls 20913->20916 20914->20917 20919 4f1cf7 20915->20919 20916->20891 20917->20892 20917->20917 20921 4ebc50 __dosmaperr 14 API calls 20917->20921 20939 4f1dfe 20917->20939 20918 4ea897 ___free_lconv_mon 14 API calls 20918->20890 20920 4ea897 ___free_lconv_mon 14 API calls 20919->20920 20920->20917 20922 4f1d8f 20921->20922 20923 4f1d9f 20922->20923 20924 4f1d97 20922->20924 20926 4ea50c ___std_exception_copy 29 API calls 20923->20926 20925 4ea897 ___free_lconv_mon 14 API calls 20924->20925 20925->20892 20927 4f1dab 20926->20927 20928 4f1e23 20927->20928 20929 4f1db2 20927->20929 20931 4e6929 __Getctype 11 API calls 20928->20931 20949 4f8e0c 20929->20949 20933 4f1e2d 20931->20933 20939->20918 20942 4f1e3b 20941->20942 20943 4f1c1d 20941->20943 20964 4f1e9d 20942->20964 20943->20891 20943->20893 20943->20894 20947 4f1e5e 20945->20947 20948 4f1cbb 20945->20948 20947->20948 20979 4f8d1b 20947->20979 20948->20902 20948->20908 21013 4ebc11 20949->21013 20965 4f1eab 20964->20965 20966 4f1eb0 20964->20966 20965->20943 20967 4ebc50 __dosmaperr 14 API calls 20966->20967 20973 4f1ecd 20967->20973 20968 4f1f3b 20969 4e6e66 CallUnexpected 39 API calls 20968->20969 20971 4f1f40 20969->20971 20970 4ea897 ___free_lconv_mon 14 API calls 20970->20965 20972 4e6929 __Getctype 11 API calls 20971->20972 20974 4f1f4c 20972->20974 20973->20968 20973->20971 20975 4ebc50 __dosmaperr 14 API calls 20973->20975 20976 4ea897 ___free_lconv_mon 14 API calls 20973->20976 20977 4ea50c ___std_exception_copy 29 API calls 20973->20977 20978 4f1f2a 20973->20978 20975->20973 20976->20973 20977->20973 20978->20970 20980 4f8d2f 20979->20980 20981 4f8d29 20979->20981 20980->20947 20982 4f95eb 20981->20982 20983 4f95a3 20981->20983 20995 4f9601 20982->20995 20985 4f95a9 20983->20985 20988 4f95c6 20983->20988 20987 4e6211 __Wcrtomb 14 API calls 20985->20987 20986 4f95b9 20986->20947 20989 4f95ae 20987->20989 20990 4e6211 __Wcrtomb 14 API calls 20988->20990 20994 4f95e4 20988->20994 20991 4e68fc __strnicoll 29 API calls 20989->20991 20992 4f95d5 20990->20992 20991->20986 20993 4e68fc __strnicoll 29 API calls 20992->20993 20993->20986 20994->20947 20996 4f962b 20995->20996 20997 4f9611 20995->20997 20999 4f964a 20996->20999 21000 4f9633 20996->21000 20998 4e6211 __Wcrtomb 14 API calls 20997->20998 21003 4f9616 20998->21003 21001 4f966d 20999->21001 21002 4f9656 20999->21002 21004 4e6211 __Wcrtomb 14 API calls 21000->21004 21010 4e0a3a __strnicoll 39 API calls 21001->21010 21011 4f9621 21001->21011 21005 4e6211 __Wcrtomb 14 API calls 21002->21005 21006 4e68fc __strnicoll 29 API calls 21003->21006 21007 4f9638 21004->21007 21009 4f965b 21005->21009 21006->21011 21008 4e68fc __strnicoll 29 API calls 21007->21008 21008->21011 21012 4e68fc __strnicoll 29 API calls 21009->21012 21010->21011 21011->20986 21012->21011 21014 4e0a3a __strnicoll 39 API calls 21013->21014 21015 4ebc23 21014->21015 21016 4ebc35 21015->21016 21021 4eb3ed 21015->21021 21018 4e0b34 21016->21018 21027 4e0b8c 21018->21027 21024 4eba02 21021->21024 21025 4eb97d std::_Lockit::_Lockit 5 API calls 21024->21025 21026 4eb3f5 21025->21026 21026->21016 21028 4e0b9a 21027->21028 21029 4e0bb4 21027->21029 21045 4e0b1a 21028->21045 21031 4e0bda 21029->21031 21032 4e0bbb 21029->21032 21033 4ea91f __fread_nolock MultiByteToWideChar 21031->21033 21044 4e0b4c 21032->21044 21049 4e0adb 21032->21049 21037 4e0be9 21033->21037 21046 4e0b25 21045->21046 21047 4e0b2d 21045->21047 21047->21044 21063 4e3e9e 21062->21063 21064 4e3e8a 21062->21064 21089 4e3f0e 21063->21089 21065 4e6211 __Wcrtomb 14 API calls 21064->21065 21067 4e3e8f 21065->21067 21069 4e68fc __strnicoll 29 API calls 21067->21069 21071 4e3e9a 21069->21071 21070 4e3eb3 CreateThread 21072 4e3ed2 GetLastError 21070->21072 21076 4e3ede 21070->21076 21106 4e3f95 21070->21106 21071->20352 21073 4e6237 __dosmaperr 14 API calls 21072->21073 21073->21076 21098 4e3f5e 21076->21098 21078 4dd0cd 21077->21078 21079 4dd0ff 21077->21079 21080 4dd0ea CloseHandle 21078->21080 21081 4dd0d4 GetExitCodeThread 21078->21081 21079->20367 21080->21079 21081->21079 21082 4dd0e5 21081->21082 21082->21080 21084 4da1ea std::_Throw_Cpp_error 21083->21084 21145 4da20f 21084->21145 21090 4ebc50 __dosmaperr 14 API calls 21089->21090 21091 4e3f1f 21090->21091 21092 4ea897 ___free_lconv_mon 14 API calls 21091->21092 21093 4e3f2c 21092->21093 21094 4e3f33 GetModuleHandleExW 21093->21094 21095 4e3f50 21093->21095 21094->21095 21096 4e3f5e 16 API calls 21095->21096 21097 4e3eaa 21096->21097 21097->21070 21097->21076 21099 4e3ee9 21098->21099 21100 4e3f6a 21098->21100 21099->20352 21101 4e3f79 21100->21101 21102 4e3f70 CloseHandle 21100->21102 21103 4e3f7f FreeLibrary 21101->21103 21104 4e3f88 21101->21104 21102->21101 21103->21104 21105 4ea897 ___free_lconv_mon 14 API calls 21104->21105 21105->21099 21107 4e3fa1 ___scrt_is_nonwritable_in_current_image 21106->21107 21108 4e3fa8 GetLastError ExitThread 21107->21108 21109 4e3fb5 21107->21109 21110 4eab23 __Getctype 39 API calls 21109->21110 21111 4e3fba 21110->21111 21120 4ee0dc 21111->21120 21115 4e3fd1 21127 4e3f00 21115->21127 21121 4e3fc5 21120->21121 21122 4ee0ec __CreateFrameInfo 21120->21122 21121->21115 21124 4eb787 21121->21124 21122->21121 21130 4eb830 21122->21130 21125 4eb97d std::_Lockit::_Lockit 5 API calls 21124->21125 21126 4eb7a3 21125->21126 21126->21115 21133 4e4013 21127->21133 21131 4eb97d std::_Lockit::_Lockit 5 API calls 21130->21131 21132 4eb84c 21131->21132 21132->21121 21134 4eac74 __dosmaperr 14 API calls 21133->21134 21135 4e401e 21134->21135 21136 4e4060 ExitThread 21135->21136 21137 4e4037 21135->21137 21142 4eb7c2 21135->21142 21139 4e404a 21137->21139 21140 4e4043 CloseHandle 21137->21140 21139->21136 21141 4e4056 FreeLibraryAndExitThread 21139->21141 21140->21139 21141->21136 21143 4eb97d std::_Lockit::_Lockit 5 API calls 21142->21143 21144 4eb7db 21143->21144 21144->21137 21146 4da21b __EH_prolog3_GS 21145->21146 21153 4da139 21146->21153 21149 4d36f0 std::_Throw_Cpp_error 30 API calls 21150 4da244 std::_Throw_Cpp_error 21149->21150 21157 4ddbae 21150->21157 21154 4da156 21153->21154 21154->21154 21160 4da29c 21154->21160 21156 4da16a 21156->21149 21158 4d986f _ValidateLocalCookies 5 API calls 21157->21158 21159 4ddbb8 21158->21159 21159->21159 21161 4da314 21160->21161 21164 4da2b3 std::_Throw_Cpp_error 21160->21164 21162 4d34f0 std::_Throw_Cpp_error 30 API calls 21161->21162 21163 4da319 21162->21163 21165 4da2ba std::_Throw_Cpp_error codecvt 21164->21165 21167 4da346 21164->21167 21165->21156 21168 4da350 21167->21168 21169 4da352 21167->21169 21168->21165 21170 4da35a 21169->21170 21171 4da361 21169->21171 21175 4da369 21170->21175 21173 4d97fb std::ios_base::_Init 3 API calls 21171->21173 21174 4da35f 21173->21174 21174->21165 21176 4da37a 21175->21176 21177 4d3500 21175->21177 21179 4d97fb std::ios_base::_Init 3 API calls 21176->21179 21178 4de6da std::_Throw_Cpp_error RaiseException 21177->21178 21180 4d3527 21178->21180 21181 4da380 21179->21181 21182 4decb7 ___std_exception_copy 29 API calls 21180->21182 21181->21174 21183 4d3558 21182->21183 21183->21174 21185 4e41e2 21184->21185 21193 4e41f3 21184->21193 21186 4dd81c __CreateFrameInfo GetModuleHandleW 21185->21186 21188 4e41e7 21186->21188 21188->21193 21195 4e40e9 GetModuleHandleExW 21188->21195 21190 4e40a1 21190->20327 21200 4e434f 21193->21200 21196 4e4128 GetProcAddress 21195->21196 21197 4e413c 21195->21197 21196->21197 21198 4e414f FreeLibrary 21197->21198 21199 4e4158 21197->21199 21198->21199 21199->21193 21201 4e435b ___scrt_is_nonwritable_in_current_image 21200->21201 21215 4e6bf4 EnterCriticalSection 21201->21215 21203 4e4365 21216 4e424c 21203->21216 21205 4e4372 21220 4e4390 21205->21220 21208 4e4184 21215->21203 21217 4e4258 ___scrt_is_nonwritable_in_current_image __CreateFrameInfo 21216->21217 21219 4e42bc __CreateFrameInfo 21217->21219 21223 4e5f1b 21217->21223 21219->21205 21244 4e6c0b LeaveCriticalSection 21220->21244 21222 4e422b 21222->21190 21222->21208 21224 4e5f27 __EH_prolog3 21223->21224 21227 4e61a6 21224->21227 21228 4e61b2 ___scrt_is_nonwritable_in_current_image 21227->21228 21235 4e6bf4 EnterCriticalSection 21228->21235 21244->21222 21256 4e12ee ___scrt_uninitialize_crt 21255->21256 21257 4e12dc 21255->21257 21256->20394 21258 4e12ea 21257->21258 21260 4e705d 21257->21260 21258->20394 21263 4e7188 21260->21263 21266 4e7261 21263->21266 21267 4e726d ___scrt_is_nonwritable_in_current_image 21266->21267 21274 4e6bf4 EnterCriticalSection 21267->21274 21269 4e72e3 21283 4e7301 21269->21283 21273 4e7277 ___scrt_uninitialize_crt 21273->21269 21275 4e71d5 21273->21275 21274->21273 21276 4e71e1 ___scrt_is_nonwritable_in_current_image 21275->21276 21286 4e13a4 EnterCriticalSection 21276->21286 21279 4e71eb ___scrt_uninitialize_crt 21330 4e6c0b LeaveCriticalSection 21283->21330 21286->21279 22783 4e1494 22784 4e705d ___scrt_uninitialize_crt 68 API calls 22783->22784 22785 4e149c 22784->22785 22793 4ed127 22785->22793 22787 4e14a1 22803 4ed1d2 22787->22803 22790 4e14cb 22791 4ea897 ___free_lconv_mon 14 API calls 22790->22791 22792 4e14d6 22791->22792 22794 4ed133 ___scrt_is_nonwritable_in_current_image 22793->22794 22807 4e6bf4 EnterCriticalSection 22794->22807 22796 4ed1aa 22812 4ed1c9 22796->22812 22798 4ed13e 22798->22796 22800 4ed17e DeleteCriticalSection 22798->22800 22808 4e6eb5 22798->22808 22801 4ea897 ___free_lconv_mon 14 API calls 22800->22801 22801->22798 22804 4ed1e9 22803->22804 22806 4e14b0 DeleteCriticalSection 22803->22806 22805 4ea897 ___free_lconv_mon 14 API calls 22804->22805 22804->22806 22805->22806 22806->22787 22806->22790 22807->22798 22809 4e6ec8 _Fputc 22808->22809 22815 4e6f73 22809->22815 22811 4e6ed4 _Fputc 22811->22798 22887 4e6c0b LeaveCriticalSection 22812->22887 22814 4ed1b6 22814->22787 22816 4e6f7f ___scrt_is_nonwritable_in_current_image 22815->22816 22817 4e6fac 22816->22817 22818 4e6f89 22816->22818 22825 4e6fa4 22817->22825 22826 4e13a4 EnterCriticalSection 22817->22826 22819 4e6aa5 _Fputc 29 API calls 22818->22819 22819->22825 22821 4e6fca 22827 4e6ee5 22821->22827 22823 4e6fd7 22841 4e7002 22823->22841 22825->22811 22826->22821 22828 4e6ef2 22827->22828 22830 4e6f15 22827->22830 22829 4e6aa5 _Fputc 29 API calls 22828->22829 22831 4e6f0d 22829->22831 22830->22831 22832 4e70cb ___scrt_uninitialize_crt 64 API calls 22830->22832 22831->22823 22833 4e6f2d 22832->22833 22834 4ed1d2 14 API calls 22833->22834 22835 4e6f35 22834->22835 22836 4ee079 __fread_nolock 29 API calls 22835->22836 22837 4e6f41 22836->22837 22844 4f2292 22837->22844 22840 4ea897 ___free_lconv_mon 14 API calls 22840->22831 22886 4e13b8 LeaveCriticalSection 22841->22886 22843 4e7008 22843->22825 22845 4f22bb 22844->22845 22846 4e6f48 22844->22846 22847 4f230a 22845->22847 22849 4f22e2 22845->22849 22846->22831 22846->22840 22848 4e6aa5 _Fputc 29 API calls 22847->22848 22848->22846 22851 4f2335 22849->22851 22852 4f2341 ___scrt_is_nonwritable_in_current_image 22851->22852 22859 4f2196 EnterCriticalSection 22852->22859 22854 4f234f 22855 4f2380 22854->22855 22860 4f21f2 22854->22860 22873 4f23ba 22855->22873 22859->22854 22861 4f1f4d __fread_nolock 29 API calls 22860->22861 22864 4f2202 22861->22864 22862 4f2208 22876 4f1fb7 22862->22876 22864->22862 22865 4f1f4d __fread_nolock 29 API calls 22864->22865 22871 4f223a 22864->22871 22867 4f2231 22865->22867 22866 4f1f4d __fread_nolock 29 API calls 22868 4f2246 CloseHandle 22866->22868 22869 4f1f4d __fread_nolock 29 API calls 22867->22869 22868->22862 22870 4f2252 GetLastError 22868->22870 22869->22871 22870->22862 22871->22862 22871->22866 22872 4f2260 __fread_nolock 22872->22855 22885 4f21b9 LeaveCriticalSection 22873->22885 22875 4f23a3 22875->22846 22877 4f202d 22876->22877 22878 4f1fc6 22876->22878 22879 4e6211 __Wcrtomb 14 API calls 22877->22879 22878->22877 22884 4f1ff0 22878->22884 22880 4f2032 22879->22880 22881 4e6224 __dosmaperr 14 API calls 22880->22881 22882 4f201d 22881->22882 22882->22872 22883 4f2017 SetStdHandle 22883->22882 22884->22882 22884->22883 22885->22875 22886->22843 22887->22814 19514 5061a9 19515 5061df 19514->19515 19516 50632c GetPEB 19515->19516 19517 50633e CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 19515->19517 19522 5063d5 TerminateProcess 19515->19522 19516->19517 19517->19515 19518 5063e5 WriteProcessMemory 19517->19518 19519 50642a 19518->19519 19520 50646c WriteProcessMemory Wow64SetThreadContext ResumeThread 19519->19520 19521 50642f WriteProcessMemory 19519->19521 19521->19519 19522->19515

                            Control-flow Graph

                            APIs
                            • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,0050611B,0050610B), ref: 0050633F
                            • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00506352
                            • Wow64GetThreadContext.KERNEL32(00000128,00000000), ref: 00506370
                            • ReadProcessMemory.KERNELBASE(00000088,?,0050615F,00000004,00000000), ref: 00506394
                            • VirtualAllocEx.KERNELBASE(00000088,?,?,00003000,00000040), ref: 005063BF
                            • TerminateProcess.KERNELBASE(00000088,00000000), ref: 005063DE
                            • WriteProcessMemory.KERNELBASE(00000088,00000000,?,?,00000000,?), ref: 00506417
                            • WriteProcessMemory.KERNELBASE(00000088,00400000,?,?,00000000,?,00000028), ref: 00506462
                            • WriteProcessMemory.KERNELBASE(00000088,?,?,00000004,00000000), ref: 005064A0
                            • Wow64SetThreadContext.KERNEL32(00000128,00A90000), ref: 005064DC
                            • ResumeThread.KERNELBASE(00000128), ref: 005064EB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                            • API String ID: 2440066154-3857624555
                            • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                            • Instruction ID: 804f0e1f1cac870e7eb81d71c3eb06ea17bcfbda58f52e757ad8f2d0cbc4ad0c
                            • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                            • Instruction Fuzzy Hash: 31B1087660064AAFDB60CF68CC80BDA77A5FF88714F158524EA0CAB341D774FA51CB94

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 63 4d1b70-4d1bd6 GetPEB call 4d1000 CreateFileA 66 4d1bdc-4d1bea GetFileSize 63->66 67 4d1ea9-4d1ebd call 4d986f 63->67 69 4d1bf0-4d1c0f call 4d9861 ReadFile 66->69 70 4d1e82-4d1e89 CloseHandle 66->70 74 4d1e79-4d1e7f call 4d986a 69->74 75 4d1c15-4d1c2a CloseHandle 69->75 70->67 74->70 76 4d1e8b-4d1e93 75->76 77 4d1c30-4d1c4f 75->77 81 4d1e9a-4d1ea1 call 4d1ab0 76->81 79 4d1c6e-4d1c8e call 4e8870 77->79 86 4d1ebe call 4d34f0 79->86 87 4d1c94-4d1c9d 79->87 85 4d1ea6 81->85 85->67 91 4d1ec3-4d1ed7 call 4e690c 86->91 89 4d1c9f-4d1cbb call 4e0360 87->89 90 4d1cc0-4d1cd5 87->90 100 4d1d1e-4d1d44 89->100 93 4d1cd7-4d1cec call 4d97fb 90->93 94 4d1cf0-4d1cfc call 4d97fb 90->94 106 4d1ed9-4d1edc 91->106 107 4d1ee6-4d1ee8 91->107 103 4d1cfe-4d1d1a call 4e0360 93->103 94->103 104 4d1dc8-4d1dd5 100->104 105 4d1d4a-4d1d58 100->105 103->100 113 4d1dd7-4d1dda 104->113 114 4d1df3-4d1dff 104->114 109 4d1d5a-4d1d5f 105->109 110 4d1da0-4d1daa 105->110 111 4d1ede-4d1ee0 PostQuitMessage 106->111 112 4d1eeb DefWindowProcW 106->112 116 4d1d60-4d1d9e 109->116 110->104 117 4d1dac-4d1dc6 110->117 111->107 118 4d1ddc-4d1ddf 113->118 119 4d1de9-4d1df1 113->119 120 4d1e01-4d1e10 114->120 116->110 116->116 117->104 118->120 123 4d1de1-4d1de6 118->123 119->114 121 4d1e41-4d1e5f 120->121 122 4d1e12-4d1e1b 120->122 126 4d1e65-4d1e74 121->126 127 4d1c60-4d1c68 121->127 124 4d1e1d-4d1e28 122->124 125 4d1e37-4d1e3e call 4d9830 122->125 123->119 124->91 128 4d1e2e-4d1e35 124->128 125->121 126->127 127->79 127->81 128->125
                            APIs
                              • Part of subcall function 004D1000: _strlen.LIBCMT ref: 004D1067
                            • CreateFileA.KERNELBASE ref: 004D1BD1
                            • GetFileSize.KERNEL32(00000000,00000000), ref: 004D1BE1
                            • ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000), ref: 004D1C07
                            • CloseHandle.KERNELBASE(00000000), ref: 004D1C16
                            • _strlen.LIBCMT ref: 004D1C84
                            • CloseHandle.KERNEL32(00000000), ref: 004D1E83
                            • PostQuitMessage.USER32(00000000), ref: 004D1EE0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: File$CloseHandle_strlen$CreateMessagePostQuitReadSize
                            • String ID:
                            • API String ID: 3694359222-0
                            • Opcode ID: 653e994a700eb888eb94d394468969cb7db6141c5c9048051b7274e6d42dcaa1
                            • Instruction ID: 7cadcb260add03fe49041223ccef2ab87c15e9b75fd104b2f2366021b5fdcbcf
                            • Opcode Fuzzy Hash: 653e994a700eb888eb94d394468969cb7db6141c5c9048051b7274e6d42dcaa1
                            • Instruction Fuzzy Hash: D7912372904340ABC314DF24C89562FBBE5AF89754F154A2FFC858B361E738E944CB96

                            Control-flow Graph

                            APIs
                            • GetModuleHandleW.KERNEL32(00000000), ref: 004D20E8
                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 004D20F9
                            • GetCurrentThreadId.KERNEL32 ref: 004D214A
                              • Part of subcall function 004DD0B6: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000), ref: 004DD0C2
                              • Part of subcall function 004DD0B6: GetExitCodeThread.KERNEL32(?,?), ref: 004DD0DB
                              • Part of subcall function 004DD0B6: CloseHandle.KERNEL32(?), ref: 004DD0ED
                              • Part of subcall function 004E3E7D: CreateThread.KERNELBASE(?,?,Function_00013F95,00000000,?,?), ref: 004E3EC6
                              • Part of subcall function 004E3E7D: GetLastError.KERNEL32 ref: 004E3ED2
                              • Part of subcall function 004E3E7D: __dosmaperr.LIBCMT ref: 004E3ED9
                            • GetCurrentThreadId.KERNEL32 ref: 004D21AF
                            • std::_Throw_Cpp_error.LIBCPMT ref: 004D21E9
                            • std::_Throw_Cpp_error.LIBCPMT ref: 004D21F0
                            • std::_Throw_Cpp_error.LIBCPMT ref: 004D21F7
                            • std::_Throw_Cpp_error.LIBCPMT ref: 004D2204
                            • std::_Throw_Cpp_error.LIBCPMT ref: 004D2213
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Cpp_errorThrow_std::_$Thread$CurrentHandleModule$CloseCodeCreateErrorExitFileLastNameObjectSingleWait__dosmaperr
                            • String ID:
                            • API String ID: 686914455-0
                            • Opcode ID: 510dbaa99e0db160de6518ccd9bb741a2a7b409d49f204097832bc1fb849137d
                            • Instruction ID: 9d1bc49ec1a248935437e9771ca860e04de8cd8d151177fe9463666e0fabe6d3
                            • Opcode Fuzzy Hash: 510dbaa99e0db160de6518ccd9bb741a2a7b409d49f204097832bc1fb849137d
                            • Instruction Fuzzy Hash: 6331D5B1A043016AE7206F658C27B5F76A4AF54B04F01441FFA48AB3C1EABC9910D79B

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 131 4eb8b2-4eb8be 132 4eb950-4eb953 131->132 133 4eb959 132->133 134 4eb8c3-4eb8d4 132->134 135 4eb95b-4eb95f 133->135 136 4eb8d6-4eb8d9 134->136 137 4eb8e1-4eb8fa LoadLibraryExW 134->137 138 4eb8df 136->138 139 4eb979-4eb97b 136->139 140 4eb8fc-4eb905 GetLastError 137->140 141 4eb960-4eb970 137->141 143 4eb94d 138->143 139->135 144 4eb93e-4eb94b 140->144 145 4eb907-4eb919 call 4eeeb4 140->145 141->139 142 4eb972-4eb973 FreeLibrary 141->142 142->139 143->132 144->143 145->144 148 4eb91b-4eb92d call 4eeeb4 145->148 148->144 151 4eb92f-4eb93c LoadLibraryExW 148->151 151->141 151->144
                            APIs
                            • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,29CDBBBE,?,004EB9C1,?,?,00000000), ref: 004EB973
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: FreeLibrary
                            • String ID: api-ms-$ext-ms-
                            • API String ID: 3664257935-537541572
                            • Opcode ID: 2d69ef865c7a822f7b483e87330438520a02d9ce9c9d9c77b8451d6148f61868
                            • Instruction ID: d1f891c9d9298c337318924da5090913e32598822976f59b28bda8ba0dba909b
                            • Opcode Fuzzy Hash: 2d69ef865c7a822f7b483e87330438520a02d9ce9c9d9c77b8451d6148f61868
                            • Instruction Fuzzy Hash: 1B210571A01355F7C7219B26EC41A6F376CEF61761F140122EA51A73D1D738EE00D6E4

