Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Fatrr_UewhcWF.msi

Overview

General Information

Sample Name:Fatrr_UewhcWF.msi
Analysis ID:895606
MD5:076682947cdb70a184620aed267a64e5
SHA1:49a78fd9ba854e7e2a16276cdd4188ade83ce384
SHA256:fcfa8b7b8dc0ef9d2a4baabcd78551c0ef1b2b505180d30ee1729298013b5204
Tags:msi
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Snort IDS alert for network traffic
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Stores files to the Windows start menu directory
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Searches for user specific document files
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Drops PE files
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Binary contains a suspicious time stamp
Creates a start menu entry (Start Menu\Programs\Startup)
Checks for available system drives (often done to infect USB drives)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)

Classification

  • System is w10x64
  • msiexec.exe (PID: 5964 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Fatrr_UewhcWF.msi" MD5: 4767B71A318E201188A0D0A420C8B608)
  • msiexec.exe (PID: 5840 cmdline: C:\Windows\system32\msiexec.exe /V MD5: 4767B71A318E201188A0D0A420C8B608)
    • msiexec.exe (PID: 1652 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding C78C18F24792FB2CF3D3274F6B2C7332 MD5: 12C17B5A5C2A7B97342C362CA467E9A2)
      • identity_helper.exe (PID: 1164 cmdline: "C:\Users\Public\Documents\identity_helper.exe" MD5: 216FBFDD15F983EE770F1A135EDA572C)
  • identity_helper.exe (PID: 5956 cmdline: "C:\Users\Public\Documents\identity_helper.exe" MD5: 216FBFDD15F983EE770F1A135EDA572C)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
Timestamp:192.168.2.354.198.235.949698802849814 06/28/23-11:59:26.808026
SID:2849814
Source Port:49698
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.354.198.235.949698802849813 06/28/23-11:59:26.808026
SID:2849813
Source Port:49698
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results
Source: Binary string: C:\Users\Pichau\Documents\SYSMX\NEWMAG - GB - EDGE- CONTANOMODULO - BARRAOK-NOVAPROGRESS - GB\SISTEMA2.0 - DLL - TIMER-1\Bin\Debug\msedge_elf.pdb source: identity_helper.exe, identity_helper.exe, 00000004.00000002.627670949.00000000097C2000.00000020.00000001.01000000.00000004.sdmp, identity_helper.exe, 00000004.00000002.628047218.000000006B8C2000.00000020.00000001.01000000.00000004.sdmp, msedge_elf.dll.2.dr
Source: Binary string: wininet.pdb source: shiED5F.tmp.2.dr
Source: Binary string: C:\JobRelease\win\Release\bin\x86\embeddeduiproxy.pdb source: Fatrr_UewhcWF.msi, 48e8fa.msi.1.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\SoftwareDetector.pdb source: Fatrr_UewhcWF.msi, MSIED15.tmp.1.dr, 48e8fa.msi.1.dr
Source: Binary string: D:\a\_work\e\src\out\Release\identity_helper.exe.pdb source: identity_helper.exe, 00000003.00000000.391646114.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe, 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe, 00000004.00000002.622394030.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe, 00000004.00000000.408427765.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe.2.dr
Source: Binary string: d3d12.pdbUGP source: shiEE2B.tmp.2.dr
Source: Binary string: d3d12.pdb source: shiEE2B.tmp.2.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\SoftwareDetector.pdb\ source: Fatrr_UewhcWF.msi, MSIED15.tmp.1.dr, 48e8fa.msi.1.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\InstallerAnalytics.pdbu source: Fatrr_UewhcWF.msi, MSI2BD9.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr
Source: Binary string: wininet.pdbUGP source: shiED5F.tmp.2.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\InstallerAnalytics.pdb source: Fatrr_UewhcWF.msi, MSI2BD9.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdb source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, 48e8fa.msi.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdbg source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, 48e8fa.msi.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.dr
Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: c:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.iniJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet ExplorerJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 4x nop then movd mm0, dword ptr [edx]3_2_00FE4577

Networking

barindex
Source: TrafficSnort IDS: 2849814 ETPRO MALWARE TakeMyFile User-Agent 192.168.2.3:49698 -> 54.198.235.9:80
Source: TrafficSnort IDS: 2849813 ETPRO MALWARE TakeMyFile Installer Checkin 192.168.2.3:49698 -> 54.198.235.9:80
Source: Joe Sandbox ViewIP Address: 54.198.235.9 54.198.235.9
Source: unknownTCP traffic detected without corresponding DNS query: 20.165.170.228
Source: unknownTCP traffic detected without corresponding DNS query: 20.165.170.228
Source: unknownTCP traffic detected without corresponding DNS query: 20.165.170.228
Source: unknownTCP traffic detected without corresponding DNS query: 20.165.170.228
Source: unknownTCP traffic detected without corresponding DNS query: 20.165.170.228
Source: shiED5F.tmp.2.drString found in binary or memory: http://.css
Source: shiED5F.tmp.2.drString found in binary or memory: http://.jpg
Source: identity_helper.exe, 00000003.00000002.627526421.00000000074CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.165.170.228
Source: identity_helper.exe, 00000003.00000002.627526421.00000000074CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.165.170.228/MARA01/index.php
Source: identity_helper.exe, 00000003.00000002.627526421.00000000074CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.165.170.228/MARA01/index.php?VS=MARA01&PL=NAO
Source: identity_helper.exe, 00000003.00000002.627526421.00000000074CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://20.165.170.2284
Source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: Fatrr_UewhcWF.msi, MSI2BD9.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.drString found in binary or memory: http://collect.installeranalytics.com
Source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: shiED5F.tmp.2.drString found in binary or memory: http://html4/loose.dtd
Source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0C
Source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0O
Source: identity_helper.exe, 00000003.00000002.627526421.00000000074A1000.00000004.00000800.00020000.00000000.sdmp, identity_helper.exe, 00000004.00000002.627493890.0000000007381000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drString found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0
Source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drString found in binary or memory: http://t2.symcb.com0
Source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drString found in binary or memory: http://tl.symcb.com/tl.crl0
Source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drString found in binary or memory: http://tl.symcb.com/tl.crt0
Source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drString found in binary or memory: http://tl.symcd.com0&
Source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drString found in binary or memory: http://www.digicert.com/CPS0
Source: shiED5F.tmp.2.drString found in binary or memory: https://HTTP/1.1
Source: identity_helper.exe, 00000003.00000002.627526421.00000000075E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://amxx1515cabreun23.asxo
Source: identity_helper.exe, 00000003.00000002.627526421.00000000075E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://amxx1515cabreun23.asxo/
Source: identity_helper.exe, 00000003.00000002.627526421.00000000075E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://amxx1515cabreun23.asxo4
Source: Fatrr_UewhcWF.msi, MSI2BD9.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.drString found in binary or memory: https://collect.installeranalytics.com
Source: Fatrr_UewhcWF.msi, MSI2BD9.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.drString found in binary or memory: https://collect.installeranalytics.comhttp://collect.installeranalytics.comhttps://installeranalytic
Source: msiexec.exeString found in binary or memory: https://firebasestorage.googleapis.com/v0/b/brrrrvaila.appspot.com/o/mar
Source: identity_helper.exe, 00000003.00000000.391646114.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe, 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe, 00000004.00000002.622394030.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe, 00000004.00000000.408427765.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe.2.drString found in binary or memory: https://github.com/pq-crystals/kyber/commit/28413dfbf523fdde181246451c2bd77199c0f7ff
Source: identity_helper.exe, 00000003.00000000.391646114.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe, 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe, 00000004.00000002.622394030.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe, 00000004.00000000.408427765.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe.2.drString found in binary or memory: https://github.com/pq-crystals/kyber/commit/28413dfbf523fdde181246451c2bd77199c0f7ffDilithium2Dilith
Source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drString found in binary or memory: https://www.advancedinstaller.com
Source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drString found in binary or memory: https://www.digicert.com/CPS0
Source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drString found in binary or memory: https://www.thawte.com/cps0/
Source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drString found in binary or memory: https://www.thawte.com/repository0W
Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: application/x-www-form-urlencoded; charset=utf-8User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)Host: collect.installeranalytics.comContent-Length: 167Cache-Control: no-cache
Source: unknownDNS traffic detected: queries for: collect.installeranalytics.com
Source: global trafficHTTP traffic detected: GET /MARA01/index.php?VS=MARA01&PL=NAO HTTP/1.1User-Agent: "Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.108 Safari/537.36"Host: 20.165.170.228Connection: Keep-Alive
Source: identity_helper.exe, 00000003.00000002.623615275.00000000056BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSIEB4C.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\48e8fa.msiJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_0106A3303_2_0106A330
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010692903_2_01069290
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010688303_2_01068830
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_0105CB103_2_0105CB10
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_01073E903_2_01073E90
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010721B03_2_010721B0
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_0107A1C03_2_0107A1C0
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_0100E03C3_2_0100E03C
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010100403_2_01010040
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010640403_2_01064040
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010670903_2_01067090
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010A70B93_2_010A70B9
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_00FE614D3_2_00FE614D
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010870C73_2_010870C7
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010753703_2_01075370
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_00FE626D3_2_00FE626D
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010703903_2_01070390
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010523C03_2_010523C0
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010653C03_2_010653C0
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_0107D3E03_2_0107D3E0
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010A320E3_2_010A320E
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010892A03_2_010892A0
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_00FE63493_2_00FE6349
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010662C03_2_010662C0
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_00FE24C03_2_00FE24C0
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010435503_2_01043550
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010515C03_2_010515C0
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010224003_2_01022400
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010204BB3_2_010204BB
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_00FE15403_2_00FE1540
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010524D03_2_010524D0
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_00FE66D53_2_00FE66D5
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_00FE867D3_2_00FE867D
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_00FE56503_2_00FE5650
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010487E03_2_010487E0
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010656203_2_01065620
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010726803_2_01072680
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_0104A6903_2_0104A690
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010836903_2_01083690
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_0100E6AB3_2_0100E6AB
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_00FE68DD3_2_00FE68DD
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_00FE18B03_2_00FE18B0
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010698103_2_01069810
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010708103_2_01070810
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_00FE19E03_2_00FE19E0
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010658203_2_01065820
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_0100F8603_2_0100F860
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010438903_2_01043890
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 4_2_097C20524_2_097C2052
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 4_2_6B8C20524_2_6B8C2052
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 4_2_07361FD14_2_07361FD1
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 4_2_073638504_2_07363850
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 4_2_0736E1704_2_0736E170
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 4_2_07364C004_2_07364C00
Source: C:\Users\Public\Documents\identity_helper.exeCode function: String function: 01092C41 appears 102 times
Source: C:\Users\Public\Documents\identity_helper.exeCode function: String function: 0100DF3C appears 131 times
Source: Fatrr_UewhcWF.msiBinary or memory string: OriginalFilenameAICustAct.dllF vs Fatrr_UewhcWF.msi
Source: Fatrr_UewhcWF.msiBinary or memory string: OriginalFilenameSoftwareDetector.dllF vs Fatrr_UewhcWF.msi
Source: Fatrr_UewhcWF.msiBinary or memory string: OriginalFilenameInstallerAnalytics.dllF vs Fatrr_UewhcWF.msi
Source: Fatrr_UewhcWF.msiBinary or memory string: OriginalFilenameembeddeduiproxy.dllF vs Fatrr_UewhcWF.msi
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: starttiledata.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Fatrr_UewhcWF.msi"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding C78C18F24792FB2CF3D3274F6B2C7332
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\Public\Documents\identity_helper.exe "C:\Users\Public\Documents\identity_helper.exe"
Source: unknownProcess created: C:\Users\Public\Documents\identity_helper.exe "C:\Users\Public\Documents\identity_helper.exe"
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding C78C18F24792FB2CF3D3274F6B2C7332Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\Public\Documents\identity_helper.exe "C:\Users\Public\Documents\identity_helper.exe" Jump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: identity_helper.lnk.2.drLNK file: ..\..\..\..\..\..\..\..\Public\Documents\identity_helper.exe
Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\AdvinstAnalyticsJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DF96920643A953DED5.TMPJump to behavior
Source: shiED5F.tmp.2.drBinary string: o\Device\NameResTrk\RecordNrtCloneOpenPacketW
Source: classification engineClassification label: mal48.evad.winMSI@7/31@2/2
Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Program Files (x86)\desktop.iniJump to behavior
Source: 3.2.identity_helper.exe.6b8c0000.2.unpack, Jhku003d/dhsu003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 4.2.identity_helper.exe.6b8c0000.2.unpack, Jhku003d/dhsu003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 4.2.identity_helper.exe.97c0000.1.unpack, Jhku003d/dhsu003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: msedge_elf.dll.2.dr, Jhku003d/dhsu003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 3.2.identity_helper.exe.98e0000.1.unpack, Jhku003d/dhsu003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: C:\Users\Public\Documents\identity_helper.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile written: C:\Users\user\AppData\Local\AdvinstAnalytics\649abc180e6ce9401d6e81cf\7.8.6.7\tracking.iniJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Fatrr_UewhcWF.msiStatic file information: File size 2252800 > 1048576
Source: Binary string: C:\Users\Pichau\Documents\SYSMX\NEWMAG - GB - EDGE- CONTANOMODULO - BARRAOK-NOVAPROGRESS - GB\SISTEMA2.0 - DLL - TIMER-1\Bin\Debug\msedge_elf.pdb source: identity_helper.exe, identity_helper.exe, 00000004.00000002.627670949.00000000097C2000.00000020.00000001.01000000.00000004.sdmp, identity_helper.exe, 00000004.00000002.628047218.000000006B8C2000.00000020.00000001.01000000.00000004.sdmp, msedge_elf.dll.2.dr
Source: Binary string: wininet.pdb source: shiED5F.tmp.2.dr
Source: Binary string: C:\JobRelease\win\Release\bin\x86\embeddeduiproxy.pdb source: Fatrr_UewhcWF.msi, 48e8fa.msi.1.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\SoftwareDetector.pdb source: Fatrr_UewhcWF.msi, MSIED15.tmp.1.dr, 48e8fa.msi.1.dr
Source: Binary string: D:\a\_work\e\src\out\Release\identity_helper.exe.pdb source: identity_helper.exe, 00000003.00000000.391646114.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe, 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe, 00000004.00000002.622394030.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe, 00000004.00000000.408427765.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe.2.dr
Source: Binary string: d3d12.pdbUGP source: shiEE2B.tmp.2.dr
Source: Binary string: d3d12.pdb source: shiEE2B.tmp.2.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\SoftwareDetector.pdb\ source: Fatrr_UewhcWF.msi, MSIED15.tmp.1.dr, 48e8fa.msi.1.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\InstallerAnalytics.pdbu source: Fatrr_UewhcWF.msi, MSI2BD9.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr
Source: Binary string: wininet.pdbUGP source: shiED5F.tmp.2.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\InstallerAnalytics.pdb source: Fatrr_UewhcWF.msi, MSI2BD9.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdb source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, 48e8fa.msi.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdbg source: Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, 48e8fa.msi.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.dr
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_0108294B push ecx; ret 3_2_0108295E
Source: identity_helper.exe.2.drStatic PE information: section name: .00cfg
Source: shiEE2B.tmp.2.drStatic PE information: section name: .text_hf
Source: shiEE2B.tmp.2.drStatic PE information: section name: .didat
Source: shiEE2B.tmp.2.drStatic PE information: section name: .DDIData
Source: shiED5F.tmp.2.drStatic PE information: section name: .wpp_sf
Source: shiED5F.tmp.2.drStatic PE information: section name: .didat
Source: shiED5F.tmp.2.drStatic PE information: 0x84CD8294 [Wed Aug 8 17:47:00 2040 UTC]
Source: initial sampleStatic PE information: section name: .text entropy: 6.8074948944091345
