Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
J18uCKmoAw.exe

Overview

General Information

Sample name:J18uCKmoAw.exe
renamed because original name is a hash value
Original sample name:9ab250b0dc1d156e2d123d277eb4d132.exe
Analysis ID:1580295
MD5:9ab250b0dc1d156e2d123d277eb4d132
SHA1:3b434ff78208c10f570dfe686455fd3094f3dd48
SHA256:49bfa0b1c3553208e59b6b881a58c94bb4aa3d09e51c3f510f207b7b24675864
Tags:exeuser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • J18uCKmoAw.exe (PID: 7648 cmdline: "C:\Users\user\Desktop\J18uCKmoAw.exe" MD5: 9AB250B0DC1D156E2D123D277EB4D132)
    • conhost.exe (PID: 7656 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • J18uCKmoAw.exe (PID: 7748 cmdline: "C:\Users\user\Desktop\J18uCKmoAw.exe" MD5: 9AB250B0DC1D156E2D123D277EB4D132)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["shapestickyr.lat", "slipperyloo.lat", "tentabatte.lat", "manyrestro.lat", "curverpluch.lat", "bashfulacid.lat", "talkynicer.lat", "wordyfindy.lat", "pancakedipyps.click"], "Build id": "FATE99--test"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-24T08:54:40.655706+010020283713Unknown Traffic192.168.2.1149705172.67.209.202443TCP
      2024-12-24T08:54:43.109571+010020283713Unknown Traffic192.168.2.1149706172.67.209.202443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-24T08:54:41.404704+010020546531A Network Trojan was detected192.168.2.1149705172.67.209.202443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-24T08:54:41.404704+010020498361A Network Trojan was detected192.168.2.1149705172.67.209.202443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-24T08:54:40.655706+010020583981Domain Observed Used for C2 Detected192.168.2.1149705172.67.209.202443TCP
      2024-12-24T08:54:43.109571+010020583981Domain Observed Used for C2 Detected192.168.2.1149706172.67.209.202443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-24T08:54:39.112406+010020583971Domain Observed Used for C2 Detected192.168.2.11563511.1.1.153UDP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: https://pancakedipyps.click/eAvira URL Cloud: Label: malware
      Source: https://pancakedipyps.click/VAvira URL Cloud: Label: malware
      Source: https://pancakedipyps.click/pijuAvira URL Cloud: Label: malware
      Source: https://pancakedipyps.click/AuAvira URL Cloud: Label: malware
      Source: https://pancakedipyps.click:443/apiCAvira URL Cloud: Label: malware
      Source: https://pancakedipyps.click/apiCAvira URL Cloud: Label: malware
      Source: 00000000.00000002.1299958142.0000000002BB7000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["shapestickyr.lat", "slipperyloo.lat", "tentabatte.lat", "manyrestro.lat", "curverpluch.lat", "bashfulacid.lat", "talkynicer.lat", "wordyfindy.lat", "pancakedipyps.click"], "Build id": "FATE99--test"}
      Source: J18uCKmoAw.exeVirustotal: Detection: 37%Perma Link
      Source: J18uCKmoAw.exeReversingLabs: Detection: 55%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
      Source: J18uCKmoAw.exeJoe Sandbox ML: detected
      Source: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: bashfulacid.lat
      Source: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: tentabatte.lat
      Source: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: curverpluch.lat
      Source: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: talkynicer.lat
      Source: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: shapestickyr.lat
      Source: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: manyrestro.lat
      Source: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: slipperyloo.lat
      Source: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: wordyfindy.lat
      Source: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: pancakedipyps.click
      Source: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
      Source: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
      Source: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
      Source: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
      Source: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
      Source: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: FATE99--test
      Source: J18uCKmoAw.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 172.67.209.202:443 -> 192.168.2.11:49705 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.209.202:443 -> 192.168.2.11:49706 version: TLS 1.2
      Source: J18uCKmoAw.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_00180CF8 FindFirstFileExW,0_2_00180CF8
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_00180DA9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00180DA9
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00180CF8 FindFirstFileExW,3_2_00180CF8
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00180DA9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_00180DA9
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then lea esi, dword ptr [eax+00000270h]3_2_00408A50
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov edx, ebx3_2_00408600
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-16h]3_2_00441720
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0042C850
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then push esi3_2_0040C805
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h3_2_00422830
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+04h]3_2_0043C830
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov esi, ecx3_2_004290D0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_0042E0DA
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov ecx, eax3_2_0041D8D8
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov ecx, eax3_2_0041D8D8
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_0042C0E6
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov edx, ecx3_2_0041B8F6
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov edx, ecx3_2_0041B8F6
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_0042C09E
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov eax, ebx3_2_0041C8A0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-000000BEh]3_2_0041C8A0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx ebx, byte ptr [esp+edx+0Ah]3_2_0041C8A0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-2E3D7ACEh]3_2_0041C8A0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov ecx, eax3_2_0041D8AC
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov ecx, eax3_2_0041D8AC
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_0042C09E
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-16h]3_2_00441160
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov eax, dword ptr [00446130h]3_2_00418169
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h3_2_0042B170
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov ecx, eax3_2_0042D17D
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov ecx, eax3_2_0042D116
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h3_2_004281CC
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h3_2_004289E9
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0042B980
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h3_2_0043C990
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then jmp edx3_2_004239B9
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx ecx, byte ptr [edx+eax]3_2_004239B9
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then cmp dword ptr [ecx+ebx*8], 385488F2h3_2_0043CA40
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00421A10
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_00436210
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then dec edx3_2_0043FA20
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_0042AAC0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+0Ah]3_2_0040AB40
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h3_2_00440340
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_0042D34A
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov ecx, eax3_2_0041C300
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then dec edx3_2_0043FB10
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov edx, ecx3_2_00418B1B
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then dec edx3_2_0043FB2A
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then dec edx3_2_0043FB28
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]3_2_004073D0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]3_2_004073D0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h3_2_004283D8
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-6E2DD57Fh]3_2_0041EB80
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov eax, ebx3_2_00427440
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+09AD4080h]3_2_00427440
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx edx, byte ptr [eax+edi-74D5A7FEh]3_2_0042C465
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_0042C465
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov edi, dword ptr [esi+30h]3_2_0040CC7A
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0041747D
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov word ptr [edx], di3_2_0041747D
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h3_2_00414CA0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then dec edx3_2_0043FD70
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax+61765397h]3_2_0041B57D
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-16h]3_2_00440D20
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h3_2_00428528
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov edx, ecx3_2_00426D2E
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx esi, byte ptr [ebp+eax-46h]3_2_0043EDC1
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 2213E57Fh3_2_0043CDF0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-3ECB279Fh]3_2_0043CDF0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 2213E57Fh3_2_0043CDF0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 7F7BECC6h3_2_0043CDF0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_0042DDFF
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov edi, ecx3_2_0042A5B6
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov ecx, eax3_2_00422E6D
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then jmp edx3_2_00422E6D
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx ecx, byte ptr [edx+eax]3_2_00422E6D
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then dec edx3_2_0043FE00
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_0042DE07
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-16h]3_2_004406F0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov edx, ecx3_2_00429E80
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx eax, byte ptr [ebp+edi+00000090h]3_2_00402EB0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+20h]3_2_00427740
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00416F52
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov ecx, eax3_2_0042BF13
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov edi, dword ptr [esp+28h]3_2_00425F1B
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then jmp eax3_2_00429739
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then jmp edx3_2_004237D6
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 4x nop then mov dword ptr [esp+20h], eax3_2_00409780

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.11:49705 -> 172.67.209.202:443
      Source: Network trafficSuricata IDS: 2058397 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (pancakedipyps .click) : 192.168.2.11:56351 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.11:49706 -> 172.67.209.202:443
      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.11:49705 -> 172.67.209.202:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.11:49705 -> 172.67.209.202:443
      Source: Malware configuration extractorURLs: shapestickyr.lat
      Source: Malware configuration extractorURLs: slipperyloo.lat
      Source: Malware configuration extractorURLs: tentabatte.lat
      Source: Malware configuration extractorURLs: manyrestro.lat
      Source: Malware configuration extractorURLs: curverpluch.lat
      Source: Malware configuration extractorURLs: bashfulacid.lat
      Source: Malware configuration extractorURLs: talkynicer.lat
      Source: Malware configuration extractorURLs: wordyfindy.lat
      Source: Malware configuration extractorURLs: pancakedipyps.click
      Source: Joe Sandbox ViewIP Address: 172.67.209.202 172.67.209.202
      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.11:49705 -> 172.67.209.202:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.11:49706 -> 172.67.209.202:443
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: pancakedipyps.click
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: pancakedipyps.click
      Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: pancakedipyps.click
      Source: J18uCKmoAw.exe, 00000003.00000003.1340319102.0000000000D14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microhe
      Source: J18uCKmoAw.exe, 00000003.00000003.1340387904.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp, J18uCKmoAw.exe, 00000003.00000002.1341855428.0000000000CC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click/
      Source: J18uCKmoAw.exe, 00000003.00000003.1340387904.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp, J18uCKmoAw.exe, 00000003.00000002.1341855428.0000000000CC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click/Au
      Source: J18uCKmoAw.exe, 00000003.00000002.1341720744.0000000000C8C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click/V
      Source: J18uCKmoAw.exe, 00000003.00000002.1341798317.0000000000CA3000.00000004.00000020.00020000.00000000.sdmp, J18uCKmoAw.exe, 00000003.00000003.1340387904.0000000000CA3000.00000004.00000020.00020000.00000000.sdmp, J18uCKmoAw.exe, 00000003.00000003.1340387904.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp, J18uCKmoAw.exe, 00000003.00000002.1341720744.0000000000C8C000.00000004.00000020.00020000.00000000.sdmp, J18uCKmoAw.exe, 00000003.00000002.1341855428.0000000000CC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click/api
      Source: J18uCKmoAw.exe, 00000003.00000002.1341798317.0000000000CA3000.00000004.00000020.00020000.00000000.sdmp, J18uCKmoAw.exe, 00000003.00000003.1340387904.0000000000CA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click/apiC
      Source: J18uCKmoAw.exe, 00000003.00000003.1340387904.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp, J18uCKmoAw.exe, 00000003.00000002.1341855428.0000000000CC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click/e
      Source: J18uCKmoAw.exe, 00000003.00000003.1340387904.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp, J18uCKmoAw.exe, 00000003.00000002.1341855428.0000000000CC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click/piju
      Source: J18uCKmoAw.exe, 00000003.00000002.1341798317.0000000000CA3000.00000004.00000020.00020000.00000000.sdmp, J18uCKmoAw.exe, 00000003.00000003.1340387904.0000000000CA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click:443/api
      Source: J18uCKmoAw.exe, 00000003.00000002.1341798317.0000000000CA3000.00000004.00000020.00020000.00000000.sdmp, J18uCKmoAw.exe, 00000003.00000003.1340387904.0000000000CA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click:443/apiC
      Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
      Source: unknownHTTPS traffic detected: 172.67.209.202:443 -> 192.168.2.11:49705 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.209.202:443 -> 192.168.2.11:49706 version: TLS 1.2
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00433E30 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,3_2_00433E30
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00433E30 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,3_2_00433E30
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004348C2 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,3_2_004348C2
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_001610000_2_00161000
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_0016E0940_2_0016E094
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_001861020_2_00186102
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_00172AA10_2_00172AA1
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_001843FF0_2_001843FF
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_00178D900_2_00178D90
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_00173EA00_2_00173EA0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_001610003_2_00161000
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0016E0943_2_0016E094
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_001861023_2_00186102
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00172AA13_2_00172AA1
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_001843FF3_2_001843FF
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00178D903_2_00178D90
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00173EA03_2_00173EA0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004086003_2_00408600
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0040C8403_2_0040C840
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0041D0033_2_0041D003
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0040D0213_2_0040D021
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0040D83C3_2_0040D83C
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004038C03_2_004038C0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0042A0CA3_2_0042A0CA
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004338D03_2_004338D0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0042C0E63_2_0042C0E6
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004160E93_2_004160E9
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0041B8F63_2_0041B8F6
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0042C09E3_2_0042C09E
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0041C8A03_2_0041C8A0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004388B03_2_004388B0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0042C09E3_2_0042C09E
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004061603_2_00406160
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0041E9603_2_0041E960
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004181693_2_00418169
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004059003_2_00405900
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0040B1003_2_0040B100
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004269103_2_00426910
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004281CC3_2_004281CC
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004409E03_2_004409E0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0042C9EB3_2_0042C9EB
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0042E1803_2_0042E180
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0043F18B3_2_0043F18B
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004291AE3_2_004291AE
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004239B93_2_004239B9
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0043CA403_2_0043CA40
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00435A4F3_2_00435A4F
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0043DA4D3_2_0043DA4D
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004042703_2_00404270
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0041E2203_2_0041E220
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0043FA203_2_0043FA20
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004112273_2_00411227
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00419AD03_2_00419AD0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004242D03_2_004242D0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004392803_2_00439280
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00439A803_2_00439A80
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00428ABC3_2_00428ABC
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0040AB403_2_0040AB40
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004213403_2_00421340
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0042D34A3_2_0042D34A
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0042F3773_2_0042F377
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004093103_2_00409310
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0043FB103_2_0043FB10
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00418B1B3_2_00418B1B
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0043FB2A3_2_0043FB2A
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0043FB283_2_0043FB28
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0040F3C03_2_0040F3C0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004073D03_2_004073D0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004283D83_2_004283D8
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0041EB803_2_0041EB80
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00404BA03_2_00404BA0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004274403_2_00427440
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0043A4403_2_0043A440
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004404603_2_00440460
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0041747D3_2_0041747D
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00433C103_2_00433C10
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004204C63_2_004204C6
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004224E03_2_004224E0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0040D4F33_2_0040D4F3
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00431CF03_2_00431CF0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00414CA03_2_00414CA0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0042CD4C3_2_0042CD4C
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0042CD5E3_2_0042CD5E
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004245603_2_00424560
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0043FD703_2_0043FD70
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00421D003_2_00421D00
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00440D203_2_00440D20
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00411D2B3_2_00411D2B
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00426D2E3_2_00426D2E
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00439D303_2_00439D30
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0042C53C3_2_0042C53C
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00405DC03_2_00405DC0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0043A5D43_2_0043A5D4
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004065F03_2_004065F0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0043CDF03_2_0043CDF0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0043C5A03_2_0043C5A0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00437DA93_2_00437DA9
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004386503_2_00438650
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0042EE633_2_0042EE63
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00420E6C3_2_00420E6C
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00422E6D3_2_00422E6D
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0042FE743_2_0042FE74
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0043FE003_2_0043FE00
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0040F60D3_2_0040F60D
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0041961B3_2_0041961B
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0041E6303_2_0041E630
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004246D03_2_004246D0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004406F03_2_004406F0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0040E6873_2_0040E687
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00438EA03_2_00438EA0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00402EB03_2_00402EB0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0041AEB03_2_0041AEB0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004277403_2_00427740
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0041DF503_2_0041DF50
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004127503_2_00412750
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00416F523_2_00416F52
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00425F1B3_2_00425F1B
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004297393_2_00429739
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004157C03_2_004157C0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_004097803_2_00409780
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: String function: 00414C90 appears 77 times
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: String function: 0016E5A0 appears 98 times
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: String function: 001775AB appears 42 times
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: String function: 0017BE0D appears 40 times
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: String function: 00407F60 appears 40 times
      Source: J18uCKmoAw.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
      Source: J18uCKmoAw.exeStatic PE information: Section: .bss ZLIB complexity 1.0003244500411184
      Source: classification engineClassification label: mal100.troj.evad.winEXE@4/1@1/1
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00432070 CoCreateInstance,3_2_00432070
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7656:120:WilError_03
      Source: J18uCKmoAw.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: J18uCKmoAw.exeVirustotal: Detection: 37%
      Source: J18uCKmoAw.exeReversingLabs: Detection: 55%
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeFile read: C:\Users\user\Desktop\J18uCKmoAw.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\J18uCKmoAw.exe "C:\Users\user\Desktop\J18uCKmoAw.exe"
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeProcess created: C:\Users\user\Desktop\J18uCKmoAw.exe "C:\Users\user\Desktop\J18uCKmoAw.exe"
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeProcess created: C:\Users\user\Desktop\J18uCKmoAw.exe "C:\Users\user\Desktop\J18uCKmoAw.exe"Jump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: webio.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: J18uCKmoAw.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_0016E75A push ecx; ret 0_2_0016E76D
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0016E75A push ecx; ret 3_2_0016E76D
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00437069 push es; retf 3_2_00437074
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0043C990 push eax; mov dword ptr [esp], 5C5D5E5Fh3_2_0043C99E
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0041B324 push F3B90044h; retf 3_2_0041B32A
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00445C05 push ds; iretd 3_2_00445C08
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0044856B push cs; retf 3_2_0044856C
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeAPI coverage: 4.7 %
      Source: C:\Users\user\Desktop\J18uCKmoAw.exe TID: 7768Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exe TID: 7764Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_00180CF8 FindFirstFileExW,0_2_00180CF8
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_00180DA9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00180DA9
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00180CF8 FindFirstFileExW,3_2_00180CF8
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00180DA9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_00180DA9
      Source: J18uCKmoAw.exe, 00000003.00000003.1340387904.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp, J18uCKmoAw.exe, 00000003.00000002.1341720744.0000000000C8C000.00000004.00000020.00020000.00000000.sdmp, J18uCKmoAw.exe, 00000003.00000002.1341855428.0000000000CC0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0043E110 LdrInitializeThunk,3_2_0043E110
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_001772FD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001772FD
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_0019619E mov edi, dword ptr fs:[00000030h]0_2_0019619E
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_00161690 mov edi, dword ptr fs:[00000030h]0_2_00161690
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_00161690 mov edi, dword ptr fs:[00000030h]3_2_00161690
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_0017C705 GetProcessHeap,0_2_0017C705
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_0016E06C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0016E06C
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_001772FD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001772FD
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_0016E420 SetUnhandledExceptionFilter,0_2_0016E420
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_0016E42C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0016E42C
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0016E06C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0016E06C
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_001772FD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_001772FD
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0016E420 SetUnhandledExceptionFilter,3_2_0016E420
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 3_2_0016E42C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0016E42C

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_0019619E GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_0019619E
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeMemory written: C:\Users\user\Desktop\J18uCKmoAw.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: J18uCKmoAw.exe, 00000000.00000002.1299958142.0000000002BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: bashfulacid.lat
      Source: J18uCKmoAw.exe, 00000000.00000002.1299958142.0000000002BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: tentabatte.lat
      Source: J18uCKmoAw.exe, 00000000.00000002.1299958142.0000000002BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: curverpluch.lat
      Source: J18uCKmoAw.exe, 00000000.00000002.1299958142.0000000002BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: talkynicer.lat
      Source: J18uCKmoAw.exe, 00000000.00000002.1299958142.0000000002BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: shapestickyr.lat
      Source: J18uCKmoAw.exe, 00000000.00000002.1299958142.0000000002BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: manyrestro.lat
      Source: J18uCKmoAw.exe, 00000000.00000002.1299958142.0000000002BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: slipperyloo.lat
      Source: J18uCKmoAw.exe, 00000000.00000002.1299958142.0000000002BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: wordyfindy.lat
      Source: J18uCKmoAw.exe, 00000000.00000002.1299958142.0000000002BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: pancakedipyps.click
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeProcess created: C:\Users\user\Desktop\J18uCKmoAw.exe "C:\Users\user\Desktop\J18uCKmoAw.exe"Jump to behavior
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00180062
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: GetLocaleInfoW,0_2_001808CD
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: GetLocaleInfoW,0_2_0017BA4C
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: EnumSystemLocalesW,0_2_001802B3
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0018034E
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: EnumSystemLocalesW,0_2_001805A1
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: GetLocaleInfoW,0_2_00180600
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: EnumSystemLocalesW,0_2_001806D5
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: GetLocaleInfoW,0_2_00180720
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_001807C7
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: EnumSystemLocalesW,0_2_0017BFF0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_00180062
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: GetLocaleInfoW,3_2_001808CD
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: GetLocaleInfoW,3_2_0017BA4C
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: EnumSystemLocalesW,3_2_001802B3
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_0018034E
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: EnumSystemLocalesW,3_2_001805A1
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: GetLocaleInfoW,3_2_00180600
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: EnumSystemLocalesW,3_2_001806D5
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: GetLocaleInfoW,3_2_00180720
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_001807C7
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: EnumSystemLocalesW,3_2_0017BFF0
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeCode function: 0_2_0016EB50 GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,0_2_0016EB50
      Source: C:\Users\user\Desktop\J18uCKmoAw.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      PowerShell
      1
      DLL Side-Loading
      211
      Process Injection
      1
      Virtualization/Sandbox Evasion
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Screen Capture
      11
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      211
      Process Injection
      LSASS Memory21
      Security Software Discovery
      Remote Desktop Protocol1
      Archive Collected Data
      2
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
      Deobfuscate/Decode Files or Information
      Security Account Manager1
      Virtualization/Sandbox Evasion
      SMB/Windows Admin Shares2
      Clipboard Data
      113
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
      Obfuscated Files or Information
      NTDS1
      File and Directory Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Software Packing
      LSA Secrets13
      System Information Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      J18uCKmoAw.exe38%VirustotalBrowse
      J18uCKmoAw.exe55%ReversingLabsWin32.Trojan.LummaStealer
      J18uCKmoAw.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://pancakedipyps.click/e100%Avira URL Cloudmalware
      https://pancakedipyps.click/V100%Avira URL Cloudmalware
      https://pancakedipyps.click/piju100%Avira URL Cloudmalware
      https://pancakedipyps.click/Au100%Avira URL Cloudmalware
      https://pancakedipyps.click:443/apiC100%Avira URL Cloudmalware
      https://pancakedipyps.click/apiC100%Avira URL Cloudmalware
      http://crl.microhe0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      pancakedipyps.click
      172.67.209.202
      truefalse
        high
        NameMaliciousAntivirus DetectionReputation
        pancakedipyps.clickfalse
          high
          wordyfindy.latfalse
            high
            slipperyloo.latfalse
              high
              curverpluch.latfalse
                high
                tentabatte.latfalse
                  high
                  manyrestro.latfalse
                    high
                    bashfulacid.latfalse
                      high
                      shapestickyr.latfalse
                        high
                        https://pancakedipyps.click/apifalse
                          high
                          talkynicer.latfalse
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://pancakedipyps.click/eJ18uCKmoAw.exe, 00000003.00000003.1340387904.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp, J18uCKmoAw.exe, 00000003.00000002.1341855428.0000000000CC0000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            https://pancakedipyps.click/pijuJ18uCKmoAw.exe, 00000003.00000003.1340387904.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp, J18uCKmoAw.exe, 00000003.00000002.1341855428.0000000000CC0000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://crl.microheJ18uCKmoAw.exe, 00000003.00000003.1340319102.0000000000D14000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://pancakedipyps.click:443/apiCJ18uCKmoAw.exe, 00000003.00000002.1341798317.0000000000CA3000.00000004.00000020.00020000.00000000.sdmp, J18uCKmoAw.exe, 00000003.00000003.1340387904.0000000000CA3000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            https://pancakedipyps.click/AuJ18uCKmoAw.exe, 00000003.00000003.1340387904.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp, J18uCKmoAw.exe, 00000003.00000002.1341855428.0000000000CC0000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            https://pancakedipyps.click/J18uCKmoAw.exe, 00000003.00000003.1340387904.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp, J18uCKmoAw.exe, 00000003.00000002.1341855428.0000000000CC0000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://pancakedipyps.click/apiCJ18uCKmoAw.exe, 00000003.00000002.1341798317.0000000000CA3000.00000004.00000020.00020000.00000000.sdmp, J18uCKmoAw.exe, 00000003.00000003.1340387904.0000000000CA3000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              https://pancakedipyps.click:443/apiJ18uCKmoAw.exe, 00000003.00000002.1341798317.0000000000CA3000.00000004.00000020.00020000.00000000.sdmp, J18uCKmoAw.exe, 00000003.00000003.1340387904.0000000000CA3000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://pancakedipyps.click/VJ18uCKmoAw.exe, 00000003.00000002.1341720744.0000000000C8C000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                172.67.209.202
                                pancakedipyps.clickUnited States
                                13335CLOUDFLARENETUSfalse
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1580295
                                Start date and time:2024-12-24 08:53:43 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 3m 5s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:4
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:J18uCKmoAw.exe
                                renamed because original name is a hash value
                                Original Sample Name:9ab250b0dc1d156e2d123d277eb4d132.exe
                                Detection:MAL
                                Classification:mal100.troj.evad.winEXE@4/1@1/1
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 99%
                                • Number of executed functions: 32
                                • Number of non-executed functions: 157
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Stop behavior analysis, all processes terminated
                                • Exclude process from analysis (whitelisted): dllhost.exe
                                • Excluded IPs from analysis (whitelisted): 13.107.246.63
                                • Excluded domains from analysis (whitelisted): otelrules.azureedge.net
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                TimeTypeDescription
                                02:54:40API Interceptor2x Sleep call for process: J18uCKmoAw.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                172.67.209.202fkawMJ7FH8.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RedLine, StealcBrowse
                                  file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                        file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC StealerBrowse
                                          file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC StealerBrowse
                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, Stealc, VidarBrowse
                                              AWrVzd6XpC.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RHADAMANTHYS, zgRATBrowse
                                                  random.exe_Y.exeGet hashmaliciousAmadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    pancakedipyps.clickfkawMJ7FH8.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RedLine, StealcBrowse
                                                    • 172.67.209.202
                                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                    • 172.67.209.202
                                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                                    • 172.67.209.202
                                                    file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Vidar, XmrigBrowse
                                                    • 104.21.23.76
                                                    file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, SystemBC, zgRATBrowse
                                                    • 104.21.23.76
                                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, Stealc, zgRATBrowse
                                                    • 104.21.23.76
                                                    file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC StealerBrowse
                                                    • 172.67.209.202
                                                    file.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                                                    • 104.21.23.76
                                                    file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC StealerBrowse
                                                    • 172.67.209.202
                                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, Stealc, VidarBrowse
                                                    • 104.21.23.76
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    CLOUDFLARENETUSy001L6lEK4.exeGet hashmaliciousLummaC, StealcBrowse
                                                    • 172.67.199.72
                                                    tTGxYWtjG5.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.199.72
                                                    iaLId0uLUw.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.199.72
                                                    4W3cB5WEYH.exeGet hashmaliciousLummaCBrowse
                                                    • 104.21.36.201
                                                    ElmEHL9kP9.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                    • 172.67.199.72
                                                    yuij5p5p3W.exeGet hashmaliciousLummaCBrowse
                                                    • 104.21.36.201
                                                    yO9EAqDV15.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.199.72
                                                    singl6.mp4.htaGet hashmaliciousLummaCBrowse
                                                    • 104.21.37.173
                                                    HALKBANK EKSTRE.exeGet hashmaliciousMassLogger RATBrowse
                                                    • 172.67.177.134
                                                    eMBO6wS1b5.exeGet hashmaliciousLummaC StealerBrowse
                                                    • 172.67.169.205
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    a0e9f5d64349fb13191bc781f81f42e1y001L6lEK4.exeGet hashmaliciousLummaC, StealcBrowse
                                                    • 172.67.209.202
                                                    tTGxYWtjG5.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.209.202
                                                    iaLId0uLUw.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.209.202
                                                    4W3cB5WEYH.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.209.202
                                                    ElmEHL9kP9.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                    • 172.67.209.202
                                                    yuij5p5p3W.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.209.202
                                                    yO9EAqDV15.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.209.202
                                                    singl6.mp4.htaGet hashmaliciousLummaCBrowse
                                                    • 172.67.209.202
                                                    eMBO6wS1b5.exeGet hashmaliciousLummaC StealerBrowse
                                                    • 172.67.209.202
                                                    qoqD1RxV0F.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.209.202
                                                    No context
                                                    Process:C:\Users\user\Desktop\J18uCKmoAw.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):15
                                                    Entropy (8bit):3.906890595608518
                                                    Encrypted:false
                                                    SSDEEP:3:SXhRi75n:SC5
                                                    MD5:3A33AF4BC7DC9699EE324B91553C2B46
                                                    SHA1:4CCE2BF1011CA006FAAB23506A349173ACC40434
                                                    SHA-256:226D20C16ED4D8DDDFD00870E83E3B6EEDEDB86704A7BF43B5826B71D61500AE
                                                    SHA-512:960194C8B60C086520D1A76B94F52BA88AC2DDEC76A18B2D7ABF758FFFF138E9EDD23E62D4375A34072B42FBA51C6D186554B1AA71D60835EF1E18BEB8873B1D
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:1.29548Enjoy!..
                                                    File type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Entropy (8bit):7.614709628313703
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:J18uCKmoAw.exe
                                                    File size:540'672 bytes
                                                    MD5:9ab250b0dc1d156e2d123d277eb4d132
                                                    SHA1:3b434ff78208c10f570dfe686455fd3094f3dd48
                                                    SHA256:49bfa0b1c3553208e59b6b881a58c94bb4aa3d09e51c3f510f207b7b24675864
                                                    SHA512:a30fb204b556b0decd7fab56a44e62356c7102bc8146b2dfd88e6545dea7574e043a3254035b7514ee0c686a726b8f5ba99bcd91e8c2c7f39c105e2724080ef0
                                                    SSDEEP:12288:huB9du8NOZx84E5YoShCwrp1OkwWFewdYHMUzN4r52ki:i9du88Zx8VAwBkewVUckki
                                                    TLSH:D7B4E010B491C072C9672477587AEB6A8A3EF9204F326ADFA7840DB9CF355D1E730726
                                                    File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...WZig..........".................R.............@.......................................@.................................dH..<..
                                                    Icon Hash:90cececece8e8eb0
                                                    Entrypoint:0x40ef52
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows cui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x67695A57 [Mon Dec 23 12:40:55 2024 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:6
                                                    OS Version Minor:0
                                                    File Version Major:6
                                                    File Version Minor:0
                                                    Subsystem Version Major:6
                                                    Subsystem Version Minor:0
                                                    Import Hash:5cc7e689f2864a0a9a8589c00efad8df
                                                    Instruction
                                                    call 00007F3C2C80AB9Ah
                                                    jmp 00007F3C2C80AA09h
                                                    mov ecx, dword ptr [00436840h]
                                                    push esi
                                                    push edi
                                                    mov edi, BB40E64Eh
                                                    mov esi, FFFF0000h
                                                    cmp ecx, edi
                                                    je 00007F3C2C80AB96h
                                                    test esi, ecx
                                                    jne 00007F3C2C80ABB8h
                                                    call 00007F3C2C80ABC1h
                                                    mov ecx, eax
                                                    cmp ecx, edi
                                                    jne 00007F3C2C80AB99h
                                                    mov ecx, BB40E64Fh
                                                    jmp 00007F3C2C80ABA0h
                                                    test esi, ecx
                                                    jne 00007F3C2C80AB9Ch
                                                    or eax, 00004711h
                                                    shl eax, 10h
                                                    or ecx, eax
                                                    mov dword ptr [00436840h], ecx
                                                    not ecx
                                                    pop edi
                                                    mov dword ptr [00436880h], ecx
                                                    pop esi
                                                    ret
                                                    push ebp
                                                    mov ebp, esp
                                                    sub esp, 14h
                                                    lea eax, dword ptr [ebp-0Ch]
                                                    xorps xmm0, xmm0
                                                    push eax
                                                    movlpd qword ptr [ebp-0Ch], xmm0
                                                    call dword ptr [00434AC4h]
                                                    mov eax, dword ptr [ebp-08h]
                                                    xor eax, dword ptr [ebp-0Ch]
                                                    mov dword ptr [ebp-04h], eax
                                                    call dword ptr [00434A78h]
                                                    xor dword ptr [ebp-04h], eax
                                                    call dword ptr [00434A74h]
                                                    xor dword ptr [ebp-04h], eax
                                                    lea eax, dword ptr [ebp-14h]
                                                    push eax
                                                    call dword ptr [00434B0Ch]
                                                    mov eax, dword ptr [ebp-10h]
                                                    lea ecx, dword ptr [ebp-04h]
                                                    xor eax, dword ptr [ebp-14h]
                                                    xor eax, dword ptr [ebp-04h]
                                                    xor eax, ecx
                                                    leave
                                                    ret
                                                    mov eax, 00004000h
                                                    ret
                                                    push 00437E18h
                                                    call dword ptr [00434AE4h]
                                                    ret
                                                    mov al, 01h
                                                    ret
                                                    push 00030000h
                                                    push 00010000h
                                                    push 00000000h
                                                    call 00007F3C2C81237Bh
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x348640x3c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x3a0000x1d70.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x30d080x18.rdata
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2d0080xc0.rdata
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x34a0c0x16c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x2a52b0x2a600ca7697ad91eaacd837ed51179759a947False0.5367809734513275data6.539348053061756IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x2c0000x9d7c0x9e00964f1e27d13bf05fbdae349f651c8112False0.4288221914556962data4.95389314063731IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0x360000x25e40x1600f9cffcfbe2a982ed0d73caf2c5c26405False0.40678267045454547data4.770466622070642IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .tls0x390000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .reloc0x3a0000x1d700x1e00050a442cf25b388dea29342e31853d9fFalse0.7709635416666667data6.524650010128688IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    .bss0x3c0000x4c0000x4c0009eaf422a324664e2395959636348fe22False1.0003244500411184data7.999467342003005IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    DLLImport
                                                    KERNEL32.dllAcquireSRWLockExclusive, CloseHandle, CompareStringW, CreateFileW, CreateThread, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, ExitThread, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryAcquireSRWLockExclusive, UnhandledExceptionFilter, WaitForSingleObjectEx, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                    USER32.dllDefWindowProcW
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2024-12-24T08:54:39.112406+01002058397ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (pancakedipyps .click)1192.168.2.11563511.1.1.153UDP
                                                    2024-12-24T08:54:40.655706+01002058398ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI)1192.168.2.1149705172.67.209.202443TCP
                                                    2024-12-24T08:54:40.655706+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1149705172.67.209.202443TCP
                                                    2024-12-24T08:54:41.404704+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.1149705172.67.209.202443TCP
                                                    2024-12-24T08:54:41.404704+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.1149705172.67.209.202443TCP
                                                    2024-12-24T08:54:43.109571+01002058398ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI)1192.168.2.1149706172.67.209.202443TCP
                                                    2024-12-24T08:54:43.109571+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1149706172.67.209.202443TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 24, 2024 08:54:39.433912039 CET49705443192.168.2.11172.67.209.202
                                                    Dec 24, 2024 08:54:39.433969021 CET44349705172.67.209.202192.168.2.11
                                                    Dec 24, 2024 08:54:39.434046030 CET49705443192.168.2.11172.67.209.202
                                                    Dec 24, 2024 08:54:39.437408924 CET49705443192.168.2.11172.67.209.202
                                                    Dec 24, 2024 08:54:39.437426090 CET44349705172.67.209.202192.168.2.11
                                                    Dec 24, 2024 08:54:40.655613899 CET44349705172.67.209.202192.168.2.11
                                                    Dec 24, 2024 08:54:40.655705929 CET49705443192.168.2.11172.67.209.202
                                                    Dec 24, 2024 08:54:40.659559965 CET49705443192.168.2.11172.67.209.202
                                                    Dec 24, 2024 08:54:40.659579039 CET44349705172.67.209.202192.168.2.11
                                                    Dec 24, 2024 08:54:40.659965038 CET44349705172.67.209.202192.168.2.11
                                                    Dec 24, 2024 08:54:40.699784040 CET49705443192.168.2.11172.67.209.202
                                                    Dec 24, 2024 08:54:40.726357937 CET49705443192.168.2.11172.67.209.202
                                                    Dec 24, 2024 08:54:40.726383924 CET49705443192.168.2.11172.67.209.202
                                                    Dec 24, 2024 08:54:40.726612091 CET44349705172.67.209.202192.168.2.11
                                                    Dec 24, 2024 08:54:41.404813051 CET44349705172.67.209.202192.168.2.11
                                                    Dec 24, 2024 08:54:41.405101061 CET44349705172.67.209.202192.168.2.11
                                                    Dec 24, 2024 08:54:41.405147076 CET49705443192.168.2.11172.67.209.202
                                                    Dec 24, 2024 08:54:41.407113075 CET49705443192.168.2.11172.67.209.202
                                                    Dec 24, 2024 08:54:41.407136917 CET44349705172.67.209.202192.168.2.11
                                                    Dec 24, 2024 08:54:41.419612885 CET49706443192.168.2.11172.67.209.202
                                                    Dec 24, 2024 08:54:41.419672012 CET44349706172.67.209.202192.168.2.11
                                                    Dec 24, 2024 08:54:41.419815063 CET49706443192.168.2.11172.67.209.202
                                                    Dec 24, 2024 08:54:41.420232058 CET49706443192.168.2.11172.67.209.202
                                                    Dec 24, 2024 08:54:41.420248032 CET44349706172.67.209.202192.168.2.11
                                                    Dec 24, 2024 08:54:43.109502077 CET44349706172.67.209.202192.168.2.11
                                                    Dec 24, 2024 08:54:43.109570980 CET49706443192.168.2.11172.67.209.202
                                                    Dec 24, 2024 08:54:43.125493050 CET49706443192.168.2.11172.67.209.202
                                                    Dec 24, 2024 08:54:43.125538111 CET44349706172.67.209.202192.168.2.11
                                                    Dec 24, 2024 08:54:43.125590086 CET49706443192.168.2.11172.67.209.202
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 24, 2024 08:54:39.112406015 CET5635153192.168.2.111.1.1.1
                                                    Dec 24, 2024 08:54:39.428394079 CET53563511.1.1.1192.168.2.11
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Dec 24, 2024 08:54:39.112406015 CET192.168.2.111.1.1.10xd6a9Standard query (0)pancakedipyps.clickA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Dec 24, 2024 08:54:39.428394079 CET1.1.1.1192.168.2.110xd6a9No error (0)pancakedipyps.click172.67.209.202A (IP address)IN (0x0001)false
                                                    Dec 24, 2024 08:54:39.428394079 CET1.1.1.1192.168.2.110xd6a9No error (0)pancakedipyps.click104.21.23.76A (IP address)IN (0x0001)false
                                                    • pancakedipyps.click
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.1149705172.67.209.2024437748C:\Users\user\Desktop\J18uCKmoAw.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-12-24 07:54:40 UTC266OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 8
                                                    Host: pancakedipyps.click
                                                    2024-12-24 07:54:40 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                    Data Ascii: act=life
                                                    2024-12-24 07:54:41 UTC1119INHTTP/1.1 200 OK
                                                    Date: Tue, 24 Dec 2024 07:54:41 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=gboh7emg4aj0p9cjejip9u7jen; expires=Sat, 19 Apr 2025 01:41:20 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    X-Frame-Options: DENY
                                                    X-Content-Type-Options: nosniff
                                                    X-XSS-Protection: 1; mode=block
                                                    cf-cache-status: DYNAMIC
                                                    vary: accept-encoding
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ELMAI4D8J0djIknJMFMWV65Cw3O3RmTJKqXiQPkr0xDqwgqv6dhj5XLzfCw8mIEQIxpoQao7gVpVGe4L5IgprWbMrzq0hjanQB5sRRzytzHIssuuUVp1Ygd5qiYs2WiefmzgFavA"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8f6f0655c98f32f4-EWR
                                                    alt-svc: h3=":443"; ma=86400
                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1810&min_rtt=1808&rtt_var=683&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=910&delivery_rate=1596500&cwnd=112&unsent_bytes=0&cid=cebdd6bae0a4bb78&ts=760&x=0"
                                                    2024-12-24 07:54:41 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                    Data Ascii: 2ok
                                                    2024-12-24 07:54:41 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:02:54:37
                                                    Start date:24/12/2024
                                                    Path:C:\Users\user\Desktop\J18uCKmoAw.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\J18uCKmoAw.exe"
                                                    Imagebase:0x160000
                                                    File size:540'672 bytes
                                                    MD5 hash:9AB250B0DC1D156E2D123D277EB4D132
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:1
                                                    Start time:02:54:37
                                                    Start date:24/12/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:3
                                                    Start time:02:54:37
                                                    Start date:24/12/2024
                                                    Path:C:\Users\user\Desktop\J18uCKmoAw.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\J18uCKmoAw.exe"
                                                    Imagebase:0x160000
                                                    File size:540'672 bytes
                                                    MD5 hash:9AB250B0DC1D156E2D123D277EB4D132
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:true