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 152 4d14c0-4d1533 call 4e8870 155 4d1535-4d153f 152->155 156 4d1542-4d154c 152->156 155->156 157 4d154e-4d1551 156->157 158 4d1556-4d155c 156->158 160 4d16f6-4d1717 157->160 161 4d157c-4d1588 158->161 162 4d155e-4d1560 158->162 163 4d1719-4d1720 call 4dbaae 160->163 164 4d1750-4d1792 call 4d3120 call 4d3190 call 4de6da 160->164 166 4d158e-4d1598 161->166 167 4d1622-4d1637 call 4db367 161->167 162->161 165 4d1562-4d1576 call 4d2940 162->165 180 4d1729-4d1734 163->180 181 4d1722-4d1724 call 4d3b30 163->181 165->160 165->161 166->167 171 4d159e-4d15a3 166->171 174 4d163a-4d164f 167->174 176 4d15db-4d15f3 171->176 182 4d1655-4d165f 174->182 183 4d16d1-4d16d4 174->183 177 4d15f5-4d15fc 176->177 178 4d15b0-4d15bc 176->178 177->178 185 4d15fe-4d160d 177->185 193 4d15c2-4d15d9 178->193 199 4d16d6-4d16db 178->199 189 4d173b-4d174f call 4d986f 180->189 190 4d1736 180->190 181->180 182->183 188 4d1661-4d1666 182->188 184 4d16df-4d16f4 183->184 184->160 185->193 195 4d16a1-4d16b5 188->195 190->189 193->176 200 4d160f-4d1620 193->200 197 4d16b7-4d16be 195->197 198 4d1670-4d167c 195->198 197->198 202 4d16c0-4d16cf 197->202 198->199 203 4d167e-4d169f 198->203 199->184 200->167 202->203 203->183 203->195
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: _strlen
                            • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                            • API String ID: 4218353326-1866435925
                            • Opcode ID: 02b22efc10220c95f9137c3f8d713403ffaf0c9f903650f546a95659afeaa973
                            • Instruction ID: ff9a4ce690444fb269a08e251bce02af110424f78bd0582e3c1122aee792bbd7
                            • Opcode Fuzzy Hash: 02b22efc10220c95f9137c3f8d713403ffaf0c9f903650f546a95659afeaa973
                            • Instruction Fuzzy Hash: 679172742042009FDB14DF29C4A4B26B7E2FF89314F18869EE9568F3A6D739EC45CB45

                            Control-flow Graph

                            APIs
                              • Part of subcall function 004D1000: _strlen.LIBCMT ref: 004D1067
                            • FreeConsole.KERNELBASE(?,?,?,00504808,ios_base::badbit set), ref: 004D1AE1
                            • VirtualProtect.KERNELBASE(0050601C,00000549,00000040,?), ref: 004D1B30
                            • ExitProcess.KERNEL32 ref: 004D1B66
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ConsoleExitFreeProcessProtectVirtual_strlen
                            • String ID: ios_base::badbit set
                            • API String ID: 4233975149-3882152299
                            • Opcode ID: 27c71eb1ee9ead94b214e1edfe36d08d2cd9feea28efa9cf830b01855c1d4402
                            • Instruction ID: 9fe98cde3f508bb538d7ddcbd09cbfbbc9e9a523118973d27084b221d1b77e17
                            • Opcode Fuzzy Hash: 27c71eb1ee9ead94b214e1edfe36d08d2cd9feea28efa9cf830b01855c1d4402
                            • Instruction Fuzzy Hash: 2E012835B801087BEB007BA6DC13FAF7B64DB44748F004066FA08BA3D2E579A62486D8

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 218 4e3e7d-4e3e88 219 4e3e9e-4e3eb1 call 4e3f0e 218->219 220 4e3e8a-4e3e9d call 4e6211 call 4e68fc 218->220 226 4e3edf 219->226 227 4e3eb3-4e3ed0 CreateThread 219->227 231 4e3ee1-4e3eed call 4e3f5e 226->231 229 4e3eee-4e3ef3 227->229 230 4e3ed2-4e3ede GetLastError call 4e6237 227->230 232 4e3efa-4e3efe 229->232 233 4e3ef5-4e3ef8 229->233 230->226 232->231 233->232
                            APIs
                            • CreateThread.KERNELBASE(?,?,Function_00013F95,00000000,?,?), ref: 004E3EC6
                            • GetLastError.KERNEL32 ref: 004E3ED2
                            • __dosmaperr.LIBCMT ref: 004E3ED9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: CreateErrorLastThread__dosmaperr
                            • String ID:
                            • API String ID: 2744730728-0
                            • Opcode ID: 2d7bd0e570095a7581a82b4554528a98cf3a9338cf5579f7358cb87333c05703
                            • Instruction ID: 7519e33f02bdc4d0297c573b0e72b853326345b9c4f396035f79841448ff1a5a
                            • Opcode Fuzzy Hash: 2d7bd0e570095a7581a82b4554528a98cf3a9338cf5579f7358cb87333c05703
                            • Instruction Fuzzy Hash: 92016D72900249ABCF16AFA7DC09A9E3A68EF5035BF00405AF90197250DB799E50DB94

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 238 4f2520-4f2542 239 4f2548-4f254a 238->239 240 4f2735 238->240 242 4f254c-4f256b call 4e6aa5 239->242 243 4f2576-4f2599 239->243 241 4f2737-4f273b 240->241 251 4f256e-4f2571 242->251 244 4f259f-4f25a5 243->244 245 4f259b-4f259d 243->245 244->242 247 4f25a7-4f25b8 244->247 245->244 245->247 249 4f25cb-4f25db call 4f284d 247->249 250 4f25ba-4f25c8 call 4f12d0 247->250 256 4f25dd-4f25e3 249->256 257 4f2624-4f2636 249->257 250->249 251->241 260 4f260c-4f2622 call 4f28ca 256->260 261 4f25e5-4f25e8 256->261 258 4f268d-4f26ad WriteFile 257->258 259 4f2638-4f263e 257->259 262 4f26af-4f26b5 GetLastError 258->262 263 4f26b8 258->263 265 4f2679-4f2686 call 4f2cf9 259->265 266 4f2640-4f2643 259->266 276 4f2605-4f2607 260->276 267 4f25ea-4f25ed 261->267 268 4f25f3-4f2602 call 4f2c91 261->268 262->263 270 4f26bb-4f26c6 263->270 283 4f268b 265->283 271 4f2665-4f2677 call 4f2ebd 266->271 272 4f2645-4f2648 266->272 267->268 273 4f26cd-4f26d0 267->273 268->276 277 4f26c8-4f26cb 270->277 278 4f2730-4f2733 270->278 284 4f2660-4f2663 271->284 279 4f26d3-4f26d5 272->279 280 4f264e-4f265b call 4f2dd4 272->280 273->279 276->270 277->273 278->241 285 4f26d7-4f26dc 279->285 286 4f2703-4f270f 279->286 280->284 283->284 284->276 289 4f26de-4f26f0 285->289 290 4f26f5-4f26fe call 4e629d 285->290 291 4f2719-4f272b 286->291 292 4f2711-4f2717 286->292 289->251 290->251 291->251 292->240 292->291
                            APIs
                              • Part of subcall function 004F28CA: GetConsoleOutputCP.KERNEL32(29CDBBBE,00000000,00000000,?), ref: 004F292D
                            • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,00000000,00000000,00000000,?,?,00000000,?,?,004E7097,?), ref: 004F26A5
                            • GetLastError.KERNEL32(?,?,004E7097,?,004E72DB,00000000,?,00000000,004E72DB,?,?,?,00504DE0,0000002C,004E71C7,?), ref: 004F26AF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ConsoleErrorFileLastOutputWrite
                            • String ID:
                            • API String ID: 2915228174-0
                            • Opcode ID: 1ee15e546e97311dac69037d2ab18b2728ae3f2ad69cfb4d5851d661878d7be3
                            • Instruction ID: 8d4a6b248ceafec90788584af8a3da0e2c2db56f25b1e6723264300702b179ac
                            • Opcode Fuzzy Hash: 1ee15e546e97311dac69037d2ab18b2728ae3f2ad69cfb4d5851d661878d7be3
                            • Instruction Fuzzy Hash: F661C17180015DAFDF01DFA8CA44EFFBBB9BF09308F14015AEA00A7251D3B9DA059B69

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 295 4f2cf9-4f2d4e call 4de300 298 4f2dc3-4f2dd3 call 4d986f 295->298 299 4f2d50 295->299 301 4f2d56 299->301 303 4f2d5c-4f2d5e 301->303 304 4f2d78-4f2d9d WriteFile 303->304 305 4f2d60-4f2d65 303->305 308 4f2d9f-4f2daa 304->308 309 4f2dbb-4f2dc1 GetLastError 304->309 306 4f2d6e-4f2d76 305->306 307 4f2d67-4f2d6d 305->307 306->303 306->304 307->306 308->298 310 4f2dac-4f2db7 308->310 309->298 310->301 311 4f2db9 310->311 311->298
                            APIs
                            • WriteFile.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?,?,004F268B,00000000,004E72DB,?,00000000,?,00000000), ref: 004F2D95
                            • GetLastError.KERNEL32(?,004F268B,00000000,004E72DB,?,00000000,?,00000000,00000000,00000000,?,?,00000000,?,?,004E7097), ref: 004F2DBB
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ErrorFileLastWrite
                            • String ID:
                            • API String ID: 442123175-0
                            • Opcode ID: c0b81d58a71aac54ac8ed41aae8d3847679cff2a505161a804495bd3ce2e9520
                            • Instruction ID: 6778a7de7e657c026d0cbb8fab47201efac5c1004c2f5b8a01b29dfc5affb7e5
                            • Opcode Fuzzy Hash: c0b81d58a71aac54ac8ed41aae8d3847679cff2a505161a804495bd3ce2e9520
                            • Instruction Fuzzy Hash: 4621BF30A002199FCF19CF29DE80AEDB7B9EB49301F1444AAEA06D7311D774DE468FA4

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 312 4ec3d2-4ec3d7 313 4ec3d9-4ec3f1 312->313 314 4ec3ff-4ec408 313->314 315 4ec3f3-4ec3f7 313->315 317 4ec41a 314->317 318 4ec40a-4ec40d 314->318 315->314 316 4ec3f9-4ec3fd 315->316 320 4ec474-4ec478 316->320 319 4ec41c-4ec429 GetStdHandle 317->319 321 4ec40f-4ec414 318->321 322 4ec416-4ec418 318->322 323 4ec42b-4ec42d 319->323 324 4ec456-4ec468 319->324 320->313 325 4ec47e-4ec481 320->325 321->319 322->319 323->324 326 4ec42f-4ec438 GetFileType 323->326 324->320 327 4ec46a-4ec46d 324->327 326->324 328 4ec43a-4ec443 326->328 327->320 329 4ec44b-4ec44e 328->329 330 4ec445-4ec449 328->330 329->320 331 4ec450-4ec454 329->331 330->320 331->320
                            APIs
                            • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,?,00000000,004EC2C1,00505160), ref: 004EC41E
                            • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,?,00000000,004EC2C1,00505160), ref: 004EC430
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: FileHandleType
                            • String ID:
                            • API String ID: 3000768030-0
                            • Opcode ID: ac046f0d28879dbc08c6ff6360b32fce24f7d50e52f49d53bcb6413804ffc8ec
                            • Instruction ID: 4c98d98d14847815a255676e9d51acb74de23abd4ee511d5e95e1b69e14a9562
                            • Opcode Fuzzy Hash: ac046f0d28879dbc08c6ff6360b32fce24f7d50e52f49d53bcb6413804ffc8ec
                            • Instruction Fuzzy Hash: 9C11D5715047D14AC7304A3F8CE86377A94AB56372B38071BD4F6C22F2C638C9479549

                            Control-flow Graph

                            APIs
                            • GetLastError.KERNEL32(00504C30,0000000C), ref: 004E3FA8
                            • ExitThread.KERNEL32 ref: 004E3FAF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ErrorExitLastThread
                            • String ID:
                            • API String ID: 1611280651-0
                            • Opcode ID: 5393075cbd00652621b0eeeb3120690dea0e7944ea15d0f03da12850eb6e57e2
                            • Instruction ID: 5ad383eee385fe15794e9cab8e3de6ac65c57ffde2ac3c69c8c41bfaacfec272
                            • Opcode Fuzzy Hash: 5393075cbd00652621b0eeeb3120690dea0e7944ea15d0f03da12850eb6e57e2
                            • Instruction Fuzzy Hash: BBF0AF71940245AFDB11AF72D80AA6E3B79FF10306F20018EF10197291CB79AA01DFA5

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 351 4eab23-4eab37 GetLastError 352 4eab39-4eab41 call 4eb53b 351->352 353 4eab53-4eab5d call 4eb57a 351->353 360 4eab4e 352->360 361 4eab43-4eab4c 352->361 358 4eab5f-4eab61 353->358 359 4eab63-4eab6b call 4ebc50 353->359 362 4eabc8-4eabd1 SetLastError 358->362 364 4eab70-4eab76 359->364 360->353 361->362 365 4eabd8-4eabdd call 4e6e66 362->365 366 4eabd3-4eabd7 362->366 367 4eab78-4eab87 call 4eb57a 364->367 368 4eab89-4eab97 call 4eb57a 364->368 375 4eaba8-4eabae call 4ea897 367->375 376 4eab99-4eaba7 call 4eb57a 368->376 377 4eabb0-4eabc5 call 4eae34 call 4ea897 368->377 384 4eabc7 375->384 376->375 377->384 384->362
                            APIs
                            • GetLastError.KERNEL32(?,?,004E3FBA,00504C30,0000000C), ref: 004EAB27
                            • SetLastError.KERNEL32(00000000), ref: 004EABC9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast
                            • String ID:
                            • API String ID: 1452528299-0
                            • Opcode ID: 823752752df6ff6d01443754575a8cb22370b4dc2cc0b21bcc62c3b23274ad30
                            • Instruction ID: 8b25720f83cc207b4d16221c0427e5c2fc613e21de2a2abeaed447a81e137d67
                            • Opcode Fuzzy Hash: 823752752df6ff6d01443754575a8cb22370b4dc2cc0b21bcc62c3b23274ad30
                            • Instruction Fuzzy Hash: 4011C121B44292AED61037A7AC86E2F2649AF203AF710013AF61592191DB5C7C2952EF

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 387 4daf05-4daf1f 388 4daf28-4daf30 387->388 389 4daf21-4daf23 387->389 391 4daf51-4daf55 388->391 392 4daf32-4daf3c 388->392 390 4db001-4db00e call 4d986f 389->390 395 4daffd 391->395 396 4daf5b-4daf6c call 4db795 391->396 392->391 397 4daf3e-4daf4f 392->397 400 4db000 395->400 403 4daf6e-4daf72 396->403 404 4daf74-4dafa8 396->404 401 4dafca-4dafcc 397->401 400->390 401->400 405 4dafbb call 4da866 403->405 410 4dafce-4dafd6 404->410 411 4dafaa-4dafad 404->411 408 4dafc0-4dafc7 405->408 408->401 412 4dafd8-4dafe9 call 4e7f3a 410->412 413 4dafeb-4daffb 410->413 411->410 414 4dafaf-4dafb3 411->414 412->395 412->413 413->400 414->395 416 4dafb5-4dafb8 414->416 416->405
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 026127e4d6120f567a7ab9a3cc862c6345c8196c77ecdb647f1accb24ab00a95
                            • Instruction ID: 465d17685fdd5c71bddad92844fbb8604c2419d0aa9e73de6a1f770c8247c9a9
                            • Opcode Fuzzy Hash: 026127e4d6120f567a7ab9a3cc862c6345c8196c77ecdb647f1accb24ab00a95
                            • Instruction Fuzzy Hash: 6B31A27260451AAFCB14DF69C8A08EEB7B8FF09324B14466BE412E3390E735F954CB95

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 418 4daef7-4daf04 call 4e13b8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: CriticalLeaveSection
                            • String ID:
                            • API String ID: 3988221542-0
                            • Opcode ID: e290f4e42505182648df4caa2ba2f78b96c941a3563cb8aa00ab183667960b27
                            • Instruction ID: 8b013a93e9382fff054efd618ccd69b2fe0ae693e522b040ca313201157878ef
                            • Opcode Fuzzy Hash: e290f4e42505182648df4caa2ba2f78b96c941a3563cb8aa00ab183667960b27
                            • Instruction Fuzzy Hash: C01197B260C2864FCB05CF38E4B1669BB60EF4233472444EFE4418A382D6295460C70E