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEFD5.tmpJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\Public\Documents\msedge_elf.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIECE5.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2BD9.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEB4C.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIED15.tmpJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\shiEE2B.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEC76.tmpJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\Public\Documents\identity_helper.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIF034.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIF1FA.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEC77.tmpJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\shiED5F.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIF268.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEFD5.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIECE5.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2BD9.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEB4C.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIED15.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEC76.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIF034.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIF1FA.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIEC77.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIF268.tmpJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\zino.ps1Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\identity_helper.lnkJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\identity_helper.lnkJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe TID: 4132Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe TID: 3320Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exe TID: 4532Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exe TID: 7072Thread sleep count: 31 > 30Jump to behavior
Source: C:\Users\Public\Documents\identity_helper.exe TID: 7072Thread sleep time: -28592453314249787s >= -30000sJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exe TID: 5748Thread sleep count: 9835 > 30Jump to behavior
Source: C:\Users\Public\Documents\identity_helper.exe TID: 5924Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exe TID: 4044Thread sleep time: -26747778906878833s >= -30000sJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exe TID: 2888Thread sleep count: 9851 > 30Jump to behavior
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIEFD5.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIECE5.tmpJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\shiEE2B.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIF034.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIF1FA.tmpJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\shiED5F.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIEC77.tmpJump to dropped file
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 4_2_07367220 rdtsc 4_2_07367220
Source: C:\Users\Public\Documents\identity_helper.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeWindow / User API: threadDelayed 9835Jump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeWindow / User API: threadDelayed 9851Jump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeAPI coverage: 7.4 %
Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_ComputerSystem
Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010821B1 VirtualQuery,GetSystemInfo,3_2_010821B1
Source: C:\Users\Public\Documents\identity_helper.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.iniJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet ExplorerJump to behavior
Source: identity_helper.exe, 00000003.00000002.623615275.00000000056F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: 48e8fa.msi.1.drBinary or memory string: 01234567890.0.0.0.%dVMware, Inc.VMware Virtual PlatformVMware7,1innotek GmbHVirtualBoxMicrosoft CorporationVirtual MachineVRTUALACRSYSA M IROOT\CIMV2SELECT * FROM Win32_ComputerSystemSELECT * FROM Win32_BIOSManufacturerModelVersionGetting system informationManufacturer [Model [BIOS [IsWow64Processkernel32Software\Microsoft\Windows NT\CurrentVersionSYSTEM\CurrentControlSet\Control\ProductOptionsCurrentMajorVersionNumberCurrentMinorVersionNumberCurrentVersionCurrentBuildNumberReleaseIdCSDVersionProductTypeProductSuiteWinNTServerNTSmall BusinessEnterpriseBackOfficeCommunicationServerTerminal ServerSmall Business(Restricted)EmbeddedNTDataCenterPersonalBladeEmbedded(Restricted)Security ApplianceStorage ServerCompute Server Failed to create IWbemLocator object. Error code: \\Could not connect to WMI provider. Error code: Failed to initialize security. Error code: Could not set proxy blanket. Error code: WQLWMI Query failed: []. Error code:
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_0109C376 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0109C376
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 4_2_07367220 rdtsc 4_2_07367220
Source: C:\Users\Public\Documents\identity_helper.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_0109C376 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0109C376
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_01082756 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_01082756
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\Public\Documents\identity_helper.exe "C:\Users\Public\Documents\identity_helper.exe" Jump to behavior
Source: identity_helper.exe, 00000003.00000002.627526421.00000000074CA000.00000004.00000800.00020000.00000000.sdmp, identity_helper.exe, 00000003.00000002.627526421.000000000760E000.00000004.00000800.00020000.00000000.sdmp, identity_helper.exe, 00000003.00000002.627526421.00000000075E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: identity_helper.exe, 00000003.00000002.627526421.000000000760E000.00000004.00000800.00020000.00000000.sdmp, identity_helper.exe, 00000003.00000002.627526421.00000000075E7000.00000004.00000800.00020000.00000000.sdmp, identity_helper.exe, 00000003.00000002.627526421.00000000075FD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerT
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Users\Public\Documents\OgtQTC.zip VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Users\Public\Documents\OgtQTC.zip VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Users\Public\Documents\OgtQTC.zip VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Users\Public\Documents\OgtQTC.zip VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Users\Public\Documents\OgtQTC.zip VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Users\Public\Documents\OgtQTC.zip VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Users\Public\Documents\OgtQTC.zip VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeQueries volume information: C:\Users\Public\Documents\msedge_elf.dll VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeQueries volume information: C:\Users\Public\Documents\msedge_elf.dll VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeCode function: GetLocaleInfoW,3_2_0109B22C
Source: C:\Users\Public\Documents\identity_helper.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_0109F237
Source: C:\Users\Public\Documents\identity_helper.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_0109F530
Source: C:\Users\Public\Documents\identity_helper.exeCode function: EnumSystemLocalesW,3_2_0109F488
Source: C:\Users\Public\Documents\identity_helper.exeCode function: EnumSystemLocalesW,3_2_0109B76D
Source: C:\Users\Public\Documents\identity_helper.exeCode function: EnumSystemLocalesW,3_2_0109F783
Source: C:\Users\Public\Documents\identity_helper.exeCode function: GetLocaleInfoW,3_2_0109F7F0
Source: C:\Users\Public\Documents\identity_helper.exeCode function: GetLocaleInfoW,3_2_0109F910
Source: C:\Users\Public\Documents\identity_helper.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_0109F9B7
Source: C:\Users\Public\Documents\identity_helper.exeCode function: EnumSystemLocalesW,3_2_0109F8C5
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_010662C0 cpuid 3_2_010662C0
Source: C:\Users\Public\Documents\identity_helper.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_01054420 _strlen,_strlen,GetLocalTime,GetTickCount,_strlen,3_2_01054420
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_0109452C GetTimeZoneInformation,3_2_0109452C
Source: C:\Users\Public\Documents\identity_helper.exeCode function: 3_2_01045610 GetVersionExW,GetProductInfo,__Init_thread_header,GetNativeSystemInfo,3_2_01045610
Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\SysWOW64\msiexec.exeDirectory queried: C:\Users\Public\DocumentsJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeDirectory queried: C:\Users\Public\DocumentsJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeDirectory queried: C:\Users\Public\DocumentsJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
1
Replication Through Removable Media
3
Windows Management Instrumentation
1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
1
Input Capture
2
System Time Discovery
1
Replication Through Removable Media
1
Archive Collected Data
Exfiltration Over Other Network Medium1
Ingress Tool Transfer
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/Job2
Registry Run Keys / Startup Folder
12
Process Injection
1
Deobfuscate/Decode Files or Information
LSASS Memory11
Peripheral Device Discovery
Remote Desktop Protocol1
Data from Local System
Exfiltration Over Bluetooth1
Encrypted Channel
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)2
Registry Run Keys / Startup Folder
4
Obfuscated Files or Information
Security Account Manager13
File and Directory Discovery
SMB/Windows Admin Shares1
Input Capture
Automated Exfiltration3
Non-Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Software Packing
NTDS56
System Information Discovery
Distributed Component Object ModelInput CaptureScheduled Transfer3
Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA Secrets41
Security Software Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
DLL Side-Loading
Cached Domain Credentials2
Process Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup Items1
File Deletion
DCSync31
Virtualization/Sandbox Evasion
Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job21
Masquerading
Proc Filesystem1
Application Window Discovery
Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)31
Virtualization/Sandbox Evasion
/etc/passwd and /etc/shadow1
Remote System Discovery
Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)12
Process Injection
Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Fatrr_UewhcWF.msi5%ReversingLabs
Fatrr_UewhcWF.msi5%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\Public\Documents\identity_helper.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\shiED5F.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\shiEE2B.tmp0%ReversingLabs
C:\Windows\Installer\MSI2BD9.tmp0%ReversingLabs
C:\Windows\Installer\MSIEB4C.tmp0%ReversingLabs
C:\Windows\Installer\MSIEC76.tmp0%ReversingLabs
C:\Windows\Installer\MSIEC77.tmp0%ReversingLabs
C:\Windows\Installer\MSIECE5.tmp0%ReversingLabs
C:\Windows\Installer\MSIED15.tmp0%ReversingLabs
C:\Windows\Installer\MSIEFD5.tmp0%ReversingLabs
C:\Windows\Installer\MSIF034.tmp0%ReversingLabs
C:\Windows\Installer\MSIF1FA.tmp0%ReversingLabs
C:\Windows\Installer\MSIF268.tmp0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://20.165.170.22840%Avira URL Cloudsafe
http://20.165.170.228/MARA01/index.php?VS=MARA01&PL=NAO0%Avira URL Cloudsafe
https://HTTP/1.10%Avira URL Cloudsafe
http://html4/loose.dtd0%Avira URL Cloudsafe
http://20.165.170.228/MARA01/index.php?VS=MARA01&PL=NAO0%VirustotalBrowse
http://20.165.170.228/MARA01/index.php0%Avira URL Cloudsafe
https://amxx1515cabreun23.asxo0%Avira URL Cloudsafe
https://amxx1515cabreun23.asxo/0%Avira URL Cloudsafe
http://.css0%Avira URL Cloudsafe
http://.jpg0%Avira URL Cloudsafe
http://20.165.170.2280%Avira URL Cloudsafe
https://amxx1515cabreun23.asxo40%Avira URL Cloudsafe
https://collect.installeranalytics.comhttp://collect.installeranalytics.comhttps://installeranalytic0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
collect.installeranalytics.com
54.198.235.9
truefalse
    high
    amxx1515cabreun23.asxo
    unknown
    unknownfalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      http://20.165.170.228/MARA01/index.php?VS=MARA01&PL=NAOfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://collect.installeranalytics.com/false
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://html4/loose.dtdshiED5F.tmp.2.drfalse
        • Avira URL Cloud: safe
        low
        https://HTTP/1.1shiED5F.tmp.2.drfalse
        • Avira URL Cloud: safe
        low
        http://20.165.170.2284identity_helper.exe, 00000003.00000002.627526421.00000000074CA000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        low
        https://github.com/pq-crystals/kyber/commit/28413dfbf523fdde181246451c2bd77199c0f7ffDilithium2Dilithidentity_helper.exe, 00000003.00000000.391646114.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe, 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe, 00000004.00000002.622394030.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe, 00000004.00000000.408427765.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe.2.drfalse
          high
          https://amxx1515cabreun23.asxoidentity_helper.exe, 00000003.00000002.627526421.00000000075E7000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.thawte.com/cps0/Fatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drfalse
            high
            https://www.thawte.com/repository0WFatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drfalse
              high
              https://www.advancedinstaller.comFatrr_UewhcWF.msi, MSIEC77.tmp.1.dr, MSI2BD9.tmp.1.dr, MSIED15.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.dr, MSIEC76.tmp.1.dr, MSIF1FA.tmp.1.dr, MSIECE5.tmp.1.drfalse
                high
                http://20.165.170.228/MARA01/index.phpidentity_helper.exe, 00000003.00000002.627526421.00000000074CA000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://amxx1515cabreun23.asxo/identity_helper.exe, 00000003.00000002.627526421.00000000075E7000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://collect.installeranalytics.comFatrr_UewhcWF.msi, MSI2BD9.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.drfalse
                  high
                  http://.cssshiED5F.tmp.2.drfalse
                  • Avira URL Cloud: safe
                  low
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentity_helper.exe, 00000003.00000002.627526421.00000000074A1000.00000004.00000800.00020000.00000000.sdmp, identity_helper.exe, 00000004.00000002.627493890.0000000007381000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://.jpgshiED5F.tmp.2.drfalse
                    • Avira URL Cloud: safe
                    low
                    https://github.com/pq-crystals/kyber/commit/28413dfbf523fdde181246451c2bd77199c0f7ffidentity_helper.exe, 00000003.00000000.391646114.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe, 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe, 00000004.00000002.622394030.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe, 00000004.00000000.408427765.00000000010BD000.00000002.00000001.01000000.00000003.sdmp, identity_helper.exe.2.drfalse
                      high
                      http://20.165.170.228identity_helper.exe, 00000003.00000002.627526421.00000000074CA000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://amxx1515cabreun23.asxo4identity_helper.exe, 00000003.00000002.627526421.00000000075E7000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://collect.installeranalytics.comFatrr_UewhcWF.msi, MSI2BD9.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.drfalse
                        high
                        https://collect.installeranalytics.comhttp://collect.installeranalytics.comhttps://installeranalyticFatrr_UewhcWF.msi, MSI2BD9.tmp.1.dr, MSIEB4C.tmp.1.dr, 48e8fa.msi.1.dr, MSIF268.tmp.1.dr, MSIF034.tmp.1.dr, MSIEFD5.tmp.1.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        54.198.235.9
                        collect.installeranalytics.comUnited States
                        14618AMAZON-AESUSfalse
                        20.165.170.228
                        unknownUnited States
                        8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                        Joe Sandbox Version:37.1.0 Beryl
                        Analysis ID:895606
                        Start date and time:2023-06-28 11:58:10 +02:00
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 10m 31s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:9
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample file name:Fatrr_UewhcWF.msi
                        Detection:MAL
                        Classification:mal48.evad.winMSI@7/31@2/2
                        EGA Information:
                        • Successful, ratio: 100%
                        HDC Information:
                        • Successful, ratio: 0.4% (good quality ratio 0.3%)
                        • Quality average: 74.2%
                        • Quality standard deviation: 38.4%
                        HCA Information:
                        • Successful, ratio: 90%
                        • Number of executed functions: 44
                        • Number of non-executed functions: 128
                        Cookbook Comments:
                        • Found application associated with file extension: .msi
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe
                        • Excluded IPs from analysis (whitelisted): 142.251.36.202, 142.251.36.234, 142.251.37.10, 172.217.16.170, 142.251.36.170
                        • Excluded domains from analysis (whitelisted): firebasestorage.googleapis.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report creation exceeded maximum time and may have missing disassembly code information.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        TimeTypeDescription
                        11:59:05API Interceptor3x Sleep call for process: msiexec.exe modified
                        11:59:18AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\identity_helper.lnk
                        11:59:23API Interceptor2x Sleep call for process: identity_helper.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        54.198.235.954zEUp34e1.exeGet hashmaliciousUnknownBrowse
                          IcEL4U66yX.exeGet hashmaliciousUnknownBrowse
                            hWiWP9kOC9.exeGet hashmaliciousPrivateLoaderBrowse
                              hWiWP9kOC9.exeGet hashmaliciousUnknownBrowse
                                S4iK1tSHGc.exeGet hashmaliciousUnknownBrowse
                                  WCYoS776qm.exeGet hashmaliciousNymaimBrowse
                                    a1rzxoicOg.exeGet hashmaliciousUnknownBrowse
                                      8UvPumbygi.exeGet hashmaliciousNymaimBrowse
                                        8UvPumbygi.exeGet hashmaliciousNymaimBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          collect.installeranalytics.com54zEUp34e1.exeGet hashmaliciousUnknownBrowse
                                          • 52.73.64.126
                                          54zEUp34e1.exeGet hashmaliciousUnknownBrowse
                                          • 54.198.235.9
                                          ECnCJ4QWok.exeGet hashmaliciousUnknownBrowse
                                          • 52.73.64.126
                                          ECnCJ4QWok.exeGet hashmaliciousUnknownBrowse
                                          • 52.73.64.126
                                          IcEL4U66yX.exeGet hashmaliciousUnknownBrowse
                                          • 54.198.235.9
                                          IcEL4U66yX.exeGet hashmaliciousUnknownBrowse
                                          • 52.73.64.126
                                          hWiWP9kOC9.exeGet hashmaliciousPrivateLoaderBrowse
                                          • 54.198.235.9
                                          hWiWP9kOC9.exeGet hashmaliciousUnknownBrowse
                                          • 54.198.235.9
                                          S4iK1tSHGc.exeGet hashmaliciousUnknownBrowse
                                          • 52.73.64.126