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:10%
                                                      Dynamic/Decrypted Code Coverage:0.4%
                                                      Signature Coverage:1.2%
                                                      Total number of Nodes:2000
                                                      Total number of Limit Nodes:32
                                                      execution_graph 23196 17c717 23197 17c72c ___scrt_is_nonwritable_in_current_image 23196->23197 23208 177594 EnterCriticalSection 23197->23208 23199 17c733 23209 182588 23199->23209 23202 17c751 23228 17c777 23202->23228 23207 17c862 2 API calls 23207->23202 23208->23199 23210 182594 ___scrt_is_nonwritable_in_current_image 23209->23210 23211 18259d 23210->23211 23212 1825be 23210->23212 23213 176bb1 __strnicoll 14 API calls 23211->23213 23231 177594 EnterCriticalSection 23212->23231 23215 1825a2 23213->23215 23216 17729c __strnicoll 29 API calls 23215->23216 23217 17c742 23216->23217 23217->23202 23222 17c7ac GetStartupInfoW 23217->23222 23218 1825f6 23239 18261d 23218->23239 23221 1825ca 23221->23218 23232 1824d8 23221->23232 23223 17c74c 23222->23223 23224 17c7c9 23222->23224 23223->23207 23224->23223 23225 182588 30 API calls 23224->23225 23226 17c7f1 23225->23226 23226->23223 23227 17c821 GetFileType 23226->23227 23227->23226 23248 1775ab LeaveCriticalSection 23228->23248 23230 17c762 23231->23221 23233 17c0e0 __dosmaperr 14 API calls 23232->23233 23235 1824ea 23233->23235 23234 1824f7 23236 17ad27 ___free_lconv_mon 14 API calls 23234->23236 23235->23234 23242 17bac7 23235->23242 23238 18254c 23236->23238 23238->23221 23247 1775ab LeaveCriticalSection 23239->23247 23241 182624 23241->23217 23243 17be0d std::_Lockit::_Lockit 5 API calls 23242->23243 23244 17bae3 23243->23244 23245 17bb01 InitializeCriticalSectionAndSpinCount 23244->23245 23246 17baec 23244->23246 23245->23246 23246->23235 23247->23241 23248->23230 21776 171e3e 21777 177a0d ___scrt_uninitialize_crt 68 API calls 21776->21777 21778 171e46 21777->21778 21786 17d5b7 21778->21786 21780 171e4b 21796 17d662 21780->21796 21783 171e75 21784 17ad27 ___free_lconv_mon 14 API calls 21783->21784 21785 171e80 21784->21785 21787 17d5c3 ___scrt_is_nonwritable_in_current_image 21786->21787 21800 177594 EnterCriticalSection 21787->21800 21789 17d63a 21805 17d659 21789->21805 21790 17d5ce 21790->21789 21792 17d60e DeleteCriticalSection 21790->21792 21801 177865 21790->21801 21795 17ad27 ___free_lconv_mon 14 API calls 21792->21795 21795->21790 21797 17d679 21796->21797 21799 171e5a DeleteCriticalSection 21796->21799 21798 17ad27 ___free_lconv_mon 14 API calls 21797->21798 21797->21799 21798->21799 21799->21780 21799->21783 21800->21790 21802 177878 _Fputc 21801->21802 21808 177923 21802->21808 21804 177884 _Fputc 21804->21790 21880 1775ab LeaveCriticalSection 21805->21880 21807 17d646 21807->21780 21809 17792f ___scrt_is_nonwritable_in_current_image 21808->21809 21810 17795c 21809->21810 21811 177939 21809->21811 21818 177954 21810->21818 21819 171d4e EnterCriticalSection 21810->21819 21812 177445 _Fputc 29 API calls 21811->21812 21812->21818 21814 17797a 21820 177895 21814->21820 21816 177987 21834 1779b2 21816->21834 21818->21804 21819->21814 21821 1778c5 21820->21821 21822 1778a2 21820->21822 21824 177a7b ___scrt_uninitialize_crt 64 API calls 21821->21824 21825 1778bd 21821->21825 21823 177445 _Fputc 29 API calls 21822->21823 21823->21825 21826 1778dd 21824->21826 21825->21816 21827 17d662 14 API calls 21826->21827 21828 1778e5 21827->21828 21829 17e509 _Ungetc 29 API calls 21828->21829 21830 1778f1 21829->21830 21837 182a87 21830->21837 21833 17ad27 ___free_lconv_mon 14 API calls 21833->21825 21879 171d62 LeaveCriticalSection 21834->21879 21836 1779b8 21836->21818 21839 182ab0 21837->21839 21840 1778f8 21837->21840 21838 182aff 21841 177445 _Fputc 29 API calls 21838->21841 21839->21838 21842 182ad7 21839->21842 21840->21825 21840->21833 21841->21840 21844 182b2a 21842->21844 21845 182b36 ___scrt_is_nonwritable_in_current_image 21844->21845 21852 182626 EnterCriticalSection 21845->21852 21847 182b44 21850 182b75 21847->21850 21853 1829e7 21847->21853 21866 182baf 21850->21866 21852->21847 21854 1823dd _Fputc 29 API calls 21853->21854 21856 1829f7 21854->21856 21855 1829fd 21869 182447 21855->21869 21856->21855 21858 1823dd _Fputc 29 API calls 21856->21858 21865 182a2f 21856->21865 21860 182a26 21858->21860 21859 1823dd _Fputc 29 API calls 21861 182a3b CloseHandle 21859->21861 21862 1823dd _Fputc 29 API calls 21860->21862 21861->21855 21863 182a47 GetLastError 21861->21863 21862->21865 21863->21855 21864 182a55 _Fputc 21864->21850 21865->21855 21865->21859 21878 182649 LeaveCriticalSection 21866->21878 21868 182b98 21868->21840 21870 1824bd 21869->21870 21871 182456 21869->21871 21872 176bb1 __strnicoll 14 API calls 21870->21872 21871->21870 21877 182480 21871->21877 21873 1824c2 21872->21873 21874 176bc4 __dosmaperr 14 API calls 21873->21874 21875 1824ad 21874->21875 21875->21864 21876 1824a7 SetStdHandle 21876->21875 21877->21875 21877->21876 21878->21868 21879->21836 21880->21807 21907 16d02a 21908 16d036 __EH_prolog3_GS 21907->21908 21911 16d0a2 21908->21911 21912 16d088 21908->21912 21915 16d050 21908->21915 21909 16e76e std::_Throw_Cpp_error 5 API calls 21910 16d179 21909->21910 21926 177d1d 21911->21926 21923 16c960 21912->21923 21915->21909 21917 162c50 std::_Throw_Cpp_error 29 API calls 21917->21915 21918 16d15e 21918->21917 21919 16d0c1 21919->21918 21920 177d1d 45 API calls 21919->21920 21922 16d198 21919->21922 21946 16c4e3 21919->21946 21920->21919 21922->21918 21950 179277 21922->21950 21963 177ed8 21923->21963 21927 177d29 ___scrt_is_nonwritable_in_current_image 21926->21927 21928 177d33 21927->21928 21929 177d4b 21927->21929 21931 176bb1 __strnicoll 14 API calls 21928->21931 22260 171d4e EnterCriticalSection 21929->22260 21933 177d38 21931->21933 21932 177d56 21935 17e509 _Ungetc 29 API calls 21932->21935 21936 177d6e 21932->21936 21934 17729c __strnicoll 29 API calls 21933->21934 21945 177d43 21934->21945 21935->21936 21937 177dd6 21936->21937 21938 177dfe 21936->21938 21939 176bb1 __strnicoll 14 API calls 21937->21939 22261 177e36 21938->22261 21941 177ddb 21939->21941 21943 17729c __strnicoll 29 API calls 21941->21943 21942 177e04 22271 177e2e 21942->22271 21943->21945 21945->21919 21947 16c517 21946->21947 21948 16c4f3 21946->21948 22275 16d85c 21947->22275 21948->21919 21951 179283 ___scrt_is_nonwritable_in_current_image 21950->21951 21952 17929f 21951->21952 21953 17928a 21951->21953 22313 171d4e EnterCriticalSection 21952->22313 21955 176bb1 __strnicoll 14 API calls 21953->21955 21956 17928f 21955->21956 21958 17729c __strnicoll 29 API calls 21956->21958 21957 1792a9 22314 1792ea 21957->22314 21960 17929a 21958->21960 21960->21922 21964 177ee4 ___scrt_is_nonwritable_in_current_image 21963->21964 21965 177f02 21964->21965 21966 177eeb 21964->21966 21976 171d4e EnterCriticalSection 21965->21976 21967 176bb1 __strnicoll 14 API calls 21966->21967 21970 177ef0 21967->21970 21969 177f0e 21977 177f4f 21969->21977 21972 17729c __strnicoll 29 API calls 21970->21972 21974 16c96b 21972->21974 21974->21915 21976->21969 21978 177fd2 21977->21978 21979 177f6c 21977->21979 21980 178099 21978->21980 21983 17e509 _Ungetc 29 API calls 21978->21983 21981 17e509 _Ungetc 29 API calls 21979->21981 22013 177f19 21980->22013 22037 1837ef 21980->22037 21982 177f72 21981->21982 21984 177f95 21982->21984 21987 17e509 _Ungetc 29 API calls 21982->21987 21985 177fe7 21983->21985 21984->21978 21999 177fb0 21984->21999 21988 17800a 21985->21988 21990 17e509 _Ungetc 29 API calls 21985->21990 21989 177f7e 21987->21989 21988->21980 21991 178021 21988->21991 21989->21984 21995 17e509 _Ungetc 29 API calls 21989->21995 21992 177ff3 21990->21992 21993 177e72 43 API calls 21991->21993 21992->21988 21998 17e509 _Ungetc 29 API calls 21992->21998 21994 17802a 21993->21994 21994->22013 22028 171eb5 21994->22028 21997 177f8a 21995->21997 22001 17e509 _Ungetc 29 API calls 21997->22001 22002 177fff 21998->22002 21999->22013 22017 177e72 21999->22017 22001->21984 22004 17e509 _Ungetc 29 API calls 22002->22004 22004->21988 22005 17806c 22033 17e39f 22005->22033 22006 177e72 43 API calls 22008 178053 22006->22008 22008->22005 22010 178059 22008->22010 22009 178080 22011 176bb1 __strnicoll 14 API calls 22009->22011 22009->22013 22012 179277 31 API calls 22010->22012 22011->22013 22012->22013 22014 177f47 22013->22014 22259 171d62 LeaveCriticalSection 22014->22259 22016 177f4d 22016->21974 22018 177e36 22017->22018 22019 177e42 22018->22019 22022 177e57 22018->22022 22020 176bb1 __strnicoll 14 API calls 22019->22020 22023 177e47 22020->22023 22021 177e66 22021->21999 22022->22021 22058 1837e4 22022->22058 22025 17729c __strnicoll 29 API calls 22023->22025 22027 177e52 22025->22027 22027->21999 22029 17afb3 __Getctype 39 API calls 22028->22029 22030 171ec0 22029->22030 22031 17b596 __Getctype 39 API calls 22030->22031 22032 171ed0 22031->22032 22032->22005 22032->22006 22034 17e3b2 _Fputc 22033->22034 22226 17e3d6 22034->22226 22036 17e3c4 _Fputc 22036->22009 22038 183989 22037->22038 22039 183998 22038->22039 22042 1839ad 22038->22042 22040 176bb1 __strnicoll 14 API calls 22039->22040 22041 18399d 22040->22041 22043 17729c __strnicoll 29 API calls 22041->22043 22044 183a0b 22042->22044 22045 18512f _Ungetc 14 API calls 22042->22045 22052 1839a8 22042->22052 22043->22052 22046 17e509 _Ungetc 29 API calls 22044->22046 22045->22044 22047 183a3b 22046->22047 22048 188983 43 API calls 22047->22048 22049 183a43 22048->22049 22050 17e509 _Ungetc 29 API calls 22049->22050 22049->22052 22051 183a7d 22050->22051 22051->22052 22053 17e509 _Ungetc 29 API calls 22051->22053 22052->22013 22054 183a8b 22053->22054 22054->22052 22055 17e509 _Ungetc 29 API calls 22054->22055 22056 183a99 22055->22056 22057 17e509 _Ungetc 29 API calls 22056->22057 22057->22052 22059 1837fa 22058->22059 22060 183807 22059->22060 22064 18381f 22059->22064 22061 176bb1 __strnicoll 14 API calls 22060->22061 22062 18380c 22061->22062 22063 17729c __strnicoll 29 API calls 22062->22063 22071 177e63 22063->22071 22065 18387e 22064->22065 22064->22071 22079 18512f 22064->22079 22067 17e509 _Ungetc 29 API calls 22065->22067 22068 183897 22067->22068 22084 188983 22068->22084 22071->21999 22072 17e509 _Ungetc 29 API calls 22073 1838d0 22072->22073 22073->22071 22074 17e509 _Ungetc 29 API calls 22073->22074 22075 1838de 22074->22075 22075->22071 22076 17e509 _Ungetc 29 API calls 22075->22076 22077 1838ec 22076->22077 22078 17e509 _Ungetc 29 API calls 22077->22078 22078->22071 22080 17c0e0 __dosmaperr 14 API calls 22079->22080 22081 18514c 22080->22081 22082 17ad27 ___free_lconv_mon 14 API calls 22081->22082 22083 185156 22082->22083 22083->22065 22085 18898f ___scrt_is_nonwritable_in_current_image 22084->22085 22086 188997 22085->22086 22090 1889b2 22085->22090 22087 176bc4 __dosmaperr 14 API calls 22086->22087 22088 18899c 22087->22088 22091 176bb1 __strnicoll 14 API calls 22088->22091 22089 1889c9 22092 176bc4 __dosmaperr 14 API calls 22089->22092 22090->22089 22093 188a04 22090->22093 22113 18389f 22091->22113 22096 1889ce 22092->22096 22094 188a0d 22093->22094 22095 188a22 22093->22095 22097 176bc4 __dosmaperr 14 API calls 22094->22097 22114 182626 EnterCriticalSection 22095->22114 22099 176bb1 __strnicoll 14 API calls 22096->22099 22100 188a12 22097->22100 22102 1889d6 22099->22102 22103 176bb1 __strnicoll 14 API calls 22100->22103 22101 188a28 22104 188a5c 22101->22104 22105 188a47 22101->22105 22107 17729c __strnicoll 29 API calls 22102->22107 22103->22102 22115 188a9c 22104->22115 22106 176bb1 __strnicoll 14 API calls 22105->22106 22109 188a4c 22106->22109 22107->22113 22111 176bc4 __dosmaperr 14 API calls 22109->22111 22110 188a57 22178 188a94 22110->22178 22111->22110 22113->22071 22113->22072 22114->22101 22116 188aae 22115->22116 22117 188ac6 22115->22117 22119 176bc4 __dosmaperr 14 API calls 22116->22119 22118 188e08 22117->22118 22123 188b09 22117->22123 22121 176bc4 __dosmaperr 14 API calls 22118->22121 22120 188ab3 22119->22120 22124 176bb1 __strnicoll 14 API calls 22120->22124 22122 188e0d 22121->22122 22125 176bb1 __strnicoll 14 API calls 22122->22125 22126 188b14 22123->22126 22129 188abb 22123->22129 22133 188b44 22123->22133 22124->22129 22127 188b21 22125->22127 22128 176bc4 __dosmaperr 14 API calls 22126->22128 22131 17729c __strnicoll 29 API calls 22127->22131 22130 188b19 22128->22130 22129->22110 22132 176bb1 __strnicoll 14 API calls 22130->22132 22131->22129 22132->22127 22134 188b5d 22133->22134 22135 188b98 22133->22135 22136 188b6a 22133->22136 22134->22136 22142 188b86 22134->22142 22139 17ad61 __strnicoll 15 API calls 22135->22139 22137 176bc4 __dosmaperr 14 API calls 22136->22137 22138 188b6f 22137->22138 22140 176bb1 __strnicoll 14 API calls 22138->22140 22143 188ba9 22139->22143 22144 188b76 22140->22144 22185 185dc4 22142->22185 22146 17ad27 ___free_lconv_mon 14 API calls 22143->22146 22147 17729c __strnicoll 29 API calls 22144->22147 22145 188ce4 22148 188d58 22145->22148 22152 188cfd GetConsoleMode 22145->22152 22149 188bb2 22146->22149 22177 188b81 22147->22177 22151 188d5c ReadFile 22148->22151 22150 17ad27 ___free_lconv_mon 14 API calls 22149->22150 22153 188bb9 22150->22153 22154 188dd0 GetLastError 22151->22154 22155 188d74 22151->22155 22152->22148 22156 188d0e 22152->22156 22157 188bde 22153->22157 22158 188bc3 22153->22158 22159 188ddd 22154->22159 22160 188d34 22154->22160 22155->22154 22161 188d4d 22155->22161 22156->22151 22162 188d14 ReadConsoleW 22156->22162 22181 181720 22157->22181 22164 176bb1 __strnicoll 14 API calls 22158->22164 22165 176bb1 __strnicoll 14 API calls 22159->22165 22170 176bd7 __dosmaperr 14 API calls 22160->22170 22160->22177 22173 188d99 22161->22173 22174 188db0 22161->22174 22161->22177 22162->22161 22167 188d2e GetLastError 22162->22167 22163 17ad27 ___free_lconv_mon 14 API calls 22163->22129 22168 188bc8 22164->22168 22169 188de2 22165->22169 22167->22160 22171 176bc4 __dosmaperr 14 API calls 22168->22171 22172 176bc4 __dosmaperr 14 API calls 22169->22172 22170->22177 22171->22177 22172->22177 22194 188ea5 22173->22194 22174->22177 22207 189149 22174->22207 22177->22163 22225 182649 LeaveCriticalSection 22178->22225 22180 188a9a 22180->22113 22182 181734 _Fputc 22181->22182 22213 1818c1 22182->22213 22184 181749 _Fputc 22184->22142 22186 185dd1 22185->22186 22188 185dde 22185->22188 22187 176bb1 __strnicoll 14 API calls 22186->22187 22189 185dd6 22187->22189 22190 185dea 22188->22190 22191 176bb1 __strnicoll 14 API calls 22188->22191 22189->22145 22190->22145 22192 185e0b 22191->22192 22193 17729c __strnicoll 29 API calls 22192->22193 22193->22189 22219 188ffc 22194->22219 22197 17adaf __strnicoll MultiByteToWideChar 22198 188fb9 22197->22198 22201 188fc2 GetLastError 22198->22201 22204 188eed 22198->22204 22199 188f47 22205 188f01 22199->22205 22206 181720 31 API calls 22199->22206 22200 188f37 22202 176bb1 __strnicoll 14 API calls 22200->22202 22203 176bd7 __dosmaperr 14 API calls 22201->22203 22202->22204 22203->22204 22204->22177 22205->22197 22206->22205 22208 189183 22207->22208 22209 189219 ReadFile 22208->22209 22210 189214 22208->22210 22209->22210 22211 189236 22209->22211 22210->22177 22211->22210 22212 181720 31 API calls 22211->22212 22212->22210 22214 1823dd _Fputc 29 API calls 22213->22214 22215 1818d3 22214->22215 22216 1818ef SetFilePointerEx 22215->22216 22218 1818db _Fputc 22215->22218 22217 181907 GetLastError 22216->22217 22216->22218 22217->22218 22218->22184 22220 189030 22219->22220 22221 1890a1 ReadFile 22220->22221 22223 188ebc 22220->22223 22222 1890ba 22221->22222 22221->22223 22222->22223 22224 181720 31 API calls 22222->22224 22223->22199 22223->22200 22223->22204 22223->22205 22224->22223 22225->22180 22228 17e3ea 22226->22228 22235 17e3fa 22226->22235 22227 17e41f 22230 17e453 22227->22230 22231 17e430 22227->22231 22228->22227 22228->22235 22238 1721e0 22228->22238 22233 17e4cf 22230->22233 22234 17e47b 22230->22234 22230->22235 22244 187902 22231->22244 22236 17adaf __strnicoll MultiByteToWideChar 22233->22236 22234->22235 22237 17adaf __strnicoll MultiByteToWideChar 22234->22237 22235->22036 22236->22235 22237->22235 22239 1721f0 22238->22239 22247 17b5f0 22239->22247 22255 189e83 22244->22255 22248 17220d 22247->22248 22249 17b607 22247->22249 22251 17b621 22248->22251 22249->22248 22250 17f695 __Getctype 39 API calls 22249->22250 22250->22248 22252 17221a 22251->22252 22253 17b638 22251->22253 22252->22227 22253->22252 22254 17c912 __strnicoll 39 API calls 22253->22254 22254->22252 22258 189eb1 _Fputc 22255->22258 22256 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 22257 18791d 22256->22257 22257->22235 22258->22256 22259->22016 22260->21932 22262 177e57 22261->22262 22263 177e42 22261->22263 22265 177e66 22262->22265 22267 1837e4 43 API calls 22262->22267 22264 176bb1 __strnicoll 14 API calls 22263->22264 22266 177e47 22264->22266 22265->21942 22268 17729c __strnicoll 29 API calls 22266->22268 22269 177e63 22267->22269 22270 177e52 22268->22270 22269->21942 22270->21942 22274 171d62 LeaveCriticalSection 22271->22274 22273 177e34 22273->21945 22274->22273 22276 16d910 22275->22276 22277 16d880 22275->22277 22279 163240 std::_Throw_Cpp_error 30 API calls 22276->22279 22278 1632c0 std::_Throw_Cpp_error 5 API calls 22277->22278 22280 16d892 22278->22280 22281 16d915 22279->22281 22286 1634d0 22280->22286 22283 16d89d codecvt 22284 162e20 std::_Throw_Cpp_error 29 API calls 22283->22284 22285 16d8de codecvt 22283->22285 22284->22285 22285->21948 22287 1634e3 22286->22287 22288 1634ef 22286->22288 22287->22283 22289 16350f 22288->22289 22290 1634fc 22288->22290 22301 1635c0 22289->22301 22293 163550 22290->22293 22294 163573 22293->22294 22295 16356e 22293->22295 22297 1635c0 std::_Throw_Cpp_error 3 API calls 22294->22297 22304 1635e0 22295->22304 22299 16357e 22297->22299 22298 16358b 22298->22287 22299->22298 22308 1772ac 22299->22308 22302 16b9cb std::ios_base::_Init 3 API calls 22301->22302 22303 1635d2 22302->22303 22303->22287 22305 1635f8 std::ios_base::_Init 22304->22305 22306 16f0bd std::_Throw_Cpp_error RaiseException 22305->22306 22307 16360d 22306->22307 22309 1774eb __strnicoll 29 API calls 22308->22309 22310 1772bb 22309->22310 22311 1772c9 __Getctype 11 API calls 22310->22311 22312 1772c8 22311->22312 22313->21957 22315 179302 22314->22315 22322 179372 22314->22322 22316 17e509 _Ungetc 29 API calls 22315->22316 22320 179308 22316->22320 22317 18512f _Ungetc 14 API calls 22319 1792b7 22317->22319 22318 17935a 22321 176bb1 __strnicoll 14 API calls 22318->22321 22325 1792e2 22319->22325 22320->22318 22320->22322 22323 17935f 22321->22323 22322->22317 22322->22319 22324 17729c __strnicoll 29 API calls 22323->22324 22324->22319 22328 171d62 LeaveCriticalSection 22325->22328 22327 1792e8 22327->21960 22328->22327 22494 17b258 22495 17b273 22494->22495 22496 17b263 22494->22496 22500 17b35d 22496->22500 22499 17ad27 ___free_lconv_mon 14 API calls 22499->22495 22501 17b372 22500->22501 22502 17b378 22500->22502 22503 17ad27 ___free_lconv_mon 14 API calls 22501->22503 22504 17ad27 ___free_lconv_mon 14 API calls 22502->22504 22503->22502 22505 17b384 22504->22505 22506 17ad27 ___free_lconv_mon 14 API calls 22505->22506 22507 17b38f 22506->22507 22508 17ad27 ___free_lconv_mon 14 API calls 22507->22508 22509 17b39a 22508->22509 22510 17ad27 ___free_lconv_mon 14 API calls 22509->22510 22511 17b3a5 22510->22511 22512 17ad27 ___free_lconv_mon 14 API calls 22511->22512 22513 17b3b0 22512->22513 22514 17ad27 ___free_lconv_mon 14 API calls 22513->22514 22515 17b3bb 22514->22515 22516 17ad27 ___free_lconv_mon 14 API calls 22515->22516 22517 17b3c6 22516->22517 22518 17ad27 ___free_lconv_mon 14 API calls 22517->22518 22519 17b3d1 22518->22519 22520 17ad27 ___free_lconv_mon 14 API calls 22519->22520 22521 17b3df 22520->22521 22526 17b4d6 22521->22526 22527 17b4e2 ___scrt_is_nonwritable_in_current_image 22526->22527 22542 177594 EnterCriticalSection 22527->22542 22529 17b516 22543 17b535 22529->22543 22531 17b4ec 22531->22529 22533 17ad27 ___free_lconv_mon 14 API calls 22531->22533 22533->22529 22534 17b541 22535 17b54d ___scrt_is_nonwritable_in_current_image 22534->22535 22547 177594 EnterCriticalSection 22535->22547 22537 17b557 22538 17b279 __dosmaperr 14 API calls 22537->22538 22539 17b56a 22538->22539 22548 17b58a 22539->22548 22542->22531 22546 1775ab LeaveCriticalSection 22543->22546 22545 17b405 22545->22534 22546->22545 22547->22537 22551 1775ab LeaveCriticalSection 22548->22551 22550 17b26b 22550->22499 22551->22550 23838 16cf43 23839 16cf5e 23838->23839 23841 16cf70 23839->23841 23842 16c9a4 23839->23842 23845 1793de 23842->23845 23846 1793ea ___scrt_is_nonwritable_in_current_image 23845->23846 23847 1793f1 23846->23847 23848 179408 23846->23848 23849 176bb1 __strnicoll 14 API calls 23847->23849 23858 171d4e EnterCriticalSection 23848->23858 23851 1793f6 23849->23851 23853 17729c __strnicoll 29 API calls 23851->23853 23852 179417 23859 17945c 23852->23859 23855 16c9b6 23853->23855 23855->23841 23856 179425 23873 179454 23856->23873 23858->23852 23860 179472 23859->23860 23862 1794fc _Ungetc 23859->23862 23861 1794a0 23860->23861 23860->23862 23863 18512f _Ungetc 14 API calls 23860->23863 23861->23862 23864 17e509 _Ungetc 29 API calls 23861->23864 23862->23856 23863->23861 23865 1794b2 23864->23865 23866 17e509 _Ungetc 29 API calls 23865->23866 23867 1794d5 23865->23867 23868 1794be 23866->23868 23867->23862 23876 179512 23867->23876 23868->23867 23870 17e509 _Ungetc 29 API calls 23868->23870 23871 1794ca 23870->23871 23872 17e509 _Ungetc 29 API calls 23871->23872 23872->23867 23903 171d62 LeaveCriticalSection 23873->23903 23875 17945a 23875->23855 23877 17e509 _Ungetc 29 API calls 23876->23877 23878 179535 23877->23878 23879 17955e 23878->23879 23880 17e509 _Ungetc 29 API calls 23878->23880 23886 179598 23879->23886 23889 17e1fb 23879->23889 23881 179543 23880->23881 23881->23879 23883 17e509 _Ungetc 29 API calls 23881->23883 23884 179551 23883->23884 23885 17e509 _Ungetc 29 API calls 23884->23885 23885->23879 23887 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 23886->23887 23888 179616 23887->23888 23888->23862 23890 17e20e _Fputc 23889->23890 23893 17e235 23890->23893 23892 17e223 _Fputc 23892->23886 23894 17e24a 23893->23894 23895 17e28b 23894->23895 23896 1721e0 _Fputc 39 API calls 23894->23896 23901 17e24e std::invalid_argument::invalid_argument _Fputc 23894->23901 23902 17e277 std::invalid_argument::invalid_argument 23894->23902 23898 17ae71 _Fputc WideCharToMultiByte 23895->23898 23895->23901 23895->23902 23896->23895 23897 177445 _Fputc 29 API calls 23897->23901 23899 17e346 23898->23899 23900 17e35c GetLastError 23899->23900 23899->23901 23900->23901 23900->23902 23901->23892 23902->23897 23902->23901 23903->23875 23952 16d349 23953 16d358 23952->23953 23955 16d37c 23953->23955 23956 178a2d 23953->23956 23957 178a40 _Fputc 23956->23957 23960 178a9a 23957->23960 23959 178a55 _Fputc 23959->23955 23961 178aac 23960->23961 23963 178acf 23960->23963 23962 177445 _Fputc 29 API calls 23961->23962 23964 178ac7 23962->23964 23963->23961 23965 178af6 23963->23965 23964->23959 23968 178bd0 23965->23968 23969 178bdc ___scrt_is_nonwritable_in_current_image 23968->23969 23976 171d4e EnterCriticalSection 23969->23976 23971 178bea 23977 178b30 23971->23977 23973 178bf7 23986 178c1f 23973->23986 23976->23971 23978 177a7b ___scrt_uninitialize_crt 64 API calls 23977->23978 23979 178b4b 23978->23979 23980 17d662 14 API calls 23979->23980 23981 178b55 23980->23981 23982 17c0e0 __dosmaperr 14 API calls 23981->23982 23985 178b70 23981->23985 23983 178b94 23982->23983 23984 17ad27 ___free_lconv_mon 14 API calls 23983->23984 23984->23985 23985->23973 23989 171d62 LeaveCriticalSection 23986->23989 23988 178b2e 23988->23959 23989->23988 21439 19619e 21444 1961d4 21439->21444 21440 196321 GetPEB 21441 196333 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 21440->21441 21442 1963da WriteProcessMemory 21441->21442 21441->21444 21443 19641f 21442->21443 21445 196461 WriteProcessMemory Wow64SetThreadContext ResumeThread 21443->21445 21446 196424 WriteProcessMemory 21443->21446 21444->21440 21444->21441 21446->21443 24046 16d39a 24047 16d3d8 24046->24047 24048 16d3a3 24046->24048 24048->24047 24051 1779ba 24048->24051 24050 16d3cb 24052 1779cc 24051->24052 24055 1779d5 ___scrt_uninitialize_crt 24051->24055 24053 177b38 ___scrt_uninitialize_crt 68 API calls 24052->24053 24054 1779d2 24053->24054 24054->24050 24056 1779e4 24055->24056 24059 177cbd 24055->24059 24056->24050 24060 177cc9 ___scrt_is_nonwritable_in_current_image 24059->24060 24067 171d4e EnterCriticalSection 24060->24067 24062 177cd7 24063 177a16 ___scrt_uninitialize_crt 68 API calls 24062->24063 24064 177ce8 24063->24064 24068 177d11 24064->24068 24067->24062 24071 171d62 LeaveCriticalSection 24068->24071 24070 177a0b 24070->24050 24071->24070 22914 16d2b9 22915 16d2db 22914->22915 22919 16d2f0 22914->22919 22920 16d431 22915->22920 22923 16d44c 22920->22923 22925 16d49d 22920->22925 22921 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 22922 16d2e0 22921->22922 22922->22919 22926 178433 22922->22926 22924 17846e 69 API calls 22923->22924 22923->22925 22924->22925 22925->22921 22927 178453 22926->22927 22928 17843e 22926->22928 22927->22928 22929 17845a 22927->22929 22930 176bb1 __strnicoll 14 API calls 22928->22930 22936 176c61 22929->22936 22931 178443 22930->22931 22933 17729c __strnicoll 29 API calls 22931->22933 22935 17844e 22933->22935 22934 178469 22934->22919 22935->22919 22937 176c74 _Fputc 22936->22937 22940 176eda 22937->22940 22939 176c89 _Fputc 22939->22934 22944 176ee6 ___scrt_is_nonwritable_in_current_image 22940->22944 22941 176eec 22942 177445 _Fputc 29 API calls 22941->22942 22943 176f07 22942->22943 22943->22939 22944->22941 22945 176f2f 22944->22945 22951 171d4e EnterCriticalSection 22945->22951 22947 176f3b 22952 176dee 22947->22952 22949 176f51 22963 176f7a 22949->22963 22951->22947 22953 176e14 22952->22953 22954 176e01 22952->22954 22966 176d15 22953->22966 22954->22949 22956 176e37 22957 176e52 22956->22957 22962 176ec5 22956->22962 22970 18197a 22956->22970 22959 177a7b ___scrt_uninitialize_crt 64 API calls 22957->22959 22960 176e65 22959->22960 22984 181760 22960->22984 22962->22949 23025 171d62 LeaveCriticalSection 22963->23025 22965 176f82 22965->22943 22967 176d7e 22966->22967 22968 176d26 22966->22968 22967->22956 22968->22967 22969 181720 31 API calls 22968->22969 22969->22967 22971 181d4c 22970->22971 22972 181d5b 22971->22972 22973 181d83 22971->22973 22975 177445 _Fputc 29 API calls 22972->22975 22974 17e509 _Ungetc 29 API calls 22973->22974 22976 181d8c 22974->22976 22977 181d76 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 22975->22977 22987 18177e 22976->22987 22977->22957 22980 181e36 22990 1819d6 22980->22990 22981 181e4d 22981->22977 23002 181b81 22981->23002 22985 1818c1 _Fputc 31 API calls 22984->22985 22986 181779 22985->22986 22986->22962 23009 18179c 22987->23009 22991 1819e5 _Fputc 22990->22991 22992 17e509 _Ungetc 29 API calls 22991->22992 22993 181a01 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 22992->22993 22996 18177e 33 API calls 22993->22996 23001 181a0d 22993->23001 22994 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 22995 181b7f 22994->22995 22995->22977 22997 181a61 22996->22997 22998 181a93 ReadFile 22997->22998 22997->23001 22999 181aba 22998->22999 22998->23001 23000 18177e 33 API calls 22999->23000 23000->23001 23001->22994 23003 17e509 _Ungetc 29 API calls 23002->23003 23004 181b94 23003->23004 23005 18177e 33 API calls 23004->23005 23008 181bde __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 23004->23008 23006 181c3b 23005->23006 23007 18177e 33 API calls 23006->23007 23006->23008 23007->23008 23008->22977 23011 1817a8 ___scrt_is_nonwritable_in_current_image 23009->23011 23010 181797 23010->22977 23010->22980 23010->22981 23011->23010 23012 1817eb 23011->23012 23014 181831 23011->23014 23013 177445 _Fputc 29 API calls 23012->23013 23013->23010 23020 182626 EnterCriticalSection 23014->23020 23016 181837 23017 181858 23016->23017 23018 1818c1 _Fputc 31 API calls 23016->23018 23021 1818b9 23017->23021 23018->23017 23020->23016 23024 182649 LeaveCriticalSection 23021->23024 23023 1818bf 23023->23010 23024->23023 23025->22965 18820 16edd0 18821 16eddc ___scrt_is_nonwritable_in_current_image 18820->18821 18846 16bc28 18821->18846 18823 16ede3 18824 16ef3c 18823->18824 18833 16ee0d ___scrt_is_nonwritable_in_current_image _unexpected ___scrt_release_startup_lock 18823->18833 18897 16e42c IsProcessorFeaturePresent 18824->18897 18826 16ef43 18877 174a0a 18826->18877 18831 16ee2c 18832 16eead 18857 176f89 18832->18857 18833->18831 18833->18832 18880 174a54 18833->18880 18836 16eeb3 18861 161bf0 18836->18861 18847 16bc31 18846->18847 18904 16e094 IsProcessorFeaturePresent 18847->18904 18851 16bc42 18856 16bc46 18851->18856 18914 171caf 18851->18914 18854 16bc5d 18854->18823 18856->18823 18858 176f92 18857->18858 18859 176f97 18857->18859 18986 1770b2 18858->18986 18859->18836 18862 161c2d 18861->18862 19896 162830 18862->19896 21221 174b55 18877->21221 18881 174a6a ___scrt_is_nonwritable_in_current_image std::_Lockit::_Lockit 18880->18881 18881->18832 18882 17afb3 __Getctype 39 API calls 18881->18882 18885 17924c 18882->18885 18883 177806 CallUnexpected 39 API calls 18884 179276 18883->18884 18885->18883 18898 16e442 _unexpected std::invalid_argument::invalid_argument 18897->18898 18899 16e4ed IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18898->18899 18900 16e531 _unexpected 18899->18900 18900->18826 18901 174a20 18902 174b55 _unexpected 21 API calls 18901->18902 18903 16ef51 18902->18903 18905 16bc3d 18904->18905 18906 16f76c 18905->18906 18923 17a9f6 18906->18923 18910 16f77d 18911 16f788 18910->18911 18937 17aa32 18910->18937 18911->18851 18913 16f775 18913->18851 18977 17d0ee 18914->18977 18917 16f78b 18918 16f794 18917->18918 18919 16f79e 18917->18919 18920 179acb ___vcrt_uninitialize_ptd 6 API calls 18918->18920 18919->18856 18921 16f799 18920->18921 18922 17aa32 ___vcrt_uninitialize_locks DeleteCriticalSection 18921->18922 18922->18919 18924 17a9ff 18923->18924 18926 17aa28 18924->18926 18927 16f771 18924->18927 18941 18527a 18924->18941 18928 17aa32 ___vcrt_uninitialize_locks DeleteCriticalSection 18926->18928 18927->18913 18929 179a98 18927->18929 18928->18927 18958 18518b 18929->18958 18934 179ac8 18934->18910 18936 179aad 18936->18910 18938 17aa5c 18937->18938 18939 17aa3d 18937->18939 18938->18913 18940 17aa47 DeleteCriticalSection 18939->18940 18940->18938 18940->18940 18946 18530c 18941->18946 18944 1852b2 InitializeCriticalSectionAndSpinCount 18945 18529d 18944->18945 18945->18924 18947 185294 18946->18947 18950 18532d 18946->18950 18947->18944 18947->18945 18948 185395 GetProcAddress 18948->18947 18950->18947 18950->18948 18951 185386 18950->18951 18953 1852c1 LoadLibraryExW 18950->18953 18951->18948 18952 18538e FreeLibrary 18951->18952 18952->18948 18954 1852d8 GetLastError 18953->18954 18955 185308 18953->18955 18954->18955 18956 1852e3 ___vcrt_FlsGetValue 18954->18956 18955->18950 18956->18955 18957 1852f9 LoadLibraryExW 18956->18957 18957->18950 18959 18530c ___vcrt_FlsGetValue 5 API calls 18958->18959 18960 1851a5 18959->18960 18961 1851be TlsAlloc 18960->18961 18962 179aa2 18960->18962 18962->18936 18963 18523c 18962->18963 18964 18530c ___vcrt_FlsGetValue 5 API calls 18963->18964 18965 185256 18964->18965 18966 185271 TlsSetValue 18965->18966 18967 179abb 18965->18967 18966->18967 18967->18934 18968 179acb 18967->18968 18969 179ad5 18968->18969 18970 179adb 18968->18970 18972 1851c6 18969->18972 18970->18936 18973 18530c ___vcrt_FlsGetValue 5 API calls 18972->18973 18974 1851e0 18973->18974 18975 1851f8 TlsFree 18974->18975 18976 1851ec 18974->18976 18975->18976 18976->18970 18978 17d0fe 18977->18978 18979 16bc4f 18977->18979 18978->18979 18981 17c862 18978->18981 18979->18854 18979->18917 18982 17c869 18981->18982 18983 17c8ac GetStdHandle 18982->18983 18984 17c90e 18982->18984 18985 17c8bf GetFileType 18982->18985 18983->18982 18984->18978 18985->18982 18987 1770bb 18986->18987 18988 1770d1 18986->18988 18987->18988 18992 176ff3 18987->18992 18988->18859 18990 1770c8 18990->18988 19009 1771c0 18990->19009 18993 176fff 18992->18993 18994 176ffc 18992->18994 19018 17c925 18993->19018 18994->18990 18999 177010 19045 17ad27 18999->19045 19000 17701c 19051 1770de 19000->19051 19005 17ad27 ___free_lconv_mon 14 API calls 19006 177040 19005->19006 19007 17ad27 ___free_lconv_mon 14 API calls 19006->19007 19008 177046 19007->19008 19008->18990 19010 177231 19009->19010 19013 1771cf 19009->19013 19010->18988 19011 17ae71 WideCharToMultiByte _Fputc 19011->19013 19012 17c0e0 __dosmaperr 14 API calls 19012->19013 19013->19010 19013->19011 19013->19012 19015 177235 19013->19015 19017 17ad27 ___free_lconv_mon 14 API calls 19013->19017 19615 182053 19013->19615 19014 17ad27 ___free_lconv_mon 14 API calls 19014->19010 19015->19014 19017->19013 19019 17c92e 19018->19019 19023 177005 19018->19023 19073 17b06e 19019->19073 19024 181f7c GetEnvironmentStringsW 19023->19024 19025 17700a 19024->19025 19026 181f94 19024->19026 19025->18999 19025->19000 19027 17ae71 _Fputc WideCharToMultiByte 19026->19027 19028 181fb1 19027->19028 19029 181fbb FreeEnvironmentStringsW 19028->19029 19030 181fc6 19028->19030 19029->19025 19031 17ad61 __strnicoll 15 API calls 19030->19031 19032 181fcd 19031->19032 19033 181fd5 19032->19033 19034 181fe6 19032->19034 19035 17ad27 ___free_lconv_mon 14 API calls 19033->19035 19036 17ae71 _Fputc WideCharToMultiByte 19034->19036 19037 181fda FreeEnvironmentStringsW 19035->19037 19038 181ff6 19036->19038 19037->19025 19039 181ffd 19038->19039 19040 182005 19038->19040 19041 17ad27 ___free_lconv_mon 14 API calls 19039->19041 19042 17ad27 ___free_lconv_mon 14 API calls 19040->19042 19043 182003 FreeEnvironmentStringsW 19041->19043 19042->19043 19043->19025 19046 17ad32 RtlFreeHeap 19045->19046 19050 177016 19045->19050 19047 17ad47 GetLastError 19046->19047 19046->19050 19048 17ad54 __dosmaperr 19047->19048 19049 176bb1 __strnicoll 12 API calls 19048->19049 19049->19050 19050->18990 19052 1770f3 19051->19052 19053 17c0e0 __dosmaperr 14 API calls 19052->19053 19054 17711a 19053->19054 19055 177122 19054->19055 19064 17712c 19054->19064 19056 17ad27 ___free_lconv_mon 14 API calls 19055->19056 19072 177023 19056->19072 19057 177189 19058 17ad27 ___free_lconv_mon 14 API calls 19057->19058 19058->19072 19059 17c0e0 __dosmaperr 14 API calls 19059->19064 19060 177198 19605 177083 19060->19605 19064->19057 19064->19059 19064->19060 19066 1771b3 19064->19066 19068 17ad27 ___free_lconv_mon 14 API calls 19064->19068 19596 17a99c 19064->19596 19065 17ad27 ___free_lconv_mon 14 API calls 19067 1771a5 19065->19067 19611 1772c9 IsProcessorFeaturePresent 19066->19611 19071 17ad27 ___free_lconv_mon 14 API calls 19067->19071 19068->19064 19070 1771bf 19071->19072 19072->19005 19074 17b07f 19073->19074 19075 17b079 19073->19075 19094 17b085 19074->19094 19125 17ba0a 19074->19125 19120 17b9cb 19075->19120 19083 17b0c6 19085 17ba0a __dosmaperr 6 API calls 19083->19085 19084 17b0b1 19086 17ba0a __dosmaperr 6 API calls 19084->19086 19087 17b0d2 19085->19087 19088 17b0bd 19086->19088 19089 17b0d6 19087->19089 19090 17b0e5 19087->19090 19093 17ad27 ___free_lconv_mon 14 API calls 19088->19093 19091 17ba0a __dosmaperr 6 API calls 19089->19091 19139 17b2c4 19090->19139 19091->19088 19093->19094 19097 17b08a 19094->19097 19144 177806 19094->19144 19096 17ad27 ___free_lconv_mon 14 API calls 19096->19097 19098 17cce6 19097->19098 19099 17cd10 19098->19099 19417 17cb72 19099->19417 19102 17cd29 19102->19023 19105 17cd42 19107 17ad27 ___free_lconv_mon 14 API calls 19105->19107 19106 17cd50 19431 17c96d 19106->19431 19107->19102 19110 17cd88 19112 176bb1 __strnicoll 14 API calls 19110->19112 19111 17cda3 19113 17cdcf 19111->19113 19117 17ad27 ___free_lconv_mon 14 API calls 19111->19117 19114 17cd8d 19112->19114 19115 17ce18 19113->19115 19442 17d0a1 19113->19442 19116 17ad27 ___free_lconv_mon 14 API calls 19114->19116 19119 17ad27 ___free_lconv_mon 14 API calls 19115->19119 19116->19102 19117->19113 19119->19102 19155 17be0d 19120->19155 19123 17ba02 TlsGetValue 19124 17b9f0 19124->19074 19126 17be0d std::_Lockit::_Lockit 5 API calls 19125->19126 19127 17ba26 19126->19127 19128 17ba44 TlsSetValue 19127->19128 19129 17b099 19127->19129 19129->19094 19130 17c0e0 19129->19130 19131 17c0ed 19130->19131 19132 17c118 HeapAlloc 19131->19132 19133 17c12d 19131->19133 19138 17c101 __dosmaperr 19131->19138 19134 17c12b 19132->19134 19132->19138 19173 176bb1 19133->19173 19136 17b0a9 19134->19136 19136->19083 19136->19084 19138->19132 19138->19133 19170 174d3c 19138->19170 19210 17b42a 19139->19210 19312 17d1a5 19144->19312 19148 177820 IsProcessorFeaturePresent 19151 17782c 19148->19151 19149 174a20 _unexpected 21 API calls 19153 177849 19149->19153 19150 177816 19150->19148 19154 17783f 19150->19154 19342 1772fd 19151->19342 19154->19149 19156 17be3d 19155->19156 19157 17b9e7 19155->19157 19156->19157 19162 17bd42 19156->19162 19157->19123 19157->19124 19160 17be57 GetProcAddress 19160->19157 19161 17be67 std::_Lockit::_Lockit 19160->19161 19161->19157 19163 17bd53 ___vcrt_FlsGetValue 19162->19163 19164 17bde9 19163->19164 19165 17bd71 LoadLibraryExW 19163->19165 19169 17bdbf LoadLibraryExW 19163->19169 19164->19157 19164->19160 19166 17bdf0 19165->19166 19167 17bd8c GetLastError 19165->19167 19166->19164 19168 17be02 FreeLibrary 19166->19168 19167->19163 19168->19164 19169->19163 19169->19166 19176 174d77 19170->19176 19187 17b104 GetLastError 19173->19187 19175 176bb6 19175->19136 19177 174d83 ___scrt_is_nonwritable_in_current_image 19176->19177 19182 177594 EnterCriticalSection 19177->19182 19179 174d8e _unexpected 19183 174dc5 19179->19183 19182->19179 19186 1775ab LeaveCriticalSection 19183->19186 19185 174d47 19185->19138 19186->19185 19188 17b11a 19187->19188 19191 17b120 19187->19191 19189 17b9cb __dosmaperr 6 API calls 19188->19189 19189->19191 19190 17ba0a __dosmaperr 6 API calls 19192 17b13c 19190->19192 19191->19190 19208 17b124 SetLastError 19191->19208 19194 17c0e0 __dosmaperr 12 API calls 19192->19194 19192->19208 19195 17b151 19194->19195 19196 17b16a 19195->19196 19197 17b159 19195->19197 19199 17ba0a __dosmaperr 6 API calls 19196->19199 19198 17ba0a __dosmaperr 6 API calls 19197->19198 19200 17b167 19198->19200 19201 17b176 19199->19201 19206 17ad27 ___free_lconv_mon 12 API calls 19200->19206 19202 17b191 19201->19202 19203 17b17a 19201->19203 19204 17b2c4 __dosmaperr 12 API calls 19202->19204 19205 17ba0a __dosmaperr 6 API calls 19203->19205 19207 17b19c 19204->19207 19205->19200 19206->19208 19209 17ad27 ___free_lconv_mon 12 API calls 19207->19209 19208->19175 19209->19208 19211 17b436 ___scrt_is_nonwritable_in_current_image 19210->19211 