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 422 4eb97d-4eb9a7 423 4eb9ad-4eb9af 422->423 424 4eb9a9-4eb9ab 422->424 426 4eb9b5-4eb9bc call 4eb8b2 423->426 427 4eb9b1-4eb9b3 423->427 425 4eb9fe-4eba01 424->425 429 4eb9c1-4eb9c5 426->429 427->425 430 4eb9c7-4eb9d5 GetProcAddress 429->430 431 4eb9e4-4eb9fb 429->431 430->431 433 4eb9d7-4eb9e2 call 4e132f 430->433 432 4eb9fd 431->432 432->425 433->432
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d02ada698f18b868a0cdc8daea3d87200469c3e6f095b4a1c35c3e215389f25f
                            • Instruction ID: dc68add938f2e26a9ae440ccdc523f219cea16ddd0d1c701f51d5009f5c5616c
                            • Opcode Fuzzy Hash: d02ada698f18b868a0cdc8daea3d87200469c3e6f095b4a1c35c3e215389f25f
                            • Instruction Fuzzy Hash: 190145732002559FEB028E6BEC81A2F33AAFBC03253204126FA0087255DB349C1197C8
                            APIs
                            • RtlAllocateHeap.NTDLL(00000008,?,?,?,004EAB70,00000001,00000364,?,00000005,000000FF,?,004E3FBA,00504C30,0000000C), ref: 004EBC91
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: AllocateHeap
                            • String ID:
                            • API String ID: 1279760036-0
                            • Opcode ID: a494944901124a13e14d067fc4e31e6fa22a2cec39c6fe3dd37cc1056465984b
                            • Instruction ID: ffe3ed30d2411ec037e8ab824bd2184143109e6a1378eb04a8aec8bc398f35da
                            • Opcode Fuzzy Hash: a494944901124a13e14d067fc4e31e6fa22a2cec39c6fe3dd37cc1056465984b
                            • Instruction Fuzzy Hash: 2BF059312082A067EB222F638C04E1B3748EF81766B35411BBC08F7290CF38DC0086E9
                            APIs
                            • RtlAllocateHeap.NTDLL(00000000,004EC8AA,?,?,004EC8AA,00000220,?,00000000,?), ref: 004EA903
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: AllocateHeap
                            • String ID:
                            • API String ID: 1279760036-0
                            • Opcode ID: 40eb865d41083d47407b62873435b44908f9bb7ee374ae856b58313e9286700e
                            • Instruction ID: 2917e5b75b62b9f7d640afc5fe47c736490ad07d23f7ce7f90e6b15cf1a9d2b9
                            • Opcode Fuzzy Hash: 40eb865d41083d47407b62873435b44908f9bb7ee374ae856b58313e9286700e
                            • Instruction Fuzzy Hash: E7E02B312012A556D72037A39C04B5F7798AF513F3F170123ED0596291EF2CED6191AF
                            APIs
                              • Part of subcall function 004EAB23: GetLastError.KERNEL32(?,?,004E3FBA,00504C30,0000000C), ref: 004EAB27
                              • Part of subcall function 004EAB23: SetLastError.KERNEL32(00000000), ref: 004EABC9
                            • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 004EFCDA
                            • IsValidCodePage.KERNEL32(00000000), ref: 004EFD18
                            • IsValidLocale.KERNEL32(?,00000001), ref: 004EFD2B
                            • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 004EFD73
                            • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 004EFD8E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                            • String ID: l#P
                            • API String ID: 415426439-1800326595
                            • Opcode ID: fe5378ef075649fe7d5729991cda63ae41bd0a987ca7c7686a7f245e903a355b
                            • Instruction ID: ce4b18558ad0d64a82ced7387e9eb64745ec203032d77ddc893cf4bc2ac60374
                            • Opcode Fuzzy Hash: fe5378ef075649fe7d5729991cda63ae41bd0a987ca7c7686a7f245e903a355b
                            • Instruction Fuzzy Hash: 62519072A00249AFDB10DFA6CC41ABF77B8FF44706F24447AE901E7291E7789908CB65
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: __floor_pentium4
                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                            • API String ID: 4168288129-2761157908
                            • Opcode ID: 74f6ea032d4e3d21f36f4ffa98d269b72d8341709668d92a1c7d3c8afbfff050
                            • Instruction ID: c78c8f28de309ce4a08613ef7ee45b5db29868d951cee056f70988e74b9b30b8
                            • Opcode Fuzzy Hash: 74f6ea032d4e3d21f36f4ffa98d269b72d8341709668d92a1c7d3c8afbfff050
                            • Instruction Fuzzy Hash: 59D23872E0822D8FDB64CE28DD40BEAB7B5EB44315F1541EAD50DE7240EB78AE818F45
                            APIs
                            • GetLocaleInfoW.KERNEL32(?,2000000B,004EFD08,00000002,00000000,?,?,?,004EFD08,?,00000000), ref: 004F03D0
                            • GetLocaleInfoW.KERNEL32(?,20001004,004EFD08,00000002,00000000,?,?,?,004EFD08,?,00000000), ref: 004F03F9
                            • GetACP.KERNEL32(?,?,004EFD08,?,00000000), ref: 004F040E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: InfoLocale
                            • String ID: ACP$OCP
                            • API String ID: 2299586839-711371036
                            • Opcode ID: 943cd613a3563592843a9c7c40b2e502c479e5eace1e6ef5bcebafb68014d120
                            • Instruction ID: 5f77635c8746760a29e780d5830b107825f1fb040d4ca317ce7c93392dccf44d
                            • Opcode Fuzzy Hash: 943cd613a3563592843a9c7c40b2e502c479e5eace1e6ef5bcebafb68014d120
                            • Instruction Fuzzy Hash: 8421B832A0020DABD734CF14C901ABB72A6BBD4B54B568066EF0AD7313E73ADE41C358
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c833190d3595b4907967d4d4129b7b381ff8ffd123d7f024cd91791e4d9d99b7
                            • Instruction ID: 7a67c928a3a5b2c864619efe98099dc247a5fad8c2934f916dfe398de8b12193
                            • Opcode Fuzzy Hash: c833190d3595b4907967d4d4129b7b381ff8ffd123d7f024cd91791e4d9d99b7
                            • Instruction Fuzzy Hash: 6E026E71E012199FDF14CFAAC980AAEB7F1FF48315F24826ED519A7380DB35A9418B94
                            APIs
                            • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 004F0A09
                            • FindNextFileW.KERNEL32(00000000,?), ref: 004F0AFD
                            • FindClose.KERNEL32(00000000), ref: 004F0B3C
                            • FindClose.KERNEL32(00000000), ref: 004F0B6F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Find$CloseFile$FirstNext
                            • String ID:
                            • API String ID: 1164774033-0
                            • Opcode ID: 3afbe254f767cc14cde2f8fd8e92f1bedfd848a27d74f47dd1713cb011a59d4d
                            • Instruction ID: 17845ab7c9f040fcef74d48205c198d7e8ca4fe93394e5efc3a612d587c720e6
                            • Opcode Fuzzy Hash: 3afbe254f767cc14cde2f8fd8e92f1bedfd848a27d74f47dd1713cb011a59d4d
                            • Instruction Fuzzy Hash: 1371E571D0515C5FDF21EF25CC89ABFBBB8AB85304F1441DAE14CA7212EA385E859F18
                            APIs
                            • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 004DD87B
                            • IsDebuggerPresent.KERNEL32 ref: 004DD947
                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004DD960
                            • UnhandledExceptionFilter.KERNEL32(?), ref: 004DD96A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                            • String ID:
                            • API String ID: 254469556-0
                            • Opcode ID: 5819163b054a0354deb45f7c8ceaf0286493d02ae59361256d8fd480c38ebda6
                            • Instruction ID: 45d45fac9f0a06987dfc74c320387214959da5c255caf7e4a4d3146c13fe5f29
                            • Opcode Fuzzy Hash: 5819163b054a0354deb45f7c8ceaf0286493d02ae59361256d8fd480c38ebda6
                            • Instruction Fuzzy Hash: E43116B5D012199BDF21EFA5D8497CDBBB8AF08300F1041AAE40CAB250EB759B85DF44
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: %$%$+$+
                            • API String ID: 0-3555305375
                            • Opcode ID: 8bf52dc134d8e78c9fe3d90e29757dea0bd5326f79281c58065bca38c5585134
                            • Instruction ID: 347119d0a709953c32b605208e0bb2ac0c55a4157a36831ef057e27c71b7217e
                            • Opcode Fuzzy Hash: 8bf52dc134d8e78c9fe3d90e29757dea0bd5326f79281c58065bca38c5585134
                            • Instruction Fuzzy Hash: 3122983050C7808FD315DF29C4A036FBBE2AB8A354F158A1FE885973A1E7789985CB47
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: %$%$+$+
                            • API String ID: 0-3555305375
                            • Opcode ID: 54dab03ed5bf11e8316eb1ecdb0fa95fc63d58f6286fe6a2867404ba84acfcf7
                            • Instruction ID: cf93c8518c6b0d1392248229c4e723b5f0a51d41ba452eb6619e1aeb506ce9a2
                            • Opcode Fuzzy Hash: 54dab03ed5bf11e8316eb1ecdb0fa95fc63d58f6286fe6a2867404ba84acfcf7
                            • Instruction Fuzzy Hash: BA1287705087848FD715DF29C0A036FBBE1ABCA354F148A1FE989973A1D7398985CB47
                            APIs
                              • Part of subcall function 004EAB23: GetLastError.KERNEL32(?,?,004E3FBA,00504C30,0000000C), ref: 004EAB27
                              • Part of subcall function 004EAB23: SetLastError.KERNEL32(00000000), ref: 004EABC9
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004EFF12
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004EFF5C
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004F0022
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: InfoLocale$ErrorLast
                            • String ID:
                            • API String ID: 661929714-0
                            • Opcode ID: c2da70a09a7ade78296c8deeaf023d9859687752e1b84b872bd0cd3cb9c5aea0
                            • Instruction ID: 08a25c19b73c55244490b3f1cf2a9895b803e743a6b15fb06cce965859c04a2c
                            • Opcode Fuzzy Hash: c2da70a09a7ade78296c8deeaf023d9859687752e1b84b872bd0cd3cb9c5aea0
                            • Instruction Fuzzy Hash: 0761927150010B9FDB289F25DC82BBB77A8EF45305F1480BBEA05D6286EB3CD985DB54
                            APIs
                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 004E6A55
                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 004E6A5F
                            • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 004E6A6C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                            • String ID:
                            • API String ID: 3906539128-0
                            • Opcode ID: dc72577a8639e2a9150e9f56d172abe09b1e3f8842705afe26dda68d9c24f8ae
                            • Instruction ID: 9c78ead07baf664751f0b17a048446a26990bb25c6fac42d9bc92bbfa9626b63
                            • Opcode Fuzzy Hash: dc72577a8639e2a9150e9f56d172abe09b1e3f8842705afe26dda68d9c24f8ae
                            • Instruction Fuzzy Hash: 3E31E574D01228ABCB21DF69DC8978DBBB8BF18350F5085EAE41CA7250E7749F859F44
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: _strlen
                            • String ID: Something
                            • API String ID: 4218353326-2334896984
                            • Opcode ID: 20eaf8b4d4b681f771d75edda32b26f5a240f730d73d10d55173f71726e19c19
                            • Instruction ID: 2b45f4b9db8b8e27a7125370d0012084993ed791abe264ebe2d8bf2dc66bc97c
                            • Opcode Fuzzy Hash: 20eaf8b4d4b681f771d75edda32b26f5a240f730d73d10d55173f71726e19c19
                            • Instruction Fuzzy Hash: EE713571A04311AFC318EF69C89052BF7E1AF8A304F058A2FED45DB351E634E941CB9A
                            APIs
                            • GetSystemTimePreciseAsFileTime.KERNEL32(?,004DE076,?,?,?,?,004DE09A,000000FF,00000000,?,?,004DDDB1,00000000,ios_base::badbit set), ref: 004DE1A8
                            • GetSystemTimeAsFileTime.KERNEL32(?,29CDBBBE,00000000,?,004FAC4A,000000FF,?,004DE076,?,?,?,?,004DE09A,000000FF,00000000), ref: 004DE1AC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Time$FileSystem$Precise
                            • String ID:
                            • API String ID: 743729956-0
                            • Opcode ID: 25912bad1777307c98a5777ce51c1ce1dd76b098c00bc74ac2d8d4bbae66f71d
                            • Instruction ID: e438126fd00acc7b8a6a1b7264700133e97f58e4442bebfa6a95178f34a260d4
                            • Opcode Fuzzy Hash: 25912bad1777307c98a5777ce51c1ce1dd76b098c00bc74ac2d8d4bbae66f71d
                            • Instruction Fuzzy Hash: 43F06576A04558EFD7119F44DC14B6DB7ACFB09B10F14422BEC1297790DB39A9049B84
                            APIs
                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,004F44E5,?,?,00000008,?,?,004FA97B,00000000), ref: 004F47B7
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ExceptionRaise
                            • String ID:
                            • API String ID: 3997070919-0
                            • Opcode ID: 54c40a36f88cc7ccfed8d8ce2ffeb86cdf5ada9d5b99f35fa9e6b61cbbc15b9b
                            • Instruction ID: 8ca051a4e8ea9c6c9b666717f19866d1019c1ff9f9f3ffb1c93358b4488430e1
                            • Opcode Fuzzy Hash: 54c40a36f88cc7ccfed8d8ce2ffeb86cdf5ada9d5b99f35fa9e6b61cbbc15b9b
                            • Instruction Fuzzy Hash: A6B18F35510608CFD714CF28C48AB667BE0FF85364F258659EA99CF3A1C739E992CB44
                            APIs
                            • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 004DD4F1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: FeaturePresentProcessor
                            • String ID:
                            • API String ID: 2325560087-0
                            • Opcode ID: 745ab168018c31f539bef3ba3175782a4df100fb57d05c49a72b02e3b5837563
                            • Instruction ID: 81bbe7815fe27b1708b4a0e6a01936d51b19baca34fd3e86aaa88b1ff6416031
                            • Opcode Fuzzy Hash: 745ab168018c31f539bef3ba3175782a4df100fb57d05c49a72b02e3b5837563
                            • Instruction Fuzzy Hash: 9BA1ADB2E02605CFCB18CF58D8916AEBBB0FB58324F24856BD425E7760D338A854DF60
                            APIs
                              • Part of subcall function 004EAB23: GetLastError.KERNEL32(?,?,004E3FBA,00504C30,0000000C), ref: 004EAB27
                              • Part of subcall function 004EAB23: SetLastError.KERNEL32(00000000), ref: 004EABC9
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004F01C4
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast$InfoLocale
                            • String ID:
                            • API String ID: 3736152602-0
                            • Opcode ID: b8a6d392aa082dd7dd2b360160eccc46bc8dfdd977d811f14a2e292bcaf16fa6
                            • Instruction ID: 1dd6393253b5202f781ba4c2a18ecbf07beff74fdf88105c9a0054c2edf1d9b9
                            • Opcode Fuzzy Hash: b8a6d392aa082dd7dd2b360160eccc46bc8dfdd977d811f14a2e292bcaf16fa6
                            • Instruction Fuzzy Hash: F421C83261514A9BEB289B66EC45A7B73A8EF84315B1040BFFE01D6242E778ED00C764
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: 0
                            • API String ID: 0-4108050209
                            • Opcode ID: bfb5ca0909a24570a5921a3e6ca96e6ff6fc22414cac3a42b384bd01ab8ffe91
                            • Instruction ID: 0f351ec2065bcdb9dbfd1a07f893c2638dd5483492fe23eff24476052185eb46
                            • Opcode Fuzzy Hash: bfb5ca0909a24570a5921a3e6ca96e6ff6fc22414cac3a42b384bd01ab8ffe91
                            • Instruction Fuzzy Hash: FCC1D0B0900686AFCB36DF3BC58867BBBA1AF05307F14461FE45297791C339AA05CB19
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: 0
                            • API String ID: 0-4108050209
                            • Opcode ID: cb5735cad87a064385dcabcea1ac5d3835f0b76df1b8a10df1f206168f711e48
                            • Instruction ID: 759422fae9c16574663ff981f415e4d93403bd4a71224589213a04364b176a74
                            • Opcode Fuzzy Hash: cb5735cad87a064385dcabcea1ac5d3835f0b76df1b8a10df1f206168f711e48
                            • Instruction Fuzzy Hash: 0FB1E4309006C79BCB248F6ACB556BFB7B9BF04306F14061FDA5297791C6BC9A02CB59
                            APIs
                              • Part of subcall function 004EAB23: GetLastError.KERNEL32(?,?,004E3FBA,00504C30,0000000C), ref: 004EAB27
                              • Part of subcall function 004EAB23: SetLastError.KERNEL32(00000000), ref: 004EABC9
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004F02E4
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast$InfoLocale
                            • String ID:
                            • API String ID: 3736152602-0
                            • Opcode ID: c4197ac77392fd05e79c0a18a7afbc02db4292a6c95f9f2082228f1fc2c07485
                            • Instruction ID: c6e8ab615935b360b0b5923cb5afca0272879c8ce252018c477f7aac75e0f414
                            • Opcode Fuzzy Hash: c4197ac77392fd05e79c0a18a7afbc02db4292a6c95f9f2082228f1fc2c07485
                            • Instruction Fuzzy Hash: DA11C672A1011A9BD714AB2ADC46ABB77ACEF44314B10407FFA01D7242EB3CED049754
                            APIs
                              • Part of subcall function 004EAB23: GetLastError.KERNEL32(?,?,004E3FBA,00504C30,0000000C), ref: 004EAB27
                              • Part of subcall function 004EAB23: SetLastError.KERNEL32(00000000), ref: 004EABC9
                            • EnumSystemLocalesW.KERNEL32(004EFEBE,00000001,00000000,?,-00000050,?,004EFCAE,00000000,-00000002,00000000,?,00000055,?), ref: 004EFE95
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast$EnumLocalesSystem
                            • String ID:
                            • API String ID: 2417226690-0
                            • Opcode ID: 8f687684197402f1b66f6be3cb0e096d3fefec751947c069d5c9c9307f61304e
                            • Instruction ID: aaac753b82396b0a559e8698330e892fa8bba2ce37b0585f5c54805ff309dab3
                            • Opcode Fuzzy Hash: 8f687684197402f1b66f6be3cb0e096d3fefec751947c069d5c9c9307f61304e
                            • Instruction Fuzzy Hash: 6F1129372003055FDB289F3AC89167BB791FF80319B18443EE54687741D3757946C740
                            APIs
                              • Part of subcall function 004EAB23: GetLastError.KERNEL32(?,?,004E3FBA,00504C30,0000000C), ref: 004EAB27
                              • Part of subcall function 004EAB23: SetLastError.KERNEL32(00000000), ref: 004EABC9
                            • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004F00DA,00000000,00000000,?), ref: 004F0469
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast$InfoLocale
                            • String ID:
                            • API String ID: 3736152602-0
                            • Opcode ID: e3bf14dc0129df8448f34c4b7283e2873cffc6f4670dd7d5613ad2f1ed90c772
                            • Instruction ID: 900c2f255f47e978e8e5ec1462e639c582c40e659b3f0fbfa4ac77299a5d2260
                            • Opcode Fuzzy Hash: e3bf14dc0129df8448f34c4b7283e2873cffc6f4670dd7d5613ad2f1ed90c772
                            • Instruction Fuzzy Hash: 5F014E3261011ABBDB389F21CC057BB3768EFC0328F14442AEF42A3281DA78FE41C599
                            APIs
                              • Part of subcall function 004EAB23: GetLastError.KERNEL32(?,?,004E3FBA,00504C30,0000000C), ref: 004EAB27
                              • Part of subcall function 004EAB23: SetLastError.KERNEL32(00000000), ref: 004EABC9
                            • EnumSystemLocalesW.KERNEL32(004F0170,00000001,?,?,-00000050,?,004EFC76,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?), ref: 004F015B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast$EnumLocalesSystem
                            • String ID:
                            • API String ID: 2417226690-0
                            • Opcode ID: 239d5df9195a986a109a0abe302417c7d0e34e213da593ff3db778e5768846a2
                            • Instruction ID: 6bb8bf69f76b44481518a16ea0fb2844345e65ae14ee918fd2d07c72b57273da
                            • Opcode Fuzzy Hash: 239d5df9195a986a109a0abe302417c7d0e34e213da593ff3db778e5768846a2
                            • Instruction Fuzzy Hash: 3AF0C2362003086FDB255F359CC1A7B7B95EBC0768F15442EFA058B791C6B6AC42C654
                            APIs
                              • Part of subcall function 004E6BF4: EnterCriticalSection.KERNEL32(?,?,004EAFB0,?,005050C0,00000008,004EAEA2,?,?,?), ref: 004E6C03
                            • EnumSystemLocalesW.KERNEL32(004EBB53,00000001,00505140,0000000C,004EB4B8,-00000050), ref: 004EBB98
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: CriticalEnterEnumLocalesSectionSystem
                            • String ID:
                            • API String ID: 1272433827-0
                            • Opcode ID: 7370a37b5d439bbb13c2d9d55960b854f03bb907868bed575690ff9dad81e5b0
                            • Instruction ID: 40bc6d7177b9a8612ae4fcddbd1f82409508ce501b372d99526f752ea35583d4
                            • Opcode Fuzzy Hash: 7370a37b5d439bbb13c2d9d55960b854f03bb907868bed575690ff9dad81e5b0
                            • Instruction Fuzzy Hash: B2F04F76A40205DFDB00DF5AD842B9E77B0EB18725F10811BF410DB3A1CB795908DF44
                            APIs
                              • Part of subcall function 004EAB23: GetLastError.KERNEL32(?,?,004E3FBA,00504C30,0000000C), ref: 004EAB27
                              • Part of subcall function 004EAB23: SetLastError.KERNEL32(00000000), ref: 004EABC9
                            • EnumSystemLocalesW.KERNEL32(004F0290,00000001,?,?,?,004EFCD0,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?,?), ref: 004F027C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast$EnumLocalesSystem
                            • String ID:
                            • API String ID: 2417226690-0
                            • Opcode ID: 77b5cea0d89476d5a9accbadbb6b65d02071dac5c668777376451f6deccb8541
                            • Instruction ID: d312f2b400f2b597f227e4bf2124b17b88eb34b74757a5c63eed3a61c3b54361
                            • Opcode Fuzzy Hash: 77b5cea0d89476d5a9accbadbb6b65d02071dac5c668777376451f6deccb8541
                            • Instruction Fuzzy Hash: CEF05C3630020857CB049F35D84977B7F94EFC1714B07409AEB058B241C275DD42C7A4
                            APIs
                            • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,00000000,?,004E5950,?,20001004,00000000,00000002,?,?,004E4862), ref: 004EB5F0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: InfoLocale
                            • String ID:
                            • API String ID: 2299586839-0
                            • Opcode ID: 1ba1ed58e65673ac5f13648d84908cd8dd74edcb4e7f15c50df41ab61e07233a
                            • Instruction ID: b0052115b1b6e2b87af3f4594d60c90c49a444c0c17c929ca6def90bd75e5a53
                            • Opcode Fuzzy Hash: 1ba1ed58e65673ac5f13648d84908cd8dd74edcb4e7f15c50df41ab61e07233a
                            • Instruction Fuzzy Hash: B8E04F31900158BBCF222F62EC04A9F7F29EF44752F048026FD0565221CB39CE21ABD9
                            APIs
                            • SetUnhandledExceptionFilter.KERNEL32(Function_0000D984), ref: 004DD868
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ExceptionFilterUnhandled
                            • String ID:
                            • API String ID: 3192549508-0
                            • Opcode ID: c5af4f08b7a76aea3fc757802398c764eeb49b82ae4dd68364a3ac2dedba37da
                            • Instruction ID: db14c875226ac312a625d20d85c5079cb84fa40ab86543e614aec8dbffc530d5
                            • Opcode Fuzzy Hash: c5af4f08b7a76aea3fc757802398c764eeb49b82ae4dd68364a3ac2dedba37da
                            • Instruction Fuzzy Hash:
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: HeapProcess
                            • String ID:
                            • API String ID: 54951025-0
                            • Opcode ID: 7523de3e48e16540b6c31e1a34b7c5ec236063533df5428837f8c650b5d44fc8
                            • Instruction ID: 60c552b58a1d969d4ef4b28ff3d1fe02766c515e7e7d8ddfcd01ef5f4fbee32d
                            • Opcode Fuzzy Hash: 7523de3e48e16540b6c31e1a34b7c5ec236063533df5428837f8c650b5d44fc8
                            • Instruction Fuzzy Hash: E4A012305011019BC3104F315E0460C37A856501C03044014A400C0160DA3844487F01
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 89299c8e5036090960a4cc36e6c1ea777176362c8fb8987ec0ee3bbf1ae92e04
                            • Instruction ID: 84bfb0dbb916608a835385e7c1b184c01e8018b3eeb4cdb7c2e21960405112f7
                            • Opcode Fuzzy Hash: 89299c8e5036090960a4cc36e6c1ea777176362c8fb8987ec0ee3bbf1ae92e04
                            • Instruction Fuzzy Hash: D9428F746087418FC714DF28C4A466AB7E1FF85304F55895FE8968B3A1DB78EC41CB8A
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000), ref: 004D1F53
                            • RegisterClassW.USER32(?), ref: 004D1F6A
                            • CreateWindowExW.USER32 ref: 004D1FCA
                            • GetLastError.KERNEL32 ref: 004D1FD4
                            • GetMessageW.USER32(Christmas Balls,00000000,00000000,00000000), ref: 004D2000
                            • GetMessageW.USER32(00000000,00000000,00000000,00000000), ref: 004D203D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Message$ClassCreateErrorHandleLastModuleRegisterWindow
                            • String ID: Christmas Balls$CreatingTool$Keep low...$[err id]: %i
                            • API String ID: 91802587-478130180
                            • Opcode ID: 1796487d9b6bdb661f9fea7d42bcd2afc050f72ff8b6daffa5b78acc2ae60107
                            • Instruction ID: 94a858674adb55cddd229718e6f0c19d5068655d508dc77f914862f91065491f
                            • Opcode Fuzzy Hash: 1796487d9b6bdb661f9fea7d42bcd2afc050f72ff8b6daffa5b78acc2ae60107
                            • Instruction Fuzzy Hash: 14418170A143419FD300DF25C955B2BB7E4BF99704F00851EF98997390DBB9D944CB56
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: __freea$__alloca_probe_16$Info
                            • String ID:
                            • API String ID: 127012223-0
                            • Opcode ID: 912ba4ee097b042e94ce39df3a3a225fa6bfdc3949521dc5160041ffac2d707e
                            • Instruction ID: 2653b88461410703b8ec8a0278e8e91a9ea7f823ca3dd921f0424039c536fed6
                            • Opcode Fuzzy Hash: 912ba4ee097b042e94ce39df3a3a225fa6bfdc3949521dc5160041ffac2d707e
                            • Instruction Fuzzy Hash: 4171D4B290024D9BDF21AF658C81FBF7BE99F46314F16045FEA04A7382D67D9C018769
                            APIs
                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?), ref: 004DDECC
                            • __alloca_probe_16.LIBCMT ref: 004DDEF8
                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?,00000000,00000000), ref: 004DDF37
                            • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004DDF54
                            • LCMapStringEx.KERNEL32(?,?,00000000,00000000,?,?,00000000,00000000,00000000), ref: 004DDF93
                            • __alloca_probe_16.LIBCMT ref: 004DDFB0
                            • LCMapStringEx.KERNEL32(?,?,00000000,00000001,00000000,00000000,00000000,00000000,00000000), ref: 004DDFF2
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 004DE015
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ByteCharMultiStringWide$__alloca_probe_16
                            • String ID:
                            • API String ID: 2040435927-0
                            • Opcode ID: be3189863e0159ed7c6878a80827971f66c8c4fe543945856de428c37508d474
                            • Instruction ID: 9acb706b9dadf607f9dd85eddf3a002e2472b9f4346241b1cb12ddeba7757201
                            • Opcode Fuzzy Hash: be3189863e0159ed7c6878a80827971f66c8c4fe543945856de428c37508d474
                            • Instruction Fuzzy Hash: 2B51BE72A0021AABEF226F62CC55FAF7BA9EF44784F10442BF9119A350D779DD00DA58
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: _strrchr
                            • String ID:
                            • API String ID: 3213747228-0
                            • Opcode ID: 90a798cb3167070a9428d5a8ad016659465e7669ef58dc39ee64ab71c5640075
                            • Instruction ID: 8e434e28498b5da1d3ca9e04a7bef88bed10ad10942407e0b20ef0f6ff397b4e
                            • Opcode Fuzzy Hash: 90a798cb3167070a9428d5a8ad016659465e7669ef58dc39ee64ab71c5640075
                            • Instruction Fuzzy Hash: C7B16772E042D59FDB15CF2ACC82BBF7BA5EF15311F15416BE904AB382D2789901C7A8
                            APIs
                            • _ValidateLocalCookies.LIBCMT ref: 004DEE37
                            • ___except_validate_context_record.LIBVCRUNTIME ref: 004DEE3F
                            • _ValidateLocalCookies.LIBCMT ref: 004DEEC8
                            • __IsNonwritableInCurrentImage.LIBCMT ref: 004DEEF3
                            • _ValidateLocalCookies.LIBCMT ref: 004DEF48
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                            • String ID: csm
                            • API String ID: 1170836740-1018135373
                            • Opcode ID: f73d23ca411b44ee7d36e5723f1745b7ba3afe828aff8649fa4e2b61db02c69e
                            • Instruction ID: edf008cac518e75301adec57fe8b147d825304abfcba785acd0cd15d723bfab3
                            • Opcode Fuzzy Hash: f73d23ca411b44ee7d36e5723f1745b7ba3afe828aff8649fa4e2b61db02c69e
                            • Instruction Fuzzy Hash: 8B41B530900219ABCF10EF6AC894A9F7BB5BF45314F14855BE8149F392C739EE15CB9A
                            APIs
                            • GetCurrentThreadId.KERNEL32 ref: 004DDD3B
                            • AcquireSRWLockExclusive.KERNEL32(00000008,?,00000000,004FAD5D,000000FF,00000000,004D9652,?,?,?,?,?,?,00000000,00000000,00000000), ref: 004DDD5A
                            • AcquireSRWLockExclusive.KERNEL32(00000008,ios_base::badbit set,?,?,00000000,004FAD5D,000000FF,00000000,004D9652,?,?,?,?,?,?,00000000), ref: 004DDD88
                            • TryAcquireSRWLockExclusive.KERNEL32(00000008,ios_base::badbit set,?,?,00000000,004FAD5D,000000FF,00000000,004D9652,?,?,?,?,?,?,00000000), ref: 004DDDE3
                            • TryAcquireSRWLockExclusive.KERNEL32(00000008,ios_base::badbit set,?,?,00000000,004FAD5D,000000FF,00000000,004D9652,?,?,?,?,?,?,00000000), ref: 004DDDFA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: AcquireExclusiveLock$CurrentThread
                            • String ID: ios_base::badbit set
                            • API String ID: 66001078-3882152299
                            • Opcode ID: 3181b5c2f88cebc329a2242a0f87a2d5a52589e7bfe4eb6f878a4fd81ba58532
                            • Instruction ID: 3fd0019473455825df63d5f01364a88ba6ee055b1fbb075b46ef526ba214cbf2
                            • Opcode Fuzzy Hash: 3181b5c2f88cebc329a2242a0f87a2d5a52589e7bfe4eb6f878a4fd81ba58532
                            • Instruction Fuzzy Hash: 8A414931E00A06DBCF20DF65C5A49AAB3B9FF29311B104A1BD456DB740D738EA45CB59
                            APIs
                            • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 004DE142
                            • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 004DE150
                            • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 004DE161
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: AddressProc$HandleModule
                            • String ID: GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                            • API String ID: 667068680-1047828073
                            • Opcode ID: 65fc68f1acf15b9a0955130e8296dff7cc425e5aeefc7b02272e00a4e9d84820
                            • Instruction ID: ec5ee1ccb8f17c17ee0384ac2366a6315c208ea7ef3324bc6873fd0816eb2e03
                            • Opcode Fuzzy Hash: 65fc68f1acf15b9a0955130e8296dff7cc425e5aeefc7b02272e00a4e9d84820
                            • Instruction Fuzzy Hash: 78D0A7319526109BC3505F70BD0CD5E3EBCFB2C3017004011F900D21D0EB740508DE59
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5591e41c9eceefc952ae9942f8430ce9f2e37131391563b0de75f8a9a7319fc1
                            • Instruction ID: 834e085733850ad07d7eeddc470d81ac2725790192e49c164b09e0e34c7958f4
                            • Opcode Fuzzy Hash: 5591e41c9eceefc952ae9942f8430ce9f2e37131391563b0de75f8a9a7319fc1
                            • Instruction Fuzzy Hash: D6B12770E0428DAFCF11DFAAC850BBE7BB1AF15306F14019AE640A7382C7799E45CB59
                            APIs
                            • _strlen.LIBCMT ref: 004D589C
                            • Concurrency::cancel_current_task.LIBCPMT ref: 004D5A5B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Concurrency::cancel_current_task_strlen
                            • String ID: ,$false$true
                            • API String ID: 575380510-760133229
                            • Opcode ID: 9fff70a2064ffce0019ad1b38ebc23adabc4c58ff5a4e4c4ee5c15c805af5dcc
                            • Instruction ID: c405599d8f821fb38a2efd3ff1dc16b5b67ab5774a5557cec8fa61a1fe221a48
                            • Opcode Fuzzy Hash: 9fff70a2064ffce0019ad1b38ebc23adabc4c58ff5a4e4c4ee5c15c805af5dcc
                            • Instruction Fuzzy Hash: 18C1B1B15043059FD310AF65CC95B6BB6E8EF94308F04492EF9898B382F779D918CB96
                            APIs
                            • GetLastError.KERNEL32(?,?,004E965B,004DEBD7,004DD9C8), ref: 004E9672
                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 004E9680
                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 004E9699
                            • SetLastError.KERNEL32(00000000,004E965B,004DEBD7,004DD9C8), ref: 004E96EB
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLastValue___vcrt_
                            • String ID:
                            • API String ID: 3852720340-0
                            • Opcode ID: 366b9d4e237a265d9232ec46113aa84601750b06a8d58d873d1ef9a851fe938f
                            • Instruction ID: 79a6681a3aaebdda7060e70a029f4f1f72bf1998f5da09738d22b72759ea72ca
                            • Opcode Fuzzy Hash: 366b9d4e237a265d9232ec46113aa84601750b06a8d58d873d1ef9a851fe938f
                            • Instruction Fuzzy Hash: F5012432208752AEE7103B77AC86A6F2764EB213BB724032FF211501F0EF998C25A14C
                            APIs
                            • type_info::operator==.LIBVCRUNTIME ref: 004EA04B
                            • CallUnexpected.LIBVCRUNTIME ref: 004EA2C4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: CallUnexpectedtype_info::operator==
                            • String ID: csm$csm$csm
                            • API String ID: 2673424686-393685449
                            • Opcode ID: f88c2c7eb8b4f71642b00808e42c3363ea120c55e9ca52bbdf9df5d0940924df
                            • Instruction ID: 7e3f3089b1ef9d684b9cddac97becea2541cc02f3b9076c2d79f7f67397e8dab
                            • Opcode Fuzzy Hash: f88c2c7eb8b4f71642b00808e42c3363ea120c55e9ca52bbdf9df5d0940924df
                            • Instruction Fuzzy Hash: 92B18D31C00289DFCF14DFA6C98099EB7B5BF14306F14459BE8146B351D739E961CB9A
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D3BFC
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D3C1A
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D3C3C
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D3CAA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Lockitstd::_$Lockit::_Lockit::~_