                                          S4iK1tSHGc.exeGet hashmaliciousUnknownBrowse
                                          • 52.73.64.126
                                          WCYoS776qm.exeGet hashmaliciousNymaimBrowse
                                          • 54.198.235.9
                                          a1rzxoicOg.exeGet hashmaliciousUnknownBrowse
                                          • 52.73.64.126
                                          a1rzxoicOg.exeGet hashmaliciousUnknownBrowse
                                          • 54.198.235.9
                                          8UvPumbygi.exeGet hashmaliciousNymaimBrowse
                                          • 54.198.235.9
                                          8UvPumbygi.exeGet hashmaliciousNymaimBrowse
                                          • 52.73.64.126
                                          Levelogger-4.6.2-Installer.exeGet hashmaliciousUnknownBrowse
                                          • 54.225.226.3
                                          21REzKeOgq.exeGet hashmaliciousNymaimBrowse
                                          • 54.204.22.198
                                          21REzKeOgq.exeGet hashmaliciousNymaimBrowse
                                          • 3.222.139.61
                                          V1lIaJpTZP.exeGet hashmaliciousMinerDownloader, Nymaim, RedLine, Vidar, XmrigBrowse
                                          • 54.204.22.198
                                          https://tinyurl.com/2abosd8kGet hashmaliciousUnknownBrowse
                                          • 54.204.22.198
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          AMAZON-AESUSPXPz45kM78.elfGet hashmaliciousMiraiBrowse
                                          • 100.25.20.79
                                          eOF9g6JYAX.elfGet hashmaliciousUnknownBrowse
                                          • 54.211.50.102
                                          fDtncWP2T2.elfGet hashmaliciousUnknownBrowse
                                          • 34.232.174.101
                                          rM1MLEPWb4.elfGet hashmaliciousMiraiBrowse
                                          • 18.209.137.146
                                          https://chipotle.app.link/?$3p=e_et&$fallback_url=https://quattropublicidades.com.br/owa/aa/brian.herman@viewtrade.comGet hashmaliciousUnknownBrowse
                                          • 44.210.162.14
                                          3EYm3kgcui.exeGet hashmaliciousAsyncRATBrowse
                                          • 3.88.20.74
                                          Invoice.xlsxGet hashmaliciousHTMLPhisherBrowse
                                          • 3.233.147.185
                                          Invoice.xlsxGet hashmaliciousHTMLPhisherBrowse
                                          • 3.233.152.246
                                          https://ct.turing.com/?ti=XnKxebcpeDwvWdbRVlUADzrVRSEAbsLtZmQpeGyzdrlemfqvIS&rd=http%3A%2F%2Fhatbaemama.com/marvel/XnKxebcpeDwvWdbRVlUADzrVRSEAbsLtZmQpeGyzdrlemfqvIS/bW5ld3NvbWVAZ2NnYW1pbmcuY29tGet hashmaliciousUnknownBrowse
                                          • 54.144.133.96
                                          https://summersorthodontics-my.sharepoint.com/:o:/g/personal/fatima_summersortho_com/EtUYeda7l-ZMryzN7-vUM0wBS1Pod5d3nG8Cq96qllxUEw?e=5%3ar24ixc&at=9Get hashmaliciousUnknownBrowse
                                          • 34.204.41.25
                                          https://r20.rs6.net/tn.jsp?f=001OXnSzYvsU7x7Sd9FEbIVki9NlE-9YwTEwGnXtmsCD9V9pV26ksVXm6FUmsPfS2zSxLjRMoqWvyPCqDbRMDWvSonHaizVRSRW-h2k-7eUhbqJvIr7SqW3pRDQQ9NJ97UCgVqBBmI1SzvOFmuHuTFGIQ==&c=CLLSgXE2Ct1Gczd1H2zRGobWELW6Q1Pp8Vdnn0Ed0gkdROw-qWZwHQ==&ch=fo7c-4X5k475-fpd1iafaf2lVjzqukrqOI_Zt4rBVvfzM0tISS9vxA==Get hashmaliciousUnknownBrowse
                                          • 52.55.206.165
                                          BR_000098.08.htmGet hashmaliciousUnknownBrowse
                                          • 34.193.113.164
                                          http://eb4.us/d5f9bd8dGet hashmaliciousUnknownBrowse
                                          • 54.237.24.211
                                          https://www.google.co.uk/amp/s/john-mcquillan-contracts.notion.site/John-McQuillan-Contracts-a9c55eedec754f018f1b2f7a453e17e9?pvs=4Get hashmaliciousUnknownBrowse
                                          • 54.82.169.31
                                          https://ct.turing.com/?ti=XnKxebcpeDwvWdbRVlUADzrVRSEAbsLtZmQpeGyzdrlemfqvIS&rd=http%3A%2F%2Fhatbaemama.com/marvel/XnKxebcpeDwvWdbRVlUADzrVRSEAbsLtZmQpeGyzdrlemfqvIS/bW5ld3NvbWVAZ2NnYW1pbmcuY29tGet hashmaliciousUnknownBrowse
                                          • 52.206.206.168
                                          https://mayfielddairy.sitey.me/?fbclid=IwAR0eRZS2-iqFa8jM-XOItFQv2oVqCJkZul0Lfc627eGRtBT7mGaVuBdc36UGet hashmaliciousUnknownBrowse
                                          • 54.225.156.255
                                          https://profoundexpertbread.tumblr.com/#2UzMyQzMtVzMyQTZkZDN1QzMvM2Yu4WYyVmZpZmLuh2d5N3LvoDc0RHaGet hashmaliciousUnknownBrowse
                                          • 3.218.56.233
                                          http://slim-gum.comGet hashmaliciousUnknownBrowse
                                          • 54.166.245.170
                                          https://airtable.com/shrwF7KLfMHkdRiTL/Get hashmaliciousUnknownBrowse
                                          • 107.22.198.248
                                          https://oirupt.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                          • 3.92.5.217
                                          MICROSOFT-CORP-MSN-AS-BLOCKUShttps://magicalarcadewerewolf.tumblr.com/#==gYBBFTHNlYPBzSY9yaulGbuAHch5yNn9WZ38yL6MHc0RHaGet hashmaliciousUnknownBrowse
                                          • 40.114.177.156
                                          https://boathiresydney.com.au/wjzmchvery/vodka.gifGet hashmaliciousUnknownBrowse
                                          • 23.96.124.156
                                          uwOz6fQ4En.elfGet hashmaliciousMiraiBrowse
                                          • 20.113.107.67
                                          http://p1.pagewiz.net/ze2s7tmr/Get hashmaliciousHTMLPhisherBrowse
                                          • 13.90.63.16
                                          izie2V13jr.elfGet hashmaliciousUnknownBrowse
                                          • 21.21.154.101
                                          PXPz45kM78.elfGet hashmaliciousMiraiBrowse
                                          • 20.145.166.159
                                          eOF9g6JYAX.elfGet hashmaliciousUnknownBrowse
                                          • 22.237.172.191
                                          fDtncWP2T2.elfGet hashmaliciousUnknownBrowse
                                          • 40.89.56.122
                                          qEItSfx4cQ.elfGet hashmaliciousUnknownBrowse
                                          • 21.250.137.116
                                          ZR657rkiJ0.elfGet hashmaliciousMiraiBrowse
                                          • 22.216.82.12
                                          R_ DHL Express - I documenti sono disponibili per il download.msgGet hashmaliciousUnknownBrowse
                                          • 52.109.32.24
                                          rM1MLEPWb4.elfGet hashmaliciousMiraiBrowse
                                          • 20.56.176.244
                                          http://crookedgiverpoetry.tumblr.com/#2UzMyQzMtVzMyQTZkZDN1QzMvM2Yu4WYyVmZpZmLqpGa0V2LvoDc0RHaGet hashmaliciousUnknownBrowse
                                          • 40.114.177.156
                                          https://ncv.microsoft.com/n5Kx1XhuzSGet hashmaliciousHTMLPhisherBrowse
                                          • 13.107.213.45
                                          file.exeGet hashmaliciousTofseeBrowse
                                          • 104.47.53.36
                                          ATT00001 (1).htmGet hashmaliciousHTMLPhisherBrowse
                                          • 13.107.246.60
                                          https://chipotle.app.link/?$3p=e_et&$fallback_url=https://quattropublicidades.com.br/owa/aa/brian.herman@viewtrade.comGet hashmaliciousUnknownBrowse
                                          • 40.126.53.21
                                          ATT00001.htmGet hashmaliciousHTMLPhisherBrowse
                                          • 13.107.246.45
                                          #U2705 ATT000387641.htmlGet hashmaliciousUnknownBrowse
                                          • 13.107.213.45
                                          https://callon.carter-hay.com/MRV6XVRQXP2K700YTGHM/abcd@abcd.comGet hashmaliciousHTMLPhisherBrowse
                                          • 13.107.246.45
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          C:\Users\user\AppData\Local\Temp\shiED5F.tmp54zEUp34e1.exeGet hashmaliciousUnknownBrowse
                                            54zEUp34e1.exeGet hashmaliciousUnknownBrowse
                                              ECnCJ4QWok.exeGet hashmaliciousUnknownBrowse
                                                ECnCJ4QWok.exeGet hashmaliciousUnknownBrowse
                                                  IcEL4U66yX.exeGet hashmaliciousUnknownBrowse
                                                    IcEL4U66yX.exeGet hashmaliciousUnknownBrowse
                                                      hWiWP9kOC9.exeGet hashmaliciousPrivateLoaderBrowse
                                                        hWiWP9kOC9.exeGet hashmaliciousUnknownBrowse
                                                          S4iK1tSHGc.exeGet hashmaliciousUnknownBrowse
                                                            S4iK1tSHGc.exeGet hashmaliciousUnknownBrowse
                                                              WCYoS776qm.exeGet hashmaliciousNymaimBrowse
                                                                a1rzxoicOg.exeGet hashmaliciousUnknownBrowse
                                                                  a1rzxoicOg.exeGet hashmaliciousUnknownBrowse
                                                                    8UvPumbygi.exeGet hashmaliciousNymaimBrowse
                                                                      8UvPumbygi.exeGet hashmaliciousNymaimBrowse
                                                                        Levelogger-4.6.2-Installer.exeGet hashmaliciousUnknownBrowse
                                                                          21REzKeOgq.exeGet hashmaliciousNymaimBrowse
                                                                            21REzKeOgq.exeGet hashmaliciousNymaimBrowse
                                                                              https://tinyurl.com/2abosd8kGet hashmaliciousUnknownBrowse
                                                                                SecuriteInfo.com.Trojan.GenericKD.65705581.16120.15146.exeGet hashmaliciousUnknownBrowse
                                                                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                  Category:dropped
                                                                                  Size (bytes):952513
                                                                                  Entropy (8bit):7.998406700980047
                                                                                  Encrypted:true
                                                                                  SSDEEP:24576:tW5oPAU6mipm4lBXHfp611l133D/ly2BTW37VcuqHq:O9U6mJ4n/s1T133zI2wrVcuIq
                                                                                  MD5:CE9B3A65EB8800DB4014605841B359BD
                                                                                  SHA1:53FD860C7DC69431D16F6E45B6045F51B7BA9EDC
                                                                                  SHA-256:C6D1EFECFBC48876E60F4FCE83DA65CF4DD8A53E8D6E7E4E320466D74249B28C
                                                                                  SHA-512:0CBBCD39C72EA7149623434363984607489CD7FC0C7E72BD0C80DA68E104F0FA6D8216E23E489A32CD08D1AE036CA590A72AC3330B5C653E37EE5AFB9D07DC2F
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:PK........C..V./..............identity_helper.exe.Z{|.E...L.W...*B.. `.]....LP0.H.Q... .dr!F.......qE......,...Dy.0.."!.....I.!.5..Uu.Lf........IWWWW.....*3v.".#..H..L..-.;...b..n.K.u..'....slsrf..g....2.'..Yb..Tq.-=c.D.%...]'..'.k..H_]....u.>....Ph=..'$.q.....y.6.|6.YG6NP...z.%;..I.D...f".....@....&.X@...).BB...Q......+.}.g.l.v.....r.Y.~4gh]t..E ;0'}f.LB....uA._../..{.6..y7ry..K8..Ghp?.....s.1....!..Pz...b}...._.~..9.sf....C..O..z9..m...%..._H..._...U.$..'J.T...m..F*.0FpN..."....3......-:..z...L.q.....x|WV.....W..=..7.h6.s..#E..H.B..-0...Bt..-b.q...".i......9...v.~....._.$....BI.sm...kG.,.C...N.."X..z.HX.i....~.k.C.."h...~..hk~..y.......1.P=`....,d..-mj.Z.R..r...$g..r...'dd.......*.G.....9S..4S..|...`.......h..>.`s5..|.%....t...9.\...F....Ws}...m.rT.r..`..........H.V.oR...\.[.b.'@]/.>.x.$...i..a.p.,:D._...Q.(.7.....,...{..E..EV".yf(.Z.yiv9M....j..a.4C`C.i..S.-.......5.[..i.5..+^...Q.d.}.H.......8P.cw....X.....,.d.u..p..e..f3-X.^`..U...Z.
                                                                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):1103264
                                                                                  Entropy (8bit):6.783368023991025
                                                                                  Encrypted:false
                                                                                  SSDEEP:24576:APUsmWUOp5Owzjx7vlHgfopIPm12/1ScWqV89//bo:YUsNhjsOIf1Sc7+//U
                                                                                  MD5:216FBFDD15F983EE770F1A135EDA572C
                                                                                  SHA1:82471E22544494305C11F3DA11763F25EB722AAF
                                                                                  SHA-256:BEEC4C4E010F1F5EA76EBF43C6A2B9E2E2264A5280BDF41E5E8607F889B61E0A
                                                                                  SHA-512:7E6E3216EBB3DF7347C51DEB1B6D0503B49972BBFF593D609C0C830ECC073F5C3E7E4F060611EEDE5EF7037BF3E2F984EC42D425C3022BBCBDAD6B691DD16E98
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Reputation:low
                                                                                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L......d.........."..................,............@..................................!....@.................................d........`...................'...p..0...\...8...........................`................................................text.............................. ..`.rdata...3.......4..................@..@.data....>.......>..................@....00cfg.......@....... ..............@..@.tls.........P......."..............@....rsrc........`.......$..............@..@.reloc..0....p.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):823808
                                                                                  Entropy (8bit):6.243154340022517
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:Qr3qqqXxWEsDXXXTrIqsLhHfvsDbh499FqsLsqsLXzqqqXQuBW80DXXXTwvzrI/:sdPgHfo4YCkNIvy
                                                                                  MD5:C4F1B57F506672ECEA678BA35A44F4B9
                                                                                  SHA1:BDC9ABF7CC236832948B4222DA6EE002343C0A7E
                                                                                  SHA-256:BD42A3174F34E485725D887F72EEC48D787C2428243617D5F9DEC0DC1EF50B8F
                                                                                  SHA-512:15D1D9854D7415A6C068A916DE95622ECE976B316559D43569CC9E34324EBAC7A6150651116631C56D9480BD490164CD5F14C038F6164C00B5D355D21AB28FBE
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....).d...........!.....:...........Y... ...`....@.. ....................................@..........................`..(....Y..O.................................................................................... ............... ..H............text....9... ...:.................. ..`.sdata.......`.......>..............@....rsrc................@..............@..@.reloc..pL.......N...D..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):26
                                                                                  Entropy (8bit):4.0081320258334
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:1EyEMyvn:1BEN
                                                                                  MD5:6BC190DD42A169DFA14515484427FC8E
                                                                                  SHA1:B53BD614A834416E4A20292AA291A6D2FC221A5E
                                                                                  SHA-256:B3395B660EB1EDB00FF91ECE4596E3ABE99FA558B149200F50AABF2CB77F5087
                                                                                  SHA-512:5B7011ED628B673217695809A38A800E9C8A42CEB0C54AB6F8BC39DBA0745297A4FBD66D6B09188FCC952C08217152844DFC3ADA7CF468C3AAFCEC379C0B16B6
                                                                                  Malicious:false
                                                                                  Reputation:moderate, very likely benign file
                                                                                  Preview:[General]..Active = true..
                                                                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):13732
                                                                                  Entropy (8bit):5.40828066022351
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:UwQ/414lsVGg5aJpRvQkdYZXJg7aExhV3N+iWhFr0PkPg+2Ig4EDM:UwQ/414lsVGg5aJpRvhdYZXJg7aEXV9m
                                                                                  MD5:8AC23955DD43C6182C7958430BF3606E
                                                                                  SHA1:B0727BC12C4991A5F4C5D5F1C07E61AA1924DDAC
                                                                                  SHA-256:54E5655892AF52E63888E8E8D1AD0D77E14BEABAECA08CED6020836EC1BE98E6
                                                                                  SHA-512:968BC9F84F3704208F2C06E61507254640F2B101EA19C075C7D15E5AE123885A9896CB50E99E2C2FC0D7B9E3C6BED1C354D2A1FC59731C1D7BECA433DA5606BE
                                                                                  Malicious:false
                                                                                  Preview:[Hit {1AA2B042-59CE-4C48-83C3-FB83AEBD0468}]..Queue Time = 0..Hit Type = lifecycle..Life control = start..Protocol Version = 3..Application ID = 649abc180e6ce9401d6e81cf..Application Version = 7.8.6.7..Client ID = 7D2E30BECC9DF42122B47B83C0F9D9F226A6C78B..Session ID = {FA015603-7D74-4142-8F3D-91E0218EBBFB}....[Hit {6BD7C390-2F6E-4400-9BA9-D6A7A1807735}]..Queue Time = 0..Hit Type = property..Label = VersionNT..Value = 1000..Protocol Version = 3..Application ID = 649abc180e6ce9401d6e81cf..Application Version = 7.8.6.7..Client ID = 7D2E30BECC9DF42122B47B83C0F9D9F226A6C78B..Session ID = {FA015603-7D74-4142-8F3D-91E0218EBBFB}....[Hit {3F24059A-48C7-435C-805F-D29504A3250E}]..Queue Time = 0..Hit Type = property..Label = VersionNT64..Value = 1000..Protocol Version = 3..Application ID = 649abc180e6ce9401d6e81cf..Application Version = 7.8.6.7..Client ID = 7D2E30BECC9DF42122B47B83C0F9D9F226A6C78B..Session ID = {FA015603-7D74-4142-8F3D-91E0218EBBFB}....[Hit {18C0204C-1AFA-48EE-B1C6-CDC7D9899C75}].