19224 177594 EnterCriticalSection 19211->19224 19213 17b440 19225 17b470 19213->19225 19216 17b47c 19217 17b488 ___scrt_is_nonwritable_in_current_image 19216->19217 19229 177594 EnterCriticalSection 19217->19229 19219 17b492 19230 17b279 19219->19230 19221 17b4aa 19234 17b4ca 19221->19234 19224->19213 19228 1775ab LeaveCriticalSection 19225->19228 19227 17b332 19227->19216 19228->19227 19229->19219 19231 17b2af __Getctype 19230->19231 19232 17b288 __Getctype 19230->19232 19231->19221 19232->19231 19237 17f4ca 19232->19237 19311 1775ab LeaveCriticalSection 19234->19311 19236 17b0f0 19236->19096 19238 17f54a 19237->19238 19243 17f4e0 19237->19243 19239 17f598 19238->19239 19241 17ad27 ___free_lconv_mon 14 API calls 19238->19241 19305 17f664 19239->19305 19244 17f56c 19241->19244 19242 17f513 19245 17f535 19242->19245 19253 17ad27 ___free_lconv_mon 14 API calls 19242->19253 19243->19238 19243->19242 19248 17ad27 ___free_lconv_mon 14 API calls 19243->19248 19246 17ad27 ___free_lconv_mon 14 API calls 19244->19246 19247 17ad27 ___free_lconv_mon 14 API calls 19245->19247 19249 17f57f 19246->19249 19250 17f53f 19247->19250 19252 17f508 19248->19252 19254 17ad27 ___free_lconv_mon 14 API calls 19249->19254 19255 17ad27 ___free_lconv_mon 14 API calls 19250->19255 19251 17f606 19256 17ad27 ___free_lconv_mon 14 API calls 19251->19256 19265 17e92c 19252->19265 19258 17f52a 19253->19258 19259 17f58d 19254->19259 19255->19238 19262 17f60c 19256->19262 19293 17ec47 19258->19293 19261 17ad27 ___free_lconv_mon 14 API calls 19259->19261 19261->19239 19262->19231 19263 17f5a6 19263->19251 19264 17ad27 14 API calls ___free_lconv_mon 19263->19264 19264->19263 19266 17e93d 19265->19266 19292 17ea26 19265->19292 19267 17e94e 19266->19267 19268 17ad27 ___free_lconv_mon 14 API calls 19266->19268 19269 17e960 19267->19269 19271 17ad27 ___free_lconv_mon 14 API calls 19267->19271 19268->19267 19270 17e972 19269->19270 19272 17ad27 ___free_lconv_mon 14 API calls 19269->19272 19273 17e984 19270->19273 19274 17ad27 ___free_lconv_mon 14 API calls 19270->19274 19271->19269 19272->19270 19275 17e996 19273->19275 19276 17ad27 ___free_lconv_mon 14 API calls 19273->19276 19274->19273 19277 17e9a8 19275->19277 19279 17ad27 ___free_lconv_mon 14 API calls 19275->19279 19276->19275 19279->19277 19292->19242 19294 17ec54 19293->19294 19295 17ecac 19293->19295 19296 17ec64 19294->19296 19297 17ad27 ___free_lconv_mon 14 API calls 19294->19297 19295->19245 19298 17ec76 19296->19298 19299 17ad27 ___free_lconv_mon 14 API calls 19296->19299 19297->19296 19300 17ec88 19298->19300 19301 17ad27 ___free_lconv_mon 14 API calls 19298->19301 19299->19298 19302 17ec9a 19300->19302 19303 17ad27 ___free_lconv_mon 14 API calls 19300->19303 19301->19300 19302->19295 19304 17ad27 ___free_lconv_mon 14 API calls 19302->19304 19303->19302 19304->19295 19306 17f690 19305->19306 19307 17f671 19305->19307 19306->19263 19307->19306 19308 17ed2b __Getctype 14 API calls 19307->19308 19309 17f68a 19308->19309 19310 17ad27 ___free_lconv_mon 14 API calls 19309->19310 19310->19306 19311->19236 19348 17d428 19312->19348 19315 17d1cc 19316 17d1d8 ___scrt_is_nonwritable_in_current_image 19315->19316 19317 17b104 __dosmaperr 14 API calls 19316->19317 19318 17d228 19316->19318 19319 17d23a _unexpected 19316->19319 19324 17d209 _unexpected 19316->19324 19317->19324 19320 176bb1 __strnicoll 14 API calls 19318->19320 19321 17d270 _unexpected 19319->19321 19362 177594 EnterCriticalSection 19319->19362 19322 17d22d 19320->19322 19327 17d2ad 19321->19327 19328 17d3aa 19321->19328 19338 17d2db 19321->19338 19359 17729c 19322->19359 19324->19318 19324->19319 19341 17d212 19324->19341 19327->19338 19363 17afb3 GetLastError 19327->19363 19329 17d3b5 19328->19329 19394 1775ab LeaveCriticalSection 19328->19394 19332 174a20 _unexpected 21 API calls 19329->19332 19334 17d3bd 19332->19334 19335 17afb3 __Getctype 39 API calls 19339 17d330 19335->19339 19337 17afb3 __Getctype 39 API calls 19337->19338 19390 17d356 19338->19390 19340 17afb3 __Getctype 39 API calls 19339->19340 19339->19341 19340->19341 19341->19150 19343 177319 _unexpected std::invalid_argument::invalid_argument 19342->19343 19344 177345 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 19343->19344 19347 177416 _unexpected 19344->19347 19346 177434 19346->19154 19409 16ba3f 19347->19409 19349 17d434 ___scrt_is_nonwritable_in_current_image 19348->19349 19354 177594 EnterCriticalSection 19349->19354 19351 17d442 19355 17d484 19351->19355 19354->19351 19358 1775ab LeaveCriticalSection 19355->19358 19357 17780b 19357->19150 19357->19315 19358->19357 19395 1774eb 19359->19395 19361 1772a8 19361->19341 19362->19321 19364 17afcf 19363->19364 19365 17afc9 19363->19365 19366 17ba0a __dosmaperr 6 API calls 19364->19366 19369 17afd3 SetLastError 19364->19369 19367 17b9cb __dosmaperr 6 API calls 19365->19367 19368 17afeb 19366->19368 19367->19364 19368->19369 19371 17c0e0 __dosmaperr 14 API calls 19368->19371 19373 17b063 19369->19373 19374 17b068 19369->19374 19372 17b000 19371->19372 19375 17b019 19372->19375 19376 17b008 19372->19376 19373->19337 19377 177806 CallUnexpected 37 API calls 19374->19377 19380 17ba0a __dosmaperr 6 API calls 19375->19380 19379 17ba0a __dosmaperr 6 API calls 19376->19379 19378 17b06d 19377->19378 19384 17b016 19379->19384 19381 17b025 19380->19381 19382 17b040 19381->19382 19383 17b029 19381->19383 19387 17b2c4 __dosmaperr 14 API calls 19382->19387 19385 17ba0a __dosmaperr 6 API calls 19383->19385 19386 17ad27 ___free_lconv_mon 14 API calls 19384->19386 19385->19384 19386->19369 19388 17b04b 19387->19388 19389 17ad27 ___free_lconv_mon 14 API calls 19388->19389 19389->19369 19391 17d322 19390->19391 19392 17d35a 19390->19392 19391->19335 19391->19339 19391->19341 19408 1775ab LeaveCriticalSection 19392->19408 19394->19329 19396 1774fd _Fputc 19395->19396 19399 177445 19396->19399 19398 177515 _Fputc 19398->19361 19400 177455 19399->19400 19401 17745c 19399->19401 19402 172240 _Fputc 16 API calls 19400->19402 19403 1774c2 _Fputc GetLastError SetLastError 19401->19403 19406 17746a 19401->19406 19402->19401 19404 177491 19403->19404 19405 1772c9 __Getctype 11 API calls 19404->19405 19404->19406 19407 1774c1 19405->19407 19406->19398 19408->19391 19410 16ba47 19409->19410 19411 16ba48 IsProcessorFeaturePresent 19409->19411 19410->19346 19413 16df86 19411->19413 19416 16e06c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 19413->19416 19415 16e069 19415->19346 19416->19415 19450 17142a 19417->19450 19420 17cba5 19422 17cbaa GetACP 19420->19422 19423 17cbbc 19420->19423 19421 17cb93 GetOEMCP 19421->19423 19422->19423 19423->19102 19424 17ad61 19423->19424 19425 17ad9f 19424->19425 19430 17ad6f __dosmaperr 19424->19430 19427 176bb1 __strnicoll 14 API calls 19425->19427 19426 17ad8a RtlAllocateHeap 19428 17ad9d 19426->19428 19426->19430 19427->19428 19428->19105 19428->19106 19429 174d3c std::ios_base::_Init 2 API calls 19429->19430 19430->19425 19430->19426 19430->19429 19432 17cb72 41 API calls 19431->19432 19433 17c98d 19432->19433 19435 17c9ca IsValidCodePage 19433->19435 19440 17ca92 19433->19440 19441 17c9e5 std::invalid_argument::invalid_argument 19433->19441 19434 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19437 17cb70 19434->19437 19436 17c9dc 19435->19436 19435->19440 19438 17ca05 GetCPInfo 19436->19438 19436->19441 19437->19110 19437->19111 19438->19440 19438->19441 19440->19434 19490 17cefc 19441->19490 19443 17d0ad ___scrt_is_nonwritable_in_current_image 19442->19443 19570 177594 EnterCriticalSection 19443->19570 19445 17d0b7 19571 17ce3b 19445->19571 19451 171441 19450->19451 19452 171448 19450->19452 19451->19420 19451->19421 19452->19451 19453 17afb3 __Getctype 39 API calls 19452->19453 19454 171469 19453->19454 19458 17b596 19454->19458 19459 17147f 19458->19459 19460 17b5a9 19458->19460 19462 17b5c3 19459->19462 19460->19459 19466 17f695 19460->19466 19463 17b5d6 19462->19463 19464 17b5eb 19462->19464 19463->19464 19487 17c912 19463->19487 19464->19451 19467 17f6a1 ___scrt_is_nonwritable_in_current_image 19466->19467 19468 17afb3 __Getctype 39 API calls 19467->19468 19469 17f6aa 19468->19469 19476 17f6f0 19469->19476 19479 177594 EnterCriticalSection 19469->19479 19471 17f6c8 19480 17f716 19471->19480 19476->19459 19477 177806 CallUnexpected 39 API calls 19478 17f715 19477->19478 19479->19471 19481 17f724 __Getctype 19480->19481 19483 17f6d9 19480->19483 19482 17f4ca __Getctype 14 API calls 19481->19482 19481->19483 19482->19483 19484 17f6f5 19483->19484 19485 1775ab std::_Lockit::~_Lockit LeaveCriticalSection 19484->19485 19486 17f6ec 19485->19486 19486->19476 19486->19477 19488 17afb3 __Getctype 39 API calls 19487->19488 19489 17c917 19488->19489 19489->19464 19491 17cf24 GetCPInfo 19490->19491 19500 17cfed 19490->19500 19497 17cf3c 19491->19497 19491->19500 19493 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19495 17d09f 19493->19495 19495->19440 19501 17c3cc 19497->19501 19500->19493 19502 17142a __strnicoll 39 API calls 19501->19502 19503 17c3ec 19502->19503 19521 17adaf 19503->19521 19505 17c4a8 19508 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19505->19508 19506 17c4a0 19524 16ea27 19506->19524 19507 17c419 19507->19505 19507->19506 19510 17ad61 __strnicoll 15 API calls 19507->19510 19512 17c43e std::invalid_argument::invalid_argument __alloca_probe_16 19507->19512 19511 17c4cb 19508->19511 19510->19512 19516 17c4cd 19511->19516 19512->19506 19513 17adaf __strnicoll MultiByteToWideChar 19512->19513 19514 17c487 19513->19514 19514->19506 19515 17c48e GetStringTypeW 19514->19515 19515->19506 19517 17142a __strnicoll 39 API calls 19516->19517 19518 17c4e0 19517->19518 19533 17c516 19518->19533 19528 17add9 19521->19528 19525 16ea42 19524->19525 19526 16ea31 19524->19526 19525->19505 19526->19525 19530 17831e 19526->19530 19529 17adcb MultiByteToWideChar 19528->19529 19529->19507 19531 17ad27 ___free_lconv_mon 14 API calls 19530->19531 19532 178336 19531->19532 19532->19525 19534 17c531 __strnicoll 19533->19534 19535 17adaf __strnicoll MultiByteToWideChar 19534->19535 19539 17c575 19535->19539 19570->19445 19581 178d0b 19571->19581 19573 17ce5d 19574 178d0b 29 API calls 19573->19574 19575 17ce7c 19574->19575 19576 17ad27 ___free_lconv_mon 14 API calls 19575->19576 19577 17cea3 19575->19577 19576->19577 19578 17d0e2 19577->19578 19595 1775ab LeaveCriticalSection 19578->19595 19580 17d0d0 19580->19115 19582 178d1c 19581->19582 19590 178d18 codecvt 19581->19590 19583 178d36 std::invalid_argument::invalid_argument 19582->19583 19584 178d23 19582->19584 19588 178d64 19583->19588 19589 178d6d 19583->19589 19583->19590 19585 176bb1 __strnicoll 14 API calls 19584->19585 19586 178d28 19585->19586 19587 17729c __strnicoll 29 API calls 19586->19587 19587->19590 19591 176bb1 __strnicoll 14 API calls 19588->19591 19589->19590 19592 176bb1 __strnicoll 14 API calls 19589->19592 19590->19573 19593 178d69 19591->19593 19592->19593 19594 17729c __strnicoll 29 API calls 19593->19594 19594->19590 19595->19580 19597 17a9b8 19596->19597 19598 17a9aa 19596->19598 19599 176bb1 __strnicoll 14 API calls 19597->19599 19598->19597 19603 17a9d0 19598->19603 19600 17a9c0 19599->19600 19602 17729c __strnicoll 29 API calls 19600->19602 19601 17a9ca 19601->19064 19602->19601 19603->19601 19604 176bb1 __strnicoll 14 API calls 19603->19604 19604->19600 19606 177090 19605->19606 19607 1770ad 19605->19607 19608 1770a7 19606->19608 19609 17ad27 ___free_lconv_mon 14 API calls 19606->19609 19607->19065 19610 17ad27 ___free_lconv_mon 14 API calls 19608->19610 19609->19606 19610->19607 19612 1772d5 19611->19612 19613 1772fd _unexpected 8 API calls 19612->19613 19614 1772ea GetCurrentProcess TerminateProcess 19613->19614 19614->19070 19616 18205e 19615->19616 19617 18206f 19616->19617 19621 182082 ___from_strstr_to_strchr 19616->19621 19618 176bb1 __strnicoll 14 API calls 19617->19618 19619 182074 19618->19619 19619->19013 19620 182299 19622 176bb1 __strnicoll 14 API calls 19620->19622 19621->19620 19623 1820a2 19621->19623 19624 18229e 19622->19624 19678 1822be 19623->19678 19626 17ad27 ___free_lconv_mon 14 API calls 19624->19626 19626->19619 19628 1820e8 19632 17c0e0 __dosmaperr 14 API calls 19628->19632 19644 1820d2 19628->19644 19630 1820c4 19635 1820cd 19630->19635 19636 1820e1 19630->19636 19634 1820f6 19632->19634 19633 17ad27 ___free_lconv_mon 14 API calls 19633->19619 19639 17ad27 ___free_lconv_mon 14 API calls 19634->19639 19640 176bb1 __strnicoll 14 API calls 19635->19640 19641 1822be 39 API calls 19636->19641 19637 1821a6 19637->19644 19646 181673 std::ios_base::_Init 32 API calls 19637->19646 19638 18215b 19642 17ad27 ___free_lconv_mon 14 API calls 19638->19642 19643 182101 19639->19643 19640->19644 19645 1820e6 19641->19645 19649 182163 19642->19649 19643->19644 19643->19645 19647 17c0e0 __dosmaperr 14 API calls 19643->19647 19644->19633 19645->19644 19682 1822d8 19645->19682 19648 1821d4 19646->19648 19650 18211d 19647->19650 19652 17ad27 ___free_lconv_mon 14 API calls 19648->19652 19656 182190 19649->19656 19686 181673 19649->19686 19654 17ad27 ___free_lconv_mon 14 API calls 19650->19654 19651 18228e 19655 17ad27 ___free_lconv_mon 14 API calls 19651->19655 19652->19656 19654->19645 19655->19619 19656->19644 19656->19651 19659 17c0e0 __dosmaperr 14 API calls 19656->19659 19657 182187 19658 17ad27 ___free_lconv_mon 14 API calls 19657->19658 19658->19656 19660 18221f 19659->19660 19661 18222f 19660->19661 19662 182227 19660->19662 19664 17a99c ___std_exception_copy 29 API calls 19661->19664 19663 17ad27 ___free_lconv_mon 14 API calls 19662->19663 19663->19644 19665 18223b 19664->19665 19666 182242 19665->19666 19667 1822b3 19665->19667 19695 18952c 19666->19695 19668 1772c9 __Getctype 11 API calls 19667->19668 19670 1822bd 19668->19670 19672 182288 19675 17ad27 ___free_lconv_mon 14 API calls 19672->19675 19673 182269 19674 176bb1 __strnicoll 14 API calls 19673->19674 19676 18226e 19674->19676 19675->19651 19677 17ad27 ___free_lconv_mon 14 API calls 19676->19677 19677->19644 19679 1822cb 19678->19679 19680 1820ad 19678->19680 19710 18232d 19679->19710 19680->19628 19680->19630 19680->19645 19683 18214b 19682->19683 19685 1822ee 19682->19685 19683->19637 19683->19638 19685->19683 19725 18943b 19685->19725 19687 18169b 19686->19687 19688 181680 19686->19688 19690 1816aa 19687->19690 19825 1883c4 19687->19825 19688->19687 19689 18168c 19688->19689 19692 176bb1 __strnicoll 14 API calls 19689->19692 19832 184976 19690->19832 19694 181691 std::invalid_argument::invalid_argument 19692->19694 19694->19657 19844 17c0a1 19695->19844 19700 18959f 19702 17ad27 ___free_lconv_mon 14 API calls 19700->19702 19704 1895ab 19700->19704 19701 17c0a1 39 API calls 19705 18957c 19701->19705 19702->19704 19703 182263 19703->19672 19703->19673 19704->19703 19706 17ad27 ___free_lconv_mon 14 API calls 19704->19706 19707 171524 17 API calls 19705->19707 19706->19703 19708 189589 19707->19708 19708->19700 19709 189593 SetEnvironmentVariableW 19708->19709 19709->19700 19711 18233b 19710->19711 19712 182340 19710->19712 19711->19680 19713 17c0e0 __dosmaperr 14 API calls 19712->19713 19714 18235d 19713->19714 19715 1823cb 19714->19715 19718 1823d0 19714->19718 19721 17c0e0 __dosmaperr 14 API calls 19714->19721 19722 17ad27 ___free_lconv_mon 14 API calls 19714->19722 19723 17a99c ___std_exception_copy 29 API calls 19714->19723 19724 1823ba 19714->19724 19716 177806 CallUnexpected 39 API calls 19715->19716 19716->19718 19717 17ad27 ___free_lconv_mon 14 API calls 19717->19711 19719 1772c9 __Getctype 11 API calls 19718->19719 19720 1823dc 19719->19720 19721->19714 19722->19714 19723->19714 19724->19717 19726 189449 19725->19726 19727 18944f 19725->19727 19730 18a08b 19726->19730 19731 18a043 19726->19731 19743 189464 19727->19743 19763 18a0a1 19730->19763 19733 18a049 19731->19733 19734 18a066 19731->19734 19736 176bb1 __strnicoll 14 API calls 19733->19736 19738 176bb1 __strnicoll 14 API calls 19734->19738 19742 18a084 19734->19742 19735 18a059 19735->19685 19737 18a04e 19736->19737 19739 17729c __strnicoll 29 API calls 19737->19739 19740 18a075 19738->19740 19739->19735 19741 17729c __strnicoll 29 API calls 19740->19741 19741->19735 19742->19685 19744 17142a __strnicoll 39 API calls 19743->19744 19745 18947a 19744->19745 19746 18945f 19745->19746 19747 189496 19745->19747 19748 1894ad 19745->19748 19746->19685 19749 176bb1 __strnicoll 14 API calls 19747->19749 19751 1894c8 19748->19751 19752 1894b6 19748->19752 19750 18949b 19749->19750 19753 17729c __strnicoll 29 API calls 19750->19753 19755 1894e8 19751->19755 19756 1894d5 19751->19756 19754 176bb1 __strnicoll 14 API calls 19752->19754 19753->19746 19757 1894bb 19754->19757 19781 18a16c 19755->19781 19758 18a0a1 __strnicoll 39 API calls 19756->19758 19760 17729c __strnicoll 29 API calls 19757->19760 19758->19746 19760->19746 19762 176bb1 __strnicoll 14 API calls 19762->19746 19764 18a0cb 19763->19764 19765 18a0b1 19763->19765 19767 18a0ea 19764->19767 19768 18a0d3 19764->19768 19766 176bb1 __strnicoll 14 API calls 19765->19766 19771 18a0b6 19766->19771 19769 18a10d 19767->19769 19770 18a0f6 19767->19770 19772 176bb1 __strnicoll 14 API calls 19768->19772 19778 17142a __strnicoll 39 API calls 19769->19778 19779 18a0c1 19769->19779 19773 176bb1 __strnicoll 14 API calls 19770->19773 19774 17729c __strnicoll 29 API calls 19771->19774 19775 18a0d8 19772->19775 19777 18a0fb 19773->19777 19774->19779 19776 17729c __strnicoll 29 API calls 19775->19776 19776->19779 19780 17729c __strnicoll 29 API calls 19777->19780 19778->19779 19779->19735 19780->19779 19782 17142a __strnicoll 39 API calls 19781->19782 19783 18a17f 19782->19783 19786 18a1b2 19783->19786 19788 18a1e6 __strnicoll 19786->19788 19787 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19789 1894fe 19787->19789 19790 18a266 19788->19790 19791 18a44a 19788->19791 19793 18a253 GetCPInfo 19788->19793 19818 18a26a 19788->19818 19789->19746 19789->19762 19792 17adaf __strnicoll MultiByteToWideChar 19790->19792 19790->19818 19794 18a2ec 19792->19794 19793->19790 19793->19818 19796 17ad61 __strnicoll 15 API calls 19794->19796 19797 18a313 __alloca_probe_16 19794->19797 19800 18a43e 19794->19800 19794->19818 19795 16ea27 __freea 14 API calls 19795->19818 19796->19797 19798 17adaf __strnicoll MultiByteToWideChar 19797->19798 19797->19800 19799 18a35f 19798->19799 19799->19800 19801 17adaf __strnicoll MultiByteToWideChar 19799->19801 19800->19795 19802 18a37b 19801->19802 19802->19800 19803 18a389 19802->19803 19804 18a3ec 19803->19804 19806 17ad61 __strnicoll 15 API calls 19803->19806 19809 18a3a2 __alloca_probe_16 19803->19809 19805 16ea27 __freea 14 API calls 19804->19805 19807 18a3f2 19805->19807 19806->19809 19808 16ea27 __freea 14 API calls 19807->19808 19808->19818 19809->19804 19810 17adaf __strnicoll MultiByteToWideChar 19809->19810 19811 18a3e5 19810->19811 19811->19804 19812 18a40e 19811->19812 19819 17b89c 19812->19819 19818->19787 19818->19791 19820 17beac std::_Lockit::_Lockit 5 API calls 19819->19820 19821 17b8a7 19820->19821 19822 17bbe6 __strnicoll 5 API calls 19821->19822 19824 17b8ad 19821->19824 19823 17b8ed CompareStringW 19822->19823 19823->19824 19826 1883cf 19825->19826 19827 1883e4 HeapSize 19825->19827 19828 176bb1 __strnicoll 14 API calls 19826->19828 19827->19690 19829 1883d4 19828->19829 19830 17729c __strnicoll 29 API calls 19829->19830 19831 1883df 19830->19831 19831->19690 19833 18498e 19832->19833 19834 184983 19832->19834 19836 184996 19833->19836 19842 18499f __dosmaperr 19833->19842 19835 17ad61 __strnicoll 15 API calls 19834->19835 19840 18498b 19835->19840 19837 17ad27 ___free_lconv_mon 14 API calls 19836->19837 19837->19840 19838 1849c9 HeapReAlloc 19838->19840 19838->19842 19839 1849a4 19841 176bb1 __strnicoll 14 API calls 19839->19841 19840->19694 19841->19840 19842->19838 19842->19839 19843 174d3c std::ios_base::_Init 2 API calls 19842->19843 19843->19842 19845 17142a __strnicoll 39 API calls 19844->19845 19846 17c0b3 19845->19846 19847 17c0c5 19846->19847 19852 17b87d 19846->19852 19849 171524 19847->19849 19858 17157c 19849->19858 19855 17be92 19852->19855 19856 17be0d std::_Lockit::_Lockit 5 API calls 19855->19856 19857 17b885 19856->19857 19857->19847 19859 1715a4 19858->19859 19860 17158a 19858->19860 19862 1715ab 19859->19862 19863 1715ca 19859->19863 19876 17150a 19860->19876 19875 17153c 19862->19875 19880 1714cb 19862->19880 19864 17adaf __strnicoll MultiByteToWideChar 19863->19864 19866 1715d9 19864->19866 19867 1715e0 GetLastError 19866->19867 19869 171606 19866->19869 19872 1714cb 15 API calls 19866->19872 19885 176bd7 19867->19885 19870 17adaf __strnicoll MultiByteToWideChar 19869->19870 19869->19875 19873 17161d 19870->19873 19872->19869 19873->19867 19873->19875 19874 176bb1 __strnicoll 14 API calls 19874->19875 19875->19700 19875->19701 19877 171515 19876->19877 19878 17151d 19876->19878 19879 17ad27 ___free_lconv_mon 14 API calls 19877->19879 19878->19875 19879->19878 19881 17150a 14 API calls 19880->19881 19882 1714d9 19881->19882 19890 1714ac 19882->19890 19893 176bc4 19885->19893 19887 176be2 __dosmaperr 19888 176bb1 __strnicoll 14 API calls 19887->19888 19889 1715ec 19888->19889 19889->19874 19891 17ad61 __strnicoll 15 API calls 19890->19891 19892 1714b9 19891->19892 19892->19875 19894 17b104 __dosmaperr 14 API calls 19893->19894 19895 176bc9 19894->19895 19895->19887 19948 1641c0 19896->19948 19898 16286b 19908 16287f 19898->19908 19952 166e00 19898->19952 19903 1629bd 19904 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19903->19904 19905 161c45 19904->19905 19909 1624c0 19905->19909 19906 1628ad std::ios_base::_Ios_base_dtor 19971 166f10 19906->19971 19976 1645c0 19908->19976 19911 1624f0 19909->19911 19910 1641c0 39 API calls 19912 1625a0 19910->19912 19911->19910 19920 164480 70 API calls 19912->19920 19922 16266d 19912->19922 19924 1625b4 19912->19924 19913 1645c0 39 API calls 19914 162803 19913->19914 19915 164610 39 API calls 19914->19915 19916 162816 19915->19916 19917 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19916->19917 19919 161c5c 19917->19919 19925 1622d0 19919->19925 19920->19912 19921 164480 70 API calls 19923 1626d2 19921->19923 19922->19923 20949 16b4c0 19922->20949 19923->19921 19923->19924 19924->19913 20960 1622f0 19925->20960 19949 1641e0 19948->19949 19951 1641fd 19949->19951 19984 1646e0 19949->19984 19951->19898 19994 16bd52 19952->19994 19956 166e3a 19970 166e65 19956->19970 20015 166ff0 19956->20015 19959 166ef0 19961 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19959->19961 19963 166efa 19961->19963 19962 166e90 20029 1649e0 19962->20029 19963->19906 20008 16bd83 19970->20008 20290 167520 19971->20290 19977 1645e5 19976->19977 20805 165920 19977->20805 19980 164610 19981 164624 19980->19981 19982 16463f 19981->19982 20945 166b10 19981->20945 19982->19903 19985 164708 19984->19985 19986 164789 19985->19986 19988 1641c0 39 API calls 19985->19988 19987 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19986->19987 19989 164793 19987->19989 19992 164723 19988->19992 19989->19951 19990 164736 19991 164610 39 API calls 19990->19991 19991->19986 19992->19990 19993 1645c0 39 API calls 19992->19993 19993->19990 19995 16bd61 19994->19995 19996 16bd68 19994->19996 20042 1775c2 19995->20042 19999 166e24 19996->19999 20047 16e608 EnterCriticalSection 19996->20047 20000 1647e0 19999->20000 20001 164802 20000->20001 20002 16483e 20000->20002 20004 16bd52 std::_Lockit::_Lockit 7 API calls 20001->20004 20003 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20002->20003 20005 164850 20003->20005 20006 164813 20004->20006 20005->19956 20007 16bd83 std::_Lockit::~_Lockit 2 API calls 20006->20007 20007->20002 20009 1775d0 20008->20009 20011 16bd8d 20008->20011 20097 1775ab LeaveCriticalSection 20009->20097 20012 16bda0 20011->20012 20096 16e616 LeaveCriticalSection 20011->20096 20012->19959 20013 1775d7 20013->19959 20016 16706c 20015->20016 20018 167010 20015->20018 20017 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20016->20017 20020 166e82 20017->20020 20018->20016 20098 16b9cb 20018->20098 20020->19962 20025 1649b0 20020->20025 20021 167028 20109 164b10 20021->20109 20026 1649c8 20025->20026 20027 16f0bd std::_Throw_Cpp_error RaiseException 20026->20027 20028 1649dd 20027->20028 20030 164a10 20029->20030 20031 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20030->20031 20032 164a1d 20031->20032 20033 16bdf6 20032->20033 20034 16be01 _Yarn 20033->20034 20035 166eb2 20034->20035 20286 16c31d 20034->20286 20038 164a30 20035->20038 20039 164a5c 20038->20039 20040 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20039->20040 20041 164a69 20040->20041 20041->19970 20048 17bd0b 20042->20048 20047->19999 20049 17be92 std::_Lockit::_Lockit 5 API calls 20048->20049 20050 17bd10 20049->20050 20069 17beac 20050->20069 20068 17bd3d 20068->20068 20070 17be0d std::_Lockit::_Lockit 5 API calls 20069->20070 20071 17bd15 20070->20071 20072 17bec6 20071->20072 20073 17be0d std::_Lockit::_Lockit 5 API calls 20072->20073 20074 17bd1a 20073->20074 20075 17bee0 20074->20075 20076 17be0d std::_Lockit::_Lockit 5 API calls 20075->20076 20077 17bd1f 20076->20077 20078 17befa 20077->20078 20079 17be0d std::_Lockit::_Lockit 5 API calls 20078->20079 20080 17bd24 20079->20080 20081 17bf14 20080->20081 20082 17be0d std::_Lockit::_Lockit 5 API calls 20081->20082 20083 17bd29 20082->20083 20084 17bf2e 20083->20084 20085 17be0d std::_Lockit::_Lockit 5 API calls 20084->20085 20086 17bd2e 20085->20086 20087 17bf48 20086->20087 20088 17be0d std::_Lockit::_Lockit 5 API calls 20087->20088 20089 17bd33 20088->20089 20090 17bf62 20089->20090 20091 17be0d std::_Lockit::_Lockit 5 API calls 20090->20091 20092 17bd38 20091->20092 20093 17bf7c 20092->20093 20094 17be0d std::_Lockit::_Lockit 5 API calls 20093->20094 20095 17bf92 20094->20095 20095->20068 20096->20012 20097->20013 20101 16b9d0 _Yarn 20098->20101 20099 16b9ea 20099->20021 20100 174d3c std::ios_base::_Init 2 API calls 20100->20101 20101->20099 20101->20100 20102 16b9ec 20101->20102 20103 16de77 std::ios_base::_Init 20102->20103 20105 16b9f6 Concurrency::cancel_current_task 20102->20105 20104 16f0bd std::_Throw_Cpp_error RaiseException 20103->20104 20106 16de93 20104->20106 20135 16f0bd 20105->20135 20108 16c339 20110 16bd52 std::_Lockit::_Lockit 7 API calls 20109->20110 20111 164b30 20110->20111 20112 164b7f 20111->20112 20113 164b9b 20111->20113 20138 16be78 20112->20138 20147 16c37a 20113->20147 20136 16f0d7 20135->20136 20137 16f105 RaiseException 20135->20137 20136->20137 20137->20108 20154 1787a0 20138->20154 20256 16c467 20147->20256 20150 16f0bd std::_Throw_Cpp_error RaiseException 20151 16c399 20150->20151 20259 1636c0 20151->20259 20155 17bd0b std::_Lockit::_Lockit 5 API calls 20154->20155 20156 1787ad 20155->20156 20163 1789d2 20156->20163 20159 16bede 20164 1789de ___scrt_is_nonwritable_in_current_image 20163->20164 20171 177594 EnterCriticalSection 20164->20171 20166 1789ec 20172 178873 20166->20172 20168 1789f9 20200 178a21 20168->20200 20171->20166 20203 1787d8 20172->20203 20174 17888e 20175 1788d9 20174->20175 20176 17afb3 __Getctype 39 API calls 20174->20176 20175->20168 20177 17889b 20176->20177 20250 184cbf 20177->20250 20255 1775ab LeaveCriticalSection 20200->20255 20202 16be85 20202->20159 20204 1787e4 20203->20204 20205 1787f2 20203->20205 20206 174e9b std::_Locinfo::_Locinfo_dtor 60 API calls 20204->20206 20207 1849df std::_Locinfo::_Locinfo_dtor 41 API calls 20205->20207 20208 1787ee 20206->20208 20209 178809 20207->20209 20208->20174 20210 178868 20209->20210 20211 17c0e0 __dosmaperr 14 API calls 20209->20211 20213 1772c9 __Getctype 11 API calls 20210->20213 20212 178824 20211->20212 20214 17884c 20212->20214 20216 1849df std::_Locinfo::_Locinfo_dtor 41 API calls 20212->20216 20215 178872 20213->20215 20217 17ad27 ___free_lconv_mon 14 API calls 20214->20217 20218 1787d8 std::_Locinfo::_Locinfo_dtor 64 API calls 20215->20218 20219 17883b 20216->20219 20220 178861 20217->20220 20221 17888e 20218->20221 20222 178842 20219->20222 20223 17884e 20219->20223 20220->20174 20224 1788d9 20221->20224 20226 17afb3 __Getctype 39 API calls 20221->20226 20222->20210 20222->20214 20225 174e9b std::_Locinfo::_Locinfo_dtor 60 API calls 20223->20225 20224->20174 20225->20214 20227 17889b 20226->20227 20251 184cd3 _Fputc 20250->20251 20252 184fa4 std::_Locinfo::_Locinfo_dtor 41 API calls 20251->20252 20255->20202 20263 166a70 20256->20263 20260 1636f7 std::invalid_argument::invalid_argument 20259->20260 20261 16f69a ___std_exception_copy 29 API calls 20260->20261 20262 16370f 20261->20262 20264 166ab1 std::invalid_argument::invalid_argument 20263->20264 20269 16f69a 20264->20269 20267 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20268 166ada 20267->20268 20268->20150 20271 16f6a7 _Yarn 20269->20271 20274 166ad0 20269->20274 20270 16f6d4 20273 17831e std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 14 API calls 20270->20273 20271->20270 20272 17a99c ___std_exception_copy 29 API calls 20271->20272 20271->20274 20272->20270 20273->20274 20274->20267 20287 16c32b Concurrency::cancel_current_task 20286->20287 20288 16f0bd std::_Throw_Cpp_error RaiseException 20287->20288 20289 16c339 20288->20289 20305 16a120 20290->20305 20292 167693 20311 16a2a0 20292->20311 20293 167582 20293->20292 20357 178339 20293->20357 20296 1676e1 20318 168780 20296->20318 20306 16a146 std::_Throw_Cpp_error 20305->20306 20368 16ace0 20306->20368 20309 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20310 16a15b 20309->20310 20310->20293 20312 16a2ba 20311->20312 20313 16a2df 20312->20313 20314 16a2c9 20312->20314 20376 16ada0 20313->20376 20372 16ad50 20314->20372 20317 16a2d7 20317->20296 20358 178348 20357->20358 20363 17835f __floor_pentium4 20357->20363 20359 176bb1 __strnicoll 14 API calls 20358->20359 20360 17834d 20359->20360 20361 17729c __strnicoll 29 API calls 20360->20361 20362 178358 __startOneArgErrorHandling __floor_pentium4 20361->20362 20362->20292 20363->20362 20769 183f89 20363->20769 20369 16ad0a std::_Throw_Cpp_error 20368->20369 20370 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20369->20370 20371 16a151 20370->20371 20371->20309 20373 16ad78 std::_Throw_Cpp_error 20372->20373 20374 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20373->20374 20375 16ad96 20374->20375 20375->20317 20377 16ae34 20376->20377 20378 16add8 std::_Throw_Cpp_error 20376->20378 20382 16aec0 20377->20382 20380 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20378->20380 20381 16ae72 20380->20381 20381->20317 20400 1631c0 20382->20400 20401 1631db std::_Throw_Cpp_error 20400->20401 20402 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20401->20402 20770 183fc2 __startOneArgErrorHandling 20769->20770 20771 183fe9 __startOneArgErrorHandling __floor_pentium4 20770->20771 20780 1843ff 20770->20780 20773 18402c 20771->20773 20774 184007 20771->20774 20792 18408b 20773->20792 20784 18435f 20774->20784 20777 184027 __floor_pentium4 20778 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20777->20778 20781 18442a __raise_exc 20780->20781 20782 184623 RaiseException 20781->20782 20783 18463b 20782->20783 20783->20771 20785 18436c 20784->20785 20786 18437b __floor_pentium4 20785->20786 20788 1843aa __startOneArgErrorHandling __floor_pentium4 20785->20788 20787 18408b __startOneArgErrorHandling 14 API calls 20786->20787 20790 1843f8 20788->20790 20791 18408b __startOneArgErrorHandling 14 API calls 20788->20791 20790->20777 20791->20790 20793 1840af 20792->20793 20795 184098 20792->20795 20794 176bb1 __strnicoll 14 API calls 20793->20794 20796 1840b4 20794->20796 20795->20796 20797 176bb1 __strnicoll 14 API calls 20795->20797 20796->20777 20798 1840a7 20797->20798 20798->20777 20808 165970 20805->20808 20809 1659b4 20808->20809 20810 165a5c 20808->20810 20812 1659d4 20809->20812 20814 16f0bd std::_Throw_Cpp_error RaiseException 20809->20814 20811 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20810->20811 20813 1629b1 20811->20813 20820 165a70 20812->20820 20813->19980 20814->20812 20816 165a2f 20823 165ab0 20816->20823 20828 165c50 20820->20828 20822 165a87 std::ios_base::_Init 20822->20816 20855 166000 20823->20855 20831 165c90 20828->20831 20832 165cb7 20831->20832 20833 165c58 20831->20833 20839 16ba4d AcquireSRWLockExclusive 20832->20839 20833->20822 20835 165cc5 20835->20833 20844 16bb02 20835->20844 20843 16ba61 20839->20843 20840 16ba66 ReleaseSRWLockExclusive 20840->20835 20843->20840 20848 16baed SleepConditionVariableSRW 20843->20848 20849 16bb17 20844->20849 20847 16ba9c AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 20847->20833 20848->20843 20850 16bb26 20849->20850 20851 16bb2d 20849->20851 20852 1768f9 std::ios_base::_Init 32 API calls 20850->20852 20853 176888 std::ios_base::_Init 32 API calls 20851->20853 20854 165ce0 20852->20854 20853->20854 20854->20847 20864 161d50 20855->20864 20865 161d79 std::_Throw_Cpp_error 20864->20865 20881 162fa0 20865->20881 20868 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20869 161dae 20868->20869 20870 1660e0 20869->20870 20894 166290 20870->20894 20882 1631c0 std::_Throw_Cpp_error 5 API calls 20881->20882 20883 162fcd 20882->20883 20884 163240 std::_Throw_Cpp_error 30 API calls 20883->20884 20885 162fdf std::_Throw_Cpp_error 20883->20885 20884->20885 20886 1631c0 std::_Throw_Cpp_error 5 API calls 20885->20886 20893 163018 std::_Throw_Cpp_error 20885->20893 20887 163072 20886->20887 20888 1632c0 std::_Throw_Cpp_error 5 API calls 20887->20888 20889 163089 20888->20889 20890 163360 std::_Throw_Cpp_error 30 API calls 20889->20890 20890->20893 20891 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20892 161da1 20891->20892 20892->20868 20893->20891 20895 1662b4 std::_Throw_Cpp_error 20894->20895 20918 166910 20895->20918 20898 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20899 166129 20898->20899 20900 1661e0 20899->20900 20919 1631c0 std::_Throw_Cpp_error 5 API calls 20918->20919 20920 16693d 20919->20920 20921 163240 std::_Throw_Cpp_error 30 API calls 20920->20921 20922 16694f std::_Throw_Cpp_error 20920->20922 20921->20922 20923 1631c0 std::_Throw_Cpp_error 5 API calls 20922->20923 20930 166988 std::_Throw_Cpp_error 20922->20930 20924 1669ca 20923->20924 20925 1632c0 std::_Throw_Cpp_error 5 API calls 20924->20925 20926 1669e1 20925->20926 20927 163360 std::_Throw_Cpp_error 30 API calls 20926->20927 20927->20930 20928 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20929 166302 20928->20929 20929->20898 20930->20928 20946 166b2e 20945->20946 20947 166b36 20946->20947 20948 1645c0 39 API calls 20946->20948 20947->19982 20948->20947 20952 16d1e3 20949->20952 20955 16cbe8 20952->20955 20956 16b501 20955->20956 20957 16cc0e codecvt 20955->20957 20956->19923 20957->20956 20958 16cdf5 70 API calls 20957->20958 20959 16ce13 70 API calls 20957->20959 20958->20957 20959->20957 20967 166cf0 20960->20967 20968 166d14 20967->20968 20969 164290 67 API calls 20968->20969 20970 166d22 std::ios_base::_Ios_base_dtor 20969->20970 20971 16ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20970->20971 20972 162318 20971->20972 20973 166bf0 20972->20973 20974 1641c0 39 API calls 20973->20974 20975 166c1f 20974->20975 20978 164480 70 API calls 20975->20978 20982 166c32 20975->20982 20976 1645c0 39 API calls 20978->20982 20982->20976 21222 174b94 21221->21222 21223 174b82 21221->21223 21233 174cef 21222->21233 21225 16e3d9 _unexpected GetModuleHandleW 21223->21225 21226 174b87 21225->21226 21226->21222 21248 174a89 GetModuleHandleExW 21226->21248 21227 16ef49 21227->18901 21234 174cfb ___scrt_is_nonwritable_in_current_image 21233->21234 21254 177594 EnterCriticalSection 21234->21254 21236 174d05 21255 174bec 21236->21255 21238 174d12 21259 174d30 21238->21259 21241 174b24 21284 174b0b 21241->21284 21243 174b2e 21244 174b42 21243->21244 21245 174b32 GetCurrentProcess TerminateProcess 21243->21245 21246 174a89 _unexpected 3 API calls 21244->21246 21245->21244 21247 174b4a ExitProcess 21246->21247 21249 174ae9 21248->21249 21250 174ac8 GetProcAddress 21248->21250 21251 174aef FreeLibrary 21249->21251 21252 174af8 21249->21252 21250->21249 21253 174adc 21250->21253 21251->21252 21252->21222 21253->21249 21254->21236 21256 174bf8 ___scrt_is_nonwritable_in_current_image _unexpected 21255->21256 21258 174c5c _unexpected 21256->21258 21262 1768bb 21256->21262 21258->21238 21283 1775ab LeaveCriticalSection 21259->21283 21261 174bcb 21261->21227 21261->21241 21263 1768c7 __EH_prolog3 21262->21263 21266 176b46 21263->21266 21265 1768ee std::ios_base::_Init 21265->21258 21267 176b52 ___scrt_is_nonwritable_in_current_image 21266->21267 21274 177594 EnterCriticalSection 21267->21274 21269 176b60 21275 176a11 21269->21275 21274->21269 21276 176a30 21275->21276 21277 176a28 21275->21277 21276->21277 21278 17ad27 ___free_lconv_mon 14 API calls 21276->21278 21279 176b95 21277->21279 21278->21277 21282 1775ab LeaveCriticalSection 21279->21282 21281 176b7e 21281->21265 21282->21281 21283->21261 21287 17e545 21284->21287 21286 174b10 _unexpected 21286->21243 21288 17e554 _unexpected 21287->21288 21289 17e561 21288->21289 21291 17bc80 21288->21291 21289->21286 21292 17be0d std::_Lockit::_Lockit 5 API calls 21291->21292 21293 17bc9c 21292->21293 21293->21289 23114 17ccc5 23117 1775ab LeaveCriticalSection 23114->23117 23116 17cccc 23117->23116 24377 16d1f8 24378 16d20c 24377->24378 24379 16d267 24378->24379 24380 16d431 69 API calls 24378->24380 24381 16d237 24380->24381 24381->24379 24382 16d254 24381->24382 24383 176c61 67 API calls 24381->24383 24382->24379 24385 177e7d 24382->24385 24383->24382 24386 177e9d 24385->24386 24387 177e88 24385->24387 24389 177ea5 24386->24389 24390 177eba 24386->24390 24388 176bb1 __strnicoll 14 API calls 24387->24388 24393 177e8d 24388->24393 24391 176bb1 __strnicoll 14 API calls 24389->24391 24399 181944 24390->24399 24394 177eaa 24391->24394 24396 17729c __strnicoll 29 API calls 24393->24396 24397 17729c __strnicoll 29 API calls 24394->24397 24395 177eb5 24395->24379 24398 177e98 24396->24398 24397->24395 24398->24379 24400 181958 _Fputc 24399->24400 24403 181eed 24400->24403 24402 181964 _Fputc 24402->24395 24404 181ef9 ___scrt_is_nonwritable_in_current_image 24403->24404 24405 181f00 24404->24405 24406 181f23 24404->24406 24407 177445 _Fputc 29 API calls 24405->24407 24414 171d4e EnterCriticalSection 24406->24414 24409 181f19 24407->24409 24409->24402 24410 181f31 24415 181d4c 24410->24415 24412 181f40 24428 181f72 24412->24428 24414->24410 24416 181d5b 24415->24416 24417 181d83 24415->24417 24419 177445 _Fputc 29 API calls 24416->24419 24418 17e509 _Ungetc 29 API calls 24417->24418 24420 181d8c 24418->24420 24425 181d76 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 24419->24425 24421 18177e 33 API calls 24420->24421 24422 181daa 24421->24422 24423 181e36 24422->24423 24422->24425 24426 181e4d 24422->24426 24424 1819d6 34 API calls 24423->24424 24424->24425 24425->24412 24426->24425 24427 181b81 33 API calls 24426->24427 24427->24425 24431 171d62 LeaveCriticalSection 24428->24431 24430 181f7a 24430->24409 24431->24430