                            • String ID: ios_base::badbit set
                            • API String ID: 593203224-3882152299
                            • Opcode ID: 72fb6970c24c2a8b461c502f4c4721957db4a3e38a4d21080324ab86dd32b272
                            • Instruction ID: 833351e73a026d1a4a209451a10d2f22f0deb905346cc7bec211e3da36f1a86a
                            • Opcode Fuzzy Hash: 72fb6970c24c2a8b461c502f4c4721957db4a3e38a4d21080324ab86dd32b272
                            • Instruction Fuzzy Hash: F321B172D182089FC710EF15E965A1A73A0FF68B25F01455FE4889B361D738BE04CB8A
                            APIs
                            • __EH_prolog3.LIBCMT ref: 004DA5AD
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004DA5BA
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004DA624
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004DA63E
                              • Part of subcall function 004D9CA8: _Yarn.LIBCPMT ref: 004D9CC8
                              • Part of subcall function 004D9CA8: _Yarn.LIBCPMT ref: 004D9CEC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Lockitstd::_$Lockit::_Yarn$H_prolog3Lockit::~_
                            • String ID: bad locale name
                            • API String ID: 3084819986-1405518554
                            • Opcode ID: 8e80b54d846ba5ddfd740659dcd73b86b9ea1bf7ee6e49a86be17ab4b0b98cbc
                            • Instruction ID: a3206799f8dd7c3f3a8112cf502654f10f8f66f3db19b40f3b98854b1c5c2e21
                            • Opcode Fuzzy Hash: 8e80b54d846ba5ddfd740659dcd73b86b9ea1bf7ee6e49a86be17ab4b0b98cbc
                            • Instruction Fuzzy Hash: 8C118BB0804748DEC720DF6AD59168ABBE0FF28304F50896FE0CAC3741D774AA44CB9A
                            APIs
                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,29CDBBBE,?,?,00000000,004FAD7A,000000FF,?,004E41AA,00000002,?,004E4246,004E6EA9), ref: 004E411E
                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 004E4130
                            • FreeLibrary.KERNEL32(00000000,?,?,00000000,004FAD7A,000000FF,?,004E41AA,00000002,?,004E4246,004E6EA9), ref: 004E4152
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: AddressFreeHandleLibraryModuleProc
                            • String ID: CorExitProcess$mscoree.dll
                            • API String ID: 4061214504-1276376045
                            • Opcode ID: be5589ccf3ffbaf248a3360e6d5ffba5e7d9f6776507183c432b24b79858d1e8
                            • Instruction ID: 96eb287af4ee36dad4ef6f52b5713cbbba30be64d725792d2c19bad78f192aa2
                            • Opcode Fuzzy Hash: be5589ccf3ffbaf248a3360e6d5ffba5e7d9f6776507183c432b24b79858d1e8
                            • Instruction Fuzzy Hash: 7401D631950659EFDF118F50DC09FAEBBBCFB54B11F004526F811A27E0DB789904DA90
                            APIs
                            • __alloca_probe_16.LIBCMT ref: 004EC10B
                            • __alloca_probe_16.LIBCMT ref: 004EC1D4
                            • __freea.LIBCMT ref: 004EC23B
                              • Part of subcall function 004EA8D1: RtlAllocateHeap.NTDLL(00000000,004EC8AA,?,?,004EC8AA,00000220,?,00000000,?), ref: 004EA903
                            • __freea.LIBCMT ref: 004EC24E
                            • __freea.LIBCMT ref: 004EC25B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: __freea$__alloca_probe_16$AllocateHeap
                            • String ID:
                            • API String ID: 1423051803-0
                            • Opcode ID: a40e3d0bd34d020f0b5175294d95be750faebf79d30c54c2bf7ba5fd201e8bb4
                            • Instruction ID: 98057bf85edbb97f4d94ca61a1cc1f523d02292a13bff8914470264a3e45d381
                            • Opcode Fuzzy Hash: a40e3d0bd34d020f0b5175294d95be750faebf79d30c54c2bf7ba5fd201e8bb4
                            • Instruction Fuzzy Hash: 2751F572E00286AFDB105FA7CCC1DBB36A9EF84715B15056BFE04D6201E738DC1286A9
                            APIs
                            • __EH_prolog3.LIBCMT ref: 004DB85E
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004DB868
                            • int.LIBCPMT ref: 004DB87F
                              • Part of subcall function 004DA613: std::_Lockit::_Lockit.LIBCPMT ref: 004DA624
                              • Part of subcall function 004DA613: std::_Lockit::~_Lockit.LIBCPMT ref: 004DA63E
                            • codecvt.LIBCPMT ref: 004DB8A2
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004DB8D9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3codecvt
                            • String ID:
                            • API String ID: 3716348337-0
                            • Opcode ID: c00f9634d97b92b6f428b9e7995bcc9c7122a10d0af2149891f601ee3ed62154
                            • Instruction ID: 0314ca5857c23f5e5906fb74e7ac9059b542a5a51faec101cf5bb51a6d6682b8
                            • Opcode Fuzzy Hash: c00f9634d97b92b6f428b9e7995bcc9c7122a10d0af2149891f601ee3ed62154
                            • Instruction Fuzzy Hash: E001ED31C04119CBCB04BB6189656AEB7A9BF84328F16484FF401AB381CF78AE01DBD9
                            APIs
                            • __EH_prolog3.LIBCMT ref: 004D9ED5
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D9EE0
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D9F4E
                              • Part of subcall function 004D9DA2: std::locale::_Locimp::_Locimp.LIBCPMT ref: 004D9DBA
                            • std::locale::_Setgloballocale.LIBCPMT ref: 004D9EFB
                            • _Yarn.LIBCPMT ref: 004D9F11
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                            • String ID:
                            • API String ID: 1088826258-0
                            • Opcode ID: a3219344283142d24c1774fa747649790e52101e0944aefaa05d43131c309a02
                            • Instruction ID: 7185d0491d62a96b4981d45e619889ae3316b989c8be240ec02982a0e1549876
                            • Opcode Fuzzy Hash: a3219344283142d24c1774fa747649790e52101e0944aefaa05d43131c309a02
                            • Instruction Fuzzy Hash: 7901DF75A041149BD706EB21D86553D7BA5FF98344B14804FE801E7381CF38BE06DBD9
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: _strcspn
                            • String ID: .$invalid string position
                            • API String ID: 3709121408-2424062830
                            • Opcode ID: 4fa6dd832b894ba76cd29f946fdbd9fbcbb4a7da128f71668c833914e553e16f
                            • Instruction ID: 1c47b095e18aaf71a2b22e41f4180f87f4479f17ecb29a26de0985dbd63d3ccd
                            • Opcode Fuzzy Hash: 4fa6dd832b894ba76cd29f946fdbd9fbcbb4a7da128f71668c833914e553e16f
                            • Instruction Fuzzy Hash: DD02B2746083449FC714DF28C494A2AB7E1FF85304F158A6FF8958B362EB78E945CB86
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: _strlen
                            • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                            • API String ID: 4218353326-1866435925
                            • Opcode ID: 76d1e9d265353f2f271900ea635b6f5cf9d1a7be56a6b6b58651b4f84bfd2ef9
                            • Instruction ID: 3e393f43acf251227d6531daafd93ce3f0fe6f0e306b9ab8d8b17bb4f58b5303
                            • Opcode Fuzzy Hash: 76d1e9d265353f2f271900ea635b6f5cf9d1a7be56a6b6b58651b4f84bfd2ef9
                            • Instruction Fuzzy Hash: 51C1AE352047019FC714CF29C5A0B6AB7E1FF98318F55866EE8998B3A1C779EC42CB85
                            APIs
                              • Part of subcall function 004EAB23: GetLastError.KERNEL32(?,?,004E3FBA,00504C30,0000000C), ref: 004EAB27
                              • Part of subcall function 004EAB23: SetLastError.KERNEL32(00000000), ref: 004EABC9
                            • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,004E46FA,?,?,?,00000055,?,-00000050,?,?,?), ref: 004EF395
                            • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,004E46FA,?,?,?,00000055,?,-00000050,?,?), ref: 004EF3CC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast$CodePageValid
                            • String ID: l#P$utf8
                            • API String ID: 943130320-809511986
                            • Opcode ID: 1369d60ad8b124eed8d14c5efc0676904de1ad6493e09d32d73a4f33c69b861d
                            • Instruction ID: eefbfebe0c0ac94f196a4656db8ed60cd4dc683e1dd1007efc6304fb651f0396
                            • Opcode Fuzzy Hash: 1369d60ad8b124eed8d14c5efc0676904de1ad6493e09d32d73a4f33c69b861d
                            • Instruction Fuzzy Hash: DF512731600381AAE725AB738C42BB773A8EF14706F10057BF949972C1F77CDA4886AD
                            APIs
                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,004F55BD,00000000,?,00508370,?,?,?,004F54F4,00000004,InitializeCriticalSectionEx,004FE634,004FE63C), ref: 004F552E
                            • GetLastError.KERNEL32(?,004F55BD,00000000,?,00508370,?,?,?,004F54F4,00000004,InitializeCriticalSectionEx,004FE634,004FE63C,00000000,?,004EA57C), ref: 004F5538
                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 004F5560
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: LibraryLoad$ErrorLast
                            • String ID: api-ms-
                            • API String ID: 3177248105-2084034818
                            • Opcode ID: eaf09f64c9ed4b3fbaec368ed8c3fee1adcde0704df755d449351db2f3d9ff47
                            • Instruction ID: 2c82e5a2dc7bb67bbf91691d6bc1d976ab8ce26de08bd51d35cc59c1bb1f0e76
                            • Opcode Fuzzy Hash: eaf09f64c9ed4b3fbaec368ed8c3fee1adcde0704df755d449351db2f3d9ff47
                            • Instruction Fuzzy Hash: E8E04830680749B7DF101B51EC06B6D3F699B20BD1F144021FB0CA85E0D7699A949648
                            APIs
                            • GetConsoleOutputCP.KERNEL32(29CDBBBE,00000000,00000000,?), ref: 004F292D
                              • Part of subcall function 004EA9E1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,004EC231,?,00000000,-00000008), ref: 004EAA42
                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 004F2B7F
                            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 004F2BC5
                            • GetLastError.KERNEL32 ref: 004F2C68
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                            • String ID:
                            • API String ID: 2112829910-0
                            • Opcode ID: fc05a0dfd2906aba58896a4ad84168b0f3810e646aa8cbc71e6bb6587a5ecc34
                            • Instruction ID: 71f50736f6256c1ce60e59de0d3c518011dae2667852a463323cd04d6762bb00
                            • Opcode Fuzzy Hash: fc05a0dfd2906aba58896a4ad84168b0f3810e646aa8cbc71e6bb6587a5ecc34
                            • Instruction Fuzzy Hash: F5D19CB1D0028C9FCF15CFE8C980AAEBBB4FF09304F24452AE956EB351D674A945CB54
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: AdjustPointer
                            • String ID:
                            • API String ID: 1740715915-0
                            • Opcode ID: 9f299138cbcf58831b2ce81aa8c56f0f4c9004b3694ac671c479c7714f8e997d
                            • Instruction ID: 21702aa65f9150ef87bf89c23691497beca8a7ded748fcc2cc567a92823b717d
                            • Opcode Fuzzy Hash: 9f299138cbcf58831b2ce81aa8c56f0f4c9004b3694ac671c479c7714f8e997d
                            • Instruction Fuzzy Hash: 9651F272A00696AFDB249F53C851FAA77A4FF44702F24452FE8064B3D1E739AC80C798
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D286C
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D288A
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D28AC
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D291A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Lockitstd::_$Lockit::_Lockit::~_
                            • String ID:
                            • API String ID: 593203224-0
                            • Opcode ID: bbae28f5c1d10000a275ba00477482583579f7fdec611fdc13a2b70ef1b05ffc
                            • Instruction ID: 0cb0cb124828834ae06ad3e97a864ae428ab330123247085ae99d2d51ac607da
                            • Opcode Fuzzy Hash: bbae28f5c1d10000a275ba00477482583579f7fdec611fdc13a2b70ef1b05ffc
                            • Instruction Fuzzy Hash: 9F21AD71E082049FC710FF26E965A2A73E0FF68724F05859FE4888B361D778AD04DB96
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D6B0C
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D6B2A
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D6B4C
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D6BBA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Lockitstd::_$Lockit::_Lockit::~_
                            • String ID:
                            • API String ID: 593203224-0
                            • Opcode ID: 1c9965bb68dc84afa6ca3fcb01c44be975c78a4f30105ce4b1eea434f478b723
                            • Instruction ID: e1a87bc51bf09d7aefbe52b3a92406c7b8f3c596f091787d02c9ed966d70cdac
                            • Opcode Fuzzy Hash: 1c9965bb68dc84afa6ca3fcb01c44be975c78a4f30105ce4b1eea434f478b723
                            • Instruction Fuzzy Hash: 21218071D082149FC710EF59E865A1A73E4EF68724F06445FE4888B3A1D738BD44CBC6
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D82AC
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D82CA
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D82EC
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D835A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Lockitstd::_$Lockit::_Lockit::~_
                            • String ID:
                            • API String ID: 593203224-0
                            • Opcode ID: dcad6fd11ac2ba3c51cdd49748b3c2be8cafc507be638897d94e0857c075e9be
                            • Instruction ID: a7d560f3c58d3edeb85c4c1b829ec8640c9d26fb777af1295dc7d863f5ac73db
                            • Opcode Fuzzy Hash: dcad6fd11ac2ba3c51cdd49748b3c2be8cafc507be638897d94e0857c075e9be
                            • Instruction Fuzzy Hash: 102171719042049FC714EF19E869A2E77E0FF58714F45855FE8988B361EB39BD04CB8A
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D839C
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D83BA
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D83DC
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D844A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Lockitstd::_$Lockit::_Lockit::~_
                            • String ID:
                            • API String ID: 593203224-0
                            • Opcode ID: fa4c76d5e51b488bd58e03c0a0842bfca9d78425f776154a151d6dc48e83021b
                            • Instruction ID: d463aacbcf180bd3b40ff6f9db1108d6ec03ad28821db689bdd8a13efa992cb4
                            • Opcode Fuzzy Hash: fa4c76d5e51b488bd58e03c0a0842bfca9d78425f776154a151d6dc48e83021b
                            • Instruction Fuzzy Hash: AF2182719043159FC711EF19E8A5A2A73E0EF58724F05845FE8888B351EB78BD04CB96
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D547C
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D549A
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D54BC
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D552A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Lockitstd::_$Lockit::_Lockit::~_
                            • String ID:
                            • API String ID: 593203224-0
                            • Opcode ID: 22896b99e5b5af9b18b9b46179b3ab2035994cae5bf6cae43e9f51350c6213fd
                            • Instruction ID: e2837ab736cad96ae1924900bc507013a20044c648ea352a47c75c66871449ef
                            • Opcode Fuzzy Hash: 22896b99e5b5af9b18b9b46179b3ab2035994cae5bf6cae43e9f51350c6213fd
                            • Instruction Fuzzy Hash: 3821DD71D08604AFC711EF19E965A1A73A0EF68324F01849FE4988B361DB38BD44CB8A
                            APIs
                              • Part of subcall function 004EA9E1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,004EC231,?,00000000,-00000008), ref: 004EAA42
                            • GetLastError.KERNEL32 ref: 004F075A
                            • __dosmaperr.LIBCMT ref: 004F0761
                            • GetLastError.KERNEL32 ref: 004F079B
                            • __dosmaperr.LIBCMT ref: 004F07A2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                            • String ID:
                            • API String ID: 1913693674-0
                            • Opcode ID: 65f5dba58660caa93bb6877484e754eb20db9c9cd0ab4f38dcee25668a2cc970
                            • Instruction ID: 1082dc44f2f3e471ceb9a39e95514d89e1e044c9f44c16bd1272abf1fd8bbcb7
                            • Opcode Fuzzy Hash: 65f5dba58660caa93bb6877484e754eb20db9c9cd0ab4f38dcee25668a2cc970
                            • Instruction Fuzzy Hash: D521D671600249AF8B20BF62DC8083BB7E9EF90368750455EFA1597252D738FC40CF99
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 75860d00cd783ff0ccc9385787d4ceef468cd22a07bac2f2dede68381ea728b3
                            • Instruction ID: 7072d655e4d89b4abc44a7b3e2f29fa2a06479ab28adea3161c317b1f09520f6
                            • Opcode Fuzzy Hash: 75860d00cd783ff0ccc9385787d4ceef468cd22a07bac2f2dede68381ea728b3
                            • Instruction Fuzzy Hash: 6F210471200289AFDB10AFE7CC40C2B77A9EF1036A720461AF935D3241EBB8FC808759
                            APIs
                            • GetEnvironmentStringsW.KERNEL32 ref: 004F1AF4
                              • Part of subcall function 004EA9E1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,004EC231,?,00000000,-00000008), ref: 004EAA42
                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004F1B2C
                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004F1B4C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                            • String ID:
                            • API String ID: 158306478-0
                            • Opcode ID: 069fdc7563c3885a8d077f7df02cbe31d974bb56a8b0556ad13d72631ea86ffa
                            • Instruction ID: 4dc4e797f4423d73b689ffdea6501ab0cd87fcd4da7560da5e3194c8fdaac893
                            • Opcode Fuzzy Hash: 069fdc7563c3885a8d077f7df02cbe31d974bb56a8b0556ad13d72631ea86ffa
                            • Instruction Fuzzy Hash: 2F1104E1A00649FEA71127739C8AC7F699CDEA53A9710012AF60191211FE78AE02967A
                            APIs
                            • __EH_prolog3.LIBCMT ref: 004DCB31
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004DCB3B
                            • int.LIBCPMT ref: 004DCB52
                              • Part of subcall function 004DA613: std::_Lockit::_Lockit.LIBCPMT ref: 004DA624
                              • Part of subcall function 004DA613: std::_Lockit::~_Lockit.LIBCPMT ref: 004DA63E
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004DCBAC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                            • String ID:
                            • API String ID: 1383202999-0
                            • Opcode ID: 70eb3cbba3245cd055eeb35abeb2c9fc1d75b4797798b9df16fff1380ff95c16
                            • Instruction ID: b58540ce8f42e61d2f473db64540728e367d6cb40ef280ed45c03d191be22e5e
                            • Opcode Fuzzy Hash: 70eb3cbba3245cd055eeb35abeb2c9fc1d75b4797798b9df16fff1380ff95c16
                            • Instruction Fuzzy Hash: D511A031D0411A8BCB04EB61D96566DB761AF44718F25444FE401AB381CB78BE01DB99
                            APIs
                            • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,004F8EBF,00000000,00000001,00000000,?,?,004F2CBC,?,00000000,00000000), ref: 004F99E7
                            • GetLastError.KERNEL32(?,004F8EBF,00000000,00000001,00000000,?,?,004F2CBC,?,00000000,00000000,?,?,?,004F2602,00000000), ref: 004F99F3
                              • Part of subcall function 004F9A44: CloseHandle.KERNEL32(FFFFFFFE,004F9A03,?,004F8EBF,00000000,00000001,00000000,?,?,004F2CBC,?,00000000,00000000,?,?), ref: 004F9A54
                            • ___initconout.LIBCMT ref: 004F9A03
                              • Part of subcall function 004F9A25: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,004F99C1,004F8EAC,?,?,004F2CBC,?,00000000,00000000,?), ref: 004F9A38
                            • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,004F8EBF,00000000,00000001,00000000,?,?,004F2CBC,?,00000000,00000000,?), ref: 004F9A18
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                            • String ID:
                            • API String ID: 2744216297-0
                            • Opcode ID: 4073fb452acc2bf39f5868661c05f3178dd435da1111e5847a2e4d3732fa01cc
                            • Instruction ID: 5b20afe49dfc811936039094a1e03a836322697f68d661982be1e10f18d9c5ea
                            • Opcode Fuzzy Hash: 4073fb452acc2bf39f5868661c05f3178dd435da1111e5847a2e4d3732fa01cc
                            • Instruction Fuzzy Hash: 01F01C36D00269BBCF262F95EC08A9E3F66FB587A0F044015FA0985170C6368D64EB94
                            APIs
                            • GetSystemTimeAsFileTime.KERNEL32(?), ref: 004DE5D9
                            • GetCurrentThreadId.KERNEL32 ref: 004DE5E8
                            • GetCurrentProcessId.KERNEL32 ref: 004DE5F1
                            • QueryPerformanceCounter.KERNEL32(?), ref: 004DE5FE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                            • String ID:
                            • API String ID: 2933794660-0
                            • Opcode ID: e791756b3b835d30100d40df8863e0a0c4f9212e42eb2cdf9db7e05af165db5b
                            • Instruction ID: b2c2be6856f36e684330460313926b85f6fe7bbb3a15333f1ea7ee41e01aad43
                            • Opcode Fuzzy Hash: e791756b3b835d30100d40df8863e0a0c4f9212e42eb2cdf9db7e05af165db5b
                            • Instruction Fuzzy Hash: 02F06274D1020EEFCB00DBB4D94999EBBF8FF2C204BA18596E412E7110EB34AB489B50
                            APIs
                            • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,004EA251,?,?,00000000,00000000,00000000,?), ref: 004EA375
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: EncodePointer
                            • String ID: MOC$RCC
                            • API String ID: 2118026453-2084237596
                            • Opcode ID: 4c1c640daf646ccf0d944efa5bdd5084f413ed60497adabc381132e46943e97f
                            • Instruction ID: 76aa1d119a09cf2ea172580756707885b07dd5e2675ba515b66e6f148c651277
                            • Opcode Fuzzy Hash: 4c1c640daf646ccf0d944efa5bdd5084f413ed60497adabc381132e46943e97f
                            • Instruction Fuzzy Hash: C441CC71900249EFCF05DF95CC85AAEBBB2BF48305F18809AF90467251D379AA60CB56
                            APIs
                            • ___except_validate_context_record.LIBVCRUNTIME ref: 004E9E33
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ___except_validate_context_record
                            • String ID: csm$csm
                            • API String ID: 3493665558-3733052814
                            • Opcode ID: 5e8fd7fc69c334e9c479dbaf2c414cdd10093a594edb8fdbc2b1c2706f2c3d10
                            • Instruction ID: 2fff2e28982cbe03e5135a1c58c0c7653755bd32ac21780e01a49e1b56fee4b5
                            • Opcode Fuzzy Hash: 5e8fd7fc69c334e9c479dbaf2c414cdd10093a594edb8fdbc2b1c2706f2c3d10
                            • Instruction Fuzzy Hash: 9E31C632400295EBCF268F56C8449AB7B65FF09317B14415BF944893E1C37BDC61DB8A
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1656737797.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000000.00000002.1656723785.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656758493.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656828669.0000000000506000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656841280.0000000000507000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656855222.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1656890128.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_4d0000_file.jbxd
                            Similarity
                            • API ID: GetctypeLockitLockit::_std::_
                            • String ID: ios_base::badbit set
                            • API String ID: 2423992667-3882152299
                            • Opcode ID: a57528cc6a56caf26033d6bea94796e8fd382b21b337ceaa0fa3fa1e055309b9
                            • Instruction ID: fc5bc6bfb278557a67acd9047ff0110d3beaaad5ef072457ce59ad4125677f90
                            • Opcode Fuzzy Hash: a57528cc6a56caf26033d6bea94796e8fd382b21b337ceaa0fa3fa1e055309b9
                            • Instruction Fuzzy Hash: DF31B1B19087848BE3109F25C96531BBBE4AFE5708F04491EF5884B342E7B9E948C7D7
                            APIs
                              • Part of subcall function 004EAB23: GetLastError.KERNEL32(00000000,?,004ECF02), ref: 004EAB27
                              • Part of subcall function 004EAB23: SetLastError.KERNEL32(00000000,?,?,00000028,004E6E76), ref: 004EABC9
                            • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 004EFCDA
                            • IsValidCodePage.KERNEL32(00000000), ref: 004EFD18
                            • IsValidLocale.KERNEL32(?,00000001), ref: 004EFD2B
                            • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 004EFD73
                            • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 004EFD8E
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                            • String ID: l#P
                            • API String ID: 415426439-1800326595
                            • Opcode ID: a1861d705af97808363bc61a397296e2ef3724fd7f1be81beb54b9c9fc57f766
                            • Instruction ID: ce4b18558ad0d64a82ced7387e9eb64745ec203032d77ddc893cf4bc2ac60374
                            • Opcode Fuzzy Hash: a1861d705af97808363bc61a397296e2ef3724fd7f1be81beb54b9c9fc57f766
                            • Instruction Fuzzy Hash: 62519072A00249AFDB10DFA6CC41ABF77B8FF44706F24447AE901E7291E7789908CB65
                            APIs
                              • Part of subcall function 004D1000: _strlen.LIBCMT ref: 004D1067
                            • GetFileSize.KERNEL32(00000000,00000000), ref: 004D1BE1
                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004D1C07
                            • CloseHandle.KERNEL32(00000000), ref: 004D1C16
                            • _strlen.LIBCMT ref: 004D1C84
                            • CloseHandle.KERNEL32(00000000), ref: 004D1E83
                            • PostQuitMessage.USER32(00000000), ref: 004D1EE0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: CloseFileHandle_strlen$MessagePostQuitReadSize
                            • String ID:
                            • API String ID: 2365707584-0
                            • Opcode ID: bb85169f50c0897420890ef9e76b684ff2a0ccf385b788e5aa32ea03ff6e6966
                            • Instruction ID: 7cadcb260add03fe49041223ccef2ab87c15e9b75fd104b2f2366021b5fdcbcf
                            • Opcode Fuzzy Hash: bb85169f50c0897420890ef9e76b684ff2a0ccf385b788e5aa32ea03ff6e6966
                            • Instruction Fuzzy Hash: D7912372904340ABC314DF24C89562FBBE5AF89754F154A2FFC858B361E738E944CB96
                            APIs
                            • GetLocaleInfoW.KERNEL32(?,2000000B,004EFD08,00000002,00000000,?,?,?,004EFD08,?,00000000), ref: 004F03D0
                            • GetLocaleInfoW.KERNEL32(?,20001004,004EFD08,00000002,00000000,?,?,?,004EFD08,?,00000000), ref: 004F03F9
                            • GetACP.KERNEL32(?,?,004EFD08,?,00000000), ref: 004F040E
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: InfoLocale
                            • String ID: ACP$OCP
                            • API String ID: 2299586839-711371036
                            • Opcode ID: 943cd613a3563592843a9c7c40b2e502c479e5eace1e6ef5bcebafb68014d120
                            • Instruction ID: 5f77635c8746760a29e780d5830b107825f1fb040d4ca317ce7c93392dccf44d
                            • Opcode Fuzzy Hash: 943cd613a3563592843a9c7c40b2e502c479e5eace1e6ef5bcebafb68014d120
                            • Instruction Fuzzy Hash: 8421B832A0020DABD734CF14C901ABB72A6BBD4B54B568066EF0AD7313E73ADE41C358
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c833190d3595b4907967d4d4129b7b381ff8ffd123d7f024cd91791e4d9d99b7
                            • Instruction ID: 7a67c928a3a5b2c864619efe98099dc247a5fad8c2934f916dfe398de8b12193
                            • Opcode Fuzzy Hash: c833190d3595b4907967d4d4129b7b381ff8ffd123d7f024cd91791e4d9d99b7
                            • Instruction Fuzzy Hash: 6E026E71E012199FDF14CFAAC980AAEB7F1FF48315F24826ED519A7380DB35A9418B94
                            APIs
                            • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004F0A09
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: FileFindFirst
                            • String ID:
                            • API String ID: 1974802433-0
                            • Opcode ID: 0b3e827810410a46a2f65b1a2031089f320c01a12bf8efaf4a2eac04bcc43609
                            • Instruction ID: d9dc6fef9d33c02b3cb444f2424ae5403a13f5415411999f2b64bce99a55974a
                            • Opcode Fuzzy Hash: 0b3e827810410a46a2f65b1a2031089f320c01a12bf8efaf4a2eac04bcc43609
                            • Instruction Fuzzy Hash: 0071E471D0515C9FDF21EF25CC89ABFB7B8AB85304F1441DAE14CA7212EA389E859F18
                            APIs
                            • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 004DD87B
                            • IsDebuggerPresent.KERNEL32 ref: 004DD947
                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004DD960
                            • UnhandledExceptionFilter.KERNEL32(?), ref: 004DD96A
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                            • String ID:
                            • API String ID: 254469556-0
                            • Opcode ID: 5819163b054a0354deb45f7c8ceaf0286493d02ae59361256d8fd480c38ebda6
                            • Instruction ID: 45d45fac9f0a06987dfc74c320387214959da5c255caf7e4a4d3146c13fe5f29
                            • Opcode Fuzzy Hash: 5819163b054a0354deb45f7c8ceaf0286493d02ae59361256d8fd480c38ebda6
                            • Instruction Fuzzy Hash: E43116B5D012199BDF21EFA5D8497CDBBB8AF08300F1041AAE40CAB250EB759B85DF44
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000), ref: 004D1F53
                            • RegisterClassW.USER32(?), ref: 004D1F6A
                            • CreateWindowExW.USER32 ref: 004D1FCA
                            • GetLastError.KERNEL32 ref: 004D1FD4
                            • GetMessageW.USER32(Christmas Balls,00000000,00000000,00000000), ref: 004D2000
                            • GetMessageW.USER32(00000000,00000000,00000000,00000000,00000000), ref: 004D203D
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Message$ClassCreateErrorHandleLastModuleRegisterWindow
                            • String ID: Christmas Balls$CreatingTool$Keep low...$[err id]: %i
                            • API String ID: 91802587-478130180
                            • Opcode ID: e0129692006e326685cda9f83a09f84596f4608c64bec456b76763be015a9029
                            • Instruction ID: 94a858674adb55cddd229718e6f0c19d5068655d508dc77f914862f91065491f
                            • Opcode Fuzzy Hash: e0129692006e326685cda9f83a09f84596f4608c64bec456b76763be015a9029
                            • Instruction Fuzzy Hash: 14418170A143419FD300DF25C955B2BB7E4BF99704F00851EF98997390DBB9D944CB56
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000), ref: 004D20E8
                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 004D20F9
                            • GetCurrentThreadId.KERNEL32 ref: 004D214A
                              • Part of subcall function 004DD0B6: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000), ref: 004DD0C2
                              • Part of subcall function 004DD0B6: GetExitCodeThread.KERNEL32(?,?), ref: 004DD0DB
                              • Part of subcall function 004DD0B6: CloseHandle.KERNEL32(?), ref: 004DD0ED
                              • Part of subcall function 004E3E7D: CreateThread.KERNEL32(?,?,004E3F95,00000000,?,?), ref: 004E3EC6
                              • Part of subcall function 004E3E7D: GetLastError.KERNEL32 ref: 004E3ED2
                              • Part of subcall function 004E3E7D: __dosmaperr.LIBCMT ref: 004E3ED9
                            • GetCurrentThreadId.KERNEL32 ref: 004D21AF
                            • std::_Throw_Cpp_error.LIBCPMT ref: 004D21E9
                            • std::_Throw_Cpp_error.LIBCPMT ref: 004D21F0
                            • std::_Throw_Cpp_error.LIBCPMT ref: 004D21F7
                            • std::_Throw_Cpp_error.LIBCPMT ref: 004D2204
                            • std::_Throw_Cpp_error.LIBCPMT ref: 004D2213
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Cpp_errorThrow_std::_$Thread$CurrentHandleModule$CloseCodeCreateErrorExitFileLastNameObjectSingleWait__dosmaperr
                            • String ID:
                            • API String ID: 686914455-0
                            • Opcode ID: 6be9552521179d6d60e030523b70db402c41edddc46df9da070a6f9aeb656575
                            • Instruction ID: 9d1bc49ec1a248935437e9771ca860e04de8cd8d151177fe9463666e0fabe6d3
                            • Opcode Fuzzy Hash: 6be9552521179d6d60e030523b70db402c41edddc46df9da070a6f9aeb656575
                            • Instruction Fuzzy Hash: 6331D5B1A043016AE7206F658C27B5F76A4AF54B04F01441FFA48AB3C1EABC9910D79B
                            APIs
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: __freea$__alloca_probe_16$Info
                            • String ID:
                            • API String ID: 127012223-0
                            • Opcode ID: b7808db50c4d8e58067dbd2426e47748ddbfb46f48d4d9362d117fa765546c79
                            • Instruction ID: 2653b88461410703b8ec8a0278e8e91a9ea7f823ca3dd921f0424039c536fed6
                            • Opcode Fuzzy Hash: b7808db50c4d8e58067dbd2426e47748ddbfb46f48d4d9362d117fa765546c79
                            • Instruction Fuzzy Hash: 4171D4B290024D9BDF21AF658C81FBF7BE99F46314F16045FEA04A7382D67D9C018769
                            APIs
                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?), ref: 004DDECC
                            • __alloca_probe_16.LIBCMT ref: 004DDEF8
                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?,00000000,00000000), ref: 004DDF37
                            • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004DDF54
                            • LCMapStringEx.KERNEL32(?,?,00000000,00000000,?,?,00000000,00000000,00000000), ref: 004DDF93
                            • __alloca_probe_16.LIBCMT ref: 004DDFB0
                            • LCMapStringEx.KERNEL32(?,?,00000000,00000001,00000000,00000000,00000000,00000000,00000000), ref: 004DDFF2
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 004DE015
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ByteCharMultiStringWide$__alloca_probe_16
                            • String ID:
                            • API String ID: 2040435927-0
                            • Opcode ID: caa1d006b98d197b44bfb07eeb27d1939883629713f7a4715a68e93d7b7f480d