                                                                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):3015168
                                                                                  Entropy (8bit):6.488798060334229
                                                                                  Encrypted:false
                                                                                  SSDEEP:49152:sS4Q3T9DntJVJZy+PDGffBlj+mBLZESa9cxpy4AiE6CxdNnstH/9hGwQn+rV:x4QpDnDVJZySGfX1uSa9y9evdNnstH/n
                                                                                  MD5:2BED2F1B8B7975B5F317813B9D2DC150
                                                                                  SHA1:DC9C89E36F2BC4E01907E0CE698881BB267EAE34
                                                                                  SHA-256:A1804D8C5127E13C27F664CDD3427C185FAE6ED2AB36108B501859C670F328BD
                                                                                  SHA-512:49FFB70F169198F1F60C5AB6B15AA535D6905988623DF875A976D3A0ABD5E5EA1F09969B26F50F2E6C56DFC5624BAD84E73CB4238FC9F94B9E252775C691B3EE
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Joe Sandbox View:
                                                                                  • Filename: 54zEUp34e1.exe, Detection: malicious, Browse
                                                                                  • Filename: 54zEUp34e1.exe, Detection: malicious, Browse
                                                                                  • Filename: ECnCJ4QWok.exe, Detection: malicious, Browse
                                                                                  • Filename: ECnCJ4QWok.exe, Detection: malicious, Browse
                                                                                  • Filename: IcEL4U66yX.exe, Detection: malicious, Browse
                                                                                  • Filename: IcEL4U66yX.exe, Detection: malicious, Browse
                                                                                  • Filename: hWiWP9kOC9.exe, Detection: malicious, Browse
                                                                                  • Filename: hWiWP9kOC9.exe, Detection: malicious, Browse
                                                                                  • Filename: S4iK1tSHGc.exe, Detection: malicious, Browse
                                                                                  • Filename: S4iK1tSHGc.exe, Detection: malicious, Browse
                                                                                  • Filename: WCYoS776qm.exe, Detection: malicious, Browse
                                                                                  • Filename: a1rzxoicOg.exe, Detection: malicious, Browse
                                                                                  • Filename: a1rzxoicOg.exe, Detection: malicious, Browse
                                                                                  • Filename: 8UvPumbygi.exe, Detection: malicious, Browse
                                                                                  • Filename: 8UvPumbygi.exe, Detection: malicious, Browse
                                                                                  • Filename: Levelogger-4.6.2-Installer.exe, Detection: malicious, Browse
                                                                                  • Filename: 21REzKeOgq.exe, Detection: malicious, Browse
                                                                                  • Filename: 21REzKeOgq.exe, Detection: malicious, Browse
                                                                                  • Filename: , Detection: malicious, Browse
                                                                                  • Filename: SecuriteInfo.com.Trojan.GenericKD.65705581.16120.15146.exe, Detection: malicious, Browse
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........g....l..l..l.~....l..bo..l..bm..l..bi..l..m.I.l..bh..l..bl..l..bb...l..b...l..bn..l.Rich..l.................PE..L.................!......*.........P.........*....c.........................`............@A..........................).K&....*...... +...................... -..=...:..T....................N.......#................*......e)......................text.....).......)................. ..`.wpp_sf.:.....).......)............. ..`.data...@4....*.......*.............@....idata..|/....*..0....*.............@..@.didat..H.....+.......*.............@....rsrc........ +.......*.............@..@.reloc...=... -..>....,.............@..B................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):1299560
                                                                                  Entropy (8bit):6.717180055414863
                                                                                  Encrypted:false
                                                                                  SSDEEP:24576:MhGigXBH4snfDLhfxTdLXWVjpUVAs7ImLKrVA16yiLo+aegfNoZFag9WM1KOn:AGigXBHvfD1f3Li9UVlerVWhNcag97sY
                                                                                  MD5:84A28C3CF7B811847D74CE68C894FBA0
                                                                                  SHA1:3140559C1BF1FF76A481C2E264808B3D094008FE
                                                                                  SHA-256:A95C72F5B9FB9274AC9DAF554B24300E32C5E300AC92B6CE5EC8DB11F5745104
                                                                                  SHA-512:E1DED6FBA8FC17DAECF97E5B0004FF6064D4403E3B02086CFCB3A2F04C36E7617D96DE9CC993B12AA00B64613BC766E985CEE25F818AC214196B8D16A2BCC2B2
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Wh..9;..9;..9;...;..9;..::.9;..=:.9;..8:..9;..<:..9;..8;..9;..7:..9;..9:..9;...;..9;..;:..9;Rich..9;................PE..L..................!.....|...h............................................... ............@A........................ ........#.. ....`..................hN...P......`...T...................DV.......S............... ...............................text...)|.......~.................. ..`.text_hf............................ ..`.data...........(..................@....idata..V.... ... ..................@..@.didat..<....@......................@....DDIData.....P......................@....rsrc........`......................@..@.reloc.......P......................@..B........................................................................................................................................................................................
                                                                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                  Category:dropped
                                                                                  Size (bytes):6656
                                                                                  Entropy (8bit):4.155379993589854
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:rlsPwyILZzJqlYXUqKquMgP0XEOqulG1qXZw3quptfBWY2zadR0vmh01ykquZQb:vXRSM3g/qGcyDfBWtedR0v40Y7
                                                                                  MD5:07E2B417ABEA51AB598DC5757F7FB0A8
                                                                                  SHA1:57FE111CC909743BBCDBC1B7AAE0DCD1CB771691
                                                                                  SHA-256:B99D43254F27FC886E9E67E474E47E316F5B6F21D2B5C20588D6F3BA622C5941
                                                                                  SHA-512:8ECD1AC320DBBCEAB8531431D369F82BD896855636A17E67C13B39D9CF0216D40878FC2C47CF35DF1EC3BF08CDDC51E4DAE16ADF582CDBF695B3FC94502A66E6
                                                                                  Malicious:false
                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                  File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                                                                                  Category:dropped
                                                                                  Size (bytes):880
                                                                                  Entropy (8bit):3.2421499879593454
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:8wl05RsXUd9CVJEIQGbBIWtEqYIAvmNJS4t2Y+xIBjK:8t+IG2KZcCJO7aB
                                                                                  MD5:14820CB37F2B8A01F49E62BF826F9B8A
                                                                                  SHA1:6CE79C8C9225E8959F27FE95CA7C04DBCA9DF31E
                                                                                  SHA-256:E5F8FB412CAE20A46BA6CE083FED8F13AB80773AEF15C1C30BAF0682C58BFEA7
                                                                                  SHA-512:35DA4BC78AACC901093B2EBDED3ACCB4CB1111BC4B1A1E4D130B99728E757FA279E9CCB16DDA86E407E8E89045E801B792A5C4E71F9365EF4C64D6C4590EE261
                                                                                  Malicious:false
                                                                                  Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........Public..>............................................P.u.b.l.i.c.....\.1...........Documents.D............................................D.o.c.u.m.e.n.t.s.....z.2...........identity_helper.exe.X............................................i.d.e.n.t.i.t.y._.h.e.l.p.e.r...e.x.e..."...<.....\.....\.....\.....\.....\.....\.....\.....\.P.u.b.l.i.c.\.D.o.c.u.m.e.n.t.s.\.i.d.e.n.t.i.t.y._.h.e.l.p.e.r...e.x.e...C.:.\.U.s.e.r.s.\.P.u.b.l.i.c.\.D.o.c.u.m.e.n.t.s.\.............-............$H...E...ye.64-...............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.................
                                                                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):6
                                                                                  Entropy (8bit):2.2516291673878226
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:gpyn:g4n
                                                                                  MD5:A067F5EC97BA51B576825B69BC855E58
                                                                                  SHA1:907D296538A45D5B593512881D721C7D347B8E04
                                                                                  SHA-256:CF3E339D25C3C023C9417FFC5D8E73F1DA828B18FEECAF14FDB9C24D04E49BA0
                                                                                  SHA-512:F6058F37CF764E6CD807D9C0E9DE881849E4C94EC1D2E0C0EB504ABF77147E77CB09113B087E1C10E790C3EC45780E5986D29B2A84B364C5F697F884B1549F4D
                                                                                  Malicious:false
                                                                                  Preview:NULL..
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {4EACFE79-EFFB-4636-86E9-CECF9E2524A6}, Number of Words: 10, Subject: UUIN RSTRROEUTR, Author: UUIN RSTRROEUTR, Name of Creating Application: Advanced Installer 18.3 build e2a0201b, Template: ;1046, Comments: UUIN RSTRROEUTR, Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
                                                                                  Category:dropped
                                                                                  Size (bytes):2252800
                                                                                  Entropy (8bit):6.488775770786979
                                                                                  Encrypted:false
                                                                                  SSDEEP:49152:2m5DxGSFVtaN4AyK8tKk5ojmrhCMz5vk3ukDln/hFRFNUEekBIWsRkn4frUMXjDA:vxM4AeKknz5vqu0sRe4frUMXjTY
                                                                                  MD5:076682947CDB70A184620AED267A64E5
                                                                                  SHA1:49A78FD9BA854E7E2A16276CDD4188ADE83CE384
                                                                                  SHA-256:FCFA8B7B8DC0EF9D2A4BAABCD78551C0EF1B2B505180D30EE1729298013B5204
                                                                                  SHA-512:43E34AC7CCDF8861B8E4D6DCEDA852FC2AE548340F03055B24B43FE60079C6B391ABFE05BDD3C824A6AF6E78555795966F513906056C7D60547EB63CE205F123
                                                                                  Malicious:false
                                                                                  Preview:......................>...................#...................................................................................................................J...K...L...M...N...O...P...Q...R...S...T...U...............................................................................................................................................................................................................................................................................................................................c...............%...7........................................................................................... ...!..."...#...$.../...0...'...(...)...*...+...,...-...........1...5...2...3...4...8...6...@...C...9...:...;...<...=...>...?...R...A...B...H...D...E...F...G...q...I...b...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a.......d...u...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...v.......w...x...y...z...
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):780768
                                                                                  Entropy (8bit):6.387720196228063
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:8tlNr2btWAp/wEqjh/lNKCQSZ1YVzsRiiqn6BbFAmrhymkM49+Og2Z04KHjJaI/5:8tlNrgpSZKVsRkn4frUMXjJaI/tWogPa
                                                                                  MD5:573F5E653258BF622AE1C0AD118880A2
                                                                                  SHA1:E243C761983908D14BAF6C7C0879301C8437415D
                                                                                  SHA-256:371D1346EC9CA236B257FED5B5A5C260114E56DFF009F515FA543E11C4BB81F7
                                                                                  SHA-512:DFFF15345DBF62307C3E6A4C0B363C133D1A0B8B368492F1200273407C2520B33ACB20BFF90FEAC356305990492F800844D849EE454E7124395F945DE39F39EA
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......#P.Qg1..g1..g1..sZ..j1..sZ...1...E..v1...E..p1...E..51..sZ...1..sZ..f1..sZ..z1..g1..T0...E..+1...E..f1...Ex.f1..g1..e1...E..f1..Richg1..........PE..L.../.`.........."!.........B......4................................................j....@..........................;......@=...............................0......X%..p....................&.......%..@............................................text............................... ..`.rdata..............................@..@.data.......P.......@..............@....rsrc...............................@..@.reloc.......0......................@..B........................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):780768
                                                                                  Entropy (8bit):6.387720196228063
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:8tlNr2btWAp/wEqjh/lNKCQSZ1YVzsRiiqn6BbFAmrhymkM49+Og2Z04KHjJaI/5:8tlNrgpSZKVsRkn4frUMXjJaI/tWogPa
                                                                                  MD5:573F5E653258BF622AE1C0AD118880A2
                                                                                  SHA1:E243C761983908D14BAF6C7C0879301C8437415D
                                                                                  SHA-256:371D1346EC9CA236B257FED5B5A5C260114E56DFF009F515FA543E11C4BB81F7
                                                                                  SHA-512:DFFF15345DBF62307C3E6A4C0B363C133D1A0B8B368492F1200273407C2520B33ACB20BFF90FEAC356305990492F800844D849EE454E7124395F945DE39F39EA
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......#P.Qg1..g1..g1..sZ..j1..sZ...1...E..v1...E..p1...E..51..sZ...1..sZ..f1..sZ..z1..g1..T0...E..+1...E..f1...Ex.f1..g1..e1...E..f1..Richg1..........PE..L.../.`.........."!.........B......4................................................j....@..........................;......@=...............................0......X%..p....................&.......%..@............................................text............................... ..`.rdata..............................@..@.data.......P.......@..............@....rsrc...............................@..@.reloc.......0......................@..B........................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):388064
                                                                                  Entropy (8bit):6.407392408414975
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:U7C5QB3/CNG2HBOqf2BLuoZSKYfuAO8DOE09VKYnyZwYW:qB3WBOG2BPDKSf9VtyZNW
                                                                                  MD5:20C782EB64C81AC14C83A853546A8924
                                                                                  SHA1:A1506933D294DE07A7A2AE1FBC6BE468F51371D6
                                                                                  SHA-256:0ED6836D55180AF20F71F7852E3D728F2DEFE22AA6D2526C54CFBBB4B48CC6A1
                                                                                  SHA-512:AFF21E3E00B39F8983D101A0C616CA84CC3DC72D6464A0DD331965CF6BECCF9B45025A7DB2042D6E8B05221D3EB5813445C8ADA69AE96E2727A607398A3DE3D9
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......b2..&S..&S..&S..28..+S..28..S...'..)S...'..1S...'..aS..28..?S..28..'S..28..;S..&S..wR...'..tS...'..'S...'+.'S..&SC.'S...'..'S..Rich&S..........................PE..L.....`.........."!.................Z..............................................a.....@.........................@n.......v..........0.......................d?..X...p...............................@............... ............................text............................... ..`.rdata.............................@..@.data...............................@....rsrc...0...........................@..@.reloc..d?.......@..................@..B........................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):388064
                                                                                  Entropy (8bit):6.407392408414975
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:U7C5QB3/CNG2HBOqf2BLuoZSKYfuAO8DOE09VKYnyZwYW:qB3WBOG2BPDKSf9VtyZNW
                                                                                  MD5:20C782EB64C81AC14C83A853546A8924
                                                                                  SHA1:A1506933D294DE07A7A2AE1FBC6BE468F51371D6
                                                                                  SHA-256:0ED6836D55180AF20F71F7852E3D728F2DEFE22AA6D2526C54CFBBB4B48CC6A1
                                                                                  SHA-512:AFF21E3E00B39F8983D101A0C616CA84CC3DC72D6464A0DD331965CF6BECCF9B45025A7DB2042D6E8B05221D3EB5813445C8ADA69AE96E2727A607398A3DE3D9
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......b2..&S..&S..&S..28..+S..28..S...'..)S...'..1S...'..aS..28..?S..28..'S..28..;S..&S..wR...'..tS...'..'S...'+.'S..&SC.'S...'..'S..Rich&S..........................PE..L.....`.........."!.................Z..............................................a.....@.........................@n.......v..........0.......................d?..X...p...............................@............... ............................text............................... ..`.rdata.............................@..@.data...............................@....rsrc...0...........................@..@.reloc..d?.......@..................@..B........................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):388064
                                                                                  Entropy (8bit):6.407392408414975
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:U7C5QB3/CNG2HBOqf2BLuoZSKYfuAO8DOE09VKYnyZwYW:qB3WBOG2BPDKSf9VtyZNW
                                                                                  MD5:20C782EB64C81AC14C83A853546A8924
                                                                                  SHA1:A1506933D294DE07A7A2AE1FBC6BE468F51371D6
                                                                                  SHA-256:0ED6836D55180AF20F71F7852E3D728F2DEFE22AA6D2526C54CFBBB4B48CC6A1
                                                                                  SHA-512:AFF21E3E00B39F8983D101A0C616CA84CC3DC72D6464A0DD331965CF6BECCF9B45025A7DB2042D6E8B05221D3EB5813445C8ADA69AE96E2727A607398A3DE3D9
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......b2..&S..&S..&S..28..+S..28..S...'..)S...'..1S...'..aS..28..?S..28..'S..28..;S..&S..wR...'..tS...'..'S...'+.'S..&SC.'S...'..'S..Rich&S..........................PE..L.....`.........."!.................Z..............................................a.....@.........................@n.......v..........0.......................d?..X...p...............................@............... ............................text............................... ..`.rdata.............................@..@.data...............................@....rsrc...0...........................@..@.reloc..d?.......@..................@..B........................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):878560
                                                                                  Entropy (8bit):6.452749824306929
                                                                                  Encrypted:false
                                                                                  SSDEEP:24576:QK8S3AccKkqSojmrhCMou5vk3Y+ukDln/hFRFNUEekB:QK8tKk5ojmrhCMz5vk3ukDln/hFRFNU0