                                                      Control-flow Graph

                                                      APIs
                                                      • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00196110,00196100), ref: 00196334
                                                      • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00196347
                                                      • Wow64GetThreadContext.KERNEL32(0000009C,00000000), ref: 00196365
                                                      • ReadProcessMemory.KERNELBASE(0000008C,?,00196154,00000004,00000000), ref: 00196389
                                                      • VirtualAllocEx.KERNELBASE(0000008C,?,?,00003000,00000040), ref: 001963B4
                                                      • WriteProcessMemory.KERNELBASE(0000008C,00000000,?,?,00000000,?), ref: 0019640C
                                                      • WriteProcessMemory.KERNELBASE(0000008C,00400000,?,?,00000000,?,00000028), ref: 00196457
                                                      • WriteProcessMemory.KERNELBASE(0000008C,?,?,00000004,00000000), ref: 00196495
                                                      • Wow64SetThreadContext.KERNEL32(0000009C,00F40000), ref: 001964D1
                                                      • ResumeThread.KERNELBASE(0000009C), ref: 001964E0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                      • API String ID: 2687962208-3857624555
                                                      • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                      • Instruction ID: 176bba7450d0a9aa23103b22d40c55726762ec3b9567dd3077a5429bf85bb1a7
                                                      • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                      • Instruction Fuzzy Hash: 78B1F97664064AAFDB60CF68CC80BDA73A5FF88714F158124EA0CAB341D774FA51CBA4

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 26 17bd42-17bd4e 27 17bde0-17bde3 26->27 28 17bd53-17bd64 27->28 29 17bde9 27->29 31 17bd66-17bd69 28->31 32 17bd71-17bd8a LoadLibraryExW 28->32 30 17bdeb-17bdef 29->30 35 17bd6f 31->35 36 17be09-17be0b 31->36 33 17bdf0-17be00 32->33 34 17bd8c-17bd95 GetLastError 32->34 33->36 40 17be02-17be03 FreeLibrary 33->40 38 17bd97-17bda9 call 17f344 34->38 39 17bdce-17bddb 34->39 37 17bddd 35->37 36->30 37->27 38->39 43 17bdab-17bdbd call 17f344 38->43 39->37 40->36 43->39 46 17bdbf-17bdcc LoadLibraryExW 43->46 46->33 46->39
                                                      APIs
                                                      • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,6CA949D0,?,0017BE51,?,?,00000000), ref: 0017BE03
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID: api-ms-$ext-ms-
                                                      • API String ID: 3664257935-537541572
                                                      • Opcode ID: 3357bb2cd70dd1e9dccff011b28aad9c9d5e0224203318357250309c075782a8
                                                      • Instruction ID: 0b977532fc56d7cbd020aa57ccd6914a01fc1984d2c68b9fa266886ed5cf0572
                                                      • Opcode Fuzzy Hash: 3357bb2cd70dd1e9dccff011b28aad9c9d5e0224203318357250309c075782a8
                                                      • Instruction Fuzzy Hash: AD212735A09214ABD7319BA4DC81FAB37B8AF02364F258121FD1AA7290DB30ED01C6D0

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: File$CloseCreateHandleSize
                                                      • String ID:
                                                      • API String ID: 1378416451-0
                                                      • Opcode ID: b58c19b8b07dc64eb3954c55e71d4dfd2c395f77035dd2414fd61839c8e2528c
                                                      • Instruction ID: 9a961ec74ccdfd97ef5c7af2bf036f3a66efddd765203bb5e2c88995d74bbac8
                                                      • Opcode Fuzzy Hash: b58c19b8b07dc64eb3954c55e71d4dfd2c395f77035dd2414fd61839c8e2528c
                                                      • Instruction Fuzzy Hash: 9F71A0B4D082489FDB00EFA8D98879DBBF0BF48308F14852AE499EB340D7749955CF52

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 81 16a4d0-16a536 82 16a571-16a594 call 164420 81->82 83 16a53c-16a54d 81->83 88 16a59a-16a5a6 82->88 89 16a5ab-16a5c3 82->89 84 16a565-16a56b 83->84 85 16a553-16a55f 83->85 84->82 85->84 90 16a621-16a762 call 178c30 call 17876d call 178c30 call 1643a0 call 164290 call 1643d0 call 1687f0 call 168890 call 168850 call 1643a0 call 1688b0 call 1643d0 call 1689c0 call 168a10 88->90 91 16a61c 89->91 92 16a5c9-16a5d9 89->92 124 16a798-16a79f 90->124 125 16a768-16a795 call 16b0e0 call 168890 90->125 91->90 92->91 93 16a5df-16a5f0 92->93 95 16a5f6-16a607 93->95 96 16a60d-16a616 93->96 95->91 95->96 96->91 127 16a8c7-16a8e0 call 161d10 call 1641a0 124->127 128 16a7a5-16a7ae 124->128 125->124 142 16a8e6-16a8f6 call 1641a0 127->142 143 16a8fc-16a906 127->143 130 16a7b4-16a7c0 128->130 131 16a7c5-16a7cb 128->131 134 16a7d1-16a7f1 call 1689f0 130->134 131->134 141 16a7f7-16a80b 134->141 144 16a811-16a826 141->144 145 16a84c-16a854 141->145 142->143 157 16a90b-16a916 call 1641a0 142->157 147 16a91c-16a936 call 164420 143->147 144->145 148 16a82c-16a846 144->148 150 16a85f-16a8a8 call 168a30 145->150 151 16a85a-16a8c2 145->151 159 16a93c-16a946 147->159 160 16aa28-16aa32 147->160 148->145 164 16a8ae-16a8b7 150->164 165 16a8bd 150->165 151->127 157->147 159->160 166 16a94c-16aa23 call 168b40 call 168890 call 168bc0 159->166 161 16ab26-16abac call 168890 call 168bc0 160->161 162 16aa38-16ab21 call 168890 call 168bc0 call 168b40 160->162 182 16abaf 161->182 162->182 164->165 165->141 183 16abb4-16ac2a call 168890 call 168bc0 166->183 182->183 189 16ac2f-16acd5 call 164570 call 168b40 call 161dc0 call 168c50 call 16ba3f 183->189
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: _strcspn
                                                      • String ID: @
                                                      • API String ID: 3709121408-2766056989
                                                      • Opcode ID: 86348472ac06bd292918c81d3f8f231344bb767bb76527da7ad9aed3c5ba9557
                                                      • Instruction ID: 6cf00aa48ae51b8d125506fc217029a992e45d820f240d318087bb1d44413605
                                                      • Opcode Fuzzy Hash: 86348472ac06bd292918c81d3f8f231344bb767bb76527da7ad9aed3c5ba9557
                                                      • Instruction Fuzzy Hash: CA32D3B4904269CFCB24DF68C981A9DFBF1BF58300F0585AAE849A7341D734AE95CF52

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ConsoleFreeProtectVirtual
                                                      • String ID: @
                                                      • API String ID: 621788221-2766056989
                                                      • Opcode ID: 7f6fd0ede0741d8f794563eb251d0a560bfe3e8c7c7c60ecd8aa3189cc7d2e4e
                                                      • Instruction ID: e2182057880df637a21b834870c620503272ff80421b2117ffcad907699b2bd5
                                                      • Opcode Fuzzy Hash: 7f6fd0ede0741d8f794563eb251d0a560bfe3e8c7c7c60ecd8aa3189cc7d2e4e
                                                      • Instruction Fuzzy Hash: 1D41DEB0D04208EFDB04EFA9D98469EBBF0FF48354F15881AE858AB350D775A984CF91

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 216 17481d-174828 217 17483e-174851 call 1748ae 216->217 218 17482a-17483d call 176bb1 call 17729c 216->218 224 174853-174870 CreateThread 217->224 225 17487f 217->225 228 174872-17487e GetLastError call 176bd7 224->228 229 17488e-174893 224->229 226 174881-17488d call 1748fe 225->226 228->225 231 174895-174898 229->231 232 17489a-17489e 229->232 231->232 232->226
                                                      APIs
                                                      • CreateThread.KERNELBASE(?,?,Function_00014935,00000000,?,?), ref: 00174866
                                                      • GetLastError.KERNEL32(?,00000000,00000000,?,0016B58D), ref: 00174872
                                                      • __dosmaperr.LIBCMT ref: 00174879
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: CreateErrorLastThread__dosmaperr
                                                      • String ID:
                                                      • API String ID: 2744730728-0
                                                      • Opcode ID: 7eb3070e7b1a288aee349f9cdbf5aac97910aba9d5d53f2c4a0b97f47fe2de33
                                                      • Instruction ID: 15a9c145b03feb7843465b9681a36fcd18d9118bb43ff57c595d7cad471d22d5
                                                      • Opcode Fuzzy Hash: 7eb3070e7b1a288aee349f9cdbf5aac97910aba9d5d53f2c4a0b97f47fe2de33
                                                      • Instruction Fuzzy Hash: 60019E72A10259BBDF159FE0DC06AAE3B78EF10360F008059F90996190DB70CA50DB91

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 236 1749b3-1749c0 call 17b104 239 1749c2-1749ca 236->239 240 174a00-174a03 ExitThread 236->240 239->240 241 1749cc-1749d0 239->241 242 1749d7-1749dd 241->242 243 1749d2 call 17bc52 241->243 245 1749df-1749e1 242->245 246 1749ea-1749f0 242->246 243->242 245->246 247 1749e3-1749e4 CloseHandle 245->247 246->240 248 1749f2-1749f4 246->248 247->246 248->240 249 1749f6-1749fa FreeLibraryAndExitThread 248->249 249->240
                                                      APIs
                                                        • Part of subcall function 0017B104: GetLastError.KERNEL32(00000000,?,00176BB6,0017C132,?,?,0017B000,00000001,00000364,?,00000005,000000FF,?,0017495A,001956B0,0000000C), ref: 0017B108
                                                        • Part of subcall function 0017B104: SetLastError.KERNEL32(00000000), ref: 0017B1AA
                                                      • CloseHandle.KERNEL32(?,?,?,001748AD,?,?,00174993,00000000), ref: 001749E4
                                                      • FreeLibraryAndExitThread.KERNELBASE(?,?,?,?,001748AD,?,?,00174993,00000000), ref: 001749FA
                                                      • ExitThread.KERNEL32 ref: 00174A03
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ErrorExitLastThread$CloseFreeHandleLibrary
                                                      • String ID:
                                                      • API String ID: 1991824761-0
                                                      • Opcode ID: 90673597837048da1e91e5035c181f44d8a7d23c50eed4188f9934b52228f1d0
                                                      • Instruction ID: 24ec48cb121e60253b0ba0a7bfdf4df781dc1d067f4495dc4b327df4d534600d
                                                      • Opcode Fuzzy Hash: 90673597837048da1e91e5035c181f44d8a7d23c50eed4188f9934b52228f1d0
                                                      • Instruction Fuzzy Hash: E6F05E31148640ABCB315B75A848A5B3AB86F04364B19C620F92FD79B0EB20DC81C698

                                                      Control-flow Graph

                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(00000002,?,00174BE6,00177849,00177849,?,00000002,6CA949D0,00177849,00000002), ref: 00174B35
                                                      • TerminateProcess.KERNEL32(00000000,?,00174BE6,00177849,00177849,?,00000002,6CA949D0,00177849,00000002), ref: 00174B3C
                                                      • ExitProcess.KERNEL32 ref: 00174B4E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: Process$CurrentExitTerminate
                                                      • String ID:
                                                      • API String ID: 1703294689-0
                                                      • Opcode ID: be9d2f6f791f455dc4ed45e17d5e5fdb5d82c6ee32634f3f4d317edd2f2f4046
                                                      • Instruction ID: 913065dde4e7f2042520e867bb08b90634db83991992587e1cc501a70480236e
                                                      • Opcode Fuzzy Hash: be9d2f6f791f455dc4ed45e17d5e5fdb5d82c6ee32634f3f4d317edd2f2f4046
                                                      • Instruction Fuzzy Hash: 58D06C32044108ABCF116FA1EC09E593F3AAB40382B448411B90A4B871DB72DD92DA98