                            • Instruction ID: 9acb706b9dadf607f9dd85eddf3a002e2472b9f4346241b1cb12ddeba7757201
                            • Opcode Fuzzy Hash: caa1d006b98d197b44bfb07eeb27d1939883629713f7a4715a68e93d7b7f480d
                            • Instruction Fuzzy Hash: 2B51BE72A0021AABEF226F62CC55FAF7BA9EF44784F10442BF9119A350D779DD00DA58
                            APIs
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: _strrchr
                            • String ID:
                            • API String ID: 3213747228-0
                            • Opcode ID: 90a798cb3167070a9428d5a8ad016659465e7669ef58dc39ee64ab71c5640075
                            • Instruction ID: 8e434e28498b5da1d3ca9e04a7bef88bed10ad10942407e0b20ef0f6ff397b4e
                            • Opcode Fuzzy Hash: 90a798cb3167070a9428d5a8ad016659465e7669ef58dc39ee64ab71c5640075
                            • Instruction Fuzzy Hash: C7B16772E042D59FDB15CF2ACC82BBF7BA5EF15311F15416BE904AB382D2789901C7A8
                            APIs
                            • _ValidateLocalCookies.LIBCMT ref: 004DEE37
                            • ___except_validate_context_record.LIBVCRUNTIME ref: 004DEE3F
                            • _ValidateLocalCookies.LIBCMT ref: 004DEEC8
                            • __IsNonwritableInCurrentImage.LIBCMT ref: 004DEEF3
                            • _ValidateLocalCookies.LIBCMT ref: 004DEF48
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                            • String ID: csm
                            • API String ID: 1170836740-1018135373
                            • Opcode ID: eca5e426a676d1e88b05c199591afb58c2bd3c0692309fdd964c21e818a74649
                            • Instruction ID: edf008cac518e75301adec57fe8b147d825304abfcba785acd0cd15d723bfab3
                            • Opcode Fuzzy Hash: eca5e426a676d1e88b05c199591afb58c2bd3c0692309fdd964c21e818a74649
                            • Instruction Fuzzy Hash: 8B41B530900219ABCF10EF6AC894A9F7BB5BF45314F14855BE8149F392C739EE15CB9A
                            APIs
                            • GetCurrentThreadId.KERNEL32(00506958,?,00000000,004FAD5D,000000FF,00000000,004D9652,?,?,?,?,?,?,00000000,00000000,00000000), ref: 004DDD3B
                            • AcquireSRWLockExclusive.KERNEL32(00000008,?,00000000,004FAD5D,000000FF,00000000,004D9652,?,?,?,?,?,?,00000000,00000000,00000000), ref: 004DDD5A
                            • AcquireSRWLockExclusive.KERNEL32(00000008,ios_base::badbit set,?,?,00000000,004FAD5D,000000FF,00000000,004D9652,?,?,?,?,?,?,00000000), ref: 004DDD88
                            • TryAcquireSRWLockExclusive.KERNEL32(00000008,ios_base::badbit set,?,?,00000000,004FAD5D,000000FF,00000000,004D9652,?,?,?,?,?,?,00000000), ref: 004DDDE3
                            • TryAcquireSRWLockExclusive.KERNEL32(00000008,ios_base::badbit set,?,?,00000000,004FAD5D,000000FF,00000000,004D9652,?,?,?,?,?,?,00000000), ref: 004DDDFA
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: AcquireExclusiveLock$CurrentThread
                            • String ID: ios_base::badbit set
                            • API String ID: 66001078-3882152299
                            • Opcode ID: 163e38fef85f2da7c1b08a5ee7874fdbca20e448a08247a071ad7fb1076e709e
                            • Instruction ID: 3fd0019473455825df63d5f01364a88ba6ee055b1fbb075b46ef526ba214cbf2
                            • Opcode Fuzzy Hash: 163e38fef85f2da7c1b08a5ee7874fdbca20e448a08247a071ad7fb1076e709e
                            • Instruction Fuzzy Hash: 8A414931E00A06DBCF20DF65C5A49AAB3B9FF29311B104A1BD456DB740D738EA45CB59
                            APIs
                            • FreeLibrary.KERNEL32(00000000,?,004EB9C1,004D34FA,?,00000000,004DA3DD,004D34FC,?,004EB596,00000022,FlsSetValue,004FE054,0P,004DA3DD), ref: 004EB973
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: FreeLibrary
                            • String ID: api-ms-$ext-ms-
                            • API String ID: 3664257935-537541572
                            • Opcode ID: 2d69ef865c7a822f7b483e87330438520a02d9ce9c9d9c77b8451d6148f61868
                            • Instruction ID: d1f891c9d9298c337318924da5090913e32598822976f59b28bda8ba0dba909b
                            • Opcode Fuzzy Hash: 2d69ef865c7a822f7b483e87330438520a02d9ce9c9d9c77b8451d6148f61868
                            • Instruction Fuzzy Hash: 1B210571A01355F7C7219B26EC41A6F376CEF61761F140122EA51A73D1D738EE00D6E4
                            APIs
                            • __EH_prolog3.LIBCMT ref: 004DB85E
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004DB868
                            • int.LIBCPMT ref: 004DB87F
                              • Part of subcall function 004DA613: std::_Lockit::_Lockit.LIBCPMT ref: 004DA624
                              • Part of subcall function 004DA613: std::_Lockit::~_Lockit.LIBCPMT ref: 004DA63E
                            • codecvt.LIBCPMT ref: 004DB8A2
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004DB8D9
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3codecvt
                            • String ID: pyP
                            • API String ID: 3716348337-1042686473
                            • Opcode ID: c00f9634d97b92b6f428b9e7995bcc9c7122a10d0af2149891f601ee3ed62154
                            • Instruction ID: 0314ca5857c23f5e5906fb74e7ac9059b542a5a51faec101cf5bb51a6d6682b8
                            • Opcode Fuzzy Hash: c00f9634d97b92b6f428b9e7995bcc9c7122a10d0af2149891f601ee3ed62154
                            • Instruction Fuzzy Hash: E001ED31C04119CBCB04BB6189656AEB7A9BF84328F16484FF401AB381CF78AE01DBD9
                            APIs
                            • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 004DE142
                            • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 004DE150
                            • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 004DE161
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: AddressProc$HandleModule
                            • String ID: GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                            • API String ID: 667068680-1047828073
                            • Opcode ID: 65fc68f1acf15b9a0955130e8296dff7cc425e5aeefc7b02272e00a4e9d84820
                            • Instruction ID: ec5ee1ccb8f17c17ee0384ac2366a6315c208ea7ef3324bc6873fd0816eb2e03
                            • Opcode Fuzzy Hash: 65fc68f1acf15b9a0955130e8296dff7cc425e5aeefc7b02272e00a4e9d84820
                            • Instruction Fuzzy Hash: 78D0A7319526109BC3505F70BD0CD5E3EBCFB2C3017004011F900D21D0EB740508DE59
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cfe82cb40342952d2f82e1ebf65d19abe7ec410c3f1d19441f2dd9c3fab08412
                            • Instruction ID: 834e085733850ad07d7eeddc470d81ac2725790192e49c164b09e0e34c7958f4
                            • Opcode Fuzzy Hash: cfe82cb40342952d2f82e1ebf65d19abe7ec410c3f1d19441f2dd9c3fab08412
                            • Instruction Fuzzy Hash: D6B12770E0428DAFCF11DFAAC850BBE7BB1AF15306F14019AE640A7382C7799E45CB59
                            APIs
                            • _strlen.LIBCMT ref: 004D589C
                            • Concurrency::cancel_current_task.LIBCPMT ref: 004D5A5B
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Concurrency::cancel_current_task_strlen
                            • String ID: ,$false$true
                            • API String ID: 575380510-760133229
                            • Opcode ID: 6dceb7d17b337375968f63e2f2014650583c4c12c700bc387075ed974fd2f512
                            • Instruction ID: c405599d8f821fb38a2efd3ff1dc16b5b67ab5774a5557cec8fa61a1fe221a48
                            • Opcode Fuzzy Hash: 6dceb7d17b337375968f63e2f2014650583c4c12c700bc387075ed974fd2f512
                            • Instruction Fuzzy Hash: 18C1B1B15043059FD310AF65CC95B6BB6E8EF94308F04492EF9898B382F779D918CB96
                            APIs
                            • GetLastError.KERNEL32(?,?,004E965B,004DEBD7,004DD9C8), ref: 004E9672
                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 004E9680
                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 004E9699
                            • SetLastError.KERNEL32(00000000,004E965B,004DEBD7,004DD9C8), ref: 004E96EB
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLastValue___vcrt_
                            • String ID:
                            • API String ID: 3852720340-0
                            • Opcode ID: db74212bd767a9f784cb615cafd36cdc2bb21f614eac970b704cfc71b18b3036
                            • Instruction ID: 79a6681a3aaebdda7060e70a029f4f1f72bf1998f5da09738d22b72759ea72ca
                            • Opcode Fuzzy Hash: db74212bd767a9f784cb615cafd36cdc2bb21f614eac970b704cfc71b18b3036
                            • Instruction Fuzzy Hash: F5012432208752AEE7103B77AC86A6F2764EB213BB724032FF211501F0EF998C25A14C
                            APIs
                            • type_info::operator==.LIBVCRUNTIME ref: 004EA04B
                            • CallUnexpected.LIBVCRUNTIME ref: 004EA2C4
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: CallUnexpectedtype_info::operator==
                            • String ID: csm$csm$csm
                            • API String ID: 2673424686-393685449
                            • Opcode ID: 3782b00ff2bc5365c3a3ae51d58fd0d47da783409a2498ec23b8cae47a05041c
                            • Instruction ID: 7e3f3089b1ef9d684b9cddac97becea2541cc02f3b9076c2d79f7f67397e8dab
                            • Opcode Fuzzy Hash: 3782b00ff2bc5365c3a3ae51d58fd0d47da783409a2498ec23b8cae47a05041c
                            • Instruction Fuzzy Hash: 92B18D31C00289DFCF14DFA6C98099EB7B5BF14306F14459BE8146B351D739E961CB9A
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D3BFC
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D3C1A
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D3C3C
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D3CAA
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Lockitstd::_$Lockit::_Lockit::~_
                            • String ID: ios_base::badbit set
                            • API String ID: 593203224-3882152299
                            • Opcode ID: 095269c943ac7083ed52c03f576591ce05307374d438f70298567265700e436b
                            • Instruction ID: 833351e73a026d1a4a209451a10d2f22f0deb905346cc7bec211e3da36f1a86a
                            • Opcode Fuzzy Hash: 095269c943ac7083ed52c03f576591ce05307374d438f70298567265700e436b
                            • Instruction Fuzzy Hash: F321B172D182089FC710EF15E965A1A73A0FF68B25F01455FE4889B361D738BE04CB8A
                            APIs
                            • __EH_prolog3.LIBCMT ref: 004DA5AD
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004DA5BA
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004DA624
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004DA63E
                              • Part of subcall function 004D9CA8: _Yarn.LIBCPMT ref: 004D9CC8
                              • Part of subcall function 004D9CA8: _Yarn.LIBCPMT ref: 004D9CEC
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Lockitstd::_$Lockit::_Yarn$H_prolog3Lockit::~_
                            • String ID: bad locale name
                            • API String ID: 3084819986-1405518554
                            • Opcode ID: 8e80b54d846ba5ddfd740659dcd73b86b9ea1bf7ee6e49a86be17ab4b0b98cbc
                            • Instruction ID: a3206799f8dd7c3f3a8112cf502654f10f8f66f3db19b40f3b98854b1c5c2e21
                            • Opcode Fuzzy Hash: 8e80b54d846ba5ddfd740659dcd73b86b9ea1bf7ee6e49a86be17ab4b0b98cbc
                            • Instruction Fuzzy Hash: 8C118BB0804748DEC720DF6AD59168ABBE0FF28304F50896FE0CAC3741D774AA44CB9A
                            APIs
                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,004FAD7A,000000FF,?,004E41AA,004E4091,?,004E4246,00000000), ref: 004E411E
                            • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,?,00000000,004FAD7A,000000FF,?,004E41AA,004E4091,?,004E4246,00000000), ref: 004E4130
                            • FreeLibrary.KERNEL32(00000000,?,?,00000000,004FAD7A,000000FF,?,004E41AA,004E4091,?,004E4246,00000000), ref: 004E4152
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: AddressFreeHandleLibraryModuleProc
                            • String ID: CorExitProcess$mscoree.dll
                            • API String ID: 4061214504-1276376045
                            • Opcode ID: be5589ccf3ffbaf248a3360e6d5ffba5e7d9f6776507183c432b24b79858d1e8
                            • Instruction ID: 96eb287af4ee36dad4ef6f52b5713cbbba30be64d725792d2c19bad78f192aa2
                            • Opcode Fuzzy Hash: be5589ccf3ffbaf248a3360e6d5ffba5e7d9f6776507183c432b24b79858d1e8
                            • Instruction Fuzzy Hash: 7401D631950659EFDF118F50DC09FAEBBBCFB54B11F004526F811A27E0DB789904DA90
                            APIs
                            • __alloca_probe_16.LIBCMT ref: 004EC10B
                            • __alloca_probe_16.LIBCMT ref: 004EC1D4
                            • __freea.LIBCMT ref: 004EC23B
                              • Part of subcall function 004EA8D1: HeapAlloc.KERNEL32(00000000,004DA3DD,004D34FA,?,004DECE1,004D34FC,004D34FA,?,?,?,004DA03F,004DA3DD,004D34FE,004D34FA,004D34FA,004D34FA), ref: 004EA903
                            • __freea.LIBCMT ref: 004EC24E
                            • __freea.LIBCMT ref: 004EC25B
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: __freea$__alloca_probe_16$AllocHeap
                            • String ID:
                            • API String ID: 1096550386-0
                            • Opcode ID: b65dfcd506934558d95e4b52ab6fb50d06873197fce08de70e42ddf3ce43cb2e
                            • Instruction ID: 98057bf85edbb97f4d94ca61a1cc1f523d02292a13bff8914470264a3e45d381
                            • Opcode Fuzzy Hash: b65dfcd506934558d95e4b52ab6fb50d06873197fce08de70e42ddf3ce43cb2e
                            • Instruction Fuzzy Hash: 2751F572E00286AFDB105FA7CCC1DBB36A9EF84715B15056BFE04D6201E738DC1286A9
                            APIs
                            • __EH_prolog3.LIBCMT ref: 004D9ED5
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D9EE0
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D9F4E
                              • Part of subcall function 004D9DA2: std::locale::_Locimp::_Locimp.LIBCPMT ref: 004D9DBA
                            • std::locale::_Setgloballocale.LIBCPMT ref: 004D9EFB
                            • _Yarn.LIBCPMT ref: 004D9F11
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                            • String ID:
                            • API String ID: 1088826258-0
                            • Opcode ID: a3219344283142d24c1774fa747649790e52101e0944aefaa05d43131c309a02
                            • Instruction ID: 7185d0491d62a96b4981d45e619889ae3316b989c8be240ec02982a0e1549876
                            • Opcode Fuzzy Hash: a3219344283142d24c1774fa747649790e52101e0944aefaa05d43131c309a02
                            • Instruction Fuzzy Hash: 7901DF75A041149BD706EB21D86553D7BA5FF98344B14804FE801E7381CF38BE06DBD9
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: _strcspn
                            • String ID: .$invalid string position
                            • API String ID: 3709121408-2424062830
                            • Opcode ID: 4fa6dd832b894ba76cd29f946fdbd9fbcbb4a7da128f71668c833914e553e16f
                            • Instruction ID: 1c47b095e18aaf71a2b22e41f4180f87f4479f17ecb29a26de0985dbd63d3ccd
                            • Opcode Fuzzy Hash: 4fa6dd832b894ba76cd29f946fdbd9fbcbb4a7da128f71668c833914e553e16f
                            • Instruction Fuzzy Hash: DD02B2746083449FC714DF28C494A2AB7E1FF85304F158A6FF8958B362EB78E945CB86
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: _strlen
                            • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                            • API String ID: 4218353326-1866435925
                            • Opcode ID: eabb908c907826fce91ca6a41377e5238a6d60fd9c1fe5976774e471920e073f
                            • Instruction ID: 3e393f43acf251227d6531daafd93ce3f0fe6f0e306b9ab8d8b17bb4f58b5303
                            • Opcode Fuzzy Hash: eabb908c907826fce91ca6a41377e5238a6d60fd9c1fe5976774e471920e073f
                            • Instruction Fuzzy Hash: 51C1AE352047019FC714CF29C5A0B6AB7E1FF98318F55866EE8998B3A1C779EC42CB85
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: _strlen
                            • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                            • API String ID: 4218353326-1866435925
                            • Opcode ID: 70fd4204dbafdad6f664a570c9701827df756aa345f4252368a69c951afcf1b8
                            • Instruction ID: ff9a4ce690444fb269a08e251bce02af110424f78bd0582e3c1122aee792bbd7
                            • Opcode Fuzzy Hash: 70fd4204dbafdad6f664a570c9701827df756aa345f4252368a69c951afcf1b8
                            • Instruction Fuzzy Hash: 679172742042009FDB14DF29C4A4B26B7E2FF89314F18869EE9568F3A6D739EC45CB45
                            APIs
                              • Part of subcall function 004EAB23: GetLastError.KERNEL32(00000000,?,004ECF02), ref: 004EAB27
                              • Part of subcall function 004EAB23: SetLastError.KERNEL32(00000000,?,?,00000028,004E6E76), ref: 004EABC9
                            • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,004E46FA,?,?,?,00000055,?,-00000050,?,?,?), ref: 004EF395
                            • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,004E46FA,?,?,?,00000055,?,-00000050,?,?), ref: 004EF3CC
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast$CodePageValid
                            • String ID: l#P$utf8
                            • API String ID: 943130320-809511986
                            • Opcode ID: 53751beddf0f29add30e4b8c9b0d0be749bb3d01af86c2fdb52d330de01dacd6
                            • Instruction ID: eefbfebe0c0ac94f196a4656db8ed60cd4dc683e1dd1007efc6304fb651f0396
                            • Opcode Fuzzy Hash: 53751beddf0f29add30e4b8c9b0d0be749bb3d01af86c2fdb52d330de01dacd6
                            • Instruction Fuzzy Hash: DF512731600381AAE725AB738C42BB773A8EF14706F10057BF949972C1F77CDA4886AD
                            APIs
                            • GetCurrentThreadId.KERNEL32(BB40E64E,ios_base::badbit set,?,?,?,00000000,004FAD5D,000000FF,00000000,004D9652), ref: 004DCBF2
                              • Part of subcall function 004DCC88: std::_Throw_Cpp_error.LIBCPMT ref: 004DCCA9
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Cpp_errorCurrentThreadThrow_std::_
                            • String ID: @zP$XiP$ios_base::badbit set
                            • API String ID: 350343453-2396428632
                            • Opcode ID: 989c7c921d9a475d8bf10e0dd208a6991e0799555f4fff343d403228bea3c566
                            • Instruction ID: 79f0a00f3880f6d751f3a9ca53c8a6d37aa183114ebd6cc1d0418044e974354a
                            • Opcode Fuzzy Hash: 989c7c921d9a475d8bf10e0dd208a6991e0799555f4fff343d403228bea3c566
                            • Instruction Fuzzy Hash: 0811D031A106069FDB25DB15C8A1BABB3E5FF44B24F10052FE62A97780DB39AC00CB94
                            APIs
                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,004F55BD,00000000,?,00508370,?,?,?,004F54F4,00000004,InitializeCriticalSectionEx,004FE634,004FE63C), ref: 004F552E
                            • GetLastError.KERNEL32(?,004F55BD,00000000,?,00508370,?,?,?,004F54F4,00000004,InitializeCriticalSectionEx,004FE634,004FE63C,00000000,?,004EA57C), ref: 004F5538
                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 004F5560
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: LibraryLoad$ErrorLast
                            • String ID: api-ms-
                            • API String ID: 3177248105-2084034818
                            • Opcode ID: eaf09f64c9ed4b3fbaec368ed8c3fee1adcde0704df755d449351db2f3d9ff47
                            • Instruction ID: 2c82e5a2dc7bb67bbf91691d6bc1d976ab8ce26de08bd51d35cc59c1bb1f0e76
                            • Opcode Fuzzy Hash: eaf09f64c9ed4b3fbaec368ed8c3fee1adcde0704df755d449351db2f3d9ff47
                            • Instruction Fuzzy Hash: E8E04830680749B7DF101B51EC06B6D3F699B20BD1F144021FB0CA85E0D7699A949648
                            APIs
                            • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 004F292D
                              • Part of subcall function 004EA9E1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,004EC231,?,00000000,-00000008), ref: 004EAA42
                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 004F2B7F
                            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 004F2BC5
                            • GetLastError.KERNEL32 ref: 004F2C68
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                            • String ID:
                            • API String ID: 2112829910-0
                            • Opcode ID: c9797c7ac1608f2e6f186b7e748c04382d19968a191b626a2fba1c7b0eab8b71
                            • Instruction ID: 71f50736f6256c1ce60e59de0d3c518011dae2667852a463323cd04d6762bb00
                            • Opcode Fuzzy Hash: c9797c7ac1608f2e6f186b7e748c04382d19968a191b626a2fba1c7b0eab8b71
                            • Instruction Fuzzy Hash: F5D19CB1D0028C9FCF15CFE8C980AAEBBB4FF09304F24452AE956EB351D674A945CB54
                            APIs
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: AdjustPointer
                            • String ID:
                            • API String ID: 1740715915-0
                            • Opcode ID: 75ee554351fe91715aa87224f2effc3fa475f2c05913598c8355fa2a528af027
                            • Instruction ID: 21702aa65f9150ef87bf89c23691497beca8a7ded748fcc2cc567a92823b717d
                            • Opcode Fuzzy Hash: 75ee554351fe91715aa87224f2effc3fa475f2c05913598c8355fa2a528af027
                            • Instruction Fuzzy Hash: 9651F272A00696AFDB249F53C851FAA77A4FF44702F24452FE8064B3D1E739AC80C798
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D286C
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D288A
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D28AC
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D291A
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Lockitstd::_$Lockit::_Lockit::~_
                            • String ID:
                            • API String ID: 593203224-0
                            • Opcode ID: b7f551833024216c352c84ef8d460e34b21c0a9fff57d9979e96d65696515ce2
                            • Instruction ID: 0cb0cb124828834ae06ad3e97a864ae428ab330123247085ae99d2d51ac607da
                            • Opcode Fuzzy Hash: b7f551833024216c352c84ef8d460e34b21c0a9fff57d9979e96d65696515ce2
                            • Instruction Fuzzy Hash: 9F21AD71E082049FC710FF26E965A2A73E0FF68724F05859FE4888B361D778AD04DB96
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D6B0C
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D6B2A
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D6B4C
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D6BBA
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Lockitstd::_$Lockit::_Lockit::~_
                            • String ID:
                            • API String ID: 593203224-0
                            • Opcode ID: 0b83e36defab8530a9beb017d04967cc7279b17470bf5c61c4e4321192f631b8
                            • Instruction ID: e1a87bc51bf09d7aefbe52b3a92406c7b8f3c596f091787d02c9ed966d70cdac
                            • Opcode Fuzzy Hash: 0b83e36defab8530a9beb017d04967cc7279b17470bf5c61c4e4321192f631b8
                            • Instruction Fuzzy Hash: 21218071D082149FC710EF59E865A1A73E4EF68724F06445FE4888B3A1D738BD44CBC6
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D82AC
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D82CA
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D82EC
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D835A
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Lockitstd::_$Lockit::_Lockit::~_
                            • String ID:
                            • API String ID: 593203224-0
                            • Opcode ID: 4ba4bbfa3fe7cdd75acd68167e3baa96a11094225fab257e7c3711ed1ae7591c
                            • Instruction ID: a7d560f3c58d3edeb85c4c1b829ec8640c9d26fb777af1295dc7d863f5ac73db
                            • Opcode Fuzzy Hash: 4ba4bbfa3fe7cdd75acd68167e3baa96a11094225fab257e7c3711ed1ae7591c
                            • Instruction Fuzzy Hash: 102171719042049FC714EF19E869A2E77E0FF58714F45855FE8988B361EB39BD04CB8A
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D839C
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D83BA
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D83DC
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D844A
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Lockitstd::_$Lockit::_Lockit::~_
                            • String ID:
                            • API String ID: 593203224-0
                            • Opcode ID: 5bdc87d309066b3cc5307eab6e1c286671fcf9e1cf3198ecd60ceea690963bce
                            • Instruction ID: d463aacbcf180bd3b40ff6f9db1108d6ec03ad28821db689bdd8a13efa992cb4
                            • Opcode Fuzzy Hash: 5bdc87d309066b3cc5307eab6e1c286671fcf9e1cf3198ecd60ceea690963bce
                            • Instruction Fuzzy Hash: AF2182719043159FC711EF19E8A5A2A73E0EF58724F05845FE8888B351EB78BD04CB96
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D547C
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004D549A
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D54BC
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004D552A
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Lockitstd::_$Lockit::_Lockit::~_
                            • String ID:
                            • API String ID: 593203224-0
                            • Opcode ID: 74445aa25653af390b4e6d83a9b98a4c399784bcd7073995ee6287317dadaf50
                            • Instruction ID: e2837ab736cad96ae1924900bc507013a20044c648ea352a47c75c66871449ef
                            • Opcode Fuzzy Hash: 74445aa25653af390b4e6d83a9b98a4c399784bcd7073995ee6287317dadaf50
                            • Instruction Fuzzy Hash: 3821DD71D08604AFC711EF19E965A1A73A0EF68324F01849FE4988B361DB38BD44CB8A
                            APIs
                              • Part of subcall function 004EA9E1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,004EC231,?,00000000,-00000008), ref: 004EAA42
                            • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 004F075A
                            • __dosmaperr.LIBCMT ref: 004F0761
                            • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 004F079B
                            • __dosmaperr.LIBCMT ref: 004F07A2
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                            • String ID:
                            • API String ID: 1913693674-0
                            • Opcode ID: ab4b5b41db4bd27165d644cc5ca155978cfd79cb2b207598a059a8f714e3635a
                            • Instruction ID: 1082dc44f2f3e471ceb9a39e95514d89e1e044c9f44c16bd1272abf1fd8bbcb7
                            • Opcode Fuzzy Hash: ab4b5b41db4bd27165d644cc5ca155978cfd79cb2b207598a059a8f714e3635a
                            • Instruction Fuzzy Hash: D521D671600249AF8B20BF62DC8083BB7E9EF90368750455EFA1597252D738FC40CF99
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 39bc732c6cfe4cc5c1f5f09e89add354da88c0c98bce6bf48b42cc8e38596a5f
                            • Instruction ID: 7072d655e4d89b4abc44a7b3e2f29fa2a06479ab28adea3161c317b1f09520f6
                            • Opcode Fuzzy Hash: 39bc732c6cfe4cc5c1f5f09e89add354da88c0c98bce6bf48b42cc8e38596a5f
                            • Instruction Fuzzy Hash: 6F210471200289AFDB10AFE7CC40C2B77A9EF1036A720461AF935D3241EBB8FC808759
                            APIs
                            • GetEnvironmentStringsW.KERNEL32 ref: 004F1AF4
                              • Part of subcall function 004EA9E1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,004EC231,?,00000000,-00000008), ref: 004EAA42
                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004F1B2C
                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004F1B4C
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                            • String ID:
                            • API String ID: 158306478-0
                            • Opcode ID: 3e310244db88a23f2a5671a9add2601149b1cbc300cd4322aa75e1c52d3906fb
                            • Instruction ID: 4dc4e797f4423d73b689ffdea6501ab0cd87fcd4da7560da5e3194c8fdaac893
                            • Opcode Fuzzy Hash: 3e310244db88a23f2a5671a9add2601149b1cbc300cd4322aa75e1c52d3906fb
                            • Instruction Fuzzy Hash: 2F1104E1A00649FEA71127739C8AC7F699CDEA53A9710012AF60191211FE78AE02967A
                            APIs
                            • __EH_prolog3.LIBCMT ref: 004DCB31
                            • std::_Lockit::_Lockit.LIBCPMT ref: 004DCB3B
                            • int.LIBCPMT ref: 004DCB52
                              • Part of subcall function 004DA613: std::_Lockit::_Lockit.LIBCPMT ref: 004DA624
                              • Part of subcall function 004DA613: std::_Lockit::~_Lockit.LIBCPMT ref: 004DA63E
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004DCBAC
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                            • String ID:
                            • API String ID: 1383202999-0
                            • Opcode ID: 70eb3cbba3245cd055eeb35abeb2c9fc1d75b4797798b9df16fff1380ff95c16
                            • Instruction ID: b58540ce8f42e61d2f473db64540728e367d6cb40ef280ed45c03d191be22e5e
                            • Opcode Fuzzy Hash: 70eb3cbba3245cd055eeb35abeb2c9fc1d75b4797798b9df16fff1380ff95c16
                            • Instruction Fuzzy Hash: D511A031D0411A8BCB04EB61D96566DB761AF44718F25444FE401AB381CB78BE01DB99
                            APIs
                            • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,004F8EBF,00000000,00000001,00000000,?,?,004F2CBC,?,00000000,00000000), ref: 004F99E7
                            • GetLastError.KERNEL32(?,004F8EBF,00000000,00000001,00000000,?,?,004F2CBC,?,00000000,00000000,?,?,?,004F2602,00000000), ref: 004F99F3
                              • Part of subcall function 004F9A44: CloseHandle.KERNEL32(FFFFFFFE,004F9A03,?,004F8EBF,00000000,00000001,00000000,?,?,004F2CBC,?,00000000,00000000,?,?), ref: 004F9A54
                            • ___initconout.LIBCMT ref: 004F9A03
                              • Part of subcall function 004F9A25: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,004F99C1,004F8EAC,?,?,004F2CBC,?,00000000,00000000,?), ref: 004F9A38
                            • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,004F8EBF,00000000,00000001,00000000,?,?,004F2CBC,?,00000000,00000000,?), ref: 004F9A18
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                            • String ID:
                            • API String ID: 2744216297-0
                            • Opcode ID: 4073fb452acc2bf39f5868661c05f3178dd435da1111e5847a2e4d3732fa01cc
                            • Instruction ID: 5b20afe49dfc811936039094a1e03a836322697f68d661982be1e10f18d9c5ea
                            • Opcode Fuzzy Hash: 4073fb452acc2bf39f5868661c05f3178dd435da1111e5847a2e4d3732fa01cc
                            • Instruction Fuzzy Hash: 01F01C36D00269BBCF262F95EC08A9E3F66FB587A0F044015FA0985170C6368D64EB94
                            APIs
                            • GetSystemTimeAsFileTime.KERNEL32(?), ref: 004DE5D9
                            • GetCurrentThreadId.KERNEL32 ref: 004DE5E8
                            • GetCurrentProcessId.KERNEL32 ref: 004DE5F1
                            • QueryPerformanceCounter.KERNEL32(?), ref: 004DE5FE
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                            • String ID:
                            • API String ID: 2933794660-0
                            • Opcode ID: e791756b3b835d30100d40df8863e0a0c4f9212e42eb2cdf9db7e05af165db5b
                            • Instruction ID: b2c2be6856f36e684330460313926b85f6fe7bbb3a15333f1ea7ee41e01aad43
                            • Opcode Fuzzy Hash: e791756b3b835d30100d40df8863e0a0c4f9212e42eb2cdf9db7e05af165db5b
                            • Instruction Fuzzy Hash: 02F06274D1020EEFCB00DBB4D94999EBBF8FF2C204BA18596E412E7110EB34AB489B50
                            APIs
                            • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,004EA251,?,?,00000000,00000000,00000000,?), ref: 004EA375
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: EncodePointer
                            • String ID: MOC$RCC
                            • API String ID: 2118026453-2084237596
                            • Opcode ID: dbd46ced7b4e4af6fe2edc373a978ac751a1bb37acde68bac7b616e69d039e13
                            • Instruction ID: 76aa1d119a09cf2ea172580756707885b07dd5e2675ba515b66e6f148c651277
                            • Opcode Fuzzy Hash: dbd46ced7b4e4af6fe2edc373a978ac751a1bb37acde68bac7b616e69d039e13
                            • Instruction Fuzzy Hash: C441CC71900249EFCF05DF95CC85AAEBBB2BF48305F18809AF90467251D379AA60CB56
                            APIs
                            • ___except_validate_context_record.LIBVCRUNTIME ref: 004E9E33
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: ___except_validate_context_record
                            • String ID: csm$csm
                            • API String ID: 3493665558-3733052814
                            • Opcode ID: 82567981a993e18aa352cfc9f22eb20de0800df58ab89b47641df18afdb14dd9
                            • Instruction ID: 2fff2e28982cbe03e5135a1c58c0c7653755bd32ac21780e01a49e1b56fee4b5
                            • Opcode Fuzzy Hash: 82567981a993e18aa352cfc9f22eb20de0800df58ab89b47641df18afdb14dd9
                            • Instruction Fuzzy Hash: 9E31C632400295EBCF268F56C8449AB7B65FF09317B14415BF944893E1C37BDC61DB8A
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1656501815.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                            • Associated: 00000002.00000002.1656482697.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656523461.00000000004FB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656538167.0000000000506000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656554330.000000000050B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000002.00000002.1656569840.000000000050D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_4d0000_file.jbxd
                            Similarity
                            • API ID: GetctypeLockitLockit::_std::_
                            • String ID: ios_base::badbit set
                            • API String ID: 2423992667-3882152299
                            • Opcode ID: 94fe182236c10b45dbe6fc4bc07a0929d53270d5a640a83545da43576953c686
                            • Instruction ID: fc5bc6bfb278557a67acd9047ff0110d3beaaad5ef072457ce59ad4125677f90
                            • Opcode Fuzzy Hash: 94fe182236c10b45dbe6fc4bc07a0929d53270d5a640a83545da43576953c686
                            • Instruction Fuzzy Hash: DF31B1B19087848BE3109F25C96531BBBE4AFE5708F04491EF5884B342E7B9E948C7D7