                                                                                  MD5:D51A7E3BCE34C74638E89366DEEE2AAB
                                                                                  SHA1:0E68022B52C288E8CDFFE85739DE1194253A7EF0
                                                                                  SHA-256:7C6BDF16A0992DB092B7F94C374B21DE5D53E3043F5717A6EECAE614432E0DF5
                                                                                  SHA-512:8ED246747CDD05CAC352919D7DED3F14B1E523CCC1F7F172DB85EED800B0C5D24475C270B34A7C25E7934467ACE7E363542A586CDEB156BFC484F7417C3A4AB0
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........j{..............`.......`..W...<.......<.......<.......`.......`.......`..............>.......>.......>...............>.......Rich....................PE..L...}.`.........."!.........|...........................................................@............................t...T........................N..............X}..p....................~.......}..@............................................text............................... ..`.rdata..............................@..@.data...\...........................@....rsrc................^..............@..@.reloc...............d..............@..B................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):780768
                                                                                  Entropy (8bit):6.387720196228063
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:8tlNr2btWAp/wEqjh/lNKCQSZ1YVzsRiiqn6BbFAmrhymkM49+Og2Z04KHjJaI/5:8tlNrgpSZKVsRkn4frUMXjJaI/tWogPa
                                                                                  MD5:573F5E653258BF622AE1C0AD118880A2
                                                                                  SHA1:E243C761983908D14BAF6C7C0879301C8437415D
                                                                                  SHA-256:371D1346EC9CA236B257FED5B5A5C260114E56DFF009F515FA543E11C4BB81F7
                                                                                  SHA-512:DFFF15345DBF62307C3E6A4C0B363C133D1A0B8B368492F1200273407C2520B33ACB20BFF90FEAC356305990492F800844D849EE454E7124395F945DE39F39EA
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......#P.Qg1..g1..g1..sZ..j1..sZ...1...E..v1...E..p1...E..51..sZ...1..sZ..f1..sZ..z1..g1..T0...E..+1...E..f1...Ex.f1..g1..e1...E..f1..Richg1..........PE..L.../.`.........."!.........B......4................................................j....@..........................;......@=...............................0......X%..p....................&.......%..@............................................text............................... ..`.rdata..............................@..@.data.......P.......@..............@....rsrc...............................@..@.reloc.......0......................@..B........................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):780768
                                                                                  Entropy (8bit):6.387720196228063
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:8tlNr2btWAp/wEqjh/lNKCQSZ1YVzsRiiqn6BbFAmrhymkM49+Og2Z04KHjJaI/5:8tlNrgpSZKVsRkn4frUMXjJaI/tWogPa
                                                                                  MD5:573F5E653258BF622AE1C0AD118880A2
                                                                                  SHA1:E243C761983908D14BAF6C7C0879301C8437415D
                                                                                  SHA-256:371D1346EC9CA236B257FED5B5A5C260114E56DFF009F515FA543E11C4BB81F7
                                                                                  SHA-512:DFFF15345DBF62307C3E6A4C0B363C133D1A0B8B368492F1200273407C2520B33ACB20BFF90FEAC356305990492F800844D849EE454E7124395F945DE39F39EA
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......#P.Qg1..g1..g1..sZ..j1..sZ...1...E..v1...E..p1...E..51..sZ...1..sZ..f1..sZ..z1..g1..T0...E..+1...E..f1...Ex.f1..g1..e1...E..f1..Richg1..........PE..L.../.`.........."!.........B......4................................................j....@..........................;......@=...............................0......X%..p....................&.......%..@............................................text............................... ..`.rdata..............................@..@.data.......P.......@..............@....rsrc...............................@..@.reloc.......0......................@..B........................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):388064
                                                                                  Entropy (8bit):6.407392408414975
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:U7C5QB3/CNG2HBOqf2BLuoZSKYfuAO8DOE09VKYnyZwYW:qB3WBOG2BPDKSf9VtyZNW
                                                                                  MD5:20C782EB64C81AC14C83A853546A8924
                                                                                  SHA1:A1506933D294DE07A7A2AE1FBC6BE468F51371D6
                                                                                  SHA-256:0ED6836D55180AF20F71F7852E3D728F2DEFE22AA6D2526C54CFBBB4B48CC6A1
                                                                                  SHA-512:AFF21E3E00B39F8983D101A0C616CA84CC3DC72D6464A0DD331965CF6BECCF9B45025A7DB2042D6E8B05221D3EB5813445C8ADA69AE96E2727A607398A3DE3D9
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......b2..&S..&S..&S..28..+S..28..S...'..)S...'..1S...'..aS..28..?S..28..'S..28..;S..&S..wR...'..tS...'..'S...'+.'S..&SC.'S...'..'S..Rich&S..........................PE..L.....`.........."!.................Z..............................................a.....@.........................@n.......v..........0.......................d?..X...p...............................@............... ............................text............................... ..`.rdata.............................@..@.data...............................@....rsrc...0...........................@..@.reloc..d?.......@..................@..B........................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):780768
                                                                                  Entropy (8bit):6.387720196228063
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:8tlNr2btWAp/wEqjh/lNKCQSZ1YVzsRiiqn6BbFAmrhymkM49+Og2Z04KHjJaI/5:8tlNrgpSZKVsRkn4frUMXjJaI/tWogPa
                                                                                  MD5:573F5E653258BF622AE1C0AD118880A2
                                                                                  SHA1:E243C761983908D14BAF6C7C0879301C8437415D
                                                                                  SHA-256:371D1346EC9CA236B257FED5B5A5C260114E56DFF009F515FA543E11C4BB81F7
                                                                                  SHA-512:DFFF15345DBF62307C3E6A4C0B363C133D1A0B8B368492F1200273407C2520B33ACB20BFF90FEAC356305990492F800844D849EE454E7124395F945DE39F39EA
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......#P.Qg1..g1..g1..sZ..j1..sZ...1...E..v1...E..p1...E..51..sZ...1..sZ..f1..sZ..z1..g1..T0...E..+1...E..f1...Ex.f1..g1..e1...E..f1..Richg1..........PE..L.../.`.........."!.........B......4................................................j....@..........................;......@=...............................0......X%..p....................&.......%..@............................................text............................... ..`.rdata..............................@..@.data.......P.......@..............@....rsrc...............................@..@.reloc.......0......................@..B........................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:data
                                                                                  Category:modified
                                                                                  Size (bytes):1412
                                                                                  Entropy (8bit):5.5357399609592175
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:Wg4Hqt6fI03ylTi6OZhEu6ANjWk/C9VvbkBSDvb6KHq8x/6+Xkb1f0xX6yGb6KHr:W0YQBA4Cs2tj+K1AX62tBG
                                                                                  MD5:BCCB88D76838A79BB167E1A9BCA8EC76
                                                                                  SHA1:31AEFB87740363C5504F35F2AA16B27B083954BD
                                                                                  SHA-256:E6FC1FAD4CD01B19039AB8C42EB7A57FDD11476876247B948CE856240742424E
                                                                                  SHA-512:117269B41B8D6B4F704639F12D5AF1CDEF7F0617B3369401E5B8B76A09230274536087EDC6797FB243F875AD532E5C508CA3DAE7CE4D10DEB6A5B7E176EAEFAC
                                                                                  Malicious:false
                                                                                  Preview:...@IXOS.@.....@c_.V.@.....@.....@.....@.....@.....@......&.{5E04AB3D-945E-4FDC-A15F-A16FAEACC06C}..UUIN RSTRROEUTR..Fatrr_UewhcWF.msi.@.....@.....@.....@........&.{4EACFE79-EFFB-4636-86E9-CECF9E2524A6}.....@.....@.....@.....@.......@.....@.....@.......@......UUIN RSTRROEUTR......Rollback..A.....o. .d.e. .r.e.s.t.a.u.r.a.....o.....RollbackCleanup..Removendo arquivos de backup..Arquivo: [1]...@.......@........ProcessComponents%.Atualizando o registro de componentes...@.....@.....@.]....&.{6E497D3B-DB84-4917-A984-13BA463D2AF8}?.C:\Users\user\AppData\Roaming\UUIN RSTRROEUTR\UUIN RSTRROEUTR\.@.......@.....@.....@......&.{FADF6E33-9191-4E1B-99FB-4E958F5FC0DA}4.01:\Software\UUIN RSTRROEUTR\UUIN RSTRROEUTR\Version.@.......@.....@.....@......&.{8FB416A0-C9BA-44AB-8B1F-8D07EF665C67}P.01:\Software\UUIN RSTRROEUTR\{5E04AB3D-945E-4FDC-A15F-A16FAEACC06C}\AI_IA_ENABLE.@.......@.....@.....@........CreateFolders..Criando novas pastas..Pasta: [1]".?.C:\Users\user\AppData\Roaming\UUIN RSTRROEUTR\UUIN
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):1.1654945483537515
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:JSbX72FjNkAGiLIlHVRpEh/7777777777777777777777777vDHFi2WL2IFc/L/z:J4QI5UVcWGF
                                                                                  MD5:CE282E2C20C8BCE889CEF85F8F82CF13
                                                                                  SHA1:0760370FCDA855EF5FE2D7A895D896DF1CF7CC57
                                                                                  SHA-256:AFA1E1AABB57804DBC393CE737F4FFEBA2C6DDE4A5E912BC16D3B4EAD3494ACE
                                                                                  SHA-512:63B35BBA246E095C385B54C7B7CE63ABDBF460F9ACCA0D692C082FC03A75398855363EB62C122EA1FD788F68EE47DE11C2D71377E08883436B8412A6EE07BFE2
                                                                                  Malicious:false
                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                  Category:dropped
                                                                                  Size (bytes):24576
                                                                                  Entropy (8bit):1.832833343081842
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:T8Ph5uRc06WXJSFT5qIa70DUj+7SKj+1AEKgCypykv8xqo8x4swXGcp4ru2xBxYE:6h51JFTQIy+7F++kCSMk87K4G1+7F+0
                                                                                  MD5:BE83F2F0279A63A809B33DB6DB05F43C
                                                                                  SHA1:D08DF19A13C7CB41D91BF165A1EE6C85AC4E8538
                                                                                  SHA-256:40D801ACB344C78A25D8F2E339DC77E170200AF36A6D7E42896A56E80BA2A5E0
                                                                                  SHA-512:53A7AC884862F2C9F11666E0CA88B5934B69BE93DAEDF5FFD8474A8C69E0748E1850AF131D22AEAE973E8EDEFD1E97D6625D7B3C142133523CA9A037949E39D2
                                                                                  Malicious:false
                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):192827
                                                                                  Entropy (8bit):5.3920160716202545
                                                                                  Encrypted:false
                                                                                  SSDEEP:3072:iHHJCoX5CNWFHjkzRl1pqf5JjzH6wbxygaK8Nkv6kF8Kwu8K8uBD556GIlZZ6bF+:i0LVlAA
                                                                                  MD5:E7133710F1F9C56CDBE00083629CD8DB
                                                                                  SHA1:7D2227AB994E1F5315AEE5C4DF22BBDAD62D9535
                                                                                  SHA-256:64395648165AC5D7BFBFA164DE385358CFF7177E660BCF14E40E434A9750876F
                                                                                  SHA-512:2D0AD74602777CD5233B9C214FAC23737BEF6C8BE2FDF8ABE52F008A01D3116684F89E260BBE2CE8E47D74AD9FC32E0859D63D56EDB795F1061D7534C5BC6950
                                                                                  Malicious:false
                                                                                  Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..07/23/2020 10:13:25.847 [3928]: Command line: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install Microsoft.VisualStudio.Tools.Applications.Hosting, Version=10.0.0.00000, Culture=neutral, PublicKeyToken=B03F5F7F11D50A3A /queue:3 /NoDependencies ..07/23/2020 10:13:25.863 [3928]: ngen returning 0x00000000..07/23/2020 10:13:25.925 [1900]: Command line: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install Microsoft.VisualStudio.Tools.Applications.ServerDocument, Version=10.0.0.00000, Culture=neutral, PublicKeyToken=B03F5F7F11D50A3A /queue:3 /NoDependencies ..07/23/2020 10:13:25.925 [1900]: ngen returning 0x00000000..07/23/2020 10:13:25.972 [4436]: Command line: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install Microsoft.Office.Tools.v4.0.Framework, Version=10.0.0.00000, Culture=neutral, PublicKeyToken=B03F5F7F11D50A3A /queue:3 /N
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                  Category:dropped
                                                                                  Size (bytes):24576
                                                                                  Entropy (8bit):1.832833343081842
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:T8Ph5uRc06WXJSFT5qIa70DUj+7SKj+1AEKgCypykv8xqo8x4swXGcp4ru2xBxYE:6h51JFTQIy+7F++kCSMk87K4G1+7F+0
                                                                                  MD5:BE83F2F0279A63A809B33DB6DB05F43C
                                                                                  SHA1:D08DF19A13C7CB41D91BF165A1EE6C85AC4E8538
                                                                                  SHA-256:40D801ACB344C78A25D8F2E339DC77E170200AF36A6D7E42896A56E80BA2A5E0
                                                                                  SHA-512:53A7AC884862F2C9F11666E0CA88B5934B69BE93DAEDF5FFD8474A8C69E0748E1850AF131D22AEAE973E8EDEFD1E97D6625D7B3C142133523CA9A037949E39D2
                                                                                  Malicious:false
                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):512
                                                                                  Entropy (8bit):0.0
                                                                                  Encrypted:false
                                                                                  SSDEEP:3::
                                                                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                  Malicious:false
                                                                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):32768
                                                                                  Entropy (8bit):0.072847580922046
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOi2adL2IFcY8tSVky6lV1:2F0i8n0itFzDHFi2WL2IFc/L/
                                                                                  MD5:2CD04518189452D5253B5CA33A9735D9
                                                                                  SHA1:8EC221C6FA6877B79C9538C08502DB9E237791B1
                                                                                  SHA-256:7BE4391DDDF44C35204DA2FF395480C08D17D0091EBF5833DAD59D82E165A78B
                                                                                  SHA-512:3B371223F3935D8595F746D992EB03EEDE8A6AD11A52E88D879FFC00B21CAC5FAC9D3BDDD3C67A745FF8A68DE673293BE1E915DC7F1C8476B8FDDD028D85874F
                                                                                  Malicious:false
                                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):512
                                                                                  Entropy (8bit):0.0
                                                                                  Encrypted:false
                                                                                  SSDEEP:3::
                                                                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                  Malicious:false
                                                                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                  Category:dropped
                                                                                  Size (bytes):49152
                                                                                  Entropy (8bit):1.2036358901766264
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:HBaI7T387Iy+7F++kCSMk87K4G1+7F+0:h57zXFzDGs
                                                                                  MD5:198D3337119DB257FA5D06C381864193
                                                                                  SHA1:0E2E4339484A8DBD8C094E18DAF854FEF7662370
                                                                                  SHA-256:ABA86CC0D095B2467434E2250E8E6CA383DB9A583DA8B129B24A268B0EECA0C8
                                                                                  SHA-512:B52EA28FF4AB617AA1115C6C5B530BBD16E19F400C4EF46C26AFC14497ABFC07A934AFFB17CE8D6B6853363D13CF1AE5E4C9D4C118C9F743B5FC3A6968371B3F
                                                                                  Malicious:false
                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):73728
                                                                                  Entropy (8bit):0.3028227972966795
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:tEzRT2j+7SKj+6j+7SKj+1AEKgCypykv8xqo8x4swXGcp4ru2xBxYxMxqxrxbxEJ:ya+7F+8+7F++kCSMk87K4GNH
                                                                                  MD5:0DD91C410C7756F774CA2FAE33FA0FA4
                                                                                  SHA1:270DA2E203E7B71A7CA6B15621D4C2F7E36BCD21
                                                                                  SHA-256:32235FF48BE743D1F3D5A3DC7E4863F7410A96ECF60F3BCE873B321FBE48BAE4
                                                                                  SHA-512:C44B8E1B2464BEEC4C08032D0D46B3D0D328C962E752CAD9FBC4D9191D111642ACCF76594807EA2D35EF70C10E7FFE14F31DCA2CB8CADD363462DA28EF847577
                                                                                  Malicious:false
                                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {4EACFE79-EFFB-4636-86E9-CECF9E2524A6}, Number of Words: 10, Subject: UUIN RSTRROEUTR, Author: UUIN RSTRROEUTR, Name of Creating Application: Advanced Installer 18.3 build e2a0201b, Template: ;1046, Comments: UUIN RSTRROEUTR, Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
                                                                                  Entropy (8bit):6.488775770786979
                                                                                  TrID:
                                                                                  • Windows SDK Setup Transform Script (63028/2) 47.91%
                                                                                  • Microsoft Windows Installer (60509/1) 46.00%
                                                                                  • Generic OLE2 / Multistream Compound File (8008/1) 6.09%
                                                                                  File name:Fatrr_UewhcWF.msi
                                                                                  File size:2'252'800 bytes
                                                                                  MD5:076682947cdb70a184620aed267a64e5
                                                                                  SHA1:49a78fd9ba854e7e2a16276cdd4188ade83ce384
                                                                                  SHA256:fcfa8b7b8dc0ef9d2a4baabcd78551c0ef1b2b505180d30ee1729298013b5204
                                                                                  SHA512:43e34ac7ccdf8861b8e4d6dceda852fc2ae548340f03055b24b43fe60079c6b391abfe05bdd3c824a6af6e78555795966f513906056c7d60547eb63ce205f123
                                                                                  SSDEEP:49152:2m5DxGSFVtaN4AyK8tKk5ojmrhCMz5vk3ukDln/hFRFNUEekBIWsRkn4frUMXjDA:vxM4AeKknz5vqu0sRe4frUMXjTY
                                                                                  TLSH:5CA58D1275CA8732EA7E8134A5AAD73621FA3FE01BB154DF53D4593A0EB05C242B2F17
                                                                                  File Content Preview:........................>...................#...................................................................................................................J...K...L...M...N...O...P...Q...R...S...T...U..................................................