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 257 182d15-182d37 258 182f2a 257->258 259 182d3d-182d3f 257->259 260 182f2c-182f30 258->260 261 182d6b-182d8e 259->261 262 182d41-182d60 call 177445 259->262 263 182d90-182d92 261->263 264 182d94-182d9a 261->264 268 182d63-182d66 262->268 263->264 267 182d9c-182dad 263->267 264->262 264->267 269 182daf-182dbd call 181760 267->269 270 182dc0-182dd0 call 183042 267->270 268->260 269->270 275 182e19-182e2b 270->275 276 182dd2-182dd8 270->276 277 182e2d-182e33 275->277 278 182e82-182ea2 WriteFile 275->278 279 182dda-182ddd 276->279 280 182e01-182e17 call 1830bf 276->280 284 182e6e-182e7b call 1834ee 277->284 285 182e35-182e38 277->285 281 182ead 278->281 282 182ea4-182eaa GetLastError 278->282 286 182de8-182df7 call 183486 279->286 287 182ddf-182de2 279->287 297 182dfa-182dfc 280->297 291 182eb0-182ebb 281->291 282->281 296 182e80 284->296 292 182e5a-182e6c call 1836b2 285->292 293 182e3a-182e3d 285->293 286->297 287->286 294 182ec2-182ec5 287->294 298 182ebd-182ec0 291->298 299 182f25-182f28 291->299 303 182e55-182e58 292->303 300 182ec8-182eca 293->300 301 182e43-182e50 call 1835c9 293->301 294->300 296->303 297->291 298->294 299->260 304 182ef8-182f04 300->304 305 182ecc-182ed1 300->305 301->303 303->297 308 182f0e-182f20 304->308 309 182f06-182f0c 304->309 310 182eea-182ef3 call 176c3d 305->310 311 182ed3-182ee5 305->311 308->268 309->258 309->308 310->268 311->268
                                                      APIs
                                                        • Part of subcall function 001830BF: GetConsoleOutputCP.KERNEL32(6CA949D0,00000000,00000000,?), ref: 00183122
                                                      • WriteFile.KERNEL32(?,?,?,?,00000000,?,00000000,?,?,?,?,?,001724F1,?,00172753), ref: 00182E9A
                                                      • GetLastError.KERNEL32(?,001724F1,?,00172753,?,00172753,?,?,?,?,?,?,?,?,?,?), ref: 00182EA4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ConsoleErrorFileLastOutputWrite
                                                      • String ID:
                                                      • API String ID: 2915228174-0
                                                      • Opcode ID: cce97e8f113b103410bbe061d03876f84f7eddfa57ba0312ba0f0d455007dc2c
                                                      • Instruction ID: abe67f65794b1123f010705ef166f6ade3b2e9fd04486287c30609a01448f16f
                                                      • Opcode Fuzzy Hash: cce97e8f113b103410bbe061d03876f84f7eddfa57ba0312ba0f0d455007dc2c
                                                      • Instruction Fuzzy Hash: 75619F72904109AFDF16EFA8C885AAEBFB9BF19704F150145F900A7252D732DB41CFA4

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 314 1834ee-183543 call 16ece0 317 1835b8-1835c8 call 16ba3f 314->317 318 183545 314->318 320 18354b 318->320 322 183551-183553 320->322 323 18356d-183592 WriteFile 322->323 324 183555-18355a 322->324 327 1835b0-1835b6 GetLastError 323->327 328 183594-18359f 323->328 325 18355c-183562 324->325 326 183563-18356b 324->326 325->326 326->322 326->323 327->317 328->317 329 1835a1-1835ac 328->329 329->320 330 1835ae 329->330 330->317
                                                      APIs
                                                      • WriteFile.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?,?,00182E80,?,00172753,?,?,?,00000000), ref: 0018358A
                                                      • GetLastError.KERNEL32(?,00182E80,?,00172753,?,?,?,00000000,?,?,?,?,?,001724F1,?,00172753), ref: 001835B0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileLastWrite
                                                      • String ID:
                                                      • API String ID: 442123175-0
                                                      • Opcode ID: b2d339ba39f02242e9c97f9e4445953a79a3cd1c2f478a5e688b3698434e46d3
                                                      • Instruction ID: c412891978cce39f886921392f756777adae931478b0ab3acef3389a8289effc
                                                      • Opcode Fuzzy Hash: b2d339ba39f02242e9c97f9e4445953a79a3cd1c2f478a5e688b3698434e46d3
                                                      • Instruction Fuzzy Hash: 8E219F34A002199FCF19DF29DC909E9B7B9EB49705F1840AAE906D7211E730EF86CF64

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 331 17c862-17c867 332 17c869-17c881 331->332 333 17c883-17c887 332->333 334 17c88f-17c898 332->334 333->334 335 17c889-17c88d 333->335 336 17c8aa 334->336 337 17c89a-17c89d 334->337 338 17c904-17c908 335->338 341 17c8ac-17c8b9 GetStdHandle 336->341 339 17c8a6-17c8a8 337->339 340 17c89f-17c8a4 337->340 338->332 344 17c90e-17c911 338->344 339->341 340->341 342 17c8e6-17c8f8 341->342 343 17c8bb-17c8bd 341->343 342->338 346 17c8fa-17c8fd 342->346 343->342 345 17c8bf-17c8c8 GetFileType 343->345 345->342 347 17c8ca-17c8d3 345->347 346->338 348 17c8d5-17c8d9 347->348 349 17c8db-17c8de 347->349 348->338 349->338 350 17c8e0-17c8e4 349->350 350->338
                                                      APIs
                                                      • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,?,00000000,0017C751,00195BA0), ref: 0017C8AE
                                                      • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,?,00000000,0017C751,00195BA0), ref: 0017C8C0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: FileHandleType
                                                      • String ID:
                                                      • API String ID: 3000768030-0
                                                      • Opcode ID: f963627474c9b8403b0c1a40a3ab06fdef89aa6789f0623fed4cc28ea252549e
                                                      • Instruction ID: 9b5e24ac894e72a066f5e409a821ced5e2c46a6d6cbad30608bce6136a05dbeb
                                                      • Opcode Fuzzy Hash: f963627474c9b8403b0c1a40a3ab06fdef89aa6789f0623fed4cc28ea252549e
                                                      • Instruction Fuzzy Hash: BF11B1716047524AC7344E3E8C88632BAA4AB56334B39875ED1BEC7AF1C370D986D686

                                                      Control-flow Graph

                                                      APIs
                                                      • GetLastError.KERNEL32(001956B0,0000000C), ref: 00174948
                                                      • ExitThread.KERNEL32 ref: 0017494F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ErrorExitLastThread
                                                      • String ID:
                                                      • API String ID: 1611280651-0
                                                      • Opcode ID: 77492ca3d5a64d79d41b8f6ad06e77169d44cff2c61d3671c3a939b63e53ef92
                                                      • Instruction ID: 75ea31f3ed9c0b6766251f2c68e9c6d660ab86cc8cc4a2633f9a1465422e8987
                                                      • Opcode Fuzzy Hash: 77492ca3d5a64d79d41b8f6ad06e77169d44cff2c61d3671c3a939b63e53ef92
                                                      • Instruction Fuzzy Hash: 58F0C2B4940205AFDB05AFB0D84AA2E7BB4FF55711F20814AF40A97692DB705D82CFA1

                                                      Control-flow Graph

                                                      APIs
                                                      • GetModuleHandleA.KERNEL32 ref: 00161B98
                                                      • GetModuleFileNameA.KERNEL32 ref: 00161BB8
                                                        • Part of subcall function 00161860: CreateFileA.KERNELBASE ref: 001618E3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: FileModule$CreateHandleName
                                                      • String ID:
                                                      • API String ID: 2828212432-0
                                                      • Opcode ID: cb7f465cbbb4b77100e00d08f7b580fee85d4b61a6aef6652730bedd08be374c
                                                      • Instruction ID: 70b536a0f2e69968c54bee4b7130a91032d2f3f0efd7b17cae9edd08ca2211d8
                                                      • Opcode Fuzzy Hash: cb7f465cbbb4b77100e00d08f7b580fee85d4b61a6aef6652730bedd08be374c
                                                      • Instruction Fuzzy Hash: ABF01DB090820C8FC750EF78E84569DBBF4AB14300F4145AED4CAD7240EB7459D88F86

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 376 17ad27-17ad30 377 17ad32-17ad45 RtlFreeHeap 376->377 378 17ad5f-17ad60 376->378 377->378 379 17ad47-17ad5e GetLastError call 176bfa call 176bb1 377->379 379->378
                                                      APIs
                                                      • RtlFreeHeap.NTDLL(00000000,00000000,?,0017F0A4,?,00000000,?,?,0017ED44,?,00000007,?,?,0017F68A,?,?), ref: 0017AD3D
                                                      • GetLastError.KERNEL32(?,?,0017F0A4,?,00000000,?,?,0017ED44,?,00000007,?,?,0017F68A,?,?), ref: 0017AD48
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 485612231-0
                                                      • Opcode ID: 35ea16d189d262da21c638a01a6b203106da04f110e49d75bb36f6009da7e076
                                                      • Instruction ID: 6660c3b1faab5cd379e3c8cb4cf9776e7c7c7bfcab43f2e154e723cd4fb352b3
                                                      • Opcode Fuzzy Hash: 35ea16d189d262da21c638a01a6b203106da04f110e49d75bb36f6009da7e076
                                                      • Instruction Fuzzy Hash: D3E08632100604A7CB212BA4FC09B993BA8AF45759F148021F60DCB871DB308891C798

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 384 161ea0-161ef0 call 178c80 call 1641a0 389 161ef6-161f18 call 1641a0 384->389 390 161f23-161f2f 384->390 397 161f34-161f5b call 1641a0 389->397 398 161f1e 389->398 392 161f60-161f8d call 1641c0 call 164270 390->392 403 161fa3-161ffa call 1643a0 call 164290 call 1643d0 call 164420 392->403 404 161f93-161f9e 392->404 397->392 398->390 420 162000 403->420 421 1620b8 403->421 405 162277-1622c1 call 1645c0 call 164610 call 16ba3f 404->405 422 162005-162013 420->422 423 1620bd-1620c8 421->423 424 1620b3 422->424 425 162019-16207e call 164460 call 164510 call 164480 call 164530 call 164440 422->425 426 1620e3-1620e9 423->426 427 1620ce-1620df 423->427 424->421 465 162084-1620ae 425->465 466 162089-162094 425->466 428 1620f4-162129 call 164460 call 164540 call 164480 426->428 429 1620ef-162195 426->429 427->426 452 16212e-162157 call 164530 call 164440 428->452 434 162253-162274 call 164570 429->434 435 16219b 429->435 434->405 438 1621a0-1621ae 435->438 443 1621b4-162219 call 164460 call 164510 call 164480 call 164530 call 164440 438->443 444 16224e 438->444 478 162224-16222f 443->478 479 16221f-162249 443->479 444->434 468 162162-162169 452->468 469 16215d 452->469 465->422 466->424 472 16216d-16218b 468->472 469->472 472->423 478->444 479->438
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: _strlen
                                                      • String ID:
                                                      • API String ID: 4218353326-0
                                                      • Opcode ID: 052bf4f954e012302c89fd8a05c9bb1c3f130471ff878b27a415271b84c7c7ea
                                                      • Instruction ID: 3d403dc9f16cb9cbb9cfe91031d9ef3797f79dd07a48bc2789e276977c3a0169
                                                      • Opcode Fuzzy Hash: 052bf4f954e012302c89fd8a05c9bb1c3f130471ff878b27a415271b84c7c7ea
                                                      • Instruction Fuzzy Hash: D9C128746087409FC704EF28D895A2ABBF0EF9A354F05892DF896CB351E735D924CB42
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1653a23f52b4e82d981a2780b6a967dde93591702bd0f01cb1b7eb20c84a73ac
                                                      • Instruction ID: 533c8772e5112d602b3c560373a1ad3b92efde10e5f2be76390ecf3c113454b0
                                                      • Opcode Fuzzy Hash: 1653a23f52b4e82d981a2780b6a967dde93591702bd0f01cb1b7eb20c84a73ac
                                                      • Instruction Fuzzy Hash: F341A031A1011AAFCB14DFA8C8909FDB7B9FF08310B544169E486E7A40E731E961DBE0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c511edb14039fdac1e4e48d2297652d72402b76c1e080469e88cf468addd8cbc
                                                      • Instruction ID: b26d9a1815d5794c16595814cb989820841e24db70446e37d641ecc715e60af7
                                                      • Opcode Fuzzy Hash: c511edb14039fdac1e4e48d2297652d72402b76c1e080469e88cf468addd8cbc
                                                      • Instruction Fuzzy Hash: 9301D8332186159F9B169F68ECC1AA733B6BBC1764725C229FB19CB654DF30DC409790
                                                      APIs
                                                      • std::_Throw_Cpp_error.LIBCPMT ref: 0016B5BB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: Cpp_errorThrow_std::_
                                                      • String ID:
                                                      • API String ID: 2134207285-0
                                                      • Opcode ID: 8193f83da37fad3b946629d6a9e0bf8885d278d0ab3bcc0cac63ba56fd39f8e9
                                                      • Instruction ID: d0aac9e3a6fd70e1e2d2f8df3dcfc9435e2e03665baa7523e9bf5bdd31109d01
                                                      • Opcode Fuzzy Hash: 8193f83da37fad3b946629d6a9e0bf8885d278d0ab3bcc0cac63ba56fd39f8e9
                                                      • Instruction Fuzzy Hash: 9E21BAB4908209DFDB04DFA4D9917AEBBF0BF54304F00846DE449AB350E7749A95CF91
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(00000000,0017CD3A,?,?,0017CD3A,00000220,?,00000000,?), ref: 0017AD93
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: cb1ab2f8d871ecb594605e3003d805d233feecfcb7a5ceafe11ffbed24cac1c3
                                                      • Instruction ID: 2222a45ed585e6c6ebee576e8adebe7df7c6e779ea53378eed9d31873e0c9187
                                                      • Opcode Fuzzy Hash: cb1ab2f8d871ecb594605e3003d805d233feecfcb7a5ceafe11ffbed24cac1c3
                                                      • Instruction Fuzzy Hash: 28E0653224061157D73626F5DC05B9E7679DFD27A2F5AC111AC4D96A90EB10CC0085E6
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: __floor_pentium4
                                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                      • API String ID: 4168288129-2761157908
                                                      • Opcode ID: 13b6484376dcfb9a5347dd4ccbd4f3768f782ca610357f075b9d4d7dd15cbfce
                                                      • Instruction ID: 261dbef7c1bee19f6f9f63761d05bed8911be4dde2cf8037d24ef0f6626c56ab
                                                      • Opcode Fuzzy Hash: 13b6484376dcfb9a5347dd4ccbd4f3768f782ca610357f075b9d4d7dd15cbfce
                                                      • Instruction Fuzzy Hash: 7FD23871E086298FDB65DE28DD447EAB7B5EB54304F1441EAD80DE7280EB78AF818F41
                                                      APIs
                                                      • GetLocaleInfoW.KERNEL32(?,2000000B,00180198,00000002,00000000,?,?,?,00180198,?,00000000), ref: 00180860
                                                      • GetLocaleInfoW.KERNEL32(?,20001004,00180198,00000002,00000000,?,?,?,00180198,?,00000000), ref: 00180889
                                                      • GetACP.KERNEL32(?,?,00180198,?,00000000), ref: 0018089E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID: ACP$OCP
                                                      • API String ID: 2299586839-711371036
                                                      • Opcode ID: 257d02d5985575ebf89800a6ede6e19ec21984490d617de15e3c492a2b610ba8
                                                      • Instruction ID: 87a86d9942b2df6449f418e2899a47db4fe9008899c78068a3d98406eccd960d
                                                      • Opcode Fuzzy Hash: 257d02d5985575ebf89800a6ede6e19ec21984490d617de15e3c492a2b610ba8
                                                      • Instruction Fuzzy Hash: 4C21D622F00108AADBB6AF54C940A9773A6EF5AB50B578024E80AD7114E732DFC5CBD0
                                                      APIs
                                                        • Part of subcall function 0017AFB3: GetLastError.KERNEL32(?,?,0017495A,001956B0,0000000C), ref: 0017AFB7
                                                        • Part of subcall function 0017AFB3: SetLastError.KERNEL32(00000000), ref: 0017B059
                                                      • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 0018016A
                                                      • IsValidCodePage.KERNEL32(00000000), ref: 001801A8
                                                      • IsValidLocale.KERNEL32(?,00000001), ref: 001801BB
                                                      • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00180203
                                                      • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 0018021E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                      • String ID:
                                                      • API String ID: 415426439-0
                                                      • Opcode ID: ca1493793ae59b845fe08e0cf23067dd85eadede7456ca1e1679cbbdc5a85198
                                                      • Instruction ID: 66a383107b075cfb7d6571b24267ae32d0a9fe295c5e7d8b7e7172414bf0b967
                                                      • Opcode Fuzzy Hash: ca1493793ae59b845fe08e0cf23067dd85eadede7456ca1e1679cbbdc5a85198
                                                      • Instruction Fuzzy Hash: 49518071A00209AFDB52EFA4CC89ABE73B9BF18700F154429F905E7190E7B0DB488F61
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: db70b6725760ee1e7b0c82764c85399648d13b1201e1b058b4d747cb3a019c3f
                                                      • Instruction ID: 2084d79a976a85b72cdaed8429f3e8bc7625230f20d298c660af63727de2dff4
                                                      • Opcode Fuzzy Hash: db70b6725760ee1e7b0c82764c85399648d13b1201e1b058b4d747cb3a019c3f
                                                      • Instruction Fuzzy Hash: 0B024D71E012199BDF14CFA9C8846AEFBF5FF48314F258269E519E7381D731AA05CB90
                                                      APIs
                                                      • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00180E99
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: FileFindFirst
                                                      • String ID:
                                                      • API String ID: 1974802433-0
                                                      • Opcode ID: 9347159ed05d234b7d820dd38a434b1a0a8f804416569339a6b5bc3748d29294
                                                      • Instruction ID: f5344d5a3350a4ed09b6883923b3a94bf022716d504c4a1b3416c3676a150472
                                                      • Opcode Fuzzy Hash: 9347159ed05d234b7d820dd38a434b1a0a8f804416569339a6b5bc3748d29294
                                                      • Instruction Fuzzy Hash: 1771B07294515C6FDF72AF688C89AAEBBB8AF09300F5481D9E009A3251DB315F898F10
                                                      APIs
                                                      • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 0016E438
                                                      • IsDebuggerPresent.KERNEL32 ref: 0016E504
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0016E51D
                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 0016E527
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                      • String ID:
                                                      • API String ID: 254469556-0
                                                      • Opcode ID: 4e00defdeaccda22e603de949215539622b2f0d99818cc1483ab3149b4dfe76d
                                                      • Instruction ID: 6b769f7eb07212d64edeab959bf85b22377bdf5bed66270f04ba8fa459b9275a
                                                      • Opcode Fuzzy Hash: 4e00defdeaccda22e603de949215539622b2f0d99818cc1483ab3149b4dfe76d
                                                      • Instruction Fuzzy Hash: 0931F5B9D052189BDF20DFA5DD49BCDBBF8AF18300F1041AAE40DAB250EB719A85CF45
                                                      APIs
                                                        • Part of subcall function 0017AFB3: GetLastError.KERNEL32(?,?,0017495A,001956B0,0000000C), ref: 0017AFB7
                                                        • Part of subcall function 0017AFB3: SetLastError.KERNEL32(00000000), ref: 0017B059
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 001803A2
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 001803EC
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 001804B2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: InfoLocale$ErrorLast
                                                      • String ID:
                                                      • API String ID: 661929714-0
                                                      • Opcode ID: 748de3c502e1cd38301be2e2ce8096d22ba9ee598535d8c4975adfd740d181ec
                                                      • Instruction ID: 68e9e3179eb776ec824246745bc0ebcd76ce02801eae50c47dd2f40fcd768a52
                                                      • Opcode Fuzzy Hash: 748de3c502e1cd38301be2e2ce8096d22ba9ee598535d8c4975adfd740d181ec
                                                      • Instruction Fuzzy Hash: 1C61827194420B9FEB69EF28CC82BAA77A8EF18300F104169ED05C6585EB34DB89DF50
                                                      APIs
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 001773F5
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 001773FF
                                                      • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 0017740C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                      • String ID:
                                                      • API String ID: 3906539128-0
                                                      • Opcode ID: 5ceee4e77e226a45b39b465779fb59ffaedc09eb4c67c31c54befd1b81000bcc
                                                      • Instruction ID: 10f60c6b51dd0a890ccbd33575d157ce72568cadd3a505ceaba4c6a8c2f77716
                                                      • Opcode Fuzzy Hash: 5ceee4e77e226a45b39b465779fb59ffaedc09eb4c67c31c54befd1b81000bcc
                                                      • Instruction Fuzzy Hash: E631E574901219ABCB21DF28DC88B9DBBB8BF18310F5041EAE41CA7290E7709F858F44
                                                      APIs
                                                      • GetSystemTimePreciseAsFileTime.KERNEL32(?,0016EA53,?,?,?,?,0016EA77,000000FF,?,?,?,0016E971,00000000), ref: 0016EB88
                                                      • GetSystemTimeAsFileTime.KERNEL32(?,6CA949D0,?,?,0018B30E,000000FF,?,0016EA53,?,?,?,?,0016EA77,000000FF,?), ref: 0016EB8C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: Time$FileSystem$Precise
                                                      • String ID:
                                                      • API String ID: 743729956-0
                                                      • Opcode ID: 359cf7c95ca8562ebca1db8d3296196bbca78ce6e2449ac72830e54666838a12
                                                      • Instruction ID: 7b76a57ef401ecc006e95abcb014e39f1c1a38c6e59905e2fd477be76d3e6e38
                                                      • Opcode Fuzzy Hash: 359cf7c95ca8562ebca1db8d3296196bbca78ce6e2449ac72830e54666838a12
                                                      • Instruction Fuzzy Hash: 47F03076A48554AFC7169F44DC41F59BBE8FB09B10F01436AE81297B90D774A9408B94
                                                      APIs
                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0018435A,?,?,?,?,?,?,00000000), ref: 0018462C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ExceptionRaise
                                                      • String ID:
                                                      • API String ID: 3997070919-0
                                                      • Opcode ID: 10e728349ebf2043142a64d0d9d4c215b50dd270f52c536160f52fe156c94dc9
                                                      • Instruction ID: d36223f17ed6e73d21979bee6786e093f641bef580c8f57f213d3f5a87766926
                                                      • Opcode Fuzzy Hash: 10e728349ebf2043142a64d0d9d4c215b50dd270f52c536160f52fe156c94dc9
                                                      • Instruction Fuzzy Hash: 2BB16F7161060ACFD719DF28C48AB647BE0FF45364F268658E89ACF2A1CB35DA81CF40
                                                      APIs
                                                      • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0016E0AA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: FeaturePresentProcessor
                                                      • String ID:
                                                      • API String ID: 2325560087-0
                                                      • Opcode ID: 332286ec580fc581baadaf8d6f1694d9d42ecaa1f0c6230741719b70bf8854d2
                                                      • Instruction ID: fa9b7ebe1093fe2c914a5016732ad737af6a8548f3214d31a3bf08e539c2212e
                                                      • Opcode Fuzzy Hash: 332286ec580fc581baadaf8d6f1694d9d42ecaa1f0c6230741719b70bf8854d2
                                                      • Instruction Fuzzy Hash: A8A157B5D107068FDB18CF58DC856A9BBF1FB58324F24822AD451EB7A4D3389994CF60
                                                      APIs
                                                        • Part of subcall function 0017C0E0: HeapAlloc.KERNEL32(00000008,?,?,?,0017B000,00000001,00000364,?,00000005,000000FF,?,0017495A,001956B0,0000000C), ref: 0017C121
                                                      • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00180E99
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00180F8D
                                                      • FindClose.KERNEL32(00000000), ref: 00180FCC
                                                      • FindClose.KERNEL32(00000000), ref: 00180FFF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFile$AllocFirstHeapNext
                                                      • String ID:
                                                      • API String ID: 2701053895-0
                                                      • Opcode ID: 194dd855054cf0b405936a8e396ac09e4679a90f1a951c5c15977d751c1ecbd1
                                                      • Instruction ID: f8d05884f4c1e54d682391b94f9c3c6a004cd9af79083eea69f8744aba120cbe
                                                      • Opcode Fuzzy Hash: 194dd855054cf0b405936a8e396ac09e4679a90f1a951c5c15977d751c1ecbd1
                                                      • Instruction Fuzzy Hash: 6851577290410CAFDB65BFA89C85ABF77B9DF89314F14429DF81993201EB309E499F60
                                                      APIs
                                                        • Part of subcall function 0017AFB3: GetLastError.KERNEL32(?,?,0017495A,001956B0,0000000C), ref: 0017AFB7
                                                        • Part of subcall function 0017AFB3: SetLastError.KERNEL32(00000000), ref: 0017B059
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00180654
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$InfoLocale
                                                      • String ID:
                                                      • API String ID: 3736152602-0
                                                      • Opcode ID: 461c45f99597f09ff79adce22d417a903a59da2c2c32bbc006ff933b8629a8c4
                                                      • Instruction ID: 76a8c3db1501e4fe78f869edce7ef4f8559642aa0281609c9ae03a2d94e884eb
                                                      • Opcode Fuzzy Hash: 461c45f99597f09ff79adce22d417a903a59da2c2c32bbc006ff933b8629a8c4
                                                      • Instruction Fuzzy Hash: D221C57261520AABEB29AB24DC91A7B73B8EF98310B20407AFD05C6241FB74DE548F50
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0
                                                      • API String ID: 0-4108050209
                                                      • Opcode ID: 782cbb2683b5ba8949bc8d9b8952673931641ff2f07c75940a05ff67778bbd50
                                                      • Instruction ID: 401761ebe20c5eb488a10ad02fb184f151e2af92d28d88ad454234bd972eca07
                                                      • Opcode Fuzzy Hash: 782cbb2683b5ba8949bc8d9b8952673931641ff2f07c75940a05ff67778bbd50
                                                      • Instruction Fuzzy Hash: 0AC1E1349007068FCB38DF68C9846BABBB1AF15340F54C61DE5AE97691C731EE85DB12
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0
                                                      • API String ID: 0-4108050209
                                                      • Opcode ID: 93ec2c903b86d8c02c504b8d50c08a908ccd5fb0ef704ea5f96a8d8c7fe2c8d2
                                                      • Instruction ID: c7cd3c3d01bfb02fd04c0a7066202175eba95bc2189b1406c2054b8946c2dcc9
                                                      • Opcode Fuzzy Hash: 93ec2c903b86d8c02c504b8d50c08a908ccd5fb0ef704ea5f96a8d8c7fe2c8d2
                                                      • Instruction Fuzzy Hash: 83B1D230A0060A8BCB39CF68C995ABEB7B1AF15310F24C61ED89E97691C774DA43DB51
                                                      APIs
                                                        • Part of subcall function 0017AFB3: GetLastError.KERNEL32(?,?,0017495A,001956B0,0000000C), ref: 0017AFB7
                                                        • Part of subcall function 0017AFB3: SetLastError.KERNEL32(00000000), ref: 0017B059
                                                      • EnumSystemLocalesW.KERNEL32(0018034E,00000001,00000000,?,-00000050,?,0018013E,00000000,-00000002,00000000,?,00000055,?), ref: 00180325
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$EnumLocalesSystem
                                                      • String ID:
                                                      • API String ID: 2417226690-0
                                                      • Opcode ID: 8ac608122caf623b2ba410317ce06e1d222af1b2a618b2a334a90d51229fc71f
                                                      • Instruction ID: 82d3c1e3da4d392b7de9bcfd0f184ae8cad022aa5025832d47e54fea4d5e2854
                                                      • Opcode Fuzzy Hash: 8ac608122caf623b2ba410317ce06e1d222af1b2a618b2a334a90d51229fc71f
                                                      • Instruction Fuzzy Hash: 6911293A2047095FDB28AF39C89167EB7A2FF84358B15442DE94B87B40D3716946CB40
                                                      APIs
                                                        • Part of subcall function 0017AFB3: GetLastError.KERNEL32(?,?,0017495A,001956B0,0000000C), ref: 0017AFB7
                                                        • Part of subcall function 0017AFB3: SetLastError.KERNEL32(00000000), ref: 0017B059
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00180774
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$InfoLocale
                                                      • String ID:
                                                      • API String ID: 3736152602-0
                                                      • Opcode ID: 714dd03cfefc33b113b7231ef8d483409997f00f98bd73fd778d936572d3f9cd
                                                      • Instruction ID: ffe4c261eeebb0872c29cad1d5288514f91bbcaf928e77c4e70f7af8acb3b2f0
                                                      • Opcode Fuzzy Hash: 714dd03cfefc33b113b7231ef8d483409997f00f98bd73fd778d936572d3f9cd
                                                      • Instruction Fuzzy Hash: 0211067261020AABD719AF68DC42ABA77FCEF08310B10417AF505D7641EB34EE448F90
                                                      APIs
                                                        • Part of subcall function 0017AFB3: GetLastError.KERNEL32(?,?,0017495A,001956B0,0000000C), ref: 0017AFB7
                                                        • Part of subcall function 0017AFB3: SetLastError.KERNEL32(00000000), ref: 0017B059
                                                      • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0018056A,00000000,00000000,?), ref: 001808F9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$InfoLocale
                                                      • String ID:
                                                      • API String ID: 3736152602-0
                                                      • Opcode ID: 303576da9c01c1b10ffd06dfb7bb53c151d0ae2d791c3e147347cc0435f9b0b1
                                                      • Instruction ID: 026f1b7411a80c6404b8c890d92ba289e8026cdd019236c5080b1cd7c0bced5f
                                                      • Opcode Fuzzy Hash: 303576da9c01c1b10ffd06dfb7bb53c151d0ae2d791c3e147347cc0435f9b0b1
                                                      • Instruction Fuzzy Hash: 37012633F0011ABBEB2D6A248805BBA7768DB4435CF165428EC4AA3181EB30EF45CFD0
                                                      APIs
                                                        • Part of subcall function 0017AFB3: GetLastError.KERNEL32(?,?,0017495A,001956B0,0000000C), ref: 0017AFB7
                                                        • Part of subcall function 0017AFB3: SetLastError.KERNEL32(00000000), ref: 0017B059
                                                      • EnumSystemLocalesW.KERNEL32(00180600,00000001,?,?,-00000050,?,00180106,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?), ref: 001805EB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$EnumLocalesSystem
                                                      • String ID:
                                                      • API String ID: 2417226690-0
                                                      • Opcode ID: 88332016451107b82fa28c7bdde793034c34b0add83a06b301f9e05b0fdc25c1
                                                      • Instruction ID: 735cae80a6209e86c494f0a8d7b20f9f07cdceeda55a69d9ffcea371cc3d5179
                                                      • Opcode Fuzzy Hash: 88332016451107b82fa28c7bdde793034c34b0add83a06b301f9e05b0fdc25c1
                                                      • Instruction Fuzzy Hash: E5F0F6362003085FEB256F39D881A7A7BA1EF84368F15842DF9464BA90D7B1AD42CF50
                                                      APIs
                                                        • Part of subcall function 00177594: EnterCriticalSection.KERNEL32(?,?,0017B440,?,00195B00,00000008,0017B332,?,?,?), ref: 001775A3
                                                      • EnumSystemLocalesW.KERNEL32(0017BFE3,00000001,00195B80,0000000C,0017B948,-00000050), ref: 0017C028
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: CriticalEnterEnumLocalesSectionSystem
                                                      • String ID:
                                                      • API String ID: 1272433827-0
                                                      • Opcode ID: c72e836d3fc7b2251d1f9ccb57cdf43a58731c0e5e3479288b42145e5febe8ca
                                                      • Instruction ID: 6ee0d8fc0416793f69be4fbf6029bf7b312e18f7185c90fc0d2c9be0357831ed
                                                      • Opcode Fuzzy Hash: c72e836d3fc7b2251d1f9ccb57cdf43a58731c0e5e3479288b42145e5febe8ca
                                                      • Instruction Fuzzy Hash: D8F04936A54304EFDB00EF98E842B9D77F0FB19B24F10811AF5059B6A0DB754940CF91
                                                      APIs
                                                        • Part of subcall function 0017AFB3: GetLastError.KERNEL32(?,?,0017495A,001956B0,0000000C), ref: 0017AFB7
                                                        • Part of subcall function 0017AFB3: SetLastError.KERNEL32(00000000), ref: 0017B059
                                                      • EnumSystemLocalesW.KERNEL32(00180720,00000001,?,?,?,00180160,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?,?), ref: 0018070C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$EnumLocalesSystem
                                                      • String ID:
                                                      • API String ID: 2417226690-0
                                                      • Opcode ID: cc84d31d807205b3de98cd6a8bd128f0831c46cd57f3fbeb6cad0538a5b40318
                                                      • Instruction ID: 58613070e2dfbc33ac5ca236ed9a011fb334fc4ea576091a79d8662e9c8b800d
                                                      • Opcode Fuzzy Hash: cc84d31d807205b3de98cd6a8bd128f0831c46cd57f3fbeb6cad0538a5b40318
                                                      • Instruction Fuzzy Hash: 5BF0553A30020857CB15AF35D805A6FBFA0EFC5710B0A4058FA0A8BA80C371AD42CF94
                                                      APIs
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,00000000,?,001762F0,?,20001004,00000000,00000002,?,?,00175202), ref: 0017BA80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID:
                                                      • API String ID: 2299586839-0
                                                      • Opcode ID: d6f2d27332b45a412cd21db0d455f3510671372f65f196759b772b48e6e89767
                                                      • Instruction ID: a0eff7a541d3463f29c14cc02e0dda466d2f840a9745f91dfee351a9ed516581
                                                      • Opcode Fuzzy Hash: d6f2d27332b45a412cd21db0d455f3510671372f65f196759b772b48e6e89767
                                                      • Instruction Fuzzy Hash: 6CE04F35948118BBCF226F61DC44FAE3F35EF44751F018011FD0A66620CB318961AA94
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_0000E541), ref: 0016E425
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: eead723bb4c179a47c26c620112cf09ec73135c33422f9f1c6e63f34609004f4
                                                      • Instruction ID: 445492a2ccb9c73a3074580a8ceb7b9f25784bd4b3a48a26dcc57937965d1c68
                                                      • Opcode Fuzzy Hash: eead723bb4c179a47c26c620112cf09ec73135c33422f9f1c6e63f34609004f4
                                                      • Instruction Fuzzy Hash:
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: HeapProcess
                                                      • String ID:
                                                      • API String ID: 54951025-0
                                                      • Opcode ID: 401e6785f7462c4f3e0f5036a500d1bb2dd35a2a194b9957bca3f0b531f27636
                                                      • Instruction ID: b863c944e43e052004547d0764bb56b137866e07f9493bf33cee514250d632b7
                                                      • Opcode Fuzzy Hash: 401e6785f7462c4f3e0f5036a500d1bb2dd35a2a194b9957bca3f0b531f27636
                                                      • Instruction Fuzzy Hash: 2EA001706412418B97608F36AA096193BE9AB46A99709886AA40AC6970EA2485929F15
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e2d0c0165b79564ce5f3e34b1a9679780976f79f02631351f340488e6833bfce
                                                      • Instruction ID: fe07c9cce0ed0dcd1f5828d06f7921fdfb467e92a77ae1a54712de34e419c8d0
                                                      • Opcode Fuzzy Hash: e2d0c0165b79564ce5f3e34b1a9679780976f79f02631351f340488e6833bfce
                                                      • Instruction Fuzzy Hash: 3C519AB0D1020DAFCB44DFA8C9919EEBBF4AB09350F24445AE815FB310D730AA51CB65
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: defeef9732a767b2ebd5551748bf70b529e8807ad572411e0bbabec0eb56d855
                                                      • Instruction ID: e47df16c3915be0a95ccfddab8442e55ea3fa18e9b28cdebe42ca4f3af8a2775
                                                      • Opcode Fuzzy Hash: defeef9732a767b2ebd5551748bf70b529e8807ad572411e0bbabec0eb56d855
                                                      • Instruction Fuzzy Hash: D0D06C3A655A58AFC210CF4AE840D41F7A8FB8D670B168066EA1893B20C231F811CEE0
                                                      APIs
                                                      • GetCPInfo.KERNEL32(00F64BD8,00F64BD8,00000000,7FFFFFFF,?,0018A19D,00F64BD8,00F64BD8,00000000,00F64BD8,?,?,?,?,00F64BD8,00000000), ref: 0018A258
                                                      • __alloca_probe_16.LIBCMT ref: 0018A313
                                                      • __alloca_probe_16.LIBCMT ref: 0018A3A2
                                                      • __freea.LIBCMT ref: 0018A3ED
                                                      • __freea.LIBCMT ref: 0018A3F3
                                                      • __freea.LIBCMT ref: 0018A429
                                                      • __freea.LIBCMT ref: 0018A42F
                                                      • __freea.LIBCMT ref: 0018A43F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: __freea$__alloca_probe_16$Info
                                                      • String ID:
                                                      • API String ID: 127012223-0
                                                      • Opcode ID: 557ba8d19fe5ca26064f9bef0474d7b2bd2e760da2f946d036ac61bdcd5ae0bb
                                                      • Instruction ID: 75ff680a1033c5c380287d0a5d75a6bb81894a693484e26374e849b399578c96
                                                      • Opcode Fuzzy Hash: 557ba8d19fe5ca26064f9bef0474d7b2bd2e760da2f946d036ac61bdcd5ae0bb
                                                      • Instruction Fuzzy Hash: 9A71D6729002495BFF31BF948C81FAE77BAAF59310F994057ED04A7281E7769E408B52
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: _strrchr
                                                      • String ID:
                                                      • API String ID: 3213747228-0
                                                      • Opcode ID: cbff355201e6154b52781c3113966492e3c4af968235757aaf5a3f6f2afe1b0b
                                                      • Instruction ID: a3409e0fe8cff2a3d82952f7e5276c1ac88a2b708465de5d6461f8dcce81bd24
                                                      • Opcode Fuzzy Hash: cbff355201e6154b52781c3113966492e3c4af968235757aaf5a3f6f2afe1b0b
                                                      • Instruction Fuzzy Hash: EBB169729043599FEB269F64DC82BBE7BB5EF65310F15C155E808AF282D770D901C7A0
                                                      APIs
                                                      • _ValidateLocalCookies.LIBCMT ref: 0016F827
                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 0016F82F
                                                      • _ValidateLocalCookies.LIBCMT ref: 0016F8B8
                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 0016F8E3
                                                      • _ValidateLocalCookies.LIBCMT ref: 0016F938
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                      • String ID: csm
                                                      • API String ID: 1170836740-1018135373
                                                      • Opcode ID: dda4d3b714c4451727524948c58de5d97d02b3f4e59b12879f942754c43e21b9
                                                      • Instruction ID: ac73e63a21b135791a126e12b388ce9a057af7354a9efc242902c43c44cf5538
                                                      • Opcode Fuzzy Hash: dda4d3b714c4451727524948c58de5d97d02b3f4e59b12879f942754c43e21b9
                                                      • Instruction Fuzzy Hash: 4F41B530E00218ABCF10DF68DC85A9E7BB5BF45314F1481A9F8189B392D7319A66CB91
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 0016EB22
                                                      • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 0016EB30
                                                      • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 0016EB41
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleModule
                                                      • String ID: GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                      • API String ID: 667068680-1047828073
                                                      • Opcode ID: 479e9e7f8ade7758d159055b25bbcd77bc699d630d1c023aae925d4d42a03134
                                                      • Instruction ID: 1f310334e36ee2635114622063a2d1d6c6b2bd09142306443b3781af3d8eaa02
                                                      • Opcode Fuzzy Hash: 479e9e7f8ade7758d159055b25bbcd77bc699d630d1c023aae925d4d42a03134
                                                      • Instruction Fuzzy Hash: 21D09E355993616FC7019B71BC0DC963E95BF056153054857F412D39A0D7B409C18B98
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 803fabb1cd05d4d42a0d1c1bc3c33dd7dc729704fa6df59c68383b8a3a56f3e0
                                                      • Instruction ID: 0c44cd0f7a7b8d2efc7e81a9d95c4d2fea441d2faf107cab82061787b7908ed8
                                                      • Opcode Fuzzy Hash: 803fabb1cd05d4d42a0d1c1bc3c33dd7dc729704fa6df59c68383b8a3a56f3e0
                                                      • Instruction Fuzzy Hash: DAB1F870A04249AFDB15EF98C881BAE7BB1BF66314F544259E405A73D6CB709F42CF60
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,00179AEB,0016F5BA,0016E585), ref: 00179B02
                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00179B10
                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00179B29
                                                      • SetLastError.KERNEL32(00000000,00179AEB,0016F5BA,0016E585), ref: 00179B7B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastValue___vcrt_
                                                      • String ID:
                                                      • API String ID: 3852720340-0
                                                      • Opcode ID: d127dfd26a5808e25f5509aa14794e808b9c7a16d6b6ba1f94f8d8719daae074
                                                      • Instruction ID: 6c52d9add583b84d2e175245d29bdf22187f0a0744a8e13963ce3bea0ecd8933
                                                      • Opcode Fuzzy Hash: d127dfd26a5808e25f5509aa14794e808b9c7a16d6b6ba1f94f8d8719daae074
                                                      • Instruction Fuzzy Hash: 1F014C32119A215ED72427B4BC85D5B2E76EB257B5730832BF41A634F1EF114C449654
                                                      APIs
                                                      • type_info::operator==.LIBVCRUNTIME ref: 0017A4DB
                                                      • CallUnexpected.LIBVCRUNTIME ref: 0017A754
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: CallUnexpectedtype_info::operator==
                                                      • String ID: csm$csm$csm
                                                      • API String ID: 2673424686-393685449
                                                      • Opcode ID: 57db0ea9afc0ce5934c9abeeb133c687aabf93dee6bb9aba3a993ca08824c889
                                                      • Instruction ID: ca1b0c2f666394e64ba5c5b2f05725f4b6a5c2507c63d8d765f285b35fc89919
                                                      • Opcode Fuzzy Hash: 57db0ea9afc0ce5934c9abeeb133c687aabf93dee6bb9aba3a993ca08824c889
                                                      • Instruction Fuzzy Hash: 89B1C171800209DFCF19DFA4C8459AEBBB5FFA4300F98855AF8096B212D731DA51CF92
                                                      APIs
                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,6CA949D0,?,?,00000000,0018B3E5,000000FF,?,00174B4A,00000002,?,00174BE6,00177849), ref: 00174ABE
                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00174AD0
                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000,0018B3E5,000000FF,?,00174B4A,00000002,?,00174BE6,00177849), ref: 00174AF2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                      • String ID: CorExitProcess$mscoree.dll
                                                      • API String ID: 4061214504-1276376045
                                                      • Opcode ID: 7fbae6647d508423e01b5a4769164dceaa0856a692a0ba631c612cc312cffacf
                                                      • Instruction ID: fc0da82a0c2179fe30f8104dccffd625fa7100d6d55bb090d063f854399f7086
                                                      • Opcode Fuzzy Hash: 7fbae6647d508423e01b5a4769164dceaa0856a692a0ba631c612cc312cffacf
                                                      • Instruction Fuzzy Hash: DB016735944615AFDB119F90DC05FAE7BB8FB05B15F01452AF822A3A90DB749940CA94
                                                      APIs
                                                      • __alloca_probe_16.LIBCMT ref: 0017C59B
                                                      • __alloca_probe_16.LIBCMT ref: 0017C664
                                                      • __freea.LIBCMT ref: 0017C6CB
                                                        • Part of subcall function 0017AD61: RtlAllocateHeap.NTDLL(00000000,0017CD3A,?,?,0017CD3A,00000220,?,00000000,?), ref: 0017AD93
                                                      • __freea.LIBCMT ref: 0017C6DE
                                                      • __freea.LIBCMT ref: 0017C6EB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1423051803-0
                                                      • Opcode ID: ae963b1085628f3b1d1e800e8ae2df63a143fe434f91459e8ce049b880cb9d2d
                                                      • Instruction ID: 518ab9ac4859e9438970556b40772b94775846f62fca3f5cc61502edf86dbc4a
                                                      • Opcode Fuzzy Hash: ae963b1085628f3b1d1e800e8ae2df63a143fe434f91459e8ce049b880cb9d2d
                                                      • Instruction Fuzzy Hash: 0E51A072600246AFEB215FA4CCC1EAB7AB9EF58710B15812EFD08D7241EB71DD508AA0
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 0016E8FB
                                                      • AcquireSRWLockExclusive.KERNEL32(?,?,00000000,0018B3C8,000000FF,?,0016B697), ref: 0016E91A
                                                      • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,0018B3C8,000000FF,?,0016B697), ref: 0016E948
                                                      • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,0018B3C8,000000FF,?,0016B697), ref: 0016E9A3
                                                      • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,0018B3C8,000000FF,?,0016B697), ref: 0016E9BA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: AcquireExclusiveLock$CurrentThread
                                                      • String ID:
                                                      • API String ID: 66001078-0
                                                      • Opcode ID: 9bc850bce2c37f06b6782c0980a65f6a57962bfab0efb1278039bffd9726076d
                                                      • Instruction ID: 599e3529820a982340eca09653fed4ac9caf9071b3a3e51be3a743968d551f06
                                                      • Opcode Fuzzy Hash: 9bc850bce2c37f06b6782c0980a65f6a57962bfab0efb1278039bffd9726076d
                                                      • Instruction Fuzzy Hash: E4416A39900606DFCB64DF69CC85A6AB3F4FF05318B204B2AE456D7A40D730E9A5CF51
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 0016C05B
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0016C066
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0016C0D4
                                                        • Part of subcall function 0016BF5D: std::locale::_Locimp::_Locimp.LIBCPMT ref: 0016BF75
                                                      • std::locale::_Setgloballocale.LIBCPMT ref: 0016C081
                                                      • _Yarn.LIBCPMT ref: 0016C097
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                      • String ID:
                                                      • API String ID: 1088826258-0
                                                      • Opcode ID: 7e4aec7e46184b51a4247e27b301f9172ff7c07840e5d0c1edf5fd1cc7bacc93
                                                      • Instruction ID: c43a5d393bdf27296a18f042ec12b207865bc0e0003e8f40bf821c5ed7f75f6f
                                                      • Opcode Fuzzy Hash: 7e4aec7e46184b51a4247e27b301f9172ff7c07840e5d0c1edf5fd1cc7bacc93
                                                      • Instruction Fuzzy Hash: 7201DF7AA045149BCB06EB60CC85A7D7BB1FFA5710B150009F816973D1CF346EA2CBD1
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,0018535D,00000000,?,00198180,?,?,?,00185294,00000004,InitializeCriticalSectionEx,0018F434,0018F43C), ref: 001852CE
                                                      • GetLastError.KERNEL32(?,0018535D,00000000,?,00198180,?,?,?,00185294,00000004,InitializeCriticalSectionEx,0018F434,0018F43C,00000000,?,0017AA0C), ref: 001852D8
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00185300
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad$ErrorLast
                                                      • String ID: api-ms-
                                                      • API String ID: 3177248105-2084034818
                                                      • Opcode ID: 4107f4b54c63a0257a0207e4e85bfdbff62d521590743b2e9b51b29a1de29bb8
                                                      • Instruction ID: d535d5a07c71fb235aec92e5b13776e5ce268790aa2bab32520031cac8d012c6
                                                      • Opcode Fuzzy Hash: 4107f4b54c63a0257a0207e4e85bfdbff62d521590743b2e9b51b29a1de29bb8
                                                      • Instruction Fuzzy Hash: CAE0BF346C4705B7EF202B61ED06F693F9AFB10B96F144031FD0EA88E1D7A1E952DA48
                                                      APIs
                                                      • GetConsoleOutputCP.KERNEL32(6CA949D0,00000000,00000000,?), ref: 00183122
                                                        • Part of subcall function 0017AE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0017C6C1,?,00000000,-00000008), ref: 0017AED2
                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00183374
                                                      • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 001833BA
                                                      • GetLastError.KERNEL32 ref: 0018345D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                      • String ID:
                                                      • API String ID: 2112829910-0
                                                      • Opcode ID: 396f5217f30c3633dd9f6b17b4a40107f514ee4036ec2e5cfa5c0c83b4595c32
                                                      • Instruction ID: 184bfa09f4a82910ac59769a549c736b4d02a846a14e6b7b750b1347ae37f61b
                                                      • Opcode Fuzzy Hash: 396f5217f30c3633dd9f6b17b4a40107f514ee4036ec2e5cfa5c0c83b4595c32
                                                      • Instruction Fuzzy Hash: AAD17975D04248AFCF15DFA8D8809ADBBB5FF49714F28416AE826EB351E730AA41CF50
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: AdjustPointer
                                                      • String ID:
                                                      • API String ID: 1740715915-0
                                                      • Opcode ID: 5062ea5513f3b3421f3b7f03a931c9d48c6ef85913f0584f6965633315ea3988
                                                      • Instruction ID: 5fccbbc993a4323715f6c79e466e44e34548784f5ef17ecadeb217d2cab4ada7
                                                      • Opcode Fuzzy Hash: 5062ea5513f3b3421f3b7f03a931c9d48c6ef85913f0584f6965633315ea3988
                                                      • Instruction Fuzzy Hash: C651F4766012029FEB298F54D841B7E77B5FF94710FA4852DEC0A47292E732ED81CB52
                                                      APIs
                                                        • Part of subcall function 0017AE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0017C6C1,?,00000000,-00000008), ref: 0017AED2
                                                      • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00180BEA
                                                      • __dosmaperr.LIBCMT ref: 00180BF1
                                                      • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00180C2B
                                                      • __dosmaperr.LIBCMT ref: 00180C32
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                      • String ID:
                                                      • API String ID: 1913693674-0
                                                      • Opcode ID: 3a9c15395a44a8bd879683782311b145e15539d59c36e26fbd53e037ea8ba96b
                                                      • Instruction ID: 2f08896bfdfc44e4d0f00cdec96fe6e2d904c305c8abda965cb62438c6fa4778
                                                      • Opcode Fuzzy Hash: 3a9c15395a44a8bd879683782311b145e15539d59c36e26fbd53e037ea8ba96b
                                                      • Instruction Fuzzy Hash: 2121077160060DAF9B66BF65C881D6BB7A8FF19368B118658F81DD7211DB30ED448F90
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b33c71d9e9c484c78022445af10e8da07e6e24e561b0a809ce77e6c582e120aa
                                                      • Instruction ID: 68cc67a63eb0ce38b126c30c7434a6d28fa42c1fe0a2fceb559af8c1f75b53ae
                                                      • Opcode Fuzzy Hash: b33c71d9e9c484c78022445af10e8da07e6e24e561b0a809ce77e6c582e120aa
                                                      • Instruction Fuzzy Hash: 9B21F035300205BF8B24AF698C81C6B77BEAF91364724C928F81ED7650EB30EC5087A0
                                                      APIs
                                                      • GetEnvironmentStringsW.KERNEL32 ref: 00181F84
                                                        • Part of subcall function 0017AE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0017C6C1,?,00000000,-00000008), ref: 0017AED2
                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00181FBC
                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00181FDC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                      • String ID:
                                                      • API String ID: 158306478-0
                                                      • Opcode ID: bb47e932d403fba792c8b4ea4d22e4136e39619be7c7c5351cdfdebb27213c51
                                                      • Instruction ID: 3d1468cdbade98e475c78b713d61f53e603f40d2f13973ced70232b6a05e8247
                                                      • Opcode Fuzzy Hash: bb47e932d403fba792c8b4ea4d22e4136e39619be7c7c5351cdfdebb27213c51
                                                      • Instruction Fuzzy Hash: 6F1104B25046197F663237F19C89C6F796CCF993A57510015F80692501FB34CE01DAB2
                                                      APIs
                                                      • std::_Throw_Cpp_error.LIBCPMT ref: 00162A8D
                                                      • GetCurrentThreadId.KERNEL32 ref: 00162A9B
                                                      • std::_Throw_Cpp_error.LIBCPMT ref: 00162AB4
                                                      • std::_Throw_Cpp_error.LIBCPMT ref: 00162AF3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: Cpp_errorThrow_std::_$CurrentThread
                                                      • String ID:
                                                      • API String ID: 2261580123-0
                                                      • Opcode ID: c7efe88cf3ec949bad0401425f398e99257070e6e3cbe756ae329d70ecf18408
                                                      • Instruction ID: 8b5a07670691df4629ac2ab7778f817d8cdffbe0a013febe4e7ab2f566fe2527
                                                      • Opcode Fuzzy Hash: c7efe88cf3ec949bad0401425f398e99257070e6e3cbe756ae329d70ecf18408
                                                      • Instruction Fuzzy Hash: 9B21E4B4E042098FCB08EFE8D9956AEBBF0AF58300F01845DE859AB391D7789950CF51
                                                      APIs
                                                      • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,00189952,00000000,00000001,?,?,?,001834B1,?,00000000,00000000), ref: 0018A487
                                                      • GetLastError.KERNEL32(?,00189952,00000000,00000001,?,?,?,001834B1,?,00000000,00000000,?,?,?,00182DF7,?), ref: 0018A493
                                                        • Part of subcall function 0018A4E4: CloseHandle.KERNEL32(FFFFFFFE,0018A4A3,?,00189952,00000000,00000001,?,?,?,001834B1,?,00000000,00000000,?,?), ref: 0018A4F4
                                                      • ___initconout.LIBCMT ref: 0018A4A3
                                                        • Part of subcall function 0018A4C5: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0018A461,0018993F,?,?,001834B1,?,00000000,00000000,?), ref: 0018A4D8
                                                      • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,00189952,00000000,00000001,?,?,?,001834B1,?,00000000,00000000,?), ref: 0018A4B8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                      • String ID:
                                                      • API String ID: 2744216297-0
                                                      • Opcode ID: ee31d32c6e811f6287fd62a4ad3d324c89d5d590b1ed8fc18cd17c7c91198506
                                                      • Instruction ID: b59335c61f22b0e5fd366e4cd70d1d9b43333922f8841926de1dfb4b51a4eec4
                                                      • Opcode Fuzzy Hash: ee31d32c6e811f6287fd62a4ad3d324c89d5d590b1ed8fc18cd17c7c91198506
                                                      • Instruction Fuzzy Hash: 88F01C36004615BBCF222F91EC08E893F66FF493A0B454412FA1D85561C7728A60AB95
                                                      APIs
                                                      • GetSystemTimeAsFileTime.KERNEL32(?), ref: 0016EFB9
                                                      • GetCurrentThreadId.KERNEL32 ref: 0016EFC8
                                                      • GetCurrentProcessId.KERNEL32 ref: 0016EFD1
                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 0016EFDE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                      • String ID:
                                                      • API String ID: 2933794660-0
                                                      • Opcode ID: 4451e87df8e75570738c34cc5f7369a9436946c5d6196a0c6dac55ec3383025e
                                                      • Instruction ID: 456e39e12d7e28bf6c0ce8805a5a05d42f292e719ebf5aebabfadcbac7b519fd
                                                      • Opcode Fuzzy Hash: 4451e87df8e75570738c34cc5f7369a9436946c5d6196a0c6dac55ec3383025e
                                                      • Instruction Fuzzy Hash: BEF0B270C0020CEBCB00DFB4CA4898EBBF4EF1C201B914996A412E7550E730AB85CB54
                                                      APIs
                                                        • Part of subcall function 0017AFB3: GetLastError.KERNEL32(?,?,0017495A,001956B0,0000000C), ref: 0017AFB7
                                                        • Part of subcall function 0017AFB3: SetLastError.KERNEL32(00000000), ref: 0017B059
                                                      • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,0017509A,?,?,?,00000055,?,-00000050,?,?,?), ref: 0017F825
                                                      • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,0017509A,?,?,?,00000055,?,-00000050,?,?), ref: 0017F85C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CodePageValid
                                                      • String ID: utf8
                                                      • API String ID: 943130320-905460609
                                                      • Opcode ID: 3431f15082daa31b6c50ae0553673a1ff369952e3799fac29c157e9ee2d1b352
                                                      • Instruction ID: 96be2e30cd9257cdad28bf89086c105b7b993b768ccddbee8527567a457e826a
                                                      • Opcode Fuzzy Hash: 3431f15082daa31b6c50ae0553673a1ff369952e3799fac29c157e9ee2d1b352
                                                      • Instruction Fuzzy Hash: 2451D571604206BADB28BB748C46BB773B8EF14704F25843DF65D975C1FB70E94286A2
                                                      APIs
                                                      • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,0017A6E1,?,?,00000000,00000000,00000000,?), ref: 0017A805
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: EncodePointer
                                                      • String ID: MOC$RCC
                                                      • API String ID: 2118026453-2084237596
                                                      • Opcode ID: df8df69f8264b48f9c99a1cda0bd4751bfd68850caa2cee774ee88011086c5d6
                                                      • Instruction ID: 93fac7a6709b3984162cf0e6ffad9ca3d73613f38e11f0e5b2781d842994bde4
                                                      • Opcode Fuzzy Hash: df8df69f8264b48f9c99a1cda0bd4751bfd68850caa2cee774ee88011086c5d6
                                                      • Instruction Fuzzy Hash: 6B418B71900209AFCF16CF94CC81AEEBBB5FF88305F158169FA086B211D3359961DB52
                                                      APIs
                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 0017A2C3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1299523777.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000000.00000002.1299499349.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299556829.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299575488.0000000000196000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299594769.0000000000197000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299614989.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1299634583.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ___except_validate_context_record
                                                      • String ID: csm$csm
                                                      • API String ID: 3493665558-3733052814
                                                      • Opcode ID: 1b4171970dccfdbc97c9c0e369294896d83ede03063e3eab7fd7a7fb600a2aff
                                                      • Instruction ID: 3e383eddc44ff943b044c2ff5f5e0d9ab797a6e01b5bc364450333e882a598c3
                                                      • Opcode Fuzzy Hash: 1b4171970dccfdbc97c9c0e369294896d83ede03063e3eab7fd7a7fb600a2aff
                                                      • Instruction Fuzzy Hash: E931CF72400218EBCF268F54C8408BE7B76FF8971AB98C15AF84C49221C336DCA1DB83