                            Execution Graph

                            Execution Coverage:3.3%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:38.6%
                            Total number of Nodes:83
                            Total number of Limit Nodes:7
                            execution_graph 13314 40a960 13317 40a990 13314->13317 13315 40ae26 13317->13315 13318 439b60 13317->13318 13319 439b73 13318->13319 13320 439b75 13318->13320 13319->13315 13321 439b7a RtlFreeHeap 13320->13321 13321->13315 13322 43b781 13324 43b822 13322->13324 13323 43bace 13324->13323 13326 43b480 LdrInitializeThunk 13324->13326 13326->13323 13327 439b40 13330 43ca60 13327->13330 13329 439b4a RtlAllocateHeap 13331 43ca80 13330->13331 13331->13329 13331->13331 13332 4351c0 13333 4351dd 13332->13333 13335 435219 13333->13335 13336 43b480 LdrInitializeThunk 13333->13336 13336->13333 13337 43b720 GetForegroundWindow 13341 43d320 13337->13341 13339 43b72e GetForegroundWindow 13340 43b74e 13339->13340 13342 43d330 13341->13342 13342->13339 13348 43d920 13349 43d940 13348->13349 13349->13349 13351 43d98e 13349->13351 13354 43b480 LdrInitializeThunk 13349->13354 13352 43da2e 13351->13352 13355 43b480 LdrInitializeThunk 13351->13355 13354->13351 13355->13352 13356 40ce23 CoInitializeSecurity 13357 40d2c5 CoUninitialize 13358 40e062 13357->13358 13359 43bc65 13360 43bc90 13359->13360 13362 43bcde 13360->13362 13366 43b480 LdrInitializeThunk 13360->13366 13363 43bd6f 13362->13363 13367 43b480 LdrInitializeThunk 13362->13367 13365 43bde7 13366->13362 13367->13365 13373 4087f0 13375 4087fc 13373->13375 13374 408979 ExitProcess 13375->13374 13376 408811 GetCurrentProcessId GetCurrentThreadId 13375->13376 13377 408974 13375->13377 13379 408851 GetForegroundWindow 13376->13379 13380 40884b 13376->13380 13386 43b400 13377->13386 13381 4088d8 13379->13381 13380->13379 13381->13377 13385 40cdf0 CoInitializeEx 13381->13385 13389 43ca40 13386->13389 13388 43b405 FreeLibrary 13388->13374 13390 43ca49 13389->13390 13390->13388 13391 43bf91 13393 43bef0 13391->13393 13392 43bff7 13393->13392 13396 43b480 LdrInitializeThunk 13393->13396 13395 43c01d 13396->13395 13397 40ce55 13398 40ce70 13397->13398 13401 436f90 13398->13401 13400 40ceb9 13402 436fc0 CoCreateInstance 13401->13402 13404 437181 SysAllocString 13402->13404 13405 437526 13402->13405 13408 4371fe 13404->13408 13407 437536 GetVolumeInformationW 13405->13407 13415 437558 13407->13415 13409 437516 SysFreeString 13408->13409 13410 437206 CoSetProxyBlanket 13408->13410 13409->13405 13411 437226 SysAllocString 13410->13411 13412 43750c 13410->13412 13414 4372f0 13411->13414 13412->13409 13414->13414 13416 437315 SysAllocString 13414->13416 13415->13400 13419 43733c 13416->13419 13417 4374fa SysFreeString SysFreeString 13417->13412 13418 4374f0 13418->13417 13419->13417 13419->13418 13420 437380 VariantInit 13419->13420 13422 4373d0 13420->13422 13421 4374df VariantClear 13421->13418 13422->13421 13423 434bdc 13424 434bf4 13423->13424 13425 434c09 GetUserDefaultUILanguage 13424->13425