                                                                                  Icon Hash:2d2e3797b32b2b99
                                                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                  192.168.2.354.198.235.949698802849814 06/28/23-11:59:26.808026TCP2849814ETPRO MALWARE TakeMyFile User-Agent4969880192.168.2.354.198.235.9
                                                                                  192.168.2.354.198.235.949698802849813 06/28/23-11:59:26.808026TCP2849813ETPRO MALWARE TakeMyFile Installer Checkin4969880192.168.2.354.198.235.9
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Jun 28, 2023 11:59:19.734811068 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:19.880330086 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:19.880470037 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:19.880568027 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:19.880738974 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.028831959 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:20.029001951 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:20.033425093 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:20.033519983 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.041246891 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.041246891 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.186165094 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:20.190954924 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:20.192019939 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.195630074 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.195630074 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.340396881 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:20.344896078 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:20.344993114 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.347153902 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.347235918 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.491894960 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:20.496581078 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:20.497339964 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.498967886 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.499056101 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.643743038 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:20.648226976 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:20.648317099 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.650125980 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.650168896 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.794931889 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:20.799293995 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:20.799619913 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.801671982 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.801738024 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.947312117 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:20.951879978 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:20.951980114 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.965895891 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:20.965943098 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:21.110753059 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:21.115596056 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:21.115688086 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:21.117192984 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:21.117192984 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:21.262067080 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:21.266661882 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:21.266808033 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:21.270152092 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:21.270153046 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:21.415079117 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:21.419419050 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:21.419574976 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:21.420922995 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:21.420922995 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:21.565717936 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:21.570180893 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:21.570306063 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:21.572173119 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:21.572211981 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:21.717025995 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:21.721196890 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:21.721502066 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:21.724052906 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:21.724121094 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:21.868777990 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:21.873471022 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:21.873744965 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:21.876401901 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:21.876401901 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.021140099 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:22.034540892 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:22.034709930 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.037369967 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.037437916 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.182156086 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:22.186919928 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:22.187118053 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.188186884 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.188225985 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.333084106 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:22.337660074 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:22.337959051 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.340310097 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.340451002 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.486139059 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:22.532136917 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:22.532243967 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.533828020 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.533871889 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.678723097 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:22.683301926 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:22.683453083 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.685344934 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.685376883 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.833430052 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:22.838324070 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:22.838558912 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.841305017 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.841438055 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.986242056 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:22.990664005 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:22.990833998 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.992186069 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:22.992186069 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:23.141467094 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:23.243037939 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:23.243264914 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:23.244498968 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:23.244546890 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:23.389270067 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:23.393836975 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:23.394017935 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:23.396625042 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:23.396727085 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:23.541475058 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:23.545558929 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:23.545686960 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:23.547868967 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:23.547938108 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:23.692711115 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:23.704056025 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:23.704157114 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:23.705996990 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:23.706034899 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:23.851080894 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:23.854576111 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:23.855550051 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:23.855837107 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:23.855873108 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.000596046 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:24.004755974 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:24.004837990 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.006185055 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.006223917 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.150945902 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:24.199446917 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:24.199536085 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.200870037 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.200907946 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.345755100 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:24.350294113 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:24.350379944 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.351911068 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.351990938 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.496781111 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:24.500977039 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:24.501070976 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.502922058 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.503031969 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.647759914 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:24.652072906 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:24.652251005 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.653465033 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.653502941 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.798285961 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:24.803061008 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:24.803210020 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.804680109 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.804718971 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.949423075 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:24.953893900 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:24.954802990 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.957423925 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:24.957518101 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:25.102246046 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:25.707835913 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:25.709933043 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:25.711179018 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:25.711179018 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:25.856167078 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:25.869736910 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:25.870104074 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:25.872939110 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:25.872939110 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:26.018019915 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:26.041735888 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:26.041980028 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:26.044327974 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:26.044327974 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:26.189094067 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:26.193871021 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:26.194175005 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:26.196824074 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:26.196918011 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:26.341691017 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:26.346458912 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:26.346740961 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:26.349838972 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:26.349963903 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:26.494699001 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:26.499509096 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:26.499687910 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:26.502446890 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:26.502542973 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:26.648169041 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:26.652754068 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:26.652992964 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:26.655591965 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:26.655658960 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:26.800443888 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:26.805027962 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:26.805300951 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:26.808026075 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:26.808090925 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:26.952732086 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:26.968133926 CEST804969854.198.235.9192.168.2.3
                                                                                  Jun 28, 2023 11:59:26.968388081 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:27.146084070 CEST4969880192.168.2.354.198.235.9
                                                                                  Jun 28, 2023 11:59:42.403894901 CEST4969980192.168.2.320.165.170.228
                                                                                  Jun 28, 2023 11:59:42.548702955 CEST804969920.165.170.228192.168.2.3
                                                                                  Jun 28, 2023 11:59:42.549962044 CEST4969980192.168.2.320.165.170.228
                                                                                  Jun 28, 2023 11:59:42.550473928 CEST4969980192.168.2.320.165.170.228
                                                                                  Jun 28, 2023 11:59:42.695920944 CEST804969920.165.170.228192.168.2.3
                                                                                  Jun 28, 2023 11:59:42.961000919 CEST804969920.165.170.228192.168.2.3
                                                                                  Jun 28, 2023 11:59:43.012453079 CEST4969980192.168.2.320.165.170.228
                                                                                  Jun 28, 2023 11:59:47.966221094 CEST804969920.165.170.228192.168.2.3
                                                                                  Jun 28, 2023 11:59:47.966331959 CEST4969980192.168.2.320.165.170.228
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Jun 28, 2023 11:59:19.702387094 CEST5692453192.168.2.38.8.8.8
                                                                                  Jun 28, 2023 11:59:19.732975960 CEST53569248.8.8.8192.168.2.3
                                                                                  Jun 28, 2023 11:59:43.008497953 CEST6062553192.168.2.38.8.8.8
                                                                                  Jun 28, 2023 11:59:43.029006958 CEST53606258.8.8.8192.168.2.3
                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                  Jun 28, 2023 11:59:19.702387094 CEST192.168.2.38.8.8.80xb3d4Standard query (0)collect.installeranalytics.comA (IP address)IN (0x0001)false
                                                                                  Jun 28, 2023 11:59:43.008497953 CEST192.168.2.38.8.8.80xc97eStandard query (0)amxx1515cabreun23.asxoA (IP address)IN (0x0001)false
                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                  Jun 28, 2023 11:59:19.732975960 CEST8.8.8.8192.168.2.30xb3d4No error (0)collect.installeranalytics.com54.198.235.9A (IP address)IN (0x0001)false
                                                                                  Jun 28, 2023 11:59:19.732975960 CEST8.8.8.8192.168.2.30xb3d4No error (0)collect.installeranalytics.com52.73.64.126A (IP address)IN (0x0001)false
                                                                                  Jun 28, 2023 11:59:43.029006958 CEST8.8.8.8192.168.2.30xc97eName error (3)amxx1515cabreun23.asxononenoneA (IP address)IN (0x0001)false
                                                                                  • collect.installeranalytics.com
                                                                                  • 20.165.170.228
                                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                  0192.168.2.34969854.198.235.980C:\Windows\SysWOW64\msiexec.exe
                                                                                  TimestampkBytes transferredDirectionData
                                                                                  Jun 28, 2023 11:59:19.880568027 CEST1180OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 167
                                                                                  Cache-Control: no-cache
                                                                                  Jun 28, 2023 11:59:19.880738974 CEST1180OUTData Raw: 71 74 3d 34 38 35 35 31 38 37 26 74 3d 6c 69 66 65 63 79 63 6c 65 26 6c 63 3d 73 74 61 72 74 26 76 3d 33 26 61 69 64 3d 36 34 39 61 62 63 31 38 30 65 36 63 65 39 34 30 31 64 36 65 38 31 63 66 26 61 76 3d 37 2e 38 2e 36 2e 37 26 63 69 64 3d 37 44
                                                                                  Data Ascii: qt=4855187&t=lifecycle&lc=start&v=3&aid=649abc180e6ce9401d6e81cf&av=7.8.6.7&cid=7D2E30BECC9DF42122B47B83C0F9D9F226A6C78B&sid=%7BFA015603-7D74-4142-8F3D-91E0218EBBFB%7D
                                                                                  Jun 28, 2023 11:59:20.033425093 CEST1205INHTTP/1.1 200 OK
                                                                                  Cache-control: no-cache="set-cookie"
                                                                                  Date: Wed, 28 Jun 2023 09:59:19 GMT
                                                                                  Set-Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7;PATH=/;MAX-AGE=600
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:20.041246891 CEST1206OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 179
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:20.041246891 CEST1206OUTData Raw: 71 74 3d 34 38 35 35 35 34 36 26 74 3d 70 72 6f 70 65 72 74 79 26 6c 62 3d 56 65 72 73 69 6f 6e 4e 54 26 76 61 6c 3d 31 30 30 30 26 76 3d 33 26 61 69 64 3d 36 34 39 61 62 63 31 38 30 65 36 63 65 39 34 30 31 64 36 65 38 31 63 66 26 61 76 3d 37 2e
                                                                                  Data Ascii: qt=4855546&t=property&lb=VersionNT&val=1000&v=3&aid=649abc180e6ce9401d6e81cf&av=7.8.6.7&cid=7D2E30BECC9DF42122B47B83C0F9D9F226A6C78B&sid=%7BFA015603-7D74-4142-8F3D-91E0218EBBFB%7D
                                                                                  Jun 28, 2023 11:59:20.190954924 CEST1207INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:20 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:20.195630074 CEST1207OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 181
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:20.195630074 CEST1207OUTData Raw: 71 74 3d 34 38 35 35 36 38 37 26 74 3d 70 72 6f 70 65 72 74 79 26 6c 62 3d 56 65 72 73 69 6f 6e 4e 54 36 34 26 76 61 6c 3d 31 30 30 30 26 76 3d 33 26 61 69 64 3d 36 34 39 61 62 63 31 38 30 65 36 63 65 39 34 30 31 64 36 65 38 31 63 66 26 61 76 3d
                                                                                  Data Ascii: qt=4855687&t=property&lb=VersionNT64&val=1000&v=3&aid=649abc180e6ce9401d6e81cf&av=7.8.6.7&cid=7D2E30BECC9DF42122B47B83C0F9D9F226A6C78B&sid=%7BFA015603-7D74-4142-8F3D-91E0218EBBFB%7D
                                                                                  Jun 28, 2023 11:59:20.344896078 CEST1208INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:20 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:20.347153902 CEST1208OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 184
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:20.347235918 CEST1208OUTData Raw: 71 74 3d 34 38 35 35 38 39 30 26 74 3d 70 72 6f 70 65 72 74 79 26 6c 62 3d 50 68 79 73 69 63 61 6c 4d 65 6d 6f 72 79 26 76 61 6c 3d 38 31 39 31 26 76 3d 33 26 61 69 64 3d 36 34 39 61 62 63 31 38 30 65 36 63 65 39 34 30 31 64 36 65 38 31 63 66 26
                                                                                  Data Ascii: qt=4855890&t=property&lb=PhysicalMemory&val=8191&v=3&aid=649abc180e6ce9401d6e81cf&av=7.8.6.7&cid=7D2E30BECC9DF42122B47B83C0F9D9F226A6C78B&sid=%7BFA015603-7D74-4142-8F3D-91E0218EBBFB%7D
                                                                                  Jun 28, 2023 11:59:20.496581078 CEST1209INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:20 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:20.498967886 CEST1209OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 180
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:20.499056101 CEST1209OUTData Raw: 71 74 3d 34 38 35 36 30 34 36 26 74 3d 70 72 6f 70 65 72 74 79 26 6c 62 3d 56 65 72 73 69 6f 6e 4d 73 69 26 76 61 6c 3d 35 2e 30 30 26 76 3d 33 26 61 69 64 3d 36 34 39 61 62 63 31 38 30 65 36 63 65 39 34 30 31 64 36 65 38 31 63 66 26 61 76 3d 37