                                                      Execution Graph

                                                      Execution Coverage:1.2%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:33.8%
                                                      Total number of Nodes:68
                                                      Total number of Limit Nodes:3
                                                      execution_graph 33467 408600 33469 40860f 33467->33469 33468 408a48 ExitProcess 33469->33468 33470 408624 GetCurrentProcessId GetCurrentThreadId 33469->33470 33475 408982 33469->33475 33471 408650 SHGetSpecialFolderPathW 33470->33471 33472 40864c 33470->33472 33473 408880 33471->33473 33472->33471 33474 408964 GetForegroundWindow 33473->33474 33474->33475 33475->33468 33502 43e760 33503 43e780 33502->33503 33505 43e7be 33503->33505 33506 43e110 LdrInitializeThunk 33503->33506 33506->33505 33507 441720 33508 441750 33507->33508 33508->33508 33511 4417a9 33508->33511 33513 43e110 LdrInitializeThunk 33508->33513 33509 44184e 33511->33509 33514 43e110 LdrInitializeThunk 33511->33514 33513->33511 33514->33509 33515 43e967 33516 43e980 33515->33516 33519 43e110 LdrInitializeThunk 33516->33519 33518 43e9ef 33519->33518 33520 441320 33521 441340 33520->33521 33521->33521 33522 44145e 33521->33522 33524 43e110 LdrInitializeThunk 33521->33524 33524->33522 33525 437764 33526 43777c 33525->33526 33527 43779d GetUserDefaultUILanguage 33526->33527 33528 4377c7 33527->33528 33529 43e3a9 33530 43e3b2 GetForegroundWindow 33529->33530 33531 43e3c9 33530->33531 33532 43ea29 33533 43ea50 33532->33533 33534 43ea8e 33533->33534 33539 43e110 LdrInitializeThunk 33533->33539 33538 43e110 LdrInitializeThunk 33534->33538 33537 43eb59 33538->33537 33539->33534 33476 43eb88 33477 43eba0 33476->33477 33480 43ebde 33477->33480 33483 43e110 LdrInitializeThunk 33477->33483 33478 43ec4e 33480->33478 33482 43e110 LdrInitializeThunk 33480->33482 33482->33478 33483->33480 33484 40ef53 CoInitializeEx CoInitializeEx 33540 43c570 33541 43c583 33540->33541 33542 43c585 33540->33542 33543 43c58a RtlFreeHeap 33542->33543 33544 40ec77 CoInitializeSecurity CoInitializeSecurity 33485 43c55b RtlAllocateHeap 33545 40ddbb 33549 401f70 33545->33549 33547 40ddc0 CoUninitialize 33548 40eea0 33547->33548 33550 401f7e 33549->33550 33486 43679f 33489 4367bc 33486->33489 33487 43682d 33489->33487 33490 43e110 LdrInitializeThunk 33489->33490 33490->33489 33491 409d1e 33492 409d40 33491->33492 33492->33492 33493 409d94 LoadLibraryExW 33492->33493 33494 409da5 33493->33494 33495 409e74 LoadLibraryExW 33494->33495 33496 409e85 33495->33496

                                                      Control-flow Graph

                                                      APIs
                                                      • GetCurrentProcessId.KERNEL32 ref: 00408624
                                                      • GetCurrentThreadId.KERNEL32 ref: 0040862E
                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 004087FA
                                                      • GetForegroundWindow.USER32 ref: 00408974
                                                        • Part of subcall function 0040B7B0: FreeLibrary.KERNEL32(00408A31), ref: 0040B7B6
                                                        • Part of subcall function 0040B7B0: FreeLibrary.KERNEL32 ref: 0040B7D7
                                                      • ExitProcess.KERNEL32 ref: 00408A4A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: CurrentFreeLibraryProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                      • String ID: b]u)$}$}
                                                      • API String ID: 3676751680-2900034282
                                                      • Opcode ID: 6a07f0384f71d87041b62ad58867324155b1be50ba3e74cb306905e4ea8226d7
                                                      • Instruction ID: 3bf81113ce60e3950654fa87f9b5bc85db09618474996d7b9c4e13ef7b0d228f
                                                      • Opcode Fuzzy Hash: 6a07f0384f71d87041b62ad58867324155b1be50ba3e74cb306905e4ea8226d7
                                                      • Instruction Fuzzy Hash: C4C1E673E187144BC708DF69C84125AF7D6ABC8710F0AC53EA898EB391EA74DD048BC6

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 101 43e110-43e142 LdrInitializeThunk
                                                      APIs
                                                      • LdrInitializeThunk.NTDLL(0044148A,?,00000018,?,?,00000018,?,?,?), ref: 0043E13E
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                      • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                      • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                      • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 103 441720-441741 104 441750-44176b 103->104 104->104 105 44176d-441779 104->105 106 4417e0-4417e5 105->106 107 44177b-441785 105->107 108 441879-44187b 106->108 109 4417eb-4417ff 106->109 110 441790-441797 107->110 111 44188d-441894 108->111 112 44187d-441884 108->112 113 441800-44181b 109->113 114 4417ad-4417b5 110->114 115 441799-4417a7 110->115 116 441886 112->116 117 44188a 112->117 113->113 118 44181d-441828 113->118 114->106 120 4417b7-4417d8 call 43e110 114->120 115->110 119 4417a9-4417ab 115->119 116->117 117->111 121 441871-441873 118->121 122 44182a-441832 118->122 119->106 124 4417dd 120->124 121->108 126 441875 121->126 125 441840-441847 122->125 124->106 127 441850-441856 125->127 128 441849-44184c 125->128 126->108 127->121 130 441858-44186e call 43e110 127->130 128->125 129 44184e 128->129 129->121 130->121
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID: =<32
                                                      • API String ID: 2994545307-852023076
                                                      • Opcode ID: 806326fabb1518b066f083a03506ad00710994454575a613e60301918d7e52c2
                                                      • Instruction ID: 3b6fc7dbca8d43659897c6c89a338d9db0430b3797e073dd088a6240ba40644d
                                                      • Opcode Fuzzy Hash: 806326fabb1518b066f083a03506ad00710994454575a613e60301918d7e52c2
                                                      • Instruction Fuzzy Hash: 7A314438608304ABF714AE159C91B3BB3A6EB85750F18852EE695573F1D738DC90878A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: de8a8dcc9c3ab3076e5cd776fb6cd32bc0718f272d39d571d2e216b7fbce9e89
                                                      • Instruction ID: c6ef65a4040eb9722264cce64ace65176086622d4161082164e2e1e487573ca7
                                                      • Opcode Fuzzy Hash: de8a8dcc9c3ab3076e5cd776fb6cd32bc0718f272d39d571d2e216b7fbce9e89
                                                      • Instruction Fuzzy Hash: E121C837A62B184BD3108E54DCC87917761E7D9318F3E86B8C9249F7D2C97BA91386C0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 31 409d1e-409d34 32 409d40-409d52 31->32 32->32 33 409d54-409d7e 32->33 34 409d80-409d92 33->34 34->34 35 409d94-409e13 LoadLibraryExW call 43d960 34->35 38 409e20-409e32 35->38 38->38 39 409e34-409e5e 38->39 40 409e60-409e72 39->40 40->40 41 409e74-409e80 LoadLibraryExW call 43d960 40->41 43 409e85-409e98 41->43
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(?,00000000), ref: 00409D98
                                                      • LoadLibraryExW.KERNEL32(?,00000000), ref: 00409E78
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID: CKI
                                                      • API String ID: 1029625771-2433779057
                                                      • Opcode ID: 46ebf1f11a428727df2c69ed2ddcf1f0c4f78635cb5cf24ba122c25d2125fb43
                                                      • Instruction ID: 9df50abc4230604fad3af689b86cbcfc4f62151ff32a39ed9a717dc759385280
                                                      • Opcode Fuzzy Hash: 46ebf1f11a428727df2c69ed2ddcf1f0c4f78635cb5cf24ba122c25d2125fb43
                                                      • Instruction Fuzzy Hash: 1041EFB4D003009FEB149F789992A9A7F71EB06324F5152ADD4902F3E6C635981A8BE6

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 48 43e34b-43e357 49 43e360-43e37a 48->49 49->49 50 43e37c-43e409 GetForegroundWindow call 4402f0 49->50
                                                      APIs
                                                      • GetForegroundWindow.USER32 ref: 0043E3BA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ForegroundWindow
                                                      • String ID:
                                                      • API String ID: 2020703349-3019521637
                                                      • Opcode ID: 1a0742d174ed02cdc22a72f35ed7972a2a7288d22f9a72e178f62dae787fe3a6
                                                      • Instruction ID: 528e16a96f9d9f00b26d3e5e14e5fe829b229e0aa49aafaba4eb36a7b6cd6e75
                                                      • Opcode Fuzzy Hash: 1a0742d174ed02cdc22a72f35ed7972a2a7288d22f9a72e178f62dae787fe3a6
                                                      • Instruction Fuzzy Hash: FA112B7AE418614BEF08CF39DC171AA77A2B3C5325B2D56B98816E32D0DA3C5C068A84

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 54 40ef53-40f0b5 CoInitializeEx * 2
                                                      APIs
                                                      • CoInitializeEx.OLE32(00000000,00000002), ref: 0040EF57
                                                      • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040F09C
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: Initialize
                                                      • String ID:
                                                      • API String ID: 2538663250-0
                                                      • Opcode ID: c72aef12464a92cc2c3f2d51aa4abadf574ffcca3a61543972ef4f2091f679da
                                                      • Instruction ID: f51fb2f77ad80b64b0419191bf69b8e44a6001040ca864f0c8a1fa7d7adef59f
                                                      • Opcode Fuzzy Hash: c72aef12464a92cc2c3f2d51aa4abadf574ffcca3a61543972ef4f2091f679da
                                                      • Instruction Fuzzy Hash: 9341C6B4C10B40AFD370EF399A0B7137EB8AB05250F504B1DF9E6866D4E231A4198BD7

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 55 40ec77-40ecbb CoInitializeSecurity * 2
                                                      APIs
                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040EC89
                                                      • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040ECA2
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: InitializeSecurity
                                                      • String ID:
                                                      • API String ID: 640775948-0
                                                      • Opcode ID: fb62f50cd5accdd3f8c0e7536e39a1f07535dd0835aa916c8da64f7b89d0cef8
                                                      • Instruction ID: 738adb6083984dd8bacecb44fa1de3dd99d04845307cbd3813f349a55eb87af8
                                                      • Opcode Fuzzy Hash: fb62f50cd5accdd3f8c0e7536e39a1f07535dd0835aa916c8da64f7b89d0cef8
                                                      • Instruction Fuzzy Hash: 8BE042783D97417BF6795B14ED57F143225AB86F26F304314B7253D6E58AE03201451D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 79 437764-437799 call 43fe00 call 414c90 * 2 87 43779b 79->87 88 43779d-4377c5 GetUserDefaultUILanguage 79->88 87->88 89 4377c7-4377ca 88->89 90 4377d0-437852 89->90 91 437857-437888 89->91 90->89
                                                      APIs
                                                      • GetUserDefaultUILanguage.KERNELBASE ref: 0043779D
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: DefaultLanguageUser
                                                      • String ID:
                                                      • API String ID: 95929093-0
                                                      • Opcode ID: bc18d378b5dd9222f1d4b2f2bf41a228d576f499a8aff68b17f4869370526a21
                                                      • Instruction ID: 54b6fee0e0571655c33f26142f93ff03fb1190c0e218daea6acb4e94425ab4d3
                                                      • Opcode Fuzzy Hash: bc18d378b5dd9222f1d4b2f2bf41a228d576f499a8aff68b17f4869370526a21
                                                      • Instruction Fuzzy Hash: 0C31E472A466418FD7158B78C8837ADBBE28BD5314F0A80AEE459C73A2D9388942CB10

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 92 43e3a9-43e3c4 GetForegroundWindow call 4402f0 95 43e3c9-43e409 92->95
                                                      APIs
                                                      • GetForegroundWindow.USER32 ref: 0043E3BA
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ForegroundWindow
                                                      • String ID:
                                                      • API String ID: 2020703349-0
                                                      • Opcode ID: 0e9d24a3901733470457e1249cc7f7470b5df7d452cc394c81079ce9d69cb8f4
                                                      • Instruction ID: 5efd1ee9a03ea3c3eb0c12d762aaad34ed982eea5bb01117e5cc31371429f0ae
                                                      • Opcode Fuzzy Hash: 0e9d24a3901733470457e1249cc7f7470b5df7d452cc394c81079ce9d69cb8f4
                                                      • Instruction Fuzzy Hash: 29F0A0FEE805528FDB04CF55EC5446533A3B7D930631D8479D501A3229DE74A902DA45

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 96 43c570-43c57c 97 43c583-43c584 96->97 98 43c585-43c597 call 43f990 RtlFreeHeap 96->98
                                                      APIs
                                                      • RtlFreeHeap.NTDLL(?,00000000,?,0043E0F9), ref: 0043C590
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: FreeHeap
                                                      • String ID:
                                                      • API String ID: 3298025750-0
                                                      • Opcode ID: 4ca71c55d9fe9b281f7981d367328e1df5632f63ab8c1559b6560bf0dd0d3b5a
                                                      • Instruction ID: b893ccae00c0100e086c015fd95e4a651a52546402759b79cf5975c20580b1f3
                                                      • Opcode Fuzzy Hash: 4ca71c55d9fe9b281f7981d367328e1df5632f63ab8c1559b6560bf0dd0d3b5a
                                                      • Instruction Fuzzy Hash: 28D01231815232FBC6102F28BC05BCB3B54DF5A321F0708A2F404AB075C764EC91DAD8