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 436f90-436fb8 1 436fc0-437006 0->1 1->1 2 437008-43701f 1->2 3 437020-43705b 2->3 3->3 4 43705d-43709a 3->4 5 4370a0-4370b2 4->5 5->5 6 4370b4-4370cd 5->6 8 4370d7-4370e2 6->8 9 4370cf 6->9 10 4370f0-437122 8->10 9->8 10->10 11 437124-43717b CoCreateInstance 10->11 12 437181-4371b2 11->12 13 437526-437556 call 43ce00 GetVolumeInformationW 11->13 14 4371c0-4371d4 12->14 18 437560-437562 13->18 19 437558-43755c 13->19 14->14 16 4371d6-437200 SysAllocString 14->16 22 437516-437522 SysFreeString 16->22 23 437206-437220 CoSetProxyBlanket 16->23 21 437587-43758e 18->21 19->18 24 437590-437597 21->24 25 4375a7-4375bf 21->25 22->13 28 437226-43723a 23->28 29 43750c-437512 23->29 24->25 26 437599-4375a5 24->26 27 4375c0-4375d4 25->27 26->25 27->27 30 4375d6-43760f 27->30 31 437240-437261 28->31 29->22 32 437610-437650 30->32 31->31 33 437263-4372e3 SysAllocString 31->33 32->32 34 437652-43767f call 41dc20 32->34 35 4372f0-437313 33->35 39 437680-437688 34->39 35->35 37 437315-43733e SysAllocString 35->37 42 437344-437366 37->42 43 4374fa-43750a SysFreeString * 2 37->43 39->39 41 43768a-43768c 39->41 44 437692-4376a2 call 408070 41->44 45 437570-437581 41->45 49 4374f0-4374f6 42->49 50 43736c-43736f 42->50 43->29 44->45 45->21 47 4376a7-4376ae 45->47 49->43 50->49 52 437375-43737a 50->52 52->49 53 437380-4373c8 VariantInit 52->53 54 4373d0-4373e4 53->54 54->54 55 4373e6-4373f4 54->55 56 4373f8-4373fa 55->56 57 437400-437406 56->57 58 4374df-4374ec VariantClear 56->58 57->58 59 43740c-43741a 57->59 58->49 60 437467 59->60 61 43741c-437421 59->61 62 437469-4374a2 call 407ff0 call 408e90 60->62 63 437446-43744a 61->63 74 4374a4 62->74 75 4374a9-4374b1 62->75 65 437430-437438 63->65 66 43744c-437455 63->66 68 43743b-437444 65->68 69 437457-43745a 66->69 70 43745c-437460 66->70 68->62 68->63 69->68 70->68 71 437462-437465 70->71 71->68 74->75 76 4374b3 75->76 77 4374b8-4374db call 408020 call 408000 75->77 76->77 77->58
                            APIs
                            • CoCreateInstance.OLE32(0044068C,00000000,00000001,0044067C), ref: 00437173
                            • SysAllocString.OLEAUT32(D080DE8F), ref: 004371DB
                            • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00437218
                            • SysAllocString.OLEAUT32(9F4F9D4B), ref: 00437268
                            • SysAllocString.OLEAUT32(E8D216C6), ref: 0043731A
                            • VariantInit.OLEAUT32(.'()), ref: 00437385
                            • VariantClear.OLEAUT32(.'()), ref: 004374E0
                            • SysFreeString.OLEAUT32(?), ref: 00437504
                            • SysFreeString.OLEAUT32(?), ref: 0043750A
                            • SysFreeString.OLEAUT32(00000000), ref: 00437517
                            • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00437552
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: String$AllocFree$Variant$BlanketClearCreateInformationInitInstanceProxyVolume
                            • String ID: !"$"#$%$.'()$.;$>C$C$p*v,${.] ${|
                            • API String ID: 2573436264-264043890
                            • Opcode ID: 7a78478979428ae9a6e1ff4e339a7a4033eb69ce9e06f36cd810f297e7b98f92
                            • Instruction ID: 06fb3ad9466451430b31427f45de08a7eb0daa23bec53a4f5f9458ad790f981b
                            • Opcode Fuzzy Hash: 7a78478979428ae9a6e1ff4e339a7a4033eb69ce9e06f36cd810f297e7b98f92
                            • Instruction Fuzzy Hash: D302F0B1A083009FD320CF64CC81B5BBBE5EB99314F14982DF6C59B3A1D679E805CB96

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 82 40a960-40a989 83 40a990-40a9e5 82->83 83->83 84 40a9e7-40aadf 83->84 85 40aae0-40ab1b 84->85 85->85 86 40ab1d-40ab39 85->86 87 40ab40-40ab69 86->87 87->87 88 40ab6b-40ab86 call 40b6a0 87->88 91 40ae29-40ae32 88->91 92 40ab8c-40ab98 88->92 93 40aba0-40abb2 92->93 93->93 94 40abb4-40abb9 93->94 95 40abc0-40abcc 94->95 96 40abd3-40abe4 95->96 97 40abce-40abd1 95->97 98 40ae20-40ae21 call 439b60 96->98 99 40abea-40abff 96->99 97->95 97->96 102 40ae26 98->102 100 40ac00-40ac41 99->100 100->100 103 40ac43-40ac50 100->103 102->91 104 40ac52-40ac58 103->104 105 40ac84-40ac88 103->105 108 40ac67-40ac6b 104->108 106 40ae1e 105->106 107 40ac8e-40acb6 105->107 106->98 109 40acc0-40acf4 107->109 108->106 110 40ac71-40ac78 108->110 109->109 111 40acf6-40acff 109->111 112 40ac7a-40ac7c 110->112 113 40ac7e 110->113 116 40ad01-40ad0b 111->116 117 40ad34-40ad36 111->117 112->113 114 40ac60-40ac65 113->114 115 40ac80-40ac82 113->115 114->105 114->108 115->114 118 40ad17-40ad1b 116->118 117->106 119 40ad3c-40ad52 117->119 118->106 120 40ad21-40ad28 118->120 121 40ad60-40adb2 119->121 123 40ad2a-40ad2c 120->123 124 40ad2e 120->124 121->121 122 40adb4-40adbe 121->122 125 40adc0-40adc8 122->125 126 40adf4-40adf8 122->126 123->124 127 40ad10-40ad15 124->127 128 40ad30-40ad32 124->128 129 40add7-40addb 125->129 130 40adfe-40ae1c call 40a6d0 126->130 127->117 127->118 128->127 129->106 131 40addd-40ade4 129->131 130->98 133 40ade6-40ade8 131->133 134 40adea-40adec 131->134 133->134 136 40add0-40add5 134->136 137 40adee-40adf2 134->137 136->129 138 40adfa-40adfc 136->138 137->136 138->106 138->130
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: #xDz$'D F$A|}~$N[\D$N[\D$kl$n
                            • API String ID: 0-490458541
                            • Opcode ID: d47076afbd05a78a046f2f951199cb1dbd1ea0c989cd37d394d3fd4149bb2193
                            • Instruction ID: 966b8f91f76bb20883ed88500b6b89ab0c93423946d56f050922860fedc986fe
                            • Opcode Fuzzy Hash: d47076afbd05a78a046f2f951199cb1dbd1ea0c989cd37d394d3fd4149bb2193
                            • Instruction Fuzzy Hash: D7C1267260C3504BC714CF6488905AFBBD3ABC2304F1E893DE9D56B382D679991AC78B

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 139 40ce55-40ce62 140 40ce70-40ce9b 139->140 140->140 141 40ce9d-40ced5 call 408720 call 436f90 140->141 146 40cee0-40cf06 141->146 146->146 147 40cf08-40cf6b 146->147 148 40cf70-40cfa7 147->148 148->148 149 40cfa9-40cfba 148->149 150 40cfc0-40cfcb 149->150 151 40d03d 149->151 152 40cfd0-40cfd9 150->152 153 40d041-40d049 151->153 152->152 154 40cfdb 152->154 155 40d05b-40d068 153->155 156 40d04b-40d04f 153->156 154->153 158 40d06a-40d071 155->158 159 40d08b-40d093 155->159 157 40d050-40d059 156->157 157->155 157->157 160 40d080-40d089 158->160 161 40d095-40d096 159->161 162 40d0ab-40d1c6 159->162 160->159 160->160 163 40d0a0-40d0a9 161->163 164 40d1d0-40d215 162->164 163->162 163->163 164->164 165 40d217-40d239 164->165 166 40d240-40d250 165->166 166->166 167 40d252-40d27f call 40b6a0 166->167 169 40d284-40d29e 167->169
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: 333480F93FDFE8E623D904AF30EFEBBC$F^$I@$N~ :$VgfW$drive-connect.cyou$z@(
                            • API String ID: 0-4180455030
                            • Opcode ID: 12efaed7f1b54f12da6bbf58353711d555d00ce7dd5b906222aedfdf9b1c7be8
                            • Instruction ID: b1d760c26d9b90ec4573806c6615211f8657e28aa76e89aec63d6860f5017e85
                            • Opcode Fuzzy Hash: 12efaed7f1b54f12da6bbf58353711d555d00ce7dd5b906222aedfdf9b1c7be8
                            • Instruction Fuzzy Hash: A191EEB05083C18BD335CF25D8A0BEBBBE0AB96314F148D6DD4DD9B282D738454ACB96

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 170 4087f0-4087fe call 43afd0 173 408804-40880b call 434680 170->173 174 408979-40897b ExitProcess 170->174 177 408811-408849 GetCurrentProcessId GetCurrentThreadId 173->177 178 408974 call 43b400 173->178 180 408851-4088d6 GetForegroundWindow 177->180 181 40884b-40884f 177->181 178->174 182 408950-408968 call 409cc0 180->182 183 4088d8-40894e 180->183 181->180 182->178 186 40896a call 40cdf0 182->186 183->182 188 40896f call 40b670 186->188 188->178
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: CurrentProcess$ExitForegroundThreadWindow
                            • String ID: YO9W
                            • API String ID: 3118123366-386669604
                            • Opcode ID: 81875feee291dd51c94163340b3786e966dc5896524b3e4d2eaf5977dbc455ff
                            • Instruction ID: 5b12a659e8285d1355c3597aa5681aa9478bfa7506ef17589c1493984f4e9e7d
                            • Opcode Fuzzy Hash: 81875feee291dd51c94163340b3786e966dc5896524b3e4d2eaf5977dbc455ff
                            • Instruction Fuzzy Hash: 98315977F5061807C31C7AB98C4636AB5874BC4614F0F863E9DD9AB386FDB89C0442D9

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 239 43b480-43b4b2 LdrInitializeThunk
                            APIs
                            • LdrInitializeThunk.NTDLL(0043D4FB,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043B4AE
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID:
                            • API String ID: 2994545307-0
                            • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                            • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                            • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                            • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 267 409cc0-409cdf 268 409ce0-409cfa 267->268 268->268 269 409cfc-409d37 268->269 270 409d40-409d69 269->270 270->270 271 409d6b-409d72 270->271 272 409d75-409d98 call 43af90 271->272
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: \U^_
                            • API String ID: 0-352632802
                            • Opcode ID: b233260ff75ba58cbb536c0014e0eb0df055bc4e14581868770786c388d706bb
                            • Instruction ID: 5fa690bb4235e6f9a1b833386d74a381627e7adb8b1be8a89cbf23ee07b36487
                            • Opcode Fuzzy Hash: b233260ff75ba58cbb536c0014e0eb0df055bc4e14581868770786c388d706bb
                            • Instruction Fuzzy Hash: D011E23060C3808FD324DF3495549ABBBA5EFD7748F545A2CE4C56B281C735980A8FAA

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 214 434bdc-434c05 call 43ce00 218 434c07 214->218 219 434c09-434c49 GetUserDefaultUILanguage 214->219 218->219
                            APIs
                            • GetUserDefaultUILanguage.KERNELBASE ref: 00434C09
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: DefaultLanguageUser
                            • String ID: t
                            • API String ID: 95929093-2238339752
                            • Opcode ID: 3fa4c25dce8568a0724ebcbfa99840aa77e9227c5342f76fc488d9eef6af0589
                            • Instruction ID: 08a8b9a0e37a212ebea7de5d04b95149eac63241ee44ff142c93878423301f38
                            • Opcode Fuzzy Hash: 3fa4c25dce8568a0724ebcbfa99840aa77e9227c5342f76fc488d9eef6af0589
                            • Instruction Fuzzy Hash: 53F0FF34808298CFDB10DF68D4943EEBBF16F66304F1880ACC08497382D37A9A84CB12

                            Control-flow Graph

                            APIs
                            • GetForegroundWindow.USER32 ref: 0043B720
                            • GetForegroundWindow.USER32 ref: 0043B740
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: ForegroundWindow
                            • String ID:
                            • API String ID: 2020703349-0
                            • Opcode ID: a4781643aa2d8fd57512208f1c3e62aa4b8d5176cb57333a04816d28865289df
                            • Instruction ID: 191facca889f69fa70601903ca8693053aaba1cbaba24685dbffd0b384c421fe
                            • Opcode Fuzzy Hash: a4781643aa2d8fd57512208f1c3e62aa4b8d5176cb57333a04816d28865289df
                            • Instruction Fuzzy Hash: 7ED0A7FDD20110EBC604AB71FC4A41B3A1AEB4722DB545539EC0343352DA39782E868F

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 232 40cdf0-40ce20 CoInitializeEx
                            APIs
                            • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040CE03
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: Initialize
                            • String ID:
                            • API String ID: 2538663250-0
                            • Opcode ID: 61d928746ba4ae58ea54a0875f1c3d0382ed5290a25c5d8e3ced17899992ccae
                            • Instruction ID: f1973b7854016afe0481596635c710bb103935c4c1c993b3491e04eff0e8badb
                            • Opcode Fuzzy Hash: 61d928746ba4ae58ea54a0875f1c3d0382ed5290a25c5d8e3ced17899992ccae
                            • Instruction Fuzzy Hash: 01D0A7345545486BD250A75CDD0BF563A5C9703B29F400239B763D61D1D9506920C669

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 233 40ce23-40ce52 CoInitializeSecurity
                            APIs
                            • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CE35
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: InitializeSecurity
                            • String ID:
                            • API String ID: 640775948-0
                            • Opcode ID: 9269880a45a3c80f6ec8299234c73a1314589920fa48725fb3d67ea21efaca66
                            • Instruction ID: 9bb2948b1e33ad1240181575e0f5375bfb099cf60bc3df2fdc322b3d55e14239
                            • Opcode Fuzzy Hash: 9269880a45a3c80f6ec8299234c73a1314589920fa48725fb3d67ea21efaca66
                            • Instruction Fuzzy Hash: CAD0C9343D83007AF5748B48ED53F1432169702F11FB00629F322FE6D4C9E07121861D

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 234 439b60-439b6c 235 439b73-439b74 234->235 236 439b75-439b87 call 43ca60 RtlFreeHeap 234->236
                            APIs
                            • RtlFreeHeap.NTDLL(?,00000000,00000000,00412F5C), ref: 00439B80
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: FreeHeap
                            • String ID:
                            • API String ID: 3298025750-0
                            • Opcode ID: d0720c9dfbe2666778a34d5469e5ae55c8d5964329e0fb1cba2b62a2f878fbc3
                            • Instruction ID: 8d81dc3d2e1c71e2762f942217139477682170591cb2c618f1865e02491f5b7e
                            • Opcode Fuzzy Hash: d0720c9dfbe2666778a34d5469e5ae55c8d5964329e0fb1cba2b62a2f878fbc3
                            • Instruction Fuzzy Hash: 76D0C935505126EBCA506B28BC15BC73A989F4A671F0708A1B4006A075C765EC919AD8