                                                                                  Data Ascii: qt=4856046&t=property&lb=VersionMsi&val=5.00&v=3&aid=649abc180e6ce9401d6e81cf&av=7.8.6.7&cid=7D2E30BECC9DF42122B47B83C0F9D9F226A6C78B&sid=%7BFA015603-7D74-4142-8F3D-91E0218EBBFB%7D
                                                                                  Jun 28, 2023 11:59:20.648226976 CEST1209INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:20 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:20.650125980 CEST1210OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 174
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:20.650168896 CEST1210OUTData Raw: 71 74 3d 34 38 35 36 31 38 37 26 74 3d 70 72 6f 70 65 72 74 79 26 6c 62 3d 55 49 4c 65 76 65 6c 26 76 61 6c 3d 33 26 76 3d 33 26 61 69 64 3d 36 34 39 61 62 63 31 38 30 65 36 63 65 39 34 30 31 64 36 65 38 31 63 66 26 61 76 3d 37 2e 38 2e 36 2e 37
                                                                                  Data Ascii: qt=4856187&t=property&lb=UILevel&val=3&v=3&aid=649abc180e6ce9401d6e81cf&av=7.8.6.7&cid=7D2E30BECC9DF42122B47B83C0F9D9F226A6C78B&sid=%7BFA015603-7D74-4142-8F3D-91E0218EBBFB%7D
                                                                                  Jun 28, 2023 11:59:20.799293995 CEST1210INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:20 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:20.801671982 CEST1211OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 183
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:20.801738024 CEST1211OUTData Raw: 71 74 3d 34 38 35 36 33 34 33 26 74 3d 70 72 6f 70 65 72 74 79 26 6c 62 3d 56 69 72 74 75 61 6c 4d 65 6d 6f 72 79 26 76 61 6c 3d 36 38 37 36 26 76 3d 33 26 61 69 64 3d 36 34 39 61 62 63 31 38 30 65 36 63 65 39 34 30 31 64 36 65 38 31 63 66 26 61
                                                                                  Data Ascii: qt=4856343&t=property&lb=VirtualMemory&val=6876&v=3&aid=649abc180e6ce9401d6e81cf&av=7.8.6.7&cid=7D2E30BECC9DF42122B47B83C0F9D9F226A6C78B&sid=%7BFA015603-7D74-4142-8F3D-91E0218EBBFB%7D
                                                                                  Jun 28, 2023 11:59:20.951879978 CEST1211INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:20 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:20.965895891 CEST1212OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 183
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:20.965943098 CEST1212OUTData Raw: 71 74 3d 34 38 35 36 35 30 30 26 74 3d 70 72 6f 70 65 72 74 79 26 6c 62 3d 4d 73 69 4e 54 50 72 6f 64 75 63 74 54 79 70 65 26 76 61 6c 3d 31 26 76 3d 33 26 61 69 64 3d 36 34 39 61 62 63 31 38 30 65 36 63 65 39 34 30 31 64 36 65 38 31 63 66 26 61
                                                                                  Data Ascii: qt=4856500&t=property&lb=MsiNTProductType&val=1&v=3&aid=649abc180e6ce9401d6e81cf&av=7.8.6.7&cid=7D2E30BECC9DF42122B47B83C0F9D9F226A6C78B&sid=%7BFA015603-7D74-4142-8F3D-91E0218EBBFB%7D
                                                                                  Jun 28, 2023 11:59:21.115596056 CEST1212INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:21 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:21.117192984 CEST1213OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 183
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:21.117192984 CEST1213OUTData Raw: 71 74 3d 34 38 35 36 36 34 30 26 74 3d 70 72 6f 70 65 72 74 79 26 6c 62 3d 53 65 72 76 69 63 65 50 61 63 6b 4c 65 76 65 6c 26 76 61 6c 3d 30 26 76 3d 33 26 61 69 64 3d 36 34 39 61 62 63 31 38 30 65 36 63 65 39 34 30 31 64 36 65 38 31 63 66 26 61
                                                                                  Data Ascii: qt=4856640&t=property&lb=ServicePackLevel&val=0&v=3&aid=649abc180e6ce9401d6e81cf&av=7.8.6.7&cid=7D2E30BECC9DF42122B47B83C0F9D9F226A6C78B&sid=%7BFA015603-7D74-4142-8F3D-91E0218EBBFB%7D
                                                                                  Jun 28, 2023 11:59:21.266661882 CEST1213INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:21 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:21.270152092 CEST1214OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 185
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:21.270153046 CEST1214OUTData Raw: 71 74 3d 34 38 35 36 37 39 36 26 74 3d 70 72 6f 70 65 72 74 79 26 6c 62 3d 50 72 6f 64 75 63 74 4c 61 6e 67 75 61 67 65 26 76 61 6c 3d 31 30 34 36 26 76 3d 33 26 61 69 64 3d 36 34 39 61 62 63 31 38 30 65 36 63 65 39 34 30 31 64 36 65 38 31 63 66
                                                                                  Data Ascii: qt=4856796&t=property&lb=ProductLanguage&val=1046&v=3&aid=649abc180e6ce9401d6e81cf&av=7.8.6.7&cid=7D2E30BECC9DF42122B47B83C0F9D9F226A6C78B&sid=%7BFA015603-7D74-4142-8F3D-91E0218EBBFB%7D
                                                                                  Jun 28, 2023 11:59:21.419419050 CEST1214INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:21 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:21.420922995 CEST1215OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 197
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:21.570180893 CEST1215INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:21 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:21.572173119 CEST1216OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 192
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:21.721196890 CEST1216INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:21 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:21.724052906 CEST1217OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 195
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:21.873471022 CEST1217INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:21 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:21.876401901 CEST1218OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 201
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:22.034540892 CEST1218INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:21 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:22.037369967 CEST1219OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 192
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:22.186919928 CEST1219INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:22 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:22.188186884 CEST1220OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 194
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:22.337660074 CEST1220INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:22 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:22.340310097 CEST1221OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 210
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:22.532136917 CEST1221INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:22 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:22.533828020 CEST1222OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 211
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:22.683301926 CEST1222INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:22 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:22.685344934 CEST1222OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 193
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:22.838324070 CEST1223INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:22 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:22.841305017 CEST1223OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 207
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:22.990664005 CEST1224INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:22 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:22.992186069 CEST1224OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 199
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:23.243037939 CEST1225INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:23 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:23.244498968 CEST1225OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 201
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:23.393836975 CEST1226INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:23 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:23.396625042 CEST1226OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 201
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:23.545558929 CEST1227INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:23 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:23.547868967 CEST1227OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 203
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:23.704056025 CEST1228INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:23 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:23.705996990 CEST1228OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 202
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:23.854576111 CEST1229INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:23 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:23.855837107 CEST1229OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 204
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:24.004755974 CEST1230INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:23 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:24.006185055 CEST1230OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 204
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:24.199446917 CEST1231INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:24 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:24.200870037 CEST1231OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 207
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:24.350294113 CEST1232INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:24 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:24.351911068 CEST1232OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 206
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:24.500977039 CEST1233INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:24 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:24.502922058 CEST1233OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 201
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:24.652072906 CEST1234INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:24 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:24.653465033 CEST1234OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 208
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:24.803061008 CEST1235INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:24 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:24.804680109 CEST1235OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 212
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:24.953893900 CEST1236INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:24 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:24.957423925 CEST1236OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 191
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:25.707835913 CEST1237INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:25 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:25.711179018 CEST1237OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 183
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:25.869736910 CEST1238INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:25 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:25.872939110 CEST1238OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 176
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:26.041735888 CEST1238INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:25 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:26.044327974 CEST1239OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 184
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:26.193871021 CEST1239INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:26 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:26.196824074 CEST1240OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 184
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:26.346458912 CEST1240INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:26 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:26.349838972 CEST1241OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 172
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:26.499509096 CEST1241INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:26 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:26.502446890 CEST1242OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 179
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:26.652754068 CEST1242INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:26 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:26.655591965 CEST1243OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 219
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:26.805027962 CEST1243INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:26 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive
                                                                                  Jun 28, 2023 11:59:26.808026075 CEST1244OUTPOST / HTTP/1.1
                                                                                  Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                  User-Agent: AdvinstAnalytics/1.0 (Microsoft Windows NT 10.0.17134 ; x64)
                                                                                  Host: collect.installeranalytics.com
                                                                                  Content-Length: 181
                                                                                  Cache-Control: no-cache
                                                                                  Cookie: AWSELB=D7177B5704D1BF661882EF94F6A835B9FB0EACE97C49CE22FDEE1CA1001AFF5F71AA12E5F06B26C30D4C68D2091FE6ED40F621B6434D87C1489153A94C392995E08A8228A7
                                                                                  Jun 28, 2023 11:59:26.968133926 CEST1244INHTTP/1.1 200 OK
                                                                                  Date: Wed, 28 Jun 2023 09:59:26 GMT
                                                                                  X-Powered-By: Express
                                                                                  Content-Length: 0
                                                                                  Connection: keep-alive


                                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                  1192.168.2.34969920.165.170.22880C:\Users\Public\Documents\identity_helper.exe
                                                                                  TimestampkBytes transferredDirectionData
                                                                                  Jun 28, 2023 11:59:42.550473928 CEST1245OUTGET /MARA01/index.php?VS=MARA01&PL=NAO HTTP/1.1
                                                                                  User-Agent: "Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.108 Safari/537.36"
                                                                                  Host: 20.165.170.228
                                                                                  Connection: Keep-Alive
                                                                                  Jun 28, 2023 11:59:42.961000919 CEST1245INHTTP/1.1 302 Found
                                                                                  Date: Wed, 28 Jun 2023 09:59:42 GMT
                                                                                  Server: Apache/2.4.29 (Ubuntu)
                                                                                  Location: https://amxx1515cabreun23.asxo/
                                                                                  Content-Length: 6
                                                                                  Keep-Alive: timeout=5, max=100
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Data Raw: 5a 75 72 69 63 68
                                                                                  Data Ascii: Zurich


                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:0
                                                                                  Start time:11:59:02
                                                                                  Start date:28/06/2023
                                                                                  Path:C:\Windows\System32\msiexec.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Fatrr_UewhcWF.msi"
                                                                                  Imagebase:0x7ff7d8f70000
                                                                                  File size:66'048 bytes
                                                                                  MD5 hash:4767B71A318E201188A0D0A420C8B608
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  Target ID:1
                                                                                  Start time:11:59:02
                                                                                  Start date:28/06/2023
                                                                                  Path:C:\Windows\System32\msiexec.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\msiexec.exe /V
                                                                                  Imagebase:0x7ff7d8f70000
                                                                                  File size:66'048 bytes
                                                                                  MD5 hash:4767B71A318E201188A0D0A420C8B608
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  Target ID:2
                                                                                  Start time:11:59:03
                                                                                  Start date:28/06/2023
                                                                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding C78C18F24792FB2CF3D3274F6B2C7332
                                                                                  Imagebase:0xa70000
                                                                                  File size:59'904 bytes
                                                                                  MD5 hash:12C17B5A5C2A7B97342C362CA467E9A2
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  Target ID:3
                                                                                  Start time:11:59:19
                                                                                  Start date:28/06/2023
                                                                                  Path:C:\Users\Public\Documents\identity_helper.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\Public\Documents\identity_helper.exe"
                                                                                  Imagebase:0xfe0000
                                                                                  File size:1'103'264 bytes
                                                                                  MD5 hash:216FBFDD15F983EE770F1A135EDA572C
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:.Net C# or VB.NET
                                                                                  Antivirus matches:
                                                                                  • Detection: 0%, ReversingLabs
                                                                                  Reputation:low

                                                                                  Target ID:4
                                                                                  Start time:11:59:27
                                                                                  Start date:28/06/2023
                                                                                  Path:C:\Users\Public\Documents\identity_helper.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\Public\Documents\identity_helper.exe"
                                                                                  Imagebase:0xfe0000
                                                                                  File size:1'103'264 bytes
                                                                                  MD5 hash:216FBFDD15F983EE770F1A135EDA572C
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:.Net C# or VB.NET
                                                                                  Reputation:low

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:2.7%
                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                    Signature Coverage:11.4%
                                                                                    Total number of Nodes:621
                                                                                    Total number of Limit Nodes:39