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 102 43c55b-43c568 RtlAllocateHeap
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(?,00000000), ref: 0043C561
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: 1e4e484f05b9e0d440bcaef072417b378b3908eb1398e6cf47b9ef0a4f9b27b4
                                                      • Instruction ID: acefbe7e0d7c30d89c71afa01d78d71c03f6ee103d6cd382e15fa3716b8bb47b
                                                      • Opcode Fuzzy Hash: 1e4e484f05b9e0d440bcaef072417b378b3908eb1398e6cf47b9ef0a4f9b27b4
                                                      • Instruction Fuzzy Hash: 13A012310401109AC5111B10BC08FC53E10DB05221F020051F000040B28260C841C584
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: Uninitialize
                                                      • String ID:
                                                      • API String ID: 3861434553-0
                                                      • Opcode ID: 0a614a96431d9d701f40230e0772b67ec7475a12848427324b9a6d407e3c9b36
                                                      • Instruction ID: 5bb00a4b7ef97e9f22d5c03d32b859c0f98b2e4320e2e689d4767ab94f51e1d5
                                                      • Opcode Fuzzy Hash: 0a614a96431d9d701f40230e0772b67ec7475a12848427324b9a6d407e3c9b36
                                                      • Instruction Fuzzy Hash: BBC0807C61C0018BC708D731EC2643732569F8B34D724443ED40785357DB7465114A4D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: "7B$%"$+A#C=]=_$- $f$8]pY$9#'$=]=_$CNF8$Fm$I$JOSP$Q*RG$R03!$V]$].n^$_^]\$_^]\$eN$g}zh$p7B$pancakedipyps.click$s$wdnf$~SS}$rp
                                                      • API String ID: 0-1637947137
                                                      • Opcode ID: e7edffdd5fd14d72b39b69682efa331384b3f5ec70a2e9e708273cc4b8c2f64b
                                                      • Instruction ID: c461727374bb2b2ad86d2c2bcda0cf258ef6ef710b96b519a2ac6f34890c1cf1
                                                      • Opcode Fuzzy Hash: e7edffdd5fd14d72b39b69682efa331384b3f5ec70a2e9e708273cc4b8c2f64b
                                                      • Instruction Fuzzy Hash: 4CB241B5A08311CFD714CF29D8816ABBBF2FF86310F19856DE4859B391D7389902CB96
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                      • String ID: '$($*$-$5$6$8$;$=$I$L$q$}
                                                      • API String ID: 2832541153-2064290267
                                                      • Opcode ID: e5da5b9a56329a51e64cc872523e0dfe2627c190021f4751e0eab4ab2fc29bc9
                                                      • Instruction ID: e1340490ca777862a7890bfc042d0e04e3e37fcf4304b8f7f5516f793469ed24
                                                      • Opcode Fuzzy Hash: e5da5b9a56329a51e64cc872523e0dfe2627c190021f4751e0eab4ab2fc29bc9
                                                      • Instruction Fuzzy Hash: E0417FB150C3818ED301AF78958835EFEE0AB89319F04497EE4C987292D7BD8689C757
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ":B$+A#C=]=_$=]=_$_^]\$eN$p7B$rp
                                                      • API String ID: 0-2092896893
                                                      • Opcode ID: ed0750c71e1987e5a6d7bbb2feff7f6cba7481729a1a1e0e14759066178fedbc
                                                      • Instruction ID: 182eaf4e6841349a8ef13573fe29d1f0c1c004a6e50f6283d231cbe69a191b93
                                                      • Opcode Fuzzy Hash: ed0750c71e1987e5a6d7bbb2feff7f6cba7481729a1a1e0e14759066178fedbc
                                                      • Instruction Fuzzy Hash: 594267B5B04211CFD714CF28D8816AABBB2FF8A311F1A81BDD4459B395D738D942CB85
                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL ref: 00411EC3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: 8$?$L$[$^$a$p$y$|
                                                      • API String ID: 237503144-3949209405
                                                      • Opcode ID: 4a8879f59250b1b40dd97a34ff5c93777886415510556bea7e1a63f8662ddf82
                                                      • Instruction ID: f3e99263922766072051b57ffb7fb6feee41006b6636dbb619e47a4599fab130
                                                      • Opcode Fuzzy Hash: 4a8879f59250b1b40dd97a34ff5c93777886415510556bea7e1a63f8662ddf82
                                                      • Instruction Fuzzy Hash: 3512A17160C7808BC324DB38C5913EFBBE1AF85314F184A2EE9D9D7392D67898858B47
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: !A/C$$Y)[$1Q>S$DE$O=q?$P-X/$S%g'$Z)o+$f!V#$r$s1z3$}5x7$}9F;
                                                      • API String ID: 0-3413813421
                                                      • Opcode ID: 458a8bf2b899d5374d71cf77dcf3c349152665624c54811c7463cc9c4c7509d7
                                                      • Instruction ID: 5d18dcd57d5afae5d2d04a22ff7efa295b4e1cb49f3d19f2d9ec184adb64bcbb
                                                      • Opcode Fuzzy Hash: 458a8bf2b899d5374d71cf77dcf3c349152665624c54811c7463cc9c4c7509d7
                                                      • Instruction Fuzzy Hash: FBC1DFB460C3418FE724DF25D85176BBBF1EF81304F05496DE5998B3A2D7388906CB9A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: "nl$#M%O$*"$4UW$\701$\701$a`|v$wt$AC$MO$pv$uvw
                                                      • API String ID: 0-635595044
                                                      • Opcode ID: 667693208df0268b9ec092dcfe9b45baca584c7d5a41cd89dd0410bc245c86b8
                                                      • Instruction ID: cacfe30d0b9b21159c86ccf72fc2d8f2746876e9854ab90a0990479cac9f29fc
                                                      • Opcode Fuzzy Hash: 667693208df0268b9ec092dcfe9b45baca584c7d5a41cd89dd0410bc245c86b8
                                                      • Instruction Fuzzy Hash: 8902F3B594C3008BC7049F29D8916ABBBF1EFD2314F15892DF4C59B351E238DA49C79A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: AL$CPm5$O}nl$Yxqs$f>mI$hch&$t|f$uvqs$
                                                      • API String ID: 0-1556426300
                                                      • Opcode ID: 735fdd800c882bc2084322a437c9c924766bb235598593207dd1441ed3ed4d6f
                                                      • Instruction ID: 72dbec98d39b44e021400b4b3f7dd457a245ac0fe219d5a174d4001ed2214f73
                                                      • Opcode Fuzzy Hash: 735fdd800c882bc2084322a437c9c924766bb235598593207dd1441ed3ed4d6f
                                                      • Instruction Fuzzy Hash: 0252467050C3918FC721CF25C8406AFBBE1AF95314F144A7EE8E45B392D739994ACB9A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 47:$ " $220$AZDH$UXWZ$nV[k$pMC@$:/'
                                                      • API String ID: 0-3711047884
                                                      • Opcode ID: a4c9283d45bc98dcba5f61ed0453037d099fbeaad371f82cb7e9938c9b68f646
                                                      • Instruction ID: 65e572282dc53975798f39d0df5fbe4ea82dc72bdd677536ff169635eb849b4a
                                                      • Opcode Fuzzy Hash: a4c9283d45bc98dcba5f61ed0453037d099fbeaad371f82cb7e9938c9b68f646
                                                      • Instruction Fuzzy Hash: 46C169B4904B819FD320AF3A95467A3BFF0EB06300F444A5ED4EA4B795E735601ACBD6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: _^]\
                                                      • API String ID: 0-3116432788
                                                      • Opcode ID: b96ce21cf214a16ae07447a79efeb4cc0916feeea9f87c928e3a685268b8bebc
                                                      • Instruction ID: 53d5d62a5b06f007e29734ec6a967500c823bb8f017ec32fffb38b320ea18f22
                                                      • Opcode Fuzzy Hash: b96ce21cf214a16ae07447a79efeb4cc0916feeea9f87c928e3a685268b8bebc
                                                      • Instruction Fuzzy Hash: CC8234715083518BC724CF28C8917ABB7F1EFCA324F198A6DE8D5973A5E7388845C746
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID: /$BVLm$_^]\$_^]\$_^]\$_^]\$_^]\
                                                      • API String ID: 2994545307-2892575238
                                                      • Opcode ID: 6e5268ea999838320bcd053c9cc8e9dfea5d0472b35df6685e8a938bf7b93b82
                                                      • Instruction ID: 8a47e0abde06d641331a8f2ba33a8f9f198beecf63cce3fe2238518d353f80c2
                                                      • Opcode Fuzzy Hash: 6e5268ea999838320bcd053c9cc8e9dfea5d0472b35df6685e8a938bf7b93b82
                                                      • Instruction Fuzzy Hash: F5325AB56083408BD718CB348CA17BBB7D2FBD6314F19593DD0D6872A2DB398D428B5A
                                                      APIs
                                                      • GetLocaleInfoW.KERNEL32(?,2000000B,00180198,00000002,00000000,?,?,?,00180198,?,00000000), ref: 00180860
                                                      • GetLocaleInfoW.KERNEL32(?,20001004,00180198,00000002,00000000,?,?,?,00180198,?,00000000), ref: 00180889
                                                      • GetACP.KERNEL32(?,?,00180198,?,00000000), ref: 0018089E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID: ACP$OCP
                                                      • API String ID: 2299586839-711371036
                                                      • Opcode ID: 257d02d5985575ebf89800a6ede6e19ec21984490d617de15e3c492a2b610ba8
                                                      • Instruction ID: 87a86d9942b2df6449f418e2899a47db4fe9008899c78068a3d98406eccd960d
                                                      • Opcode Fuzzy Hash: 257d02d5985575ebf89800a6ede6e19ec21984490d617de15e3c492a2b610ba8
                                                      • Instruction Fuzzy Hash: 4C21D622F00108AADBB6AF54C940A9773A6EF5AB50B578024E80AD7114E732DFC5CBD0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: _^]\_^]\$rqB$uYD\$PV$X^$\R
                                                      • API String ID: 0-1627709806
                                                      • Opcode ID: 3df9218c4e884d0bc4ea657edaa843c97e8fa3da6c91276e4a67d9cf42d70f5f
                                                      • Instruction ID: 5825545f21314853fe0769d62852bd8f916bf307171877822417e4e5256747d8
                                                      • Opcode Fuzzy Hash: 3df9218c4e884d0bc4ea657edaa843c97e8fa3da6c91276e4a67d9cf42d70f5f
                                                      • Instruction Fuzzy Hash: 42F1EEB5E04318CFDB14CFA9D8816AEBBB1FF49304F18446DD642AB351D779A902CB98
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: >$HYZF$HYZF$UMAG$Y2^0$]><
                                                      • API String ID: 0-2666672646
                                                      • Opcode ID: 32375935e6ef412caa3837e9f6c66e3b8adf22c54bae03c550ad84a2513a055e
                                                      • Instruction ID: 560480d45fa7c8791f5dd325a32e0fd9eca2933a49feb221361dc50e24506aec
                                                      • Opcode Fuzzy Hash: 32375935e6ef412caa3837e9f6c66e3b8adf22c54bae03c550ad84a2513a055e
                                                      • Instruction Fuzzy Hash: 38E12A7674C7504BD324CF6888512AFBBE2DFC1304F18893EE5E5AB385DA798905878A
                                                      APIs
                                                        • Part of subcall function 0017AFB3: GetLastError.KERNEL32(00000000,?,0017D392), ref: 0017AFB7
                                                        • Part of subcall function 0017AFB3: SetLastError.KERNEL32(00000000,?,?,00000028,00177816), ref: 0017B059
                                                      • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 0018016A
                                                      • IsValidCodePage.KERNEL32(00000000), ref: 001801A8
                                                      • IsValidLocale.KERNEL32(?,00000001), ref: 001801BB
                                                      • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00180203
                                                      • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 0018021E
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                      • String ID:
                                                      • API String ID: 415426439-0
                                                      • Opcode ID: 52611096de8d26cabdc51ea8537bd47a5311b410d76340864207c3479976f69c
                                                      • Instruction ID: 66a383107b075cfb7d6571b24267ae32d0a9fe295c5e7d8b7e7172414bf0b967
                                                      • Opcode Fuzzy Hash: 52611096de8d26cabdc51ea8537bd47a5311b410d76340864207c3479976f69c
                                                      • Instruction Fuzzy Hash: 49518071A00209AFDB52EFA4CC89ABE73B9BF18700F154429F905E7190E7B0DB488F61
                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 004284BD
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 004285B4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: LF7Y$_^]\
                                                      • API String ID: 237503144-3688711800
                                                      • Opcode ID: 26de5ca542a2a6977b9e84e77be44b5ac01a7d5cb18c837ff72e8e2a41646e8e
                                                      • Instruction ID: 00d2ad6f27f0b0783341daf9d6c4bd9e01a02a9b0560c8c7bc353a94b2bfb0e2
                                                      • Opcode Fuzzy Hash: 26de5ca542a2a6977b9e84e77be44b5ac01a7d5cb18c837ff72e8e2a41646e8e
                                                      • Instruction Fuzzy Hash: 90221375A08351CFD3248F28E88072FB7E1BF8A310F194A7DE995673A1D7349912CB5A
                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 004284BD
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 004285B4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: LF7Y$_^]\
                                                      • API String ID: 237503144-3688711800
                                                      • Opcode ID: d13f070fd010028f18266c39e4bf0995e2ea579b86d440724d5feb7531688b93
                                                      • Instruction ID: 9e148bf222026bc2ff09e9b78a5b6d6e6f400f6959469ba780e6b53d717f86de
                                                      • Opcode Fuzzy Hash: d13f070fd010028f18266c39e4bf0995e2ea579b86d440724d5feb7531688b93
                                                      • Instruction Fuzzy Hash: F812F175A08351CFD3248F28E88071FBBE1BF8A310F194A6DE995673A1D734D942CB5A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID: _^]\$_^]\$f$fiP$jiP
                                                      • API String ID: 2994545307-2734853458
                                                      • Opcode ID: 02867def88f330cc357aa33e98f5089401e16d469949ca3e2fbae4f2ba5b0f1e
                                                      • Instruction ID: 745ca490046a6ac68c59f9825e457d0a566b3cc6b4523f93947a3945e487c19a
                                                      • Opcode Fuzzy Hash: 02867def88f330cc357aa33e98f5089401e16d469949ca3e2fbae4f2ba5b0f1e
                                                      • Instruction Fuzzy Hash: 972213B1A0C3029FD718CF29D89072FBBE2ABD9314F189A2DE4D597395D634DC418B4A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 2h?n$7$SP$^`/4$gfff
                                                      • API String ID: 0-3257051659
                                                      • Opcode ID: e0427b1a9b77ff7e65e449d5ce122ac57cd39ae6c2270757774d7d10ffd74788
                                                      • Instruction ID: 27920faaac780ccf3f5efe4f99c0b1a63c78e90bde3d2871b705a1280bebe65e
                                                      • Opcode Fuzzy Hash: e0427b1a9b77ff7e65e449d5ce122ac57cd39ae6c2270757774d7d10ffd74788
                                                      • Instruction Fuzzy Hash: 59A14876A143504BD314CF28C8517AFB7E2FBC5318F198A3EE895D7391EA3889428786
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: db70b6725760ee1e7b0c82764c85399648d13b1201e1b058b4d747cb3a019c3f
                                                      • Instruction ID: 2084d79a976a85b72cdaed8429f3e8bc7625230f20d298c660af63727de2dff4
                                                      • Opcode Fuzzy Hash: db70b6725760ee1e7b0c82764c85399648d13b1201e1b058b4d747cb3a019c3f
                                                      • Instruction Fuzzy Hash: 0B024D71E012199BDF14CFA9C8846AEFBF5FF48314F258269E519E7381D731AA05CB90
                                                      APIs
                                                      • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00180E99
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: FileFindFirst
                                                      • String ID:
                                                      • API String ID: 1974802433-0
                                                      • Opcode ID: 2414ce650eede987cda66207a25f8d866202811c9df9f8cd129af2a06fdfc094
                                                      • Instruction ID: f5344d5a3350a4ed09b6883923b3a94bf022716d504c4a1b3416c3676a150472
                                                      • Opcode Fuzzy Hash: 2414ce650eede987cda66207a25f8d866202811c9df9f8cd129af2a06fdfc094
                                                      • Instruction Fuzzy Hash: 1771B07294515C6FDF72AF688C89AAEBBB8AF09300F5481D9E009A3251DB315F898F10
                                                      APIs
                                                      • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 0016E438
                                                      • IsDebuggerPresent.KERNEL32 ref: 0016E504
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0016E51D
                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 0016E527
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                      • String ID:
                                                      • API String ID: 254469556-0
                                                      • Opcode ID: 4e26eae05ae8d6d4e3e5ea755fa482ab7c3a9b9e69b09bd663f3b4f605849cdf
                                                      • Instruction ID: 6b769f7eb07212d64edeab959bf85b22377bdf5bed66270f04ba8fa459b9275a
                                                      • Opcode Fuzzy Hash: 4e26eae05ae8d6d4e3e5ea755fa482ab7c3a9b9e69b09bd663f3b4f605849cdf
                                                      • Instruction Fuzzy Hash: 0931F5B9D052189BDF20DFA5DD49BCDBBF8AF18300F1041AAE40DAB250EB719A85CF45
                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,?), ref: 004291DA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: +Ku$wpq
                                                      • API String ID: 237503144-1953850642
                                                      • Opcode ID: dd00e6cff4bb86df55339bea6a97020402cd2a79317d379f18720dc196f8341f
                                                      • Instruction ID: 7bb714cd0adbe8f34d65affdf2b55708b4274e5c8486b9e210027d19f02d6b7d
                                                      • Opcode Fuzzy Hash: dd00e6cff4bb86df55339bea6a97020402cd2a79317d379f18720dc196f8341f
                                                      • Instruction Fuzzy Hash: 6F51CE7220C3528FC324CF29984076FB7E2EBC5310F55892EE5D9CB285DB34D50A8B96
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: MetricsSystem
                                                      • String ID:
                                                      • API String ID: 4116985748-3916222277
                                                      • Opcode ID: e2dbdaae214771375078ea694cbe3190168a6d9690373aa5dbc97004a2b0131a
                                                      • Instruction ID: fc399c5893f09ab22ce38e0ca23dce90b2d9510c132352c7ff6b67ebebce5796
                                                      • Opcode Fuzzy Hash: e2dbdaae214771375078ea694cbe3190168a6d9690373aa5dbc97004a2b0131a
                                                      • Instruction Fuzzy Hash: 725160B4E142089FCB40EFACD98569DBBF0AB48710F11852EE898E7350D734A944CF96
                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,00000000,?), ref: 00429170
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: M/($M/(
                                                      • API String ID: 237503144-1710806632
                                                      • Opcode ID: ff58c78b0b27bbba40667f193cd225ec620092edf491b3be0aa44738014710da
                                                      • Instruction ID: a6fe4633539d009e024b46cdafe5f934a4e6010abeff1ae95be2d2e31fad33eb
                                                      • Opcode Fuzzy Hash: ff58c78b0b27bbba40667f193cd225ec620092edf491b3be0aa44738014710da
                                                      • Instruction Fuzzy Hash: 9E21017165C3615BE714CE34A88579BB7AAEBC2700F01892CA0D1AB2C5D679880B8756
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: VN$VN$i$i
                                                      • API String ID: 0-1885346908
                                                      • Opcode ID: f2560a5eb87e48c54c403f4c235dd9b7370a68364d9f3f272869781b585ee5e7
                                                      • Instruction ID: 20de38ffdec1ef662448aae0f94b74d237ba66483fbda11b24aa8be7d4a8abcc
                                                      • Opcode Fuzzy Hash: f2560a5eb87e48c54c403f4c235dd9b7370a68364d9f3f272869781b585ee5e7
                                                      • Instruction Fuzzy Hash: B721F6212083918BD3058E6590402A7BBE3AFC6318F684A5FD8F15B395E63BC94A875B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 7UA$D]+\$_^]\
                                                      • API String ID: 0-3619184598
                                                      • Opcode ID: 2e0cd4d93215bffa60c50a2cc29c154bb915ce2da521f1faa8d3ae08ee25634b
                                                      • Instruction ID: 9cee455d72e7dd9915cda87ad3665199875abe0b71a1f7719e3c07a7155446ef
                                                      • Opcode Fuzzy Hash: 2e0cd4d93215bffa60c50a2cc29c154bb915ce2da521f1faa8d3ae08ee25634b
                                                      • Instruction Fuzzy Hash: E4524474608300DBE704DF28EC527BBB3A1FB86314F19493DE586973A1E7399981CB5A
                                                      APIs
                                                      • FreeLibrary.KERNEL32(1A11171A), ref: 0042D2A4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID: ou
                                                      • API String ID: 3664257935-3837949563
                                                      • Opcode ID: 78db4c3670b02004b5ce09dd30d6be68ef6f26a73c645ae10e47e490a35e64f0
                                                      • Instruction ID: 8c0201977aaad96103e3db66e91fe0e05dd0d7e7661fbda8aa4fd031d2e77fc5
                                                      • Opcode Fuzzy Hash: 78db4c3670b02004b5ce09dd30d6be68ef6f26a73c645ae10e47e490a35e64f0
                                                      • Instruction Fuzzy Hash: 1B41F3706043828BE3158F34D9A0B63BFE0EF57318F28869DE5D64B393D63998068769
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID: @Ukx$
                                                      • API String ID: 2994545307-3636270652
                                                      • Opcode ID: 68fd1405b344facc4b0026b9fe161e78bdc877d3fcaeb6f8274981348c185207
                                                      • Instruction ID: 03a383fb22d51b403848371ba2a4540fe2b40c56cab5129fcdd4839ce92f9fe8
                                                      • Opcode Fuzzy Hash: 68fd1405b344facc4b0026b9fe161e78bdc877d3fcaeb6f8274981348c185207
                                                      • Instruction Fuzzy Hash: DDB17833B083104BE728CE28DCD22BBB792EBC5314F19C93DDA9657395DA399C458786
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 1$A
                                                      • API String ID: 0-719046165
                                                      • Opcode ID: bd1ee34c9fa08e29029345848de4dd2afdd75f18fa78b65bf56a6416e37b6555
                                                      • Instruction ID: e807b6bde7ca49dc404e07dafbff5fc9189e5662c362ff5d9520ac40bf6a6c7c
                                                      • Opcode Fuzzy Hash: bd1ee34c9fa08e29029345848de4dd2afdd75f18fa78b65bf56a6416e37b6555
                                                      • Instruction Fuzzy Hash: 41D1E4B55083508BD718DF24C8517ABBBE1FFC5318F08896DE4D99B382DB389906CB96
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C@$_^]\
                                                      • API String ID: 0-1259475386
                                                      • Opcode ID: e06a379b46e52741ffd7a8eb9d43fc02087815218cdea83b303c67149d7ce589
                                                      • Instruction ID: 97f681d162b0ce7800c7d58e7d4b110804466645679b58dd264a8ebd8314ce09
                                                      • Opcode Fuzzy Hash: e06a379b46e52741ffd7a8eb9d43fc02087815218cdea83b303c67149d7ce589
                                                      • Instruction Fuzzy Hash: A2B149A1B083206BD714DF25995273BB3F1EFD1324F59892EE88697381E27CE941835A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (. 7$,7
                                                      • API String ID: 0-1315767106
                                                      • Opcode ID: 3dc14f1719d0dcaf1c8e7808f16df868dad44d99b75b9089029e889b2ab59045
                                                      • Instruction ID: aca24a6d404cff65d8132a2c5354bf9a6b34cab982d47b5a163a498561acaf8d
                                                      • Opcode Fuzzy Hash: 3dc14f1719d0dcaf1c8e7808f16df868dad44d99b75b9089029e889b2ab59045
                                                      • Instruction Fuzzy Hash: 73A1DFB190C3519FC714DF25D85262BBBE2EF86314F44892DF4D58B392E738A841CB5A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: EWC`
                                                      • API String ID: 0-1922773688
                                                      • Opcode ID: 96f336dbcf29f94cd9f9a1eaede8d54ada638bb942813ff3d340c66f321929fb
                                                      • Instruction ID: 3092ec9d695e803f581415aef64df2e1d782c7e4da9fd3e94958caedbaf0e785
                                                      • Opcode Fuzzy Hash: 96f336dbcf29f94cd9f9a1eaede8d54ada638bb942813ff3d340c66f321929fb
                                                      • Instruction Fuzzy Hash: 20D11F746047028BC3358F28C4A26A3BBF2EF96304F18542ED5C78BB91E739E846C794
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ><+
                                                      • API String ID: 0-2918635699
                                                      • Opcode ID: 3980c0afaf6dac2d4ca75895f3ce9cc4aa60152e4397ff49cad2d9ebd5e9afb7
                                                      • Instruction ID: 444f218a8ad5829191449d1546b31e79214a0b4c0f4cfb8ef7368535fe843fa0
                                                      • Opcode Fuzzy Hash: 3980c0afaf6dac2d4ca75895f3ce9cc4aa60152e4397ff49cad2d9ebd5e9afb7
                                                      • Instruction Fuzzy Hash: 72C1E575A047418FD725CF2AD490762FBE2BF9A310F28859EC4DA8B752C739E806CB54
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: "
                                                      • API String ID: 0-123907689
                                                      • Opcode ID: d05c80c795993c871168dd86f7d1ea5d1d218413b04f758d20a6faf4e3c25647
                                                      • Instruction ID: f2fd7e02527a425c6081b095c58e6bcd0ab65349b2e1505f4c1e2091d8d38838
                                                      • Opcode Fuzzy Hash: d05c80c795993c871168dd86f7d1ea5d1d218413b04f758d20a6faf4e3c25647
                                                      • Instruction Fuzzy Hash: 82C15872B043256BD711CE25E49076BB7D5EF84314F98892FE8958B382E738EC4487DA
                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,00000000,?), ref: 00429F6C
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID:
                                                      • API String ID: 237503144-0
                                                      • Opcode ID: bf0f97b787aa3901fc489b07fc1f7d675bb90a5acac53e645be6843c85619458
                                                      • Instruction ID: 56439e7850811f5116bb8c84f174b1b770b1ea540e4d3f3412480b83843e5581
                                                      • Opcode Fuzzy Hash: bf0f97b787aa3901fc489b07fc1f7d675bb90a5acac53e645be6843c85619458
                                                      • Instruction Fuzzy Hash: B141C1B454C341CFD3109F20A98166BBBF4EB86718F10487DE5969B292D735E507CB8B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: t
                                                      • API String ID: 0-2238339752
                                                      • Opcode ID: 039beb9b53b4255e9ee2e6f2bbcbd7cde69c3a8df900983a1a0d2cd4bed9f5c8
                                                      • Instruction ID: 1cd3e92b5432f2ec1c5279b22e8dfdc45cf82fdb07faf4288aa06f6d08a0fcad
                                                      • Opcode Fuzzy Hash: 039beb9b53b4255e9ee2e6f2bbcbd7cde69c3a8df900983a1a0d2cd4bed9f5c8
                                                      • Instruction Fuzzy Hash: 15B187B05093818BD3358F25C9A13EBBBE0EFDA304F04896DD9C94B391EB395546CB86
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID: _^]\
                                                      • API String ID: 2994545307-3116432788
                                                      • Opcode ID: b4c7d66211ae49d8fd9eccf31c03fcf250aa2d1c5501d05c3c86452f57ff21d1
                                                      • Instruction ID: 2cadfa6051f0cea8981a5c3a8346752ded914f405fdfafbc00b99242be117cb3
                                                      • Opcode Fuzzy Hash: b4c7d66211ae49d8fd9eccf31c03fcf250aa2d1c5501d05c3c86452f57ff21d1
                                                      • Instruction Fuzzy Hash: 1A714B75B0C3205BD7149B29EC9273BB7A1DF86318F58843EE58697382E23CDC45835A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: _^]\
                                                      • API String ID: 0-3116432788
                                                      • Opcode ID: 18627fe42d59fa6849b5f8a45ac1d7137aaf139f75de676eaf8c8d08dd2ee1c0
                                                      • Instruction ID: 4542599af833d18a30e416191cc565c9845a3175e58f9edfc757ba35f46fda4c
                                                      • Opcode Fuzzy Hash: 18627fe42d59fa6849b5f8a45ac1d7137aaf139f75de676eaf8c8d08dd2ee1c0
                                                      • Instruction Fuzzy Hash: 8F714775A0C3508BD324CF68D89166BB7E1EFC5304F59486DE8C597362EB789842CB8A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID: _^]\
                                                      • API String ID: 2994545307-3116432788
                                                      • Opcode ID: a83dfb6a84884be77bbdeb245f1cea9c60f563621f19ebf7a2bdccf3372ac9f2
                                                      • Instruction ID: 696eb795723ead0f6ba9be3735fd8be620dffa71c9a4400ef3d7ad22a9e3dc13
                                                      • Opcode Fuzzy Hash: a83dfb6a84884be77bbdeb245f1cea9c60f563621f19ebf7a2bdccf3372ac9f2
                                                      • Instruction Fuzzy Hash: C2712871A043014FDB1CDF28CCE162FBB92EB8A710F19A63EE496E7395D6349C418789
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: N&
                                                      • API String ID: 0-3274356042
                                                      • Opcode ID: 8fff828ef7096bc6de3c5e3531ef3bcfddfa3f41189f47e61279592947ff70fd
                                                      • Instruction ID: 81471823a485b6705c349d61d83959a7e20011983708bf5e147628ffe1b1dd5e
                                                      • Opcode Fuzzy Hash: 8fff828ef7096bc6de3c5e3531ef3bcfddfa3f41189f47e61279592947ff70fd
                                                      • Instruction Fuzzy Hash: DE51F625604B904BD729CB3A98513B7BBD3ABDB310B58969EC4D7C7786CA3CE4068B14
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: N&
                                                      • API String ID: 0-3274356042
                                                      • Opcode ID: 09941e67317fc8cb3ce7ea217b500117e96f00fb937d19bfefd61d270a526b4e
                                                      • Instruction ID: e5864593d1339f498270878ef60363620a1941cd2fe9c21c7a7607c55bfa5eb6
                                                      • Opcode Fuzzy Hash: 09941e67317fc8cb3ce7ea217b500117e96f00fb937d19bfefd61d270a526b4e
                                                      • Instruction Fuzzy Hash: B2512925604B904AD729CB3A98513B77BD3AF9B310F9C969DC4D7C7B86CA3C94028B15
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @
                                                      • API String ID: 0-2766056989
                                                      • Opcode ID: 1bf28d208f4d471862e62771911b4b91396caa8be407dd285211548932c35c82
                                                      • Instruction ID: 1aa89e2f6171c8b600b289c24d78a6f9a5b4d57d8403bbd31509dc912f19ad9e
                                                      • Opcode Fuzzy Hash: 1bf28d208f4d471862e62771911b4b91396caa8be407dd285211548932c35c82
                                                      • Instruction Fuzzy Hash: 0D4123B19043109BE714CF54CC56B7BBBA1FFD5354F088A2DE5855B3A0E3799844C78A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: AB@|
                                                      • API String ID: 0-3627600888
                                                      • Opcode ID: f041e5b4f18625dfaa42653504e20addc449c282f38dd463f45fba843b59f9ad
                                                      • Instruction ID: 9d680adfff61346dbcddf561b221a097d06f6077c5c56bfff523f23a55ee5db6
                                                      • Opcode Fuzzy Hash: f041e5b4f18625dfaa42653504e20addc449c282f38dd463f45fba843b59f9ad
                                                      • Instruction Fuzzy Hash: 634106B15046928FD7228F39C850767FBE1BF97310B189699D0D28B796C738E845CB54
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0$z
                                                      • API String ID: 0-542936926
                                                      • Opcode ID: 56022ef5e62e296913ac47c6de968db9b320837307f66e6c85d4f38a5b4770bc
                                                      • Instruction ID: 598e6e7b5ab3f32ace4510c997d5c2914f2054150b2e0cbc2781ed5d43e0899f
                                                      • Opcode Fuzzy Hash: 56022ef5e62e296913ac47c6de968db9b320837307f66e6c85d4f38a5b4770bc
                                                      • Instruction Fuzzy Hash: 7A3104B2A193114BD314DF24CC8471BBBD2EB89714F0A992DE484A7342D37A9C428BDA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: _^]\
                                                      • API String ID: 0-3116432788
                                                      • Opcode ID: f6a8d254ef2cb00699e79095288bd1bdad4cbdf7a23a769f2daf49ab799d3e86
                                                      • Instruction ID: fa1734f8cecfd62dbfa6e1ffd5af071ca539f15cf05182bc01822064141da677
                                                      • Opcode Fuzzy Hash: f6a8d254ef2cb00699e79095288bd1bdad4cbdf7a23a769f2daf49ab799d3e86
                                                      • Instruction Fuzzy Hash: 9C21EC7470A2109BD71C8B34DC91B3F73A3FBC6314F69152ED193527A6CB399852468D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ,-
                                                      • API String ID: 0-1027024164
                                                      • Opcode ID: e841ffa07ed1daa646f5eb3df3353fcb7b3331a6bb754204e02c01eb04e9c511
                                                      • Instruction ID: 3df528e0a1c1aaf7ae1dd87ce3c0daf4cbce6c1de34562fe1b5624c5cc0b1623
                                                      • Opcode Fuzzy Hash: e841ffa07ed1daa646f5eb3df3353fcb7b3331a6bb754204e02c01eb04e9c511
                                                      • Instruction Fuzzy Hash: E8216A61A153108BC7109F29CC52537B7B1EF92364F85861EE4828B361F778CD05C79B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID: @
                                                      • API String ID: 2994545307-2766056989
                                                      • Opcode ID: 6ebeeff5786163907a1946c8d73bc8e49d379f446760a2416b3547ff48868a07
                                                      • Instruction ID: 33784d5b8146ae1d6e83e41184c2528a054757f8bcb0ba64dcdd6e2a9e18c57c
                                                      • Opcode Fuzzy Hash: 6ebeeff5786163907a1946c8d73bc8e49d379f446760a2416b3547ff48868a07
                                                      • Instruction Fuzzy Hash: 1831FF756083048BE314DF58D8C266FBBE4EBC5324F14892DEA9883390D739D858CB9A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ses`
                                                      • API String ID: 0-1601344200
                                                      • Opcode ID: 7ecea65e69f80fd34ed937d50154ad00ae80800854f723ecc4b508468e07b142
                                                      • Instruction ID: c16a7131854b6aed293f14fd3f65d90cfdcd1604bceaaf5e70633509fa898857
                                                      • Opcode Fuzzy Hash: 7ecea65e69f80fd34ed937d50154ad00ae80800854f723ecc4b508468e07b142
                                                      • Instruction Fuzzy Hash: AD110B645046528BEB168F359C55726BBF1AF33354F1892DCD0D1DF292D624C442CB28
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ses`
                                                      • API String ID: 0-1601344200
                                                      • Opcode ID: acdcb12a599db5bd8b29fdd08185f7d8639ff27a1d18159ef2967bd0d873cb9e
                                                      • Instruction ID: 2b194369684db8568e4cc4b10858fb41ea2ffb87a76b3f2bea81f07ece6f04e6
                                                      • Opcode Fuzzy Hash: acdcb12a599db5bd8b29fdd08185f7d8639ff27a1d18159ef2967bd0d873cb9e
                                                      • Instruction Fuzzy Hash: 21014EA46446538BE7128F359C15726FBF1EF33350F18E2A8D091DF2A2D634C842CB18
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: _^]\
                                                      • API String ID: 0-3116432788
                                                      • Opcode ID: 7248b21c1a5d66122527e099d388fada2b713c8df9422b832066424d84c6be5f
                                                      • Instruction ID: a8dfba8dee4ad149da4611bc05b701b5a33fd88c903e8634cd43ba9cb2d750ed
                                                      • Opcode Fuzzy Hash: 7248b21c1a5d66122527e099d388fada2b713c8df9422b832066424d84c6be5f
                                                      • Instruction Fuzzy Hash: ED01D6B0B0A32187D708CB15D49162FB7E2BBCA310F195A2ED0D623755C738E84287CE
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6c171becab70a86a6e575e69f5b8f9388b08847a9ebf173f34fd08f30fb17e69
                                                      • Instruction ID: 15bf1ea58ee97730c61fd6eda894784fa47516086410607d7a072294ae37ca60
                                                      • Opcode Fuzzy Hash: 6c171becab70a86a6e575e69f5b8f9388b08847a9ebf173f34fd08f30fb17e69
                                                      • Instruction Fuzzy Hash: DB22243AB54211CFDB08CF78D8A12AAB3E2FF8A314F1A857DC94697351D7389851CB85
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9edad3ee9539bfad45d948b53ca40223dce90882209d286bf0c99f9c6cd7d631
                                                      • Instruction ID: 4eb073694aac07531e4e37dd991e5aaa8cdb99ba0f72cd08d303837d400a2551
                                                      • Opcode Fuzzy Hash: 9edad3ee9539bfad45d948b53ca40223dce90882209d286bf0c99f9c6cd7d631
                                                      • Instruction Fuzzy Hash: 3552F5715083458FCB15CF24C0906AABFE1BF89305F188A7EF8996B381D779D949CB89
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6e797157fb35717b6a91bbe19d3c6782b16ec68ef1e5ad1ec3f47f605a4e618f
                                                      • Instruction ID: 6123c4b066af5df033588bdcadea87e91db6a899c9f8ce647c920f563282eda9
                                                      • Opcode Fuzzy Hash: 6e797157fb35717b6a91bbe19d3c6782b16ec68ef1e5ad1ec3f47f605a4e618f
                                                      • Instruction Fuzzy Hash: E322A472A087118BD725DF18D8806ABB3E1BFC4319F19893ED986A7385D738B811CB57
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5b217010d00d36b6e532b914cc2c8748e4c1d1399e6fa795548d92cd5122fdeb
                                                      • Instruction ID: bc1c9a79bd48fbe04f38ca9b4e00e2ed040d16652403f2f97064ad5dbaff0f70
                                                      • Opcode Fuzzy Hash: 5b217010d00d36b6e532b914cc2c8748e4c1d1399e6fa795548d92cd5122fdeb
                                                      • Instruction Fuzzy Hash: 9502483AB54211CFD708CF78D8E02AAB7A2FF8A314F1A857DC94693351D739A851CB85
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c87e449dc06f3ba1431d52dba96a7b849506db30f3e9f92c5d405e1d6b40a5de
                                                      • Instruction ID: a1c715d08816259ade05fabf2ed31b4fea3a659fa95dcf98a80d69cb0f26fb97
                                                      • Opcode Fuzzy Hash: c87e449dc06f3ba1431d52dba96a7b849506db30f3e9f92c5d405e1d6b40a5de
                                                      • Instruction Fuzzy Hash: 59F13939B54211CFD708CF78D8E02AAB3A2FF8A314F1A857DC94693351D735A851CB85
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3a977913465e41e9bc8fdf4fe2f93bdf54fd14983a5a5a95a9e13933d6850651
                                                      • Instruction ID: 7c816634e29e8635841472aa4442699fe105e1924a6df37b46faa06d9bb3fd90
                                                      • Opcode Fuzzy Hash: 3a977913465e41e9bc8fdf4fe2f93bdf54fd14983a5a5a95a9e13933d6850651
                                                      • Instruction Fuzzy Hash: 87F13939B54211CFDB08CF78D8E02AAB3A2FF8A314F19857DC94693351D739A851CB85
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 80d8542304fd61a6ec4704e93bd93ae71f34bee62e8590f6df1c4416f41d4fae
                                                      • Instruction ID: 5e9d7e84427f8d5228b95ea90cb98d597139ae8c2cd507701152bf7f0d2aec8f
                                                      • Opcode Fuzzy Hash: 80d8542304fd61a6ec4704e93bd93ae71f34bee62e8590f6df1c4416f41d4fae
                                                      • Instruction Fuzzy Hash: DBE117B1E00215CFCB14CF69C8516BBBBB1FF4A310F18465DE496AB391E338A951CB99
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e75f06d64608b7b62d8af53fcc16e7372a13ff163848b6366e20841680721154
                                                      • Instruction ID: 0a10cce7f6b7f4c9e5a99d8e2b4a5133f7361f2e21e3c94240870ffe1abc1756
                                                      • Opcode Fuzzy Hash: e75f06d64608b7b62d8af53fcc16e7372a13ff163848b6366e20841680721154
                                                      • Instruction Fuzzy Hash: FAE105B1E00615CFCB14CF69C8516BBBBB1FF4A310F18465DE496AB391E338A951CB98
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6587f211f8bb243ac471bf4d418ae114b6383508c51c90636e998149a2c9f481
                                                      • Instruction ID: 0795aabbeeca3c289a54d5a983081f6cc9b815f424e4503ad834db78cbe5b8b0
                                                      • Opcode Fuzzy Hash: 6587f211f8bb243ac471bf4d418ae114b6383508c51c90636e998149a2c9f481