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 240 439b40-439b57 call 43ca60 RtlAllocateHeap
                            APIs
                            • RtlAllocateHeap.NTDLL(?,00000000,?,?,00414E57,00000400), ref: 00439B50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: AllocateHeap
                            • String ID:
                            • API String ID: 1279760036-0
                            • Opcode ID: a95155655fbe3eb8f0e77a05497d8175f8be12db265ae77d37b3e7249a9ffdc4
                            • Instruction ID: 3d340f236624c1ae318c051adf9ea47d82c8c11c3707c94fc3fa8f772c7fe72e
                            • Opcode Fuzzy Hash: a95155655fbe3eb8f0e77a05497d8175f8be12db265ae77d37b3e7249a9ffdc4
                            • Instruction Fuzzy Hash: 91C04831145224ABDA10AB15EC09B8A3AA8AF496A1F1A04A6B005660B28760AC929A98
                            APIs
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: Uninitialize
                            • String ID:
                            • API String ID: 3861434553-0
                            • Opcode ID: 5707253a0f4c189d33386fe30951e2cae249061f9284b9e86972a201113a272f
                            • Instruction ID: aa1ebcc13e0591ffa587ed879dc96101c66d2de581aeeee77924bd980006153c
                            • Opcode Fuzzy Hash: 5707253a0f4c189d33386fe30951e2cae249061f9284b9e86972a201113a272f
                            • Instruction Fuzzy Hash: 1AB0923AA1A015DE8A0047A5B8480D8F360E6882A67508873E31AE2010D231113A4656
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: MetricsSystem
                            • String ID: $&)C$;(C$="C$="C$="C$="C$="C$="C$="C$="C$="C$="C$="C$="C$="C$="C$="C$="C$="C$="C$='C$S%C$b(C$#C
                            • API String ID: 4116985748-628680385
                            • Opcode ID: c4360614f8f82c5e27f19abdd04c6f864ef0af49341f313285d7bdd33a848109
                            • Instruction ID: ea45c71986b2e534ecec44a4126f62931ddcc8577b73b097e58ed3aa899a90b6
                            • Opcode Fuzzy Hash: c4360614f8f82c5e27f19abdd04c6f864ef0af49341f313285d7bdd33a848109
                            • Instruction Fuzzy Hash: 41B16FB04097818FE771DF14D48879BBBE0BBC5308F508A2EE5E89B251CBB95448CF86
                            APIs
                              • Part of subcall function 0043B480: LdrInitializeThunk.NTDLL(0043D4FB,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043B4AE
                            • FreeLibrary.KERNEL32(?), ref: 0041A21A
                            • FreeLibrary.KERNEL32(?), ref: 0041A29B
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: FreeLibrary$InitializeThunk
                            • String ID: I,~M$PQ$cba`$cba`$cba`$wEtG
                            • API String ID: 764372645-3803835663
                            • Opcode ID: 47063c938c01330124c9dc59b6d375a3b8a360990f39732c0e3748d67b9dcd4f
                            • Instruction ID: ce701afe96e54189f6fff091c8333c98f5ae15aa60c98f01a083bef101dadeb2
                            • Opcode Fuzzy Hash: 47063c938c01330124c9dc59b6d375a3b8a360990f39732c0e3748d67b9dcd4f
                            • Instruction Fuzzy Hash: C59235746093409FE714CF65D891B6BBBE2EBD5300F28882EE58487391D7799C81CB9B
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: z%|$"r,t$&f?x$3v#H$<b"d$=j9l$cba`$cba`$Z\$^P
                            • API String ID: 0-3047316687
                            • Opcode ID: 45c83a3ddc5386c7eaecb6d0721308efe7616dc8ac7a87c6f5778f813dbd46f5
                            • Instruction ID: 146473404e5499b4986dffa8d26f26e1c07bf5215faae6f3d7194190b628d0b4
                            • Opcode Fuzzy Hash: 45c83a3ddc5386c7eaecb6d0721308efe7616dc8ac7a87c6f5778f813dbd46f5
                            • Instruction Fuzzy Hash: C2D124B9608380DFE324DF15E88176BB7E1FBD5304F94982DE58587261D738D901CB4A
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: #R,T$$^<P$VW$]~"p$ij$KM
                            • API String ID: 0-788320361
                            • Opcode ID: 0ef6ac19612ecc2b18e822a80ca420e4bb8027dd0eadc437e0bac95af6737912
                            • Instruction ID: 9ed236048ece28067beed024fb633757567cd4a7e3bca11c75bb2a7735f0e68b
                            • Opcode Fuzzy Hash: 0ef6ac19612ecc2b18e822a80ca420e4bb8027dd0eadc437e0bac95af6737912
                            • Instruction Fuzzy Hash: D1F1CAB46083509FD310DF65E88262BBBF1EFD5304F44892DE4958B351EB789A06CB4B
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                            • String ID: K
                            • API String ID: 2832541153-856455061
                            • Opcode ID: 027abc228ed841da0674a97a3735ab7f080d79d715808bd082ae78d0cbe3e8e1
                            • Instruction ID: 513562b2ac7e6d1d4712994eff6d7c1bc04b9d90a7c3137532ed1f51a9abc6ba
                            • Opcode Fuzzy Hash: 027abc228ed841da0674a97a3735ab7f080d79d715808bd082ae78d0cbe3e8e1
                            • Instruction Fuzzy Hash: 34418E6150C7818ED310AF7C988826FBFE09B96224F044A6EE8E5872D2E6389549C797
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: );?g$9nI9$;>*2$='0{$[93=$cba`$fa
                            • API String ID: 0-154584671
                            • Opcode ID: 3e51a02978bc99ce7d016768a4801fe2a924607298026115374562d3702a8947
                            • Instruction ID: 21be1e4f2e6752f9380b4aadbcf4cd787e7e0f4b09ea5b297d7e9ef9a1fb0c4b
                            • Opcode Fuzzy Hash: 3e51a02978bc99ce7d016768a4801fe2a924607298026115374562d3702a8947
                            • Instruction Fuzzy Hash: 3FC1077560C3A08FC3118F29D89066BBBE2AF96310F588A6DF4E1573D2C7398D45CB5A
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: #$0$AGsW$P$k
                            • API String ID: 0-1629916805
                            • Opcode ID: a92c176f258902a07af39c1f8e4a41f6c7503ef90e7a1abad74dc0064dca0dbd
                            • Instruction ID: 8816b6b3b95a3b8c405e0a0f8c285763547ceed8af8c8b555c70c7a9f783aa76
                            • Opcode Fuzzy Hash: a92c176f258902a07af39c1f8e4a41f6c7503ef90e7a1abad74dc0064dca0dbd
                            • Instruction Fuzzy Hash: 1CC1F4317183918ED328CF39D4513ABBBD2AFD2304F68866ED4D58B2D1D6798449C71B
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: ){+}$4cde$CJ$F'k)$GS
                            • API String ID: 0-4192230409
                            • Opcode ID: 5de04a91f599762488a7f1befa48500976ff1de46b0c1ed8ec4e4c363fac47c6
                            • Instruction ID: 6afdb2316fdadaf12e32bd698f1912d34734f08b0bc4a82971b76fff6b28e520
                            • Opcode Fuzzy Hash: 5de04a91f599762488a7f1befa48500976ff1de46b0c1ed8ec4e4c363fac47c6
                            • Instruction Fuzzy Hash: 50B11BB84053058FE354DF629688FAA7BB0FB25310F1A82E9E0992F776D7748405CF96
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: FreeLibrary
                            • String ID: 3$qjjw
                            • API String ID: 3664257935-3235754969
                            • Opcode ID: 3641d3b1d95d9d0e2252580d4e70a4747529bd2a480d62c0a42bd322f018f1c7
                            • Instruction ID: e0248e225440bb7285b8803733d60271f7e61eb44642cbaa2f092a8799675a72
                            • Opcode Fuzzy Hash: 3641d3b1d95d9d0e2252580d4e70a4747529bd2a480d62c0a42bd322f018f1c7
                            • Instruction Fuzzy Hash: 29A16C717083919BE7248F24C8917ABBBD2EFD2340F18856ED5C94B3C6DB384405D796
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: 1/3T$WL$^Q$neA
                            • API String ID: 0-3205570823
                            • Opcode ID: ba18f0a771fe5c943f6b46e4d9dfc1ae68c5ab374dcf48f97578f812035a9b14
                            • Instruction ID: 36620dcd79f832a97b090e2ed89ea61b800e286945c25bf48684ec17d430fe28
                            • Opcode Fuzzy Hash: ba18f0a771fe5c943f6b46e4d9dfc1ae68c5ab374dcf48f97578f812035a9b14
                            • Instruction Fuzzy Hash: A9D1CEB4100B01CFD7258F25C8A1BA3BBB1FF86314F19858DC8964F7A2D779A855CB94
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID: 4zVc$8zVc$YNMZ$cba`
                            • API String ID: 2994545307-1799417857
                            • Opcode ID: eaf66d541d549ce35d0b7173bc81318c446716c3833972a3082171e3945cfb6b
                            • Instruction ID: a4538a0261ff6c2ac210d57fc6ac5424e6a326b8b8d8802f404cc31a7d59ec03
                            • Opcode Fuzzy Hash: eaf66d541d549ce35d0b7173bc81318c446716c3833972a3082171e3945cfb6b
                            • Instruction Fuzzy Hash: 189147B2F042208BD724DA25EC8172B7292EBD1314F5A857EEC8597342E678AC00C7DA
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: FreeLibrary
                            • String ID: x
                            • API String ID: 3664257935-2363233923
                            • Opcode ID: 212c4427347d00bc0ab6c4fd254bb844e7ef8bf1701165750c227f18fd5959f2
                            • Instruction ID: f24e0535182122329204161442b6cb3576d9d8656e0dc52521a12abdc108ad65
                            • Opcode Fuzzy Hash: 212c4427347d00bc0ab6c4fd254bb844e7ef8bf1701165750c227f18fd5959f2
                            • Instruction Fuzzy Hash: EFD1B46060C3E08ED7358B2994903BFBBD1AFD7344F5849ADD0C99B282D779450ACB57
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: B:@<$F>?0
                            • API String ID: 0-4011826714
                            • Opcode ID: db013f8bcd791390b44068821e0592b044049136823266e2a0b8e4940e29ff84
                            • Instruction ID: 92ed06d7aa227fc4673e4b6d33fedd1ff2714f2f2b1d0eb8acbab6dee258af69
                            • Opcode Fuzzy Hash: db013f8bcd791390b44068821e0592b044049136823266e2a0b8e4940e29ff84
                            • Instruction Fuzzy Hash: E43256B1A00721CBCB24CF24C892267BBB1FF92310F59825DD8825F796E779A851CBD5
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: '$iJ
                            • API String ID: 0-30662343
                            • Opcode ID: 5f8335f824c18f5e14225d200a316fb8f8740858805ddfb73ef0b7ad87012508
                            • Instruction ID: e8033de2897f6a471e39d6e72682695b514e130b01bc458e21cc2d5cc8d806b0
                            • Opcode Fuzzy Hash: 5f8335f824c18f5e14225d200a316fb8f8740858805ddfb73ef0b7ad87012508
                            • Instruction Fuzzy Hash: 7C02F57060C3E18FD7298F2990A03ABBFE1AF97304F58496ED4D997342D77984058B97
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: =UA$cba`
                            • API String ID: 0-2849403845
                            • Opcode ID: ac233faae9877bc3ddc3a70347ef5b8a5b0ef2ad5a4fd7cdd570c427d15c7cae
                            • Instruction ID: b0755fcd4efdf1967727a5f4be91126eb1e252dcdfc562f5600afc0ab194aa5f
                            • Opcode Fuzzy Hash: ac233faae9877bc3ddc3a70347ef5b8a5b0ef2ad5a4fd7cdd570c427d15c7cae
                            • Instruction Fuzzy Hash: 9402FE34608300EFD7149F24D962BABB7B1FB9A304F94582DF481972A2D775EC45CB8A
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: TU$c!"
                            • API String ID: 0-3813282519
                            • Opcode ID: 757f52760972d6ea7efb3a276aabc71b80904803bdd1bf2a89c12d688fe9e935
                            • Instruction ID: a4d5b8c078bf2433dc24120fb7555f1f32600d90c3be649242fb2c546733d6d2
                            • Opcode Fuzzy Hash: 757f52760972d6ea7efb3a276aabc71b80904803bdd1bf2a89c12d688fe9e935
                            • Instruction Fuzzy Hash: 27C16672B04310ABD714DB29ED5277BB3E2EFD5314F48852EE88587381E6BCE801875A
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: pr$|~
                            • API String ID: 0-4145297803
                            • Opcode ID: ee8a3b8d263e0e2bc6467c896304b100a01db44200932090249312cc29dfec84
                            • Instruction ID: 1c71e515e24bd4364ede3925d09e369eeeaf8989eca5e2d791649c7508655d54
                            • Opcode Fuzzy Hash: ee8a3b8d263e0e2bc6467c896304b100a01db44200932090249312cc29dfec84
                            • Instruction Fuzzy Hash: E451F0B0A0C3509BD7008F24D8127ABB7F1EF92319F1885AEE4C55B391E7399642CB5E
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: pr$|~
                            • API String ID: 0-4145297803
                            • Opcode ID: 1cbfd2780bc33f3a437b09008cb0e627c906c1623d91543066de9fab292285fd
                            • Instruction ID: b30244ed6a2ff3de417c81c30de102dda9fa652a451c4e072b4a3ececf8c80cf
                            • Opcode Fuzzy Hash: 1cbfd2780bc33f3a437b09008cb0e627c906c1623d91543066de9fab292285fd
                            • Instruction Fuzzy Hash: B751F4B460C3509BD7009F24C8126ABB7F1EF92315F1885ADE4C55B391E739D642CB5E
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: BLJB$X
                            • API String ID: 0-2222927247
                            • Opcode ID: 85d985c10c38fb94c5f45cecc72a4b56871a758ab7e71e90a7e49e993c96917b
                            • Instruction ID: 1af2eb929763e148cb4abff1c4585c52a2657f08fe5d59f4d12d45bf37d2de30
                            • Opcode Fuzzy Hash: 85d985c10c38fb94c5f45cecc72a4b56871a758ab7e71e90a7e49e993c96917b
                            • Instruction Fuzzy Hash: 13515531708B618BD730DE6894412FBBBE1DF55350F984A3ED8D987382E23CA545E74A
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: H.s $ij
                            • API String ID: 0-4017226643
                            • Opcode ID: 2cb1b7f925fbc6c9f7264a4edce0ffabfea3ec399ad5ab8651c95cdd20c1a345
                            • Instruction ID: ae217f9daa6f4cce8b7d259f4259de876ba9e86de0ba8af5ed87a71d833a3b47
                            • Opcode Fuzzy Hash: 2cb1b7f925fbc6c9f7264a4edce0ffabfea3ec399ad5ab8651c95cdd20c1a345
                            • Instruction Fuzzy Hash: 0F31DEB260D3908FD314CF65D48165FBBE2EBC6704F55892DE4C56B340CBB49906CB46
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID: 1/3T
                            • API String ID: 2994545307-3266294232
                            • Opcode ID: db788342ad88ef6c488a899aa4db307fe01876e7341283b38dbf2834c16ac000
                            • Instruction ID: ff65059a960126ae2aa6a0ba82ae0d71c7a8e5e6bd522a8814a62b27b48fd42c
                            • Opcode Fuzzy Hash: db788342ad88ef6c488a899aa4db307fe01876e7341283b38dbf2834c16ac000
                            • Instruction Fuzzy Hash: 37F1E134204741CFE7258F29D891BB3BBA2FB5A301F1945ADD5D68B392C739E881CB58
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: x
                            • API String ID: 0-2363233923
                            • Opcode ID: dd7dd52a73c17c107c662ee8ca0c022aa0f15367076f24ecb02be622242e9914
                            • Instruction ID: cbfe56490d4610b99627c39bd120223bdbde8b4c29662e55905f397c0fd00549
                            • Opcode Fuzzy Hash: dd7dd52a73c17c107c662ee8ca0c022aa0f15367076f24ecb02be622242e9914
                            • Instruction Fuzzy Hash: 1AD1176060C7E18ED7358B2894903BFBBD1AF97344F5849AED0D54B382D739940AC797
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: &tB
                            • API String ID: 0-268467982
                            • Opcode ID: ab8b9b4babc4c53dd273e945744bbaef1afa28ee0cdd2d4e334d85f9a15f2521
                            • Instruction ID: 06a34f82c29db43340e48ad1cbe7e395302b1ddd3c50ea808075b5b9ec83bf05
                            • Opcode Fuzzy Hash: ab8b9b4babc4c53dd273e945744bbaef1afa28ee0cdd2d4e334d85f9a15f2521
                            • Instruction Fuzzy Hash: C5E169B5A083618FC7109F14E45136BB7E1AFDA304F0A486EE8C597342D639ED45CB9B
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: "
                            • API String ID: 0-123907689
                            • Opcode ID: 4abfa2479a0e4305d02d5d5ee4678300abeb872efe24ce69da09627c08f165b8
                            • Instruction ID: f813c1fc85afd7223dda0e36a8c027de47e21e6ca96e88e37e758e8b14c45e64
                            • Opcode Fuzzy Hash: 4abfa2479a0e4305d02d5d5ee4678300abeb872efe24ce69da09627c08f165b8
                            • Instruction Fuzzy Hash: 03C113B2B043215BD7149E25E44076BB7E5AF84310F59892FEC9687382E738DC59C78B
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID: @CDE
                            • API String ID: 2994545307-1513065382
                            • Opcode ID: cbdfbb28d977ac1ea6b7f73f0ada9322f454d3da5a8c62154e5dc83033fd8ee1
                            • Instruction ID: 3c5ac0be7424b57116813a4f2293c38aabf5a2246835f37d4781b8179357b19c
                            • Opcode Fuzzy Hash: cbdfbb28d977ac1ea6b7f73f0ada9322f454d3da5a8c62154e5dc83033fd8ee1
                            • Instruction Fuzzy Hash: EFB146717493414BC318DB2AC8D1A3BBBE6ABE9314F1CD93DE58687392C638DC058796
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: RuA
                            • API String ID: 0-3286949753
                            • Opcode ID: d354970e6102b2f6e14b23a1e4f96fce490ba8160eb9c464f18d88e9fbdd3b3e
                            • Instruction ID: 812d55878a62f6fab66defe66c88ae53172d99736bf38563795d352ae53827f1
                            • Opcode Fuzzy Hash: d354970e6102b2f6e14b23a1e4f96fce490ba8160eb9c464f18d88e9fbdd3b3e
                            • Instruction Fuzzy Hash: 8CB10234208701CFE7258F29D851B73B7F2EB4A711F1489ADD4968B392D738A882CB58
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: x%
                            • API String ID: 0-3980080454
                            • Opcode ID: 21b534372c422996cba93c7f3a0046e52d28a6e1f65226b4000f06bfaeed42f9
                            • Instruction ID: 53925fe815e81de9676dfe4c3668865c11de61aed011eb2c10e86570e61a59d5
                            • Opcode Fuzzy Hash: 21b534372c422996cba93c7f3a0046e52d28a6e1f65226b4000f06bfaeed42f9
                            • Instruction Fuzzy Hash: 7BA145B1604320ABCB10DF24DC91B6777E4FF94358F08492DEA858B391E7B9E905C766
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: "
                            • API String ID: 0-123907689
                            • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                            • Instruction ID: 1b0d155936ea343f35509df964668f6b6c6c9246b28269455b7de3af52c0cfb1
                            • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                            • Instruction Fuzzy Hash: D271E632B183254BD714CE28E58031BBBE3ABC5710F99856EE9949B391D238EC55C78B
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: tuv
                            • API String ID: 0-2475268160
                            • Opcode ID: 832319e91b6d4892eeb44864a439925f3f6d3c4679f0fc0c8248a51ed8917232
                            • Instruction ID: 96cc1be5c7b42f4822ccf6fdabcc1d0a1cf8542e79077bfe6f2257edbdd6f4ef
                            • Opcode Fuzzy Hash: 832319e91b6d4892eeb44864a439925f3f6d3c4679f0fc0c8248a51ed8917232
                            • Instruction Fuzzy Hash: 2B6133B6604700CFC7208F24D8923A3B3F2FF96318F18456EE996477A1E739A945C759
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: 1_B
                            • API String ID: 0-2132359058
                            • Opcode ID: ebd4713a8c839dd888d4ddf57068d90824b288b6a5d2fb2c475a76c4d08f8f2d
                            • Instruction ID: 5b09de0f708086b2db089408e795921656c95d083517461b5049a84f32a7c51a
                            • Opcode Fuzzy Hash: ebd4713a8c839dd888d4ddf57068d90824b288b6a5d2fb2c475a76c4d08f8f2d
                            • Instruction Fuzzy Hash: D8415972D09B7487C230DA64A81017BB6D5DB85310F9A847FF9C697342EB38AD01A7CA
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: CUUI
                            • API String ID: 0-173970609
                            • Opcode ID: 11d751ef2c6838004d4261e70f5839909a1e0ffe6a220f83fd188cfbbc9468dc
                            • Instruction ID: 633f9cfe08b78efd1148aada0c0c4a0bea52aba14bf5254293374e99ea80dff2
                            • Opcode Fuzzy Hash: 11d751ef2c6838004d4261e70f5839909a1e0ffe6a220f83fd188cfbbc9468dc
                            • Instruction Fuzzy Hash: 9541E7A020C7E08ADB358F2594903ABBBE1DFD3304F5884ADC6C56B243C77988068B5A
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID: @
                            • API String ID: 2994545307-2766056989
                            • Opcode ID: a54cd9664649f0a3eb3b986b2c8d66ddc9897b79c163bf161da4d5756e812fe2
                            • Instruction ID: 1421818bc4f15c0d032df179158ed2797c8d4970c2420d5e39c05150b2e3af5d
                            • Opcode Fuzzy Hash: a54cd9664649f0a3eb3b986b2c8d66ddc9897b79c163bf161da4d5756e812fe2
                            • Instruction Fuzzy Hash: C33100B15183048BC314DF18E8C162BBBF8FB9A314F15A92DE68687391D3759908CB9A
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID: cba`
                            • API String ID: 2994545307-1926275841
                            • Opcode ID: e363ae243e25186fafc727a7c143fe84283cddf713b74be5aabea9aa04b6da8b
                            • Instruction ID: beb69707a00ddb1e0f288a180930159145dfafadf277c1aff9f3426dfcb85bde
                            • Opcode Fuzzy Hash: e363ae243e25186fafc727a7c143fe84283cddf713b74be5aabea9aa04b6da8b
                            • Instruction Fuzzy Hash: 47113536A44B204BC324CE289DC163777E1AB95314F95263DDCA9D33A1E278EC009AD9
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b4f2b084faef48d893cec2519f241ff843f37aefc35a02b9a69ce986de1685e5
                            • Instruction ID: af49202ca076376fa415bca2a3091a328854806cafe53c7e33487b358e5641c5
                            • Opcode Fuzzy Hash: b4f2b084faef48d893cec2519f241ff843f37aefc35a02b9a69ce986de1685e5
                            • Instruction Fuzzy Hash: 9722B332A087118BD725DF18D9806ABB3E1BFC4319F19893ED986A7385D738B851CB47
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 86b120d65a92fc5bdbbef3624e805ea907a676f62533a2aebf6e078355a3b7f7
                            • Instruction ID: a0fb517757f1b8da7777bae7579d9f52a382c29ac2183c4fd28747a7d9f1db1e
                            • Opcode Fuzzy Hash: 86b120d65a92fc5bdbbef3624e805ea907a676f62533a2aebf6e078355a3b7f7
                            • Instruction Fuzzy Hash: F402127AB04216CFC704CF28E8906AAB7F2FB8A311F1A847ED58593351D734AD55CB86
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d076b9d010211f014a59fe34b7121c93ea0654b322b9de3976980b709a020c0e
                            • Instruction ID: 0188f3e029ce03e8205a7a452b25b6dbd5bcd661a0513372e50984eaaf58ab41
                            • Opcode Fuzzy Hash: d076b9d010211f014a59fe34b7121c93ea0654b322b9de3976980b709a020c0e
                            • Instruction Fuzzy Hash: 98E12F79B04216CFC704CF68E8906AAB7F2FB8A312F1A847EE585D3351D334A955CB85
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 72ef3389d17b5c2d7356fca882b754ee43f181ee348d4ceda7fd19fbe0bcaa8a
                            • Instruction ID: 292f23283d7cd07bb6fd19c8603031892cd16be448e450c68c3e166b8ce1a4f1
                            • Opcode Fuzzy Hash: 72ef3389d17b5c2d7356fca882b754ee43f181ee348d4ceda7fd19fbe0bcaa8a
                            • Instruction Fuzzy Hash: DAF1CF356087418FD724CF29C88066BFBE2EFD9304F08882EE5D597791E679E904CB5A
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 536c392115e0cff150cd0d6d8dc87b4614f7e511d1c43d6d4655b511f952909a
                            • Instruction ID: b7c2eaf3338182462aad9b41d84ad1057b9f4e6ab3b7739cdaab2d2094e4d2b6
                            • Opcode Fuzzy Hash: 536c392115e0cff150cd0d6d8dc87b4614f7e511d1c43d6d4655b511f952909a
                            • Instruction Fuzzy Hash: 36C1007AA04216CFC704CF28E8906AAB7F2FB8A311F1A447DE98593351D734ED54CB85
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0698e5323aca3189bcf61449c470d5166dbf916172f2457ca70a618e1c4aeee2
                            • Instruction ID: 56b07d3b8ecf2697cfceb0b79347f06369642de1c8fee68a0e9743baf01ab03d
                            • Opcode Fuzzy Hash: 0698e5323aca3189bcf61449c470d5166dbf916172f2457ca70a618e1c4aeee2
                            • Instruction Fuzzy Hash: 46C12EB060D3218AC314DF14D86272BB7F2EF92364F44891DF0D19B395EB789905CB9A
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b7ae3e85a33d43a6e2771b0fd908fe387ca734c2f104cbcf9b416a7aefdf7c9a
                            • Instruction ID: 20c8691d40d2db25294344e9a87d3a2a4619c2758e90d916e0ff6e9b3fbd9dce
                            • Opcode Fuzzy Hash: b7ae3e85a33d43a6e2771b0fd908fe387ca734c2f104cbcf9b416a7aefdf7c9a
                            • Instruction Fuzzy Hash: 95B1FE7AA14216CFC704CF68E8906AAB7F1FB8A311F1A447EE98693350D734ED54CB85
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fc05906a2cd7047f79f16b5ec2f82067cc14c0beb5821a18253c96a7a105a64b
                            • Instruction ID: 02c91c5c175dbfc798e5ae80a92b3f6d79b9f3e28c5cee1d4de64ad44bd3bbdb
                            • Opcode Fuzzy Hash: fc05906a2cd7047f79f16b5ec2f82067cc14c0beb5821a18253c96a7a105a64b
                            • Instruction Fuzzy Hash: 28B1FE79A08216CFC704CF28E8906AAB7F1FB8A311F1A487DE985D3350D734E955CB95
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 71e2b72de9db90adf160ba091cc0f4e0f3ea60225d0eeabf88c335e2ed5b0d7e
                            • Instruction ID: 5a7d6a52498181c9cf4f87941996139a214d8b31775e9e11dc627d5a44ad725e
                            • Opcode Fuzzy Hash: 71e2b72de9db90adf160ba091cc0f4e0f3ea60225d0eeabf88c335e2ed5b0d7e
                            • Instruction Fuzzy Hash: 73A143B46047418FD724CF29C8D1B63B7E2AB5A304F14892ED59A87792D338E886CB58
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID:
                            • API String ID: 2994545307-0
                            • Opcode ID: b7535c463ae1e5bcf3702ce14ffd2b5f638eb3eed67e07491a9c0359b24ec7dd
                            • Instruction ID: 9eaef7f6449a926bdd011e6bf6c7dc343cb48eef6fbbacc1f9e318c96c7b604e
                            • Opcode Fuzzy Hash: b7535c463ae1e5bcf3702ce14ffd2b5f638eb3eed67e07491a9c0359b24ec7dd
                            • Instruction Fuzzy Hash: 6891DF356053118BC718DF1AC890A2BB3F6EF9D710F19996DE8858B391E734EC01CB86
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID:
                            • API String ID: 2994545307-0
                            • Opcode ID: 7e2f85c664c8434edd563ad3eec3cf26f3dbdf93c28ccb518c6c18397a03e6ac
                            • Instruction ID: 42590aa1c4a3029240d7faad05c1566b36b776a36cf424c854185cc8c2ee326e
                            • Opcode Fuzzy Hash: 7e2f85c664c8434edd563ad3eec3cf26f3dbdf93c28ccb518c6c18397a03e6ac
                            • Instruction Fuzzy Hash: 58717A31A043014BC714AF29E890A3FB7A6EFDD750F1AD43EE4868B365DB349C11878A
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 485f9e8018368faea3edae90e71b0f5b01441832ec9af48811220032a096e4bd
                            • Instruction ID: 0033b059549c864885c35c4736f174911fb7ab2e2a7e13fdb612373215023671
                            • Opcode Fuzzy Hash: 485f9e8018368faea3edae90e71b0f5b01441832ec9af48811220032a096e4bd
                            • Instruction Fuzzy Hash: 939168B2A083558FC714CF25945226FF7A2AFD1304F98892EE4E687382D639DD05CB4A
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7d03f9876956ffac6f74f0866a7bde9a035be760a6bedc0074a97e3c21121794
                            • Instruction ID: 79a636d4ef35a115cd61f203c964b336e8654c9833e22f85933b964d871e8aad
                            • Opcode Fuzzy Hash: 7d03f9876956ffac6f74f0866a7bde9a035be760a6bedc0074a97e3c21121794
                            • Instruction Fuzzy Hash: 824113B455835287CB209F289C413BBF3F1AFA2358F59455EE8C597380E738D992C36A
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4c7e07812f1b8347d7007c075ffe03fcbbfb4954c80059fd09941d44e601273e
                            • Instruction ID: cd3817f91458a04e6f4698fbdec964a5fe2b941d70aabd782eb82a79c60357af
                            • Opcode Fuzzy Hash: 4c7e07812f1b8347d7007c075ffe03fcbbfb4954c80059fd09941d44e601273e
                            • Instruction Fuzzy Hash: 4751EBB060C3208AC720DF60E49132BB7F0EFA2344F40492DD9D64B761EB799908DB9B
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 54105d90293e4b8a7fe8cebbefda0a172f6c9cbfe66afa0c85e262d0473a1c3c
                            • Instruction ID: 8a214a05a26fc8f928125f8fb48cb90f3e515442b7647201508495c5dbe42c78
                            • Opcode Fuzzy Hash: 54105d90293e4b8a7fe8cebbefda0a172f6c9cbfe66afa0c85e262d0473a1c3c
                            • Instruction Fuzzy Hash: DA4127B2B193504BD71CCF258CA275FFBA2EBC5308F16883DE5869B284CA7494078B45
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 91220374a97f5aff33aa7e71888e41c88829f78e25f822e198eb2ef461918297
                            • Instruction ID: 504e49b0b2ddc2a099550f91d12c5185d5b4ceea0bdb26274afb8cde00bc0dbb
                            • Opcode Fuzzy Hash: 91220374a97f5aff33aa7e71888e41c88829f78e25f822e198eb2ef461918297
                            • Instruction Fuzzy Hash: B5314632A083385B83249E5D8982067F7E8EBCD714F1AE12FD884E7311E574ED0147C5
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID:
                            • API String ID: 2994545307-0
                            • Opcode ID: 73dc7dffa9da4718634bc1df2c87a66b7a70c35b3b00ffd698cd8eaa02142161
                            • Instruction ID: d5ab4806ffe72a1369b891b0c03ce99b48dccca7df38fd9f7e726c1ee5c76a78
                            • Opcode Fuzzy Hash: 73dc7dffa9da4718634bc1df2c87a66b7a70c35b3b00ffd698cd8eaa02142161
                            • Instruction Fuzzy Hash: 250124347A0A01DBE7258B15A891BB37293FB82310FA49029E18293281DB69AC91875D
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                            • Instruction ID: fc3937f92bddd9b9036211213233e27d23e83f380f16c5f831fb688d5273015d
                            • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                            • Instruction Fuzzy Hash: 8E11EC336051D40EC3158D3C84005A5BF930AD7234F59939AF4B4972E6D62A9D8B8359
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a62376ffa6d90c1baa96e3dbf302ab3dfe7742f197fede568b4cb05d9ce342f2
                            • Instruction ID: 81ebb7552e56e7d5adf40a514b1d7c04d719dbb311c9cbdb1d4034df3b6f2776
                            • Opcode Fuzzy Hash: a62376ffa6d90c1baa96e3dbf302ab3dfe7742f197fede568b4cb05d9ce342f2
                            • Instruction Fuzzy Hash: D601D4F5B00B1147D7309E11A5C0B27B2A9AF8070CF59443EED4467342DB7EEC28C69A
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dabecf6e6ddfb1cdd8269c5c9ebdc2cc04a1f760bd0808b9cf36547e64e5e14a
                            • Instruction ID: dad6f7438d27f99e102fe50886f5565f1d4720bfb2582f27d129ae765fd9d515
                            • Opcode Fuzzy Hash: dabecf6e6ddfb1cdd8269c5c9ebdc2cc04a1f760bd0808b9cf36547e64e5e14a
                            • Instruction Fuzzy Hash: EEF0E937B1551607A214DD26ACC453BB366D7C6314B295439E841E3281C979F80692B8
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 676c11319c11e30e550c5dd480f93aa2d5812f95884204bdcd3370e1ab4f8030
                            • Instruction ID: c74ae76d4aeefb6f888da0d67bba939e79ddb671e6929748130615be24dd088f
                            • Opcode Fuzzy Hash: 676c11319c11e30e550c5dd480f93aa2d5812f95884204bdcd3370e1ab4f8030
                            • Instruction Fuzzy Hash: E6D022789048005BC608EB10EE12639B2688F4B2AEF00303DE443FF353CE38EC60890E
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 32957ae45f5fb5a31ef22e0da77331464b0a71ff3474b199ef627a84159dc668
                            • Instruction ID: 52fe0259059b82c7cb9fb3d0f913ef24527c2e8030ec2916e1bb67edfa7a0227
                            • Opcode Fuzzy Hash: 32957ae45f5fb5a31ef22e0da77331464b0a71ff3474b199ef627a84159dc668
                            • Instruction Fuzzy Hash: 01D0122494A2994AD3068F389CA1731BBB1EF03100F442558D142DB291C7D09016865C
                            APIs
                            • CopyFileW.KERNEL32(00000000,?,00000000), ref: 00427607
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1697397120.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                            Similarity
                            • API ID: CopyFile
                            • String ID: <vB$B\$JC$OR
                            • API String ID: 1304948518-1094185596
                            • Opcode ID: 534c61a23f16c94dd70e9183f09d5d618cb95d249a0f73e85ffe0a6b27bbc1d3
                            • Instruction ID: 8ef9865115e3bd1ef4dc2c2120f56385b28599b8e62f1996c0c1473ca8bdbd32
                            • Opcode Fuzzy Hash: 534c61a23f16c94dd70e9183f09d5d618cb95d249a0f73e85ffe0a6b27bbc1d3
                            • Instruction Fuzzy Hash: 802180B964D340DFD3209F61A84671BBBF4FB86304F40582CE1D587291EB788515DB4A