                                                      • Instruction Fuzzy Hash: 46B1FF39B04211CFCB08CF78E8902AAB7B2FF8A324F1985BDD94593351C775A861CB85
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f54337c51817de601ce1ec662ea4a86470746f121211f08e90cfc523ef7306dd
                                                      • Instruction ID: 8f12c1f11cf7dd9d5989c678c09bce864ea8bb7899150d07336210a81ccf9f3f
                                                      • Opcode Fuzzy Hash: f54337c51817de601ce1ec662ea4a86470746f121211f08e90cfc523ef7306dd
                                                      • Instruction Fuzzy Hash: 2AB11E39A04205CFDB08CF78D8902AEB7B2FF8A314F19857DD94593391D735A922CB85
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: e85f12f7bbac3723ecb9eee596fb1eeda3fecaf8cb6cd1164115649647f81f7d
                                                      • Instruction ID: bbaad09b7466ea8e443d8553dc44a5451933c837b4ca1b8c359bd5f9b3e4a5a9
                                                      • Opcode Fuzzy Hash: e85f12f7bbac3723ecb9eee596fb1eeda3fecaf8cb6cd1164115649647f81f7d
                                                      • Instruction Fuzzy Hash: 478115756083018BE714DF19C890A2BB7A2FFD5710F19852DEAC49B395EB38DC61CB86
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d79f1fd880ab180e1b863fa2a9d981922e66a5893552c9cd54a43db72e04df75
                                                      • Instruction ID: 1ae5c22645a0c49bea9d6a70653e44e8157fd1e252da5b34c0afae31fd87a2fe
                                                      • Opcode Fuzzy Hash: d79f1fd880ab180e1b863fa2a9d981922e66a5893552c9cd54a43db72e04df75
                                                      • Instruction Fuzzy Hash: 314129A4204790CBE7328B3A98E0B737FE0EF27305F48198DE4E78B646D3299405CB59
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c7e0094a64ed9e0f308886f35ab180eb3d940b80439b08ae9969d5e3e11de77b
                                                      • Instruction ID: d8b4a6cdd0763d1df8515212ee66b27a55189a0bec8caba65ff171ec82452c36
                                                      • Opcode Fuzzy Hash: c7e0094a64ed9e0f308886f35ab180eb3d940b80439b08ae9969d5e3e11de77b
                                                      • Instruction Fuzzy Hash: D23138745047904BD7368B3584A17737FE09F2B308F58489ED1D387293D22A9549C796
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings$Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                      • String ID:
                                                      • API String ID: 1780199113-0
                                                      • Opcode ID: 94b07ba9958116a24f49aa2ce181052b6958ac39138e9011af663e1bf14a50e6
                                                      • Instruction ID: 6b5d6437c4fa7b8805f8ed77d50acdad1f0dd5a7239fa4c95c8d74861a36b3c0
                                                      • Opcode Fuzzy Hash: 94b07ba9958116a24f49aa2ce181052b6958ac39138e9011af663e1bf14a50e6
                                                      • Instruction Fuzzy Hash: 0531E4EAF405405BE5057A232863A6F21674BD071CF48103EF84A272C3ED7DB916959F
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 33cc46eaab1da60d5c7c303c1f4bff1ac88459165d933fbad2b388fb389fe25a
                                                      • Instruction ID: 1166d7d1cf2a9c2f689b228294c5ddb55241fb8fb130d34f92ce9a1e81a5b4f1
                                                      • Opcode Fuzzy Hash: 33cc46eaab1da60d5c7c303c1f4bff1ac88459165d933fbad2b388fb389fe25a
                                                      • Instruction Fuzzy Hash: 0D814CB451A7808FE374DF05D59869FBBE0FB8A308F11891ED4984B350CBB86549CF9A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                      • Instruction ID: 63507484b2069e2e8211a278e3cf8cd1c2c15e4e039033c761ca6b325ddcdd3c
                                                      • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                      • Instruction Fuzzy Hash: 94112C336041D50ED3119D3C8500566BFD30AD7334F1BD3DAF4B8972D2D6268D8A8359
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7b5d740ace398df56c1bc651b30677a1090a792db8fb55b3a5b1b7746f8ad41c
                                                      • Instruction ID: a0f30dc86e724eb7f88f9efd602dd5de4cd53b28ec3d007000181f31979604c4
                                                      • Opcode Fuzzy Hash: 7b5d740ace398df56c1bc651b30677a1090a792db8fb55b3a5b1b7746f8ad41c
                                                      • Instruction Fuzzy Hash: 67019EB1B0031197E6209E25A5C1B27B6A96F94708F18003EED0657342DB7DFC24C29B
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: b6d6b89a0769f86010591fd06291181582dea7eebbe521dc95f02f92bd725890
                                                      • Instruction ID: ef255d715ab18d882adc5ea52eeea8cbfa11f5837c70251ee56aeac1239934a6
                                                      • Opcode Fuzzy Hash: b6d6b89a0769f86010591fd06291181582dea7eebbe521dc95f02f92bd725890
                                                      • Instruction Fuzzy Hash: 410126B5B052264BD720EE55ECC073F7756A7DE711F1EA07AD48077305D2348C419399
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d915abd692c596d351a76ef7c44155bf2f7634e88133afcabaf1f94f6f3ee80c
                                                      • Instruction ID: 3b5a2521859e6f9e2b7c42681b895aeeefce9f58c49972f42ecf2407dd3de83c
                                                      • Opcode Fuzzy Hash: d915abd692c596d351a76ef7c44155bf2f7634e88133afcabaf1f94f6f3ee80c
                                                      • Instruction Fuzzy Hash: 91F03160104B914AD7328F3985643B3FFE09B13218F545A4DC9E357AD2D36AD14A8798
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2c87cf7490ba7f349dbf4ff6d15317452443a64d08c45edd5236fd878cf74ed6
                                                      • Instruction ID: 6759ef11ba54ebcff8aa8f6da36673660d6dd1d1c904dc71617b67ba0d321406
                                                      • Opcode Fuzzy Hash: 2c87cf7490ba7f349dbf4ff6d15317452443a64d08c45edd5236fd878cf74ed6
                                                      • Instruction Fuzzy Hash: EC01B174E412688BCB24CF66E8912BEB7B1FF56305F186068E482FB380DB358C05CB59
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 98f4e3217fe9b5c4e997299aec1ba0aa40f02e45b7d4679749b3d65f6db5070c
                                                      • Instruction ID: 934d56785e493b3be4b0c9c008a8aca41c7e0e8933f1bbf3a4c9d2d3fb154c99
                                                      • Opcode Fuzzy Hash: 98f4e3217fe9b5c4e997299aec1ba0aa40f02e45b7d4679749b3d65f6db5070c
                                                      • Instruction Fuzzy Hash: 16F0F0244086938ADB059F2980A0776FBA1AF23345F2C41DEC4C0AB393CB2AC8068758
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a74d5857912f424093c70e21deeb6922a10a882864307659604c18145d6e58bc
                                                      • Instruction ID: 53e9e5a03a9e822e66d5819fe35fee1f40f302e6fc978103a9a9be73ad9cdb27
                                                      • Opcode Fuzzy Hash: a74d5857912f424093c70e21deeb6922a10a882864307659604c18145d6e58bc
                                                      • Instruction Fuzzy Hash: C7F065105087F28ADB234B3E54606B3AFE09B63120B581BD6C8E19B3C7C3199497C36A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f6e45a90e1ceaff6c5d0e3e053bdb80ffa80649d360dfdb931296267ad3d0f33
                                                      • Instruction ID: e2807706931cebe5a4fd8447433720849932be0b4ea6b6dd525263aa63fc0ea0
                                                      • Opcode Fuzzy Hash: f6e45a90e1ceaff6c5d0e3e053bdb80ffa80649d360dfdb931296267ad3d0f33
                                                      • Instruction Fuzzy Hash: 270149306042428BD344CF38CCA056BFBA1EB83324F08C79DC45687796C638C442C799
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c4f87736648c9b6f2dd64c8d371659d93ba6f9c6e5d05e4d379e6cf43d16ee00
                                                      • Instruction ID: 2cc704b116e4bd3b8fd511eeb7f6c98f4211d06ad42a95779158915a2f3845ef
                                                      • Opcode Fuzzy Hash: c4f87736648c9b6f2dd64c8d371659d93ba6f9c6e5d05e4d379e6cf43d16ee00
                                                      • Instruction Fuzzy Hash: C6C0123C583840DF83088F20EC08879B374BB0B202B006824E807E33A2CB22A511AA6E
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a40189d29a415ea6312dcdd67a1103e7914f9f9b1922703845f218493d16d700
                                                      • Instruction ID: b006575f33bb30629b5eebf8556c7f8348362c77d274ae0a1f7cd2f0d910ddfd
                                                      • Opcode Fuzzy Hash: a40189d29a415ea6312dcdd67a1103e7914f9f9b1922703845f218493d16d700
                                                      • Instruction Fuzzy Hash: 92B092B4A1C2018A87088F00E140039EAB4629F202F30A02E908A63215C225C1058A8E
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: InitVariant
                                                      • String ID: A$B$B$D$K$M$j$q$w$y
                                                      • API String ID: 1927566239-3160828158
                                                      • Opcode ID: eddacfeeedbf2f75f6d5a413a3fd0e74a564a643395569db151e54d21141464b
                                                      • Instruction ID: 1c928e62d6be9c8abd40ab69893dd7e66488cb55e0e55af33186cf6b993705b4
                                                      • Opcode Fuzzy Hash: eddacfeeedbf2f75f6d5a413a3fd0e74a564a643395569db151e54d21141464b
                                                      • Instruction Fuzzy Hash: 6241287050CBC18AD335DB38845879EBFD16BD2214F188A9DE2E94B3E2D7788145CB57
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: AllocString
                                                      • String ID: 0$a$c$e$f$g
                                                      • API String ID: 2525500382-100324306
                                                      • Opcode ID: 6fa382de4c939dc68479ac497997f55f83f35014caf28410cf75d298f2d01ba0
                                                      • Instruction ID: 2beeffe621b162477516d1a3ffd6e32473519446922c4ca7b5322f15d7df1e3d
                                                      • Opcode Fuzzy Hash: 6fa382de4c939dc68479ac497997f55f83f35014caf28410cf75d298f2d01ba0
                                                      • Instruction Fuzzy Hash: EB91812110DBC28DD3328A7C595879BBED16BA7234F484B9EE0E98B3E6D7704106C767
                                                      APIs
                                                      • GetCPInfo.KERNEL32(00000000,00000000,00000000,7FFFFFFF,?,0018A19D,00000000,00000000,00000000,00000000,?,?,?,?,00000000,00000000), ref: 0018A258
                                                      • __alloca_probe_16.LIBCMT ref: 0018A313
                                                      • __alloca_probe_16.LIBCMT ref: 0018A3A2
                                                      • __freea.LIBCMT ref: 0018A3ED
                                                      • __freea.LIBCMT ref: 0018A3F3
                                                      • __freea.LIBCMT ref: 0018A429
                                                      • __freea.LIBCMT ref: 0018A42F
                                                      • __freea.LIBCMT ref: 0018A43F
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: __freea$__alloca_probe_16$Info
                                                      • String ID:
                                                      • API String ID: 127012223-0
                                                      • Opcode ID: c21e687ae88f075989c9d5e91bfc279644934dc6b400fd7f9ee40c747b3ba9ad
                                                      • Instruction ID: 75ff680a1033c5c380287d0a5d75a6bb81894a693484e26374e849b399578c96
                                                      • Opcode Fuzzy Hash: c21e687ae88f075989c9d5e91bfc279644934dc6b400fd7f9ee40c747b3ba9ad
                                                      • Instruction Fuzzy Hash: 9A71D6729002495BFF31BF948C81FAE77BAAF59310F994057ED04A7281E7769E408B52
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: _strrchr
                                                      • String ID:
                                                      • API String ID: 3213747228-0
                                                      • Opcode ID: 76cd254f3b8e765761cdde82e3165a3a1630fbfe1fb7a850d07f14f5abbed5a0
                                                      • Instruction ID: a3409e0fe8cff2a3d82952f7e5276c1ac88a2b708465de5d6461f8dcce81bd24
                                                      • Opcode Fuzzy Hash: 76cd254f3b8e765761cdde82e3165a3a1630fbfe1fb7a850d07f14f5abbed5a0
                                                      • Instruction Fuzzy Hash: EBB169729043599FEB269F64DC82BBE7BB5EF65310F15C155E808AF282D770D901C7A0
                                                      APIs
                                                      • _ValidateLocalCookies.LIBCMT ref: 0016F827
                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 0016F82F
                                                      • _ValidateLocalCookies.LIBCMT ref: 0016F8B8
                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 0016F8E3
                                                      • _ValidateLocalCookies.LIBCMT ref: 0016F938
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                      • String ID: csm
                                                      • API String ID: 1170836740-1018135373
                                                      • Opcode ID: 1b72d1cd99cac4b00f54c0ae2d91360730c4a02ee30f94c3580a5cea9f040587
                                                      • Instruction ID: ac73e63a21b135791a126e12b388ce9a057af7354a9efc242902c43c44cf5538
                                                      • Opcode Fuzzy Hash: 1b72d1cd99cac4b00f54c0ae2d91360730c4a02ee30f94c3580a5cea9f040587
                                                      • Instruction Fuzzy Hash: 4F41B530E00218ABCF10DF68DC85A9E7BB5BF45314F1481A9F8189B392D7319A66CB91
                                                      APIs
                                                      • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,BB40E64E,?,0017BE51,001635D2,?,00000000,?), ref: 0017BE03
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID: api-ms-$ext-ms-
                                                      • API String ID: 3664257935-537541572
                                                      • Opcode ID: 3357bb2cd70dd1e9dccff011b28aad9c9d5e0224203318357250309c075782a8
                                                      • Instruction ID: 0b977532fc56d7cbd020aa57ccd6914a01fc1984d2c68b9fa266886ed5cf0572
                                                      • Opcode Fuzzy Hash: 3357bb2cd70dd1e9dccff011b28aad9c9d5e0224203318357250309c075782a8
                                                      • Instruction Fuzzy Hash: AD212735A09214ABD7319BA4DC81FAB37B8AF02364F258121FD1AA7290DB30ED01C6D0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit
                                                      • String ID: C$C$P$T
                                                      • API String ID: 2610073882-3051599793
                                                      • Opcode ID: 70cc15cec2ffaa4e64ca4ef94809e37c86eda4dcb3d81504480f7fa9456d32e2
                                                      • Instruction ID: 97d45b2a61606388edab5b45fc9f71e82de55712b11621588c9e0c32b5ea6509
                                                      • Opcode Fuzzy Hash: 70cc15cec2ffaa4e64ca4ef94809e37c86eda4dcb3d81504480f7fa9456d32e2
                                                      • Instruction Fuzzy Hash: 0141E52000C7C18AD3728B38845979FBFE06B96324F488A9DD4ED8B3D2DB754149DB53
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 0016EB22
                                                      • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 0016EB30
                                                      • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 0016EB41
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleModule
                                                      • String ID: GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                      • API String ID: 667068680-1047828073
                                                      • Opcode ID: 479e9e7f8ade7758d159055b25bbcd77bc699d630d1c023aae925d4d42a03134
                                                      • Instruction ID: 1f310334e36ee2635114622063a2d1d6c6b2bd09142306443b3781af3d8eaa02
                                                      • Opcode Fuzzy Hash: 479e9e7f8ade7758d159055b25bbcd77bc699d630d1c023aae925d4d42a03134
                                                      • Instruction Fuzzy Hash: 21D09E355993616FC7019B71BC0DC963E95BF056153054857F412D39A0D7B409C18B98
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7f3bc5caf3fc5be250898df17e2910bf8ff620e3aca25d889a7686779f495cf6
                                                      • Instruction ID: 0c44cd0f7a7b8d2efc7e81a9d95c4d2fea441d2faf107cab82061787b7908ed8
                                                      • Opcode Fuzzy Hash: 7f3bc5caf3fc5be250898df17e2910bf8ff620e3aca25d889a7686779f495cf6
                                                      • Instruction Fuzzy Hash: DAB1F870A04249AFDB15EF98C881BAE7BB1BF66314F544259E405A73D6CB709F42CF60
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,00179AEB,0016F5BA,0016E585), ref: 00179B02
                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00179B10
                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00179B29
                                                      • SetLastError.KERNEL32(00000000,00179AEB,0016F5BA,0016E585), ref: 00179B7B
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastValue___vcrt_
                                                      • String ID:
                                                      • API String ID: 3852720340-0
                                                      • Opcode ID: 1286fe8f449c63dad51f82596122d67e470bed4ab0b2c6b3e35fdbf6ac86d265
                                                      • Instruction ID: 6c52d9add583b84d2e175245d29bdf22187f0a0744a8e13963ce3bea0ecd8933
                                                      • Opcode Fuzzy Hash: 1286fe8f449c63dad51f82596122d67e470bed4ab0b2c6b3e35fdbf6ac86d265
                                                      • Instruction Fuzzy Hash: 1F014C32119A215ED72427B4BC85D5B2E76EB257B5730832BF41A634F1EF114C449654
                                                      APIs
                                                      • type_info::operator==.LIBVCRUNTIME ref: 0017A4DB
                                                      • CallUnexpected.LIBVCRUNTIME ref: 0017A754
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: CallUnexpectedtype_info::operator==
                                                      • String ID: csm$csm$csm
                                                      • API String ID: 2673424686-393685449
                                                      • Opcode ID: 93280e217a9a99248685f4164d753a028008501e13f7a9fef22d109f68e08030
                                                      • Instruction ID: ca1b0c2f666394e64ba5c5b2f05725f4b6a5c2507c63d8d765f285b35fc89919
                                                      • Opcode Fuzzy Hash: 93280e217a9a99248685f4164d753a028008501e13f7a9fef22d109f68e08030
                                                      • Instruction Fuzzy Hash: 89B1C171800209DFCF19DFA4C8459AEBBB5FFA4300F98855AF8096B212D731DA51CF92
                                                      APIs
                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,0018B3E5,000000FF,?,00174B4A,00174A31,?,00174BE6,00000000), ref: 00174ABE
                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00174AD0
                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000,0018B3E5,000000FF,?,00174B4A,00174A31,?,00174BE6,00000000), ref: 00174AF2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                      • String ID: CorExitProcess$mscoree.dll
                                                      • API String ID: 4061214504-1276376045
                                                      • Opcode ID: 7fbae6647d508423e01b5a4769164dceaa0856a692a0ba631c612cc312cffacf
                                                      • Instruction ID: fc0da82a0c2179fe30f8104dccffd625fa7100d6d55bb090d063f854399f7086
                                                      • Opcode Fuzzy Hash: 7fbae6647d508423e01b5a4769164dceaa0856a692a0ba631c612cc312cffacf
                                                      • Instruction Fuzzy Hash: DB016735944615AFDB119F90DC05FAE7BB8FB05B15F01452AF822A3A90DB749940CA94
                                                      APIs
                                                      • __alloca_probe_16.LIBCMT ref: 0017C59B
                                                      • __alloca_probe_16.LIBCMT ref: 0017C664
                                                      • __freea.LIBCMT ref: 0017C6CB
                                                        • Part of subcall function 0017AD61: HeapAlloc.KERNEL32(00000000,?,?,?,0016B9E5,?,?,001635D2,00001000,?,0016351A), ref: 0017AD93
                                                      • __freea.LIBCMT ref: 0017C6DE
                                                      • __freea.LIBCMT ref: 0017C6EB
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: __freea$__alloca_probe_16$AllocHeap
                                                      • String ID:
                                                      • API String ID: 1096550386-0
                                                      • Opcode ID: 92ffa99992c9735d5467decc45ae5a5926a457d75ebfef9cc90cad4c22c8ee3c
                                                      • Instruction ID: 518ab9ac4859e9438970556b40772b94775846f62fca3f5cc61502edf86dbc4a
                                                      • Opcode Fuzzy Hash: 92ffa99992c9735d5467decc45ae5a5926a457d75ebfef9cc90cad4c22c8ee3c
                                                      • Instruction Fuzzy Hash: 0E51A072600246AFEB215FA4CCC1EAB7AB9EF58710B15812EFD08D7241EB71DD508AA0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: CloseFileHandleSize
                                                      • String ID:
                                                      • API String ID: 3849164406-0
                                                      • Opcode ID: d7dcb13ac5e26d63654c3a958806f3bb1dc6b2ea008023dcce99db83e6660f84
                                                      • Instruction ID: 9a961ec74ccdfd97ef5c7af2bf036f3a66efddd765203bb5e2c88995d74bbac8
                                                      • Opcode Fuzzy Hash: d7dcb13ac5e26d63654c3a958806f3bb1dc6b2ea008023dcce99db83e6660f84
                                                      • Instruction Fuzzy Hash: 9F71A0B4D082489FDB00EFA8D98879DBBF0BF48308F14852AE499EB340D7749955CF52
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 0016E8FB
                                                      • AcquireSRWLockExclusive.KERNEL32(?,?,00000000,0018B3C8,000000FF,?,0016B697), ref: 0016E91A
                                                      • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,0018B3C8,000000FF,?,0016B697), ref: 0016E948
                                                      • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,0018B3C8,000000FF,?,0016B697), ref: 0016E9A3
                                                      • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,0018B3C8,000000FF,?,0016B697), ref: 0016E9BA
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: AcquireExclusiveLock$CurrentThread
                                                      • String ID:
                                                      • API String ID: 66001078-0
                                                      • Opcode ID: acd65e7ce407b2f17ca5ffd89874ea71543ddad5e262a17e5b9d2ad91c74091a
                                                      • Instruction ID: 599e3529820a982340eca09653fed4ac9caf9071b3a3e51be3a743968d551f06
                                                      • Opcode Fuzzy Hash: acd65e7ce407b2f17ca5ffd89874ea71543ddad5e262a17e5b9d2ad91c74091a
                                                      • Instruction Fuzzy Hash: E4416A39900606DFCB64DF69CC85A6AB3F4FF05318B204B2AE456D7A40D730E9A5CF51
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 0016C05B
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0016C066
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0016C0D4
                                                        • Part of subcall function 0016BF5D: std::locale::_Locimp::_Locimp.LIBCPMT ref: 0016BF75
                                                      • std::locale::_Setgloballocale.LIBCPMT ref: 0016C081
                                                      • _Yarn.LIBCPMT ref: 0016C097
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                      • String ID:
                                                      • API String ID: 1088826258-0
                                                      • Opcode ID: 7e4aec7e46184b51a4247e27b301f9172ff7c07840e5d0c1edf5fd1cc7bacc93
                                                      • Instruction ID: c43a5d393bdf27296a18f042ec12b207865bc0e0003e8f40bf821c5ed7f75f6f
                                                      • Opcode Fuzzy Hash: 7e4aec7e46184b51a4247e27b301f9172ff7c07840e5d0c1edf5fd1cc7bacc93
                                                      • Instruction Fuzzy Hash: 7201DF7AA045149BCB06EB60CC85A7D7BB1FFA5710B150009F816973D1CF346EA2CBD1
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,0018535D,00000000,?,00198180,?,?,?,00185294,00000004,InitializeCriticalSectionEx,0018F434,0018F43C), ref: 001852CE
                                                      • GetLastError.KERNEL32(?,0018535D,00000000,?,00198180,?,?,?,00185294,00000004,InitializeCriticalSectionEx,0018F434,0018F43C,00000000,?,0017AA0C), ref: 001852D8
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00185300
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad$ErrorLast
                                                      • String ID: api-ms-
                                                      • API String ID: 3177248105-2084034818
                                                      • Opcode ID: 4107f4b54c63a0257a0207e4e85bfdbff62d521590743b2e9b51b29a1de29bb8
                                                      • Instruction ID: d535d5a07c71fb235aec92e5b13776e5ce268790aa2bab32520031cac8d012c6
                                                      • Opcode Fuzzy Hash: 4107f4b54c63a0257a0207e4e85bfdbff62d521590743b2e9b51b29a1de29bb8
                                                      • Instruction Fuzzy Hash: CAE0BF346C4705B7EF202B61ED06F693F9AFB10B96F144031FD0EA88E1D7A1E952DA48
                                                      APIs
                                                      • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 00183122
                                                        • Part of subcall function 0017AE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0017C6C1,?,00000000,-00000008), ref: 0017AED2
                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00183374
                                                      • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 001833BA
                                                      • GetLastError.KERNEL32 ref: 0018345D
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                      • String ID:
                                                      • API String ID: 2112829910-0
                                                      • Opcode ID: dbfc09f9927418bfa500ad27e0e2bbedba728e3806feb8dc25484a5ddf292047
                                                      • Instruction ID: 184bfa09f4a82910ac59769a549c736b4d02a846a14e6b7b750b1347ae37f61b
                                                      • Opcode Fuzzy Hash: dbfc09f9927418bfa500ad27e0e2bbedba728e3806feb8dc25484a5ddf292047
                                                      • Instruction Fuzzy Hash: AAD17975D04248AFCF15DFA8D8809ADBBB5FF49714F28416AE826EB351E730AA41CF50
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: AdjustPointer
                                                      • String ID:
                                                      • API String ID: 1740715915-0
                                                      • Opcode ID: 39b5cce606a0805eda5b52602f5f34796f55355ac586ae8425a9ec668eee6e03
                                                      • Instruction ID: 5fccbbc993a4323715f6c79e466e44e34548784f5ef17ecadeb217d2cab4ada7
                                                      • Opcode Fuzzy Hash: 39b5cce606a0805eda5b52602f5f34796f55355ac586ae8425a9ec668eee6e03
                                                      • Instruction Fuzzy Hash: C651F4766012029FEB298F54D841B7E77B5FF94710FA4852DEC0A47292E732ED81CB52
                                                      APIs
                                                        • Part of subcall function 0017AE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0017C6C1,?,00000000,-00000008), ref: 0017AED2
                                                      • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00180BEA
                                                      • __dosmaperr.LIBCMT ref: 00180BF1
                                                      • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00180C2B
                                                      • __dosmaperr.LIBCMT ref: 00180C32
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                      • String ID:
                                                      • API String ID: 1913693674-0
                                                      • Opcode ID: 6b329e42a26295ed915ededc0cf0c7f6b72a4a44fb2607c88dd5fe427e519974
                                                      • Instruction ID: 2f08896bfdfc44e4d0f00cdec96fe6e2d904c305c8abda965cb62438c6fa4778
                                                      • Opcode Fuzzy Hash: 6b329e42a26295ed915ededc0cf0c7f6b72a4a44fb2607c88dd5fe427e519974
                                                      • Instruction Fuzzy Hash: 2121077160060DAF9B66BF65C881D6BB7A8FF19368B118658F81DD7211DB30ED448F90
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e5f5f4ee3c83580c3b73e22779d98906e88307981d20f5428dcc70918d88be2d
                                                      • Instruction ID: 68cc67a63eb0ce38b126c30c7434a6d28fa42c1fe0a2fceb559af8c1f75b53ae
                                                      • Opcode Fuzzy Hash: e5f5f4ee3c83580c3b73e22779d98906e88307981d20f5428dcc70918d88be2d
                                                      • Instruction Fuzzy Hash: 9B21F035300205BF8B24AF698C81C6B77BEAF91364724C928F81ED7650EB30EC5087A0
                                                      APIs
                                                      • GetEnvironmentStringsW.KERNEL32 ref: 00181F84
                                                        • Part of subcall function 0017AE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0017C6C1,?,00000000,-00000008), ref: 0017AED2
                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00181FBC
                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00181FDC
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                      • String ID:
                                                      • API String ID: 158306478-0
                                                      • Opcode ID: 41c928784b47a079d4371362bb7def2a9ca533909dee9ae32a0a6f3104c70f57
                                                      • Instruction ID: 3d1468cdbade98e475c78b713d61f53e603f40d2f13973ced70232b6a05e8247
                                                      • Opcode Fuzzy Hash: 41c928784b47a079d4371362bb7def2a9ca533909dee9ae32a0a6f3104c70f57
                                                      • Instruction Fuzzy Hash: 6F1104B25046197F663237F19C89C6F796CCF993A57510015F80692501FB34CE01DAB2
                                                      APIs
                                                      • std::_Throw_Cpp_error.LIBCPMT ref: 00162A8D
                                                      • GetCurrentThreadId.KERNEL32 ref: 00162A9B
                                                      • std::_Throw_Cpp_error.LIBCPMT ref: 00162AB4
                                                      • std::_Throw_Cpp_error.LIBCPMT ref: 00162AF3
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: Cpp_errorThrow_std::_$CurrentThread
                                                      • String ID:
                                                      • API String ID: 2261580123-0
                                                      • Opcode ID: a77f7638a7d587301e7083a9a023a5a737958689b983759d638ceb555daee6ff
                                                      • Instruction ID: 8b5a07670691df4629ac2ab7778f817d8cdffbe0a013febe4e7ab2f566fe2527
                                                      • Opcode Fuzzy Hash: a77f7638a7d587301e7083a9a023a5a737958689b983759d638ceb555daee6ff
                                                      • Instruction Fuzzy Hash: 9B21E4B4E042098FCB08EFE8D9956AEBBF0AF58300F01845DE859AB391D7789950CF51
                                                      APIs
                                                      • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,00189952,00000000,00000001,?,?,?,001834B1,?,00000000,00000000), ref: 0018A487
                                                      • GetLastError.KERNEL32(?,00189952,00000000,00000001,?,?,?,001834B1,?,00000000,00000000,?,?,?,00182DF7,?), ref: 0018A493
                                                        • Part of subcall function 0018A4E4: CloseHandle.KERNEL32(FFFFFFFE,0018A4A3,?,00189952,00000000,00000001,?,?,?,001834B1,?,00000000,00000000,?,?), ref: 0018A4F4
                                                      • ___initconout.LIBCMT ref: 0018A4A3
                                                        • Part of subcall function 0018A4C5: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0018A461,0018993F,?,?,001834B1,?,00000000,00000000,?), ref: 0018A4D8
                                                      • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,00189952,00000000,00000001,?,?,?,001834B1,?,00000000,00000000,?), ref: 0018A4B8
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                      • String ID:
                                                      • API String ID: 2744216297-0
                                                      • Opcode ID: ee31d32c6e811f6287fd62a4ad3d324c89d5d590b1ed8fc18cd17c7c91198506
                                                      • Instruction ID: b59335c61f22b0e5fd366e4cd70d1d9b43333922f8841926de1dfb4b51a4eec4
                                                      • Opcode Fuzzy Hash: ee31d32c6e811f6287fd62a4ad3d324c89d5d590b1ed8fc18cd17c7c91198506
                                                      • Instruction Fuzzy Hash: 88F01C36004615BBCF222F91EC08E893F66FF493A0B454412FA1D85561C7728A60AB95
                                                      APIs
                                                      • GetSystemTimeAsFileTime.KERNEL32(?), ref: 0016EFB9
                                                      • GetCurrentThreadId.KERNEL32 ref: 0016EFC8
                                                      • GetCurrentProcessId.KERNEL32 ref: 0016EFD1
                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 0016EFDE
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                      • String ID:
                                                      • API String ID: 2933794660-0
                                                      • Opcode ID: 4451e87df8e75570738c34cc5f7369a9436946c5d6196a0c6dac55ec3383025e
                                                      • Instruction ID: 456e39e12d7e28bf6c0ce8805a5a05d42f292e719ebf5aebabfadcbac7b519fd
                                                      • Opcode Fuzzy Hash: 4451e87df8e75570738c34cc5f7369a9436946c5d6196a0c6dac55ec3383025e
                                                      • Instruction Fuzzy Hash: BEF0B270C0020CEBCB00DFB4CA4898EBBF4EF1C201B914996A412E7550E730AB85CB54
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: _strcspn
                                                      • String ID: @
                                                      • API String ID: 3709121408-2766056989
                                                      • Opcode ID: c99cf67dd332d41c4a4638e18ab4426d5b58983745887c1b31f16b5f6290ffcf
                                                      • Instruction ID: 6cf00aa48ae51b8d125506fc217029a992e45d820f240d318087bb1d44413605
                                                      • Opcode Fuzzy Hash: c99cf67dd332d41c4a4638e18ab4426d5b58983745887c1b31f16b5f6290ffcf
                                                      • Instruction Fuzzy Hash: CA32D3B4904269CFCB24DF68C981A9DFBF1BF58300F0585AAE849A7341D734AE95CF52
                                                      APIs
                                                        • Part of subcall function 0017AFB3: GetLastError.KERNEL32(00000000,?,0017D392), ref: 0017AFB7
                                                        • Part of subcall function 0017AFB3: SetLastError.KERNEL32(00000000,?,?,00000028,00177816), ref: 0017B059
                                                      • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,0017509A,?,?,?,00000055,?,-00000050,?,?,?), ref: 0017F825
                                                      • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,0017509A,?,?,?,00000055,?,-00000050,?,?), ref: 0017F85C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CodePageValid
                                                      • String ID: utf8
                                                      • API String ID: 943130320-905460609
                                                      • Opcode ID: dea70d85f2ebe2fad658c1d0345dc7fef006378f9a0f0a69398346174f50cf47
                                                      • Instruction ID: 96be2e30cd9257cdad28bf89086c105b7b993b768ccddbee8527567a457e826a
                                                      • Opcode Fuzzy Hash: dea70d85f2ebe2fad658c1d0345dc7fef006378f9a0f0a69398346174f50cf47
                                                      • Instruction Fuzzy Hash: 2451D571604206BADB28BB748C46BB773B8EF14704F25843DF65D975C1FB70E94286A2
                                                      APIs
                                                      • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,0017A6E1,?,?,00000000,00000000,00000000,?), ref: 0017A805
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: EncodePointer
                                                      • String ID: MOC$RCC
                                                      • API String ID: 2118026453-2084237596
                                                      • Opcode ID: 3c623021122a501ee6da11939de864713e9ae86c864e450fc909c908daca1502
                                                      • Instruction ID: 93fac7a6709b3984162cf0e6ffad9ca3d73613f38e11f0e5b2781d842994bde4
                                                      • Opcode Fuzzy Hash: 3c623021122a501ee6da11939de864713e9ae86c864e450fc909c908daca1502
                                                      • Instruction Fuzzy Hash: 6B418B71900209AFCF16CF94CC81AEEBBB5FF88305F158169FA086B211D3359961DB52
                                                      APIs
                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 0017A2C3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341282750.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                                                      • Associated: 00000003.00000002.1341248949.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341323279.000000000018C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341350536.0000000000196000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341367777.000000000019A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000003.00000002.1341399698.000000000019C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_160000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: ___except_validate_context_record
                                                      • String ID: csm$csm
                                                      • API String ID: 3493665558-3733052814
                                                      • Opcode ID: df1ab2e6cfe95aa779d67f35f2ecc34dd1dcc371cd7c2ddb6bed1af84bec5acd
                                                      • Instruction ID: 3e383eddc44ff943b044c2ff5f5e0d9ab797a6e01b5bc364450333e882a598c3
                                                      • Opcode Fuzzy Hash: df1ab2e6cfe95aa779d67f35f2ecc34dd1dcc371cd7c2ddb6bed1af84bec5acd
                                                      • Instruction Fuzzy Hash: E931CF72400218EBCF268F54C8408BE7B76FF8971AB98C15AF84C49221C336DCA1DB83
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID: ;87>$ou
                                                      • API String ID: 3664257935-2936904059
                                                      • Opcode ID: 8948d3cd5bc622644077d860e0ab694d6f95e2090f86dfe1e4841dcaad48535a
                                                      • Instruction ID: 6bca69879cb3e651ebc8ca0b13598fe737171d623fe99421924d523c2323336e
                                                      • Opcode Fuzzy Hash: 8948d3cd5bc622644077d860e0ab694d6f95e2090f86dfe1e4841dcaad48535a
                                                      • Instruction Fuzzy Hash: FF214B70A043928FDB218F25D850727BFE1AF4B301F68869AD4D28B396D6389842CB15
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: MetricsSystem
                                                      • String ID:
                                                      • API String ID: 4116985748-3916222277
                                                      • Opcode ID: 21c571957f9eedbc13ecd4bfc36bc2f66f2a3654bfb69307476122a183b7950a
                                                      • Instruction ID: a44d6496935459a921f5505b3ec94aa74778db30aba9446cb93c37adee0bb457
                                                      • Opcode Fuzzy Hash: 21c571957f9eedbc13ecd4bfc36bc2f66f2a3654bfb69307476122a183b7950a
                                                      • Instruction Fuzzy Hash: D0317DF49143149FDB00EFA8D98561EBBF4BB89704F11852EE898DB364D374A948CF86
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID: ;87>$ou
                                                      • API String ID: 3664257935-2936904059
                                                      • Opcode ID: fd3193656894a668b22de869095197b6b1e72f9b9e7d47cf1e04037ab90bc313
                                                      • Instruction ID: 86d99b7f9b2e41fbf427bd52e774bdff68d06f883e7a09e1f2f077771d0b6d71
                                                      • Opcode Fuzzy Hash: fd3193656894a668b22de869095197b6b1e72f9b9e7d47cf1e04037ab90bc313
                                                      • Instruction Fuzzy Hash: D6112BB1600602CFD7118F35EC5072BBBE2FF4B311F59C6A9D4968B392EA389842CB55
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1341473938.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_400000_J18uCKmoAw.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID: ou
                                                      • API String ID: 3664257935-3837949563
                                                      • Opcode ID: da798694984a35fde46e4bcd63e174060923e03d5e302a6048e3f29a9fc80685
                                                      • Instruction ID: 8d13b867a32c3a4b7460dc0ab53feb316509c0c4818bc205b844e3f8a964c7f0
                                                      • Opcode Fuzzy Hash: da798694984a35fde46e4bcd63e174060923e03d5e302a6048e3f29a9fc80685
                                                      • Instruction Fuzzy Hash: 0DC002799914029FEF056FA1FE0E8593B22FB5630670401B6B90590632EA6B09B4AB5F