                                                                                    execution_graph 33993 1091629 33994 109163e 33993->33994 34040 104ad00 33994->34040 33997 109166d 34049 104ac80 33997->34049 33999 10916d4 34000 104ac80 ___std_exception_copy 11 API calls 33999->34000 34012 1091673 34000->34012 34001 104ad00 _unexpected 130 API calls 34004 1091677 34001->34004 34002 10916e3 34053 10915a2 11 API calls ___std_exception_copy 34002->34053 34004->33999 34004->34001 34004->34002 34006 10916fe 34004->34006 34008 104ac80 ___std_exception_copy 11 API calls 34004->34008 34005 10916e9 34007 104ac80 ___std_exception_copy 11 API calls 34005->34007 34045 109c342 IsProcessorFeaturePresent 34006->34045 34010 10916f0 34007->34010 34008->34004 34011 104ac80 ___std_exception_copy 11 API calls 34010->34011 34011->34012 34013 104ad00 _unexpected 130 API calls 34015 109176a 34013->34015 34014 109170a 34014->34013 34016 1091772 34015->34016 34025 109177c 34015->34025 34017 104ac80 ___std_exception_copy 11 API calls 34016->34017 34033 1091778 34017->34033 34018 10917f1 34019 104ac80 ___std_exception_copy 11 API calls 34018->34019 34019->34033 34020 104ad00 _unexpected 130 API calls 34020->34025 34021 1091801 34055 10915a2 11 API calls ___std_exception_copy 34021->34055 34024 1091807 34026 104ac80 ___std_exception_copy 11 API calls 34024->34026 34025->34018 34025->34020 34025->34021 34027 109181c 34025->34027 34029 104ac80 ___std_exception_copy 11 API calls 34025->34029 34054 109e30f 15 API calls 34025->34054 34028 109180f 34026->34028 34030 109c342 11 API calls 34027->34030 34031 104ac80 ___std_exception_copy 11 API calls 34028->34031 34029->34025 34034 1091828 34030->34034 34031->34033 34032 109189a 34034->34032 34035 104ad00 _unexpected 130 API calls 34034->34035 34037 109189e 34034->34037 34039 104ac80 ___std_exception_copy 11 API calls 34034->34039 34056 10a11db 170 API calls 3 library calls 34034->34056 34035->34034 34036 104ac80 ___std_exception_copy 11 API calls 34036->34032 34037->34036 34039->34034 34041 104ad10 34040->34041 34042 104ad41 34041->34042 34057 1069290 34041->34057 34087 106b1f0 EnterCriticalSection LeaveCriticalSection ___std_exception_copy 34041->34087 34042->33997 34042->34004 34046 109c34e 34045->34046 34354 109c376 34046->34354 34050 104ac97 34049->34050 34360 106ab40 34050->34360 34051 104ac9d 34051->34012 34053->34005 34054->34025 34055->34024 34056->34034 34058 10692b4 34057->34058 34059 10694be 34057->34059 34058->34059 34063 10692c3 34058->34063 34095 106af20 34059->34095 34061 10697e8 ReleaseSRWLockExclusive 34073 1069739 34061->34073 34062 1069435 TryAcquireSRWLockExclusive 34064 1069450 34062->34064 34069 1069457 34062->34069 34063->34062 34072 106937e 34063->34072 34063->34073 34076 10694cb 34063->34076 34123 105c5a0 TryAcquireSRWLockExclusive AcquireSRWLockExclusive 34064->34123 34066 10696b1 34101 1073e90 34066->34101 34068 10694f0 TryAcquireSRWLockExclusive 34071 106950e 34068->34071 34079 1069515 34068->34079 34069->34066 34070 1069601 ReleaseSRWLockExclusive 34069->34070 34069->34073 34070->34079 34124 105c5a0 TryAcquireSRWLockExclusive AcquireSRWLockExclusive 34071->34124 34072->34076 34080 106939f _unexpected 34072->34080 34073->34061 34126 105c370 5 API calls CatchGuardHandler 34073->34126 34075 10696c9 34075->34073 34077 1073e90 125 API calls 34075->34077 34076->34068 34077->34073 34078 1069658 ReleaseSRWLockExclusive 34078->34066 34079->34073 34079->34075 34079->34078 34081 1069417 34080->34081 34084 10695b5 34080->34084 34088 1082573 34081->34088 34125 105c370 5 API calls CatchGuardHandler 34084->34125 34085 106942b 34085->34041 34087->34041 34089 108257b 34088->34089 34090 108257c IsProcessorFeaturePresent 34088->34090 34089->34085 34092 1082671 34090->34092 34127 1082756 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 34092->34127 34094 1082754 34094->34085 34098 106af40 _unexpected 34095->34098 34096 1082573 CatchGuardHandler 5 API calls 34097 106b060 34096->34097 34097->34076 34100 106b049 34098->34100 34128 105c730 TryAcquireSRWLockExclusive 34098->34128 34100->34096 34102 1073f6d 34101->34102 34112 1073ec2 34101->34112 34120 1073f30 34102->34120 34167 1074660 130 API calls 34102->34167 34104 1082573 CatchGuardHandler 5 API calls 34105 1073f61 34104->34105 34105->34075 34106 1074638 34107 1074645 ReleaseSRWLockExclusive 34106->34107 34106->34120 34170 105c9a0 GetCurrentProcess IsWow64Process RaiseException 34107->34170 34108 1074120 34141 1076160 34108->34141 34109 1073ee9 34109->34108 34117 1073f07 34109->34117 34109->34120 34112->34120 34121 1073edd 34112->34121 34156 1074b40 34112->34156 34115 107420d 34115->34120 34169 105c930 VirtualFree GetLastError 34115->34169 34117->34120 34168 105c370 5 API calls CatchGuardHandler 34117->34168 34119 1074514 ReleaseSRWLockExclusive 34119->34121 34120->34104 34121->34106 34121->34109 34122 107435a 34122->34119 34122->34121 34123->34069 34124->34079 34125->34069 34126->34073 34127->34094 34129 105c74e 34128->34129 34130 105c768 34128->34130 34132 105c757 ReleaseSRWLockExclusive 34129->34132 34135 105c778 34129->34135 34139 105c5a0 TryAcquireSRWLockExclusive AcquireSRWLockExclusive 34130->34139 34133 105c91c 34132->34133 34133->34100 34134 105c923 34135->34134 34140 105b910 8 API calls 34135->34140 34137 105c8e2 34138 105c8f7 ReleaseSRWLockExclusive 34137->34138 34138->34133 34139->34129 34140->34137 34142 1076172 34141->34142 34143 107617e 34141->34143 34142->34143 34144 10761b0 VirtualFree 34142->34144 34148 107641a 34142->34148 34171 1075a70 VirtualAlloc 34143->34171 34146 10761a5 34144->34146 34146->34115 34149 107654b 34148->34149 34153 107656d 34148->34153 34204 101f8ac 130 API calls 34148->34204 34205 1020450 5 API calls CatchGuardHandler 34148->34205 34150 1082573 CatchGuardHandler 5 API calls 34149->34150 34151 1076561 34150->34151 34151->34115 34154 1082573 CatchGuardHandler 5 API calls 34153->34154 34155 107660c 34154->34155 34155->34115 34157 1074b53 34156->34157 34158 1074bda 34157->34158 34166 1074b9b 34157->34166 34206 10758f0 34157->34206 34165 1074be2 34158->34165 34209 1075910 6 API calls 34158->34209 34160 1074c2b 34160->34158 34161 1074cb9 34160->34161 34160->34165 34164 10758f0 130 API calls 34161->34164 34163 10758f0 130 API calls 34163->34166 34164->34165 34165->34122 34166->34160 34166->34163 34166->34165 34167->34121 34168->34120 34169->34120 34172 1075a9a 34171->34172 34176 1075cd2 34171->34176 34173 1075ab8 GetLastError 34172->34173 34172->34176 34174 1075ad4 Sleep VirtualAlloc 34173->34174 34175 1075ac9 34173->34175 34174->34176 34177 1075af2 GetLastError 34174->34177 34175->34174 34175->34176 34176->34146 34178 1075b03 34177->34178 34179 1075b0e Sleep VirtualAlloc 34177->34179 34178->34176 34178->34179 34179->34176 34180 1075b2c GetLastError 34179->34180 34181 1075b3d 34180->34181 34182 1075b48 Sleep VirtualAlloc 34180->34182 34181->34176 34181->34182 34182->34176 34183 1075b66 GetLastError 34182->34183 34184 1075b77 34183->34184 34185 1075b82 Sleep VirtualAlloc 34183->34185 34184->34176 34184->34185 34185->34176 34186 1075ba0 GetLastError 34185->34186 34187 1075bb1 34186->34187 34188 1075bbc Sleep VirtualAlloc 34186->34188 34187->34176 34187->34188 34188->34176 34189 1075bda GetLastError 34188->34189 34190 1075bf6 Sleep VirtualAlloc 34189->34190 34191 1075beb 34189->34191 34190->34176 34192 1075c14 GetLastError 34190->34192 34191->34176 34191->34190 34193 1075c25 34192->34193 34194 1075c30 Sleep VirtualAlloc 34192->34194 34193->34176 34193->34194 34194->34176 34195 1075c4e GetLastError 34194->34195 34196 1075c66 Sleep VirtualAlloc 34195->34196 34197 1075c5f 34195->34197 34196->34176 34198 1075c80 GetLastError 34196->34198 34197->34176 34197->34196 34199 1075c91 34198->34199 34200 1075c98 Sleep VirtualAlloc 34198->34200 34199->34176 34199->34200 34200->34176 34201 1075cb2 GetLastError 34200->34201 34202 1075cc3 34201->34202 34203 1075cca Sleep 34201->34203 34202->34176 34202->34203 34203->34176 34205->34148 34210 1075ce0 VirtualFree 34206->34210 34208 10758fe 34208->34157 34209->34165 34211 1075cf7 34210->34211 34212 1075d03 34210->34212 34211->34208 34213 1075d76 VirtualFree 34212->34213 34214 10760d7 34212->34214 34215 1075ff3 34212->34215 34219 1075a70 30 API calls 34212->34219 34236 1075d94 34212->34236 34220 1075d87 GetLastError 34213->34220 34221 1075d91 34213->34221 34217 1075a70 30 API calls 34214->34217 34216 1075a70 30 API calls 34215->34216 34223 1076028 34216->34223 34224 10760ff 34217->34224 34218 1075a70 30 API calls 34218->34236 34222 1075d55 34219->34222 34220->34221 34220->34236 34221->34208 34222->34221 34230 1075d5c GetLastError 34222->34230 34225 107602f 34223->34225 34226 107603a GetLastError 34223->34226 34224->34225 34227 107610c GetLastError 34224->34227 34225->34208 34226->34225 34234 107605c TryAcquireSRWLockExclusive 34226->34234 34227->34225 34235 107611d 34227->34235 34228 1075f74 GetLastError 34228->34236 34229 1075f8c 34229->34208 34231 1075d6f 34230->34231 34232 1075d69 34230->34232 34231->34213 34231->34221 34343 1065090 RaiseException 34232->34343 34238 1076075 34234->34238 34239 107606b 34234->34239 34240 1075a70 30 API calls 34235->34240 34236->34214 34236->34215 34236->34218 34236->34228 34236->34229 34236->34235 34245 1075efe VirtualFree 34236->34245 34248 10761b0 VirtualFree 34236->34248 34261 1075fd0 34236->34261 34242 10760b5 ReleaseSRWLockExclusive 34238->34242 34243 107607e VirtualFree 34238->34243 34344 105c5a0 TryAcquireSRWLockExclusive AcquireSRWLockExclusive 34239->34344 34246 10761a5 34240->34246 34242->34214 34244 10760c8 34242->34244 34243->34235 34247 107609a 34243->34247 34244->34214 34244->34235 34244->34248 34250 107641a 34244->34250 34245->34236 34251 1075fa2 34245->34251 34246->34208 34247->34242 34248->34246 34252 107654b 34250->34252 34258 107656d 34250->34258 34345 101f8ac 130 API calls 34250->34345 34346 1020450 5 API calls CatchGuardHandler 34250->34346 34292 1075da0 34251->34292 34254 1082573 CatchGuardHandler 5 API calls 34252->34254 34256 1076561 34254->34256 34255 1075fc9 34255->34208 34256->34208 34259 1082573 CatchGuardHandler 5 API calls 34258->34259 34260 107660c 34259->34260 34260->34208 34262 1075fe7 34261->34262 34263 10760d7 34262->34263 34264 10761b0 VirtualFree 34262->34264 34265 1075a70 30 API calls 34262->34265 34281 107611d 34262->34281 34267 1075a70 30 API calls 34263->34267 34268 10761a5 34264->34268 34269 1076028 34265->34269 34266 1075a70 30 API calls 34266->34268 34270 10760ff 34267->34270 34268->34236 34271 107602f 34269->34271 34272 107603a GetLastError 34269->34272 34270->34271 34273 107610c GetLastError 34270->34273 34271->34236 34272->34271 34274 107605c TryAcquireSRWLockExclusive 34272->34274 34273->34271 34273->34281 34275 1076075 34274->34275 34276 107606b 34274->34276 34278 10760b5 ReleaseSRWLockExclusive 34275->34278 34279 107607e VirtualFree 34275->34279 34347 105c5a0 TryAcquireSRWLockExclusive AcquireSRWLockExclusive 34276->34347 34278->34263 34280 10760c8 34278->34280 34279->34281 34282 107609a 34279->34282 34280->34263 34280->34264 34280->34281 34284 107641a 34280->34284 34281->34266 34282->34278 34285 107654b 34284->34285 34289 107656d 34284->34289 34348 101f8ac 130 API calls 34284->34348 34349 1020450 5 API calls CatchGuardHandler 34284->34349 34286 1082573 CatchGuardHandler 5 API calls 34285->34286 34287 1076561 34286->34287 34287->34236 34290 1082573 CatchGuardHandler 5 API calls 34289->34290 34291 107660c 34290->34291 34291->34236 34293 1075dca 34292->34293 34294 1075dba 34292->34294 34296 1075fd0 120 API calls 34293->34296 34350 107f640 13 API calls 34294->34350 34298 1075ddc 34296->34298 34297 1075dc1 34297->34293 34299 1075e08 34298->34299 34300 1075df2 VirtualFree 34298->34300 34301 1075f88 34298->34301 34299->34301 34303 1075fd0 120 API calls 34299->34303 34300->34299 34302 1075fa2 34300->34302 34301->34255 34305 1075da0 120 API calls 34302->34305 34304 1075e3d 34303->34304 34304->34301 34306 1075e53 VirtualFree 34304->34306 34310 1075e69 34304->34310 34307 1075fc9 34305->34307 34306->34302 34306->34310 34307->34255 34308 1075fd0 120 API calls 34308->34310 34309 1075efe VirtualFree 34309->34302 34309->34310 34310->34301 34310->34302 34310->34308 34310->34309 34311 1075ff3 34310->34311 34312 10760d7 34310->34312 34313 10761b0 VirtualFree 34310->34313 34318 1075a70 30 API calls 34310->34318 34324 1075f74 GetLastError 34310->34324 34332 107611d 34310->34332 34314 1075a70 30 API calls 34311->34314 34316 1075a70 30 API calls 34312->34316 34317 10761a5 34313->34317 34319 1076028 34314->34319 34315 1075a70 30 API calls 34315->34317 34320 10760ff 34316->34320 34317->34255 34318->34310 34321 107602f 34319->34321 34322 107603a GetLastError 34319->34322 34320->34321 34323 107610c GetLastError 34320->34323 34321->34255 34322->34321 34325 107605c TryAcquireSRWLockExclusive 34322->34325 34323->34321 34323->34332 34324->34310 34326 1076075 34325->34326 34327 107606b 34325->34327 34329 10760b5 ReleaseSRWLockExclusive 34326->34329 34330 107607e VirtualFree 34326->34330 34351 105c5a0 TryAcquireSRWLockExclusive AcquireSRWLockExclusive 34327->34351 34329->34312 34331 10760c8 34329->34331 34330->34332 34333 107609a 34330->34333 34331->34312 34331->34313 34331->34332 34335 107641a 34331->34335 34332->34315 34333->34329 34336 107654b 34335->34336 34340 107656d 34335->34340 34352 101f8ac 130 API calls 34335->34352 34353 1020450 5 API calls CatchGuardHandler 34335->34353 34337 1082573 CatchGuardHandler 5 API calls 34336->34337 34338 1076561 34337->34338 34338->34255 34341 1082573 CatchGuardHandler 5 API calls 34340->34341 34342 107660c 34341->34342 34342->34255 34344->34238 34346->34250 34347->34275 34349->34284 34350->34297 34351->34326 34353->34335 34355 109c392 _unexpected 34354->34355 34356 109c3be IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 34355->34356 34357 109c48f 34356->34357 34358 1082573 CatchGuardHandler 5 API calls 34357->34358 34359 109c363 GetCurrentProcess TerminateProcess 34358->34359 34359->34014 34361 106ac73 34360->34361 34370 106ab54 _unexpected 34360->34370 34361->34051 34362 106acc1 TryAcquireSRWLockExclusive 34363 106acd7 34362->34363 34367 106acde 34362->34367 34374 105c5a0 TryAcquireSRWLockExclusive AcquireSRWLockExclusive 34363->34374 34365 106aca7 34365->34362 34366 106ac39 34369 106ac67 34366->34369 34375 105c1c0 9 API calls CatchGuardHandler 34366->34375 34368 106ae32 34367->34368 34371 106ad3f ReleaseSRWLockExclusive 34367->34371 34368->34051 34369->34361 34376 105c2f0 9 API calls 34369->34376 34370->34361 34370->34362 34370->34365 34370->34366 34371->34361 34374->34367 34375->34369 34376->34361 34377 100bf40 34381 100bfa9 34377->34381 34378 100c092 34379 100c106 34378->34379 34383 105e960 34378->34383 34381->34378 34387 1076120 VirtualFree 34381->34387 34384 105e980 34383->34384 34385 105e9c3 34384->34385 34390 100c120 34384->34390 34385->34379 34388 1076142 34387->34388 34389 1076138 GetLastError 34387->34389 34388->34378 34389->34388 34391 100c1df 34390->34391 34392 100c13c 34390->34392 34391->34384 34392->34391 34393 1076120 2 API calls 34392->34393 34393->34391 34394 108fed8 34395 108ff32 34394->34395 34396 108ff6a GetModuleFileNameW 34395->34396 34397 108ff54 34395->34397 34405 108ff42 34395->34405 34399 108ff8f 34396->34399 34418 109c332 15 API calls 34397->34418 34412 108fee3 34399->34412 34401 108ffbc 34402 108ffc5 34401->34402 34403 109000b 34401->34403 34404 104ac80 ___std_exception_copy 11 API calls 34402->34404 34406 109002c 34403->34406 34407 1090022 34403->34407 34404->34405 34409 104ac80 ___std_exception_copy 11 API calls 34406->34409 34408 104ac80 ___std_exception_copy 11 API calls 34407->34408 34410 109002a 34408->34410 34409->34410 34411 104ac80 ___std_exception_copy 11 API calls 34410->34411 34411->34405 34413 108ff26 34412->34413 34414 108fef4 34412->34414 34413->34401 34414->34413 34415 104ad00 _unexpected 130 API calls 34414->34415 34416 108ff1d 34415->34416 34417 104ac80 ___std_exception_copy 11 API calls 34416->34417 34417->34413 34418->34405 34419 109aa5b GetLastError 34420 109aa71 34419->34420 34423 109aa77 34419->34423 34445 109b154 6 API calls 34420->34445 34438 109aa7b SetLastError 34423->34438 34440 109b193 34423->34440 34426 104ad00 _unexpected 128 API calls 34427 109aaa8 34426->34427 34428 109aac1 34427->34428 34429 109aab0 34427->34429 34430 109b193 6 API calls 34428->34430 34431 109b193 6 API calls 34429->34431 34432 109aacd 34430->34432 34433 109aabe 34431->34433 34434 109aae8 34432->34434 34435 109aad1 34432->34435 34437 104ac80 ___std_exception_copy 11 API calls 34433->34437 34439 104ac80 ___std_exception_copy 11 API calls 34434->34439 34436 109b193 6 API calls 34435->34436 34436->34433 34437->34438 34439->34438 34446 109b589 34440->34446 34443 109b1cd TlsSetValue 34444 109aa93 34444->34426 34444->34438 34445->34423 34447 109b5b9 34446->34447 34450 109b1af 34446->34450 34447->34450 34453 109b4be LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 34447->34453 34449 109b5cd 34449->34450 34451 109b5d3 GetProcAddress 34449->34451 34450->34443 34450->34444 34451->34450 34452 109b5e3 34451->34452 34452->34450 34453->34449 34454 100cec4 GetInstallDetailsPayload 34457 105f102 34454->34457 34460 1081644 227 API calls ___std_exception_copy 34457->34460 34459 100ced3 34460->34459 34461 108e14c 34462 108e158 ___std_exception_copy 34461->34462 34469 109b871 EnterCriticalSection 34462->34469 34464 108e162 34470 108e049 34464->34470 34468 108e17b 34469->34464 34471 108e055 ___std_exception_copy 34470->34471 34476 108e0e7 34471->34476 34477 108e0b9 34471->34477 34479 10902c4 13 API calls __EH_prolog3 34471->34479 34473 109192d 227 API calls 34473->34476 34475 108e0d6 34475->34473 34478 108e18d LeaveCriticalSection ___std_exception_copy 34476->34478 34477->34475 34480 109192d 34477->34480 34478->34468 34479->34477 34481 1091954 34480->34481 34482 109193b 34480->34482 34481->34475 34482->34481 34484 1025e60 34482->34484 34489 1024760 34484->34489 34490 10247be 34489->34490 34498 10247ab 34489->34498 34502 10816e7 EnterCriticalSection 34490->34502 34492 10247c8 34492->34498 34507 1024820 34492->34507 34495 1081951 169 API calls 34496 10247f2 34495->34496 34533 108175d EnterCriticalSection LeaveCriticalSection WakeAllConditionVariable SetEvent ResetEvent 34496->34533 34499 1081951 34498->34499 34658 1081966 34499->34658 34503 10816fb 34502->34503 34504 1081700 LeaveCriticalSection 34503->34504 34534 10817a7 SleepConditionVariableCS LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 34503->34534 34504->34492 34508 1024870 34507->34508 34509 1024bab 34507->34509 34535 1024cb0 34508->34535 34510 10816e7 __Init_thread_header 6 API calls 34509->34510 34511 1024bb5 34510->34511 34511->34508 34538 1025050 34511->34538 34513 1024892 34547 10245ca 227 API calls 34513->34547 34516 1024bd1 34555 108175d EnterCriticalSection LeaveCriticalSection WakeAllConditionVariable SetEvent ResetEvent 34516->34555 34517 10248c2 34548 10245ca 227 API calls 34517->34548 34520 102491c 34549 10245ca 227 API calls 34520->34549 34522 1024976 34550 10245ca 227 API calls 34522->34550 34524 10249be 34551 10245ca 227 API calls 34524->34551 34526 1024a4e 34552 10245ca 227 API calls 34526->34552 34528 1024aac 34553 10245ca 227 API calls 34528->34553 34530 1024b0a 34554 10245ca 227 API calls 34530->34554 34532 10247e8 34532->34495 34533->34498 34534->34503 34556 100a650 34535->34556 34537 1024ce2 34537->34513 34579 103e6dc 34538->34579 34540 10250af 34582 1025130 132 API calls 34540->34582 34542 10250db 34583 1025210 132 API calls ___std_exception_copy 34542->34583 34544 10250e6 34584 108e6b4 14 API calls ___std_exception_copy 34544->34584 34546 10250ee 34546->34516 34547->34517 34548->34520 34549->34522 34550->34524 34551->34526 34552->34528 34553->34530 34554->34532 34555->34508 34559 10372c0 34556->34559 34562 1037200 34559->34562 34563 1037260 34562->34563 34564 100a664 34562->34564 34565 10816e7 __Init_thread_header 6 API calls 34563->34565 34564->34537 34566 103726a 34565->34566 34566->34564 34570 1036eb0 34566->34570 34571 1036f10 34570->34571 34572 1036ef9 34570->34572 34573 10816e7 __Init_thread_header 6 API calls 34571->34573 34578 108175d EnterCriticalSection LeaveCriticalSection WakeAllConditionVariable SetEvent ResetEvent 34572->34578 34574 1036f1a 34573->34574 34574->34572 34575 1036760 227 API calls 34574->34575 34576 1036f39 34575->34576 34577 108175d EnterCriticalSection LeaveCriticalSection WakeAllConditionVariable SetEvent ResetEvent 34576->34577 34577->34572 34578->34564 34585 108e650 34579->34585 34581 103e6f3 34581->34540 34582->34542 34583->34544 34584->34546 34586 108e671 34585->34586 34587 108e6a1 34585->34587 34586->34587 34593 109d69f 34586->34593 34588 1082573 CatchGuardHandler 5 API calls 34587->34588 34591 108e6b2 34588->34591 34590 108e68d 34590->34587 34596 108e7f9 34590->34596 34591->34581 34615 109d6c9 34593->34615 34597 108e809 34596->34597 34598 108e8fc 34596->34598 34597->34598 34599 104ad00 _unexpected 130 API calls 34597->34599 34598->34587 34600 108e820 34599->34600 34601 104ad00 _unexpected 130 API calls 34600->34601 34603 108e82b 34600->34603 34602 108e849 34601->34602 34604 104ad00 _unexpected 130 API calls 34602->34604 34607 108e851 34602->34607 34605 104ac80 ___std_exception_copy 11 API calls 34603->34605 34610 108e86e 34604->34610 34606 108e8f5 34605->34606 34606->34587 34609 104ac80 ___std_exception_copy 11 API calls 34607->34609 34608 108e876 34612 104ac80 ___std_exception_copy 11 API calls 34608->34612 34609->34603 34610->34608 34617 108f40f 34610->34617 34612->34607 34613 108e89a 34613->34608 34633 109e68b 34613->34633 34616 109d6bb MultiByteToWideChar 34615->34616 34616->34590 34618 108f43a 34617->34618 34621 108f45b 34617->34621 34623 1082573 CatchGuardHandler 5 API calls 34618->34623 34619 108f5ef 34622 108e900 148 API calls 34619->34622 34620 108f274 227 API calls 34620->34618 34621->34619 34625 108f5e0 34621->34625 34627 108f49d 34621->34627 34622->34625 34624 108f6eb 34623->34624 34624->34613 34625->34618 34625->34620 34626 109e466 15 API calls 34626->34627 34627->34618 34627->34625 34627->34626 34628 108f6f2 34627->34628 34630 108f6ed 34627->34630 34629 109c342 11 API calls 34628->34629 34632 108f6fe 34629->34632 34631 1082650 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 34630->34631 34631->34628 34632->34613 34635 109e70b 34633->34635 34636 109e6a1 34633->34636 34634 109e825 11 API calls 34653 109e767 34634->34653 34637 104ac80 ___std_exception_copy 11 API calls 34635->34637 34657 109e759 34635->34657 34636->34635 34638 109e6d6 34636->34638 34643 104ac80 ___std_exception_copy 11 API calls 34636->34643 34639 109e72d 34637->34639 34640 109e6eb 34638->34640 34648 104ac80 ___std_exception_copy 11 API calls 34638->34648 34641 104ac80 ___std_exception_copy 11 API calls 34639->34641 34642 104ac80 ___std_exception_copy 11 API calls 34640->34642 34644 109e740 34641->34644 34645 109e700 34642->34645 34647 109e6c9 ___free_lconv_mon 34643->34647 34649 104ac80 ___std_exception_copy 11 API calls 34644->34649 34650 104ac80 ___std_exception_copy 11 API calls 34645->34650 34646 109e7c7 34651 104ac80 ___std_exception_copy 11 API calls 34646->34651 34647->34638 34648->34640 34652 109e74e 34649->34652 34650->34635 34654 109e7cd 34651->34654 34655 104ac80 ___std_exception_copy 11 API calls 34652->34655 34653->34646 34656 104ac80 11 API calls ___std_exception_copy 34653->34656 34654->34608 34655->34657 34656->34653 34657->34634 34659 108197c 34658->34659 34660 1081975 34658->34660 34667 1090291 34659->34667 34664 1090302 34660->34664 34663 1025e77 34663->34482 34665 1090291 169 API calls 34664->34665 34666 1090314 34665->34666 34666->34663 34670 10904f4 34667->34670 34671 1090500 ___std_exception_copy 34670->34671 34678 109b871 EnterCriticalSection 34671->34678 34673 109050e 34679 1090318 34673->34679 34675 109051b 34689 1090543 LeaveCriticalSection ___std_exception_copy 34675->34689 34677 10902c2 34677->34663 34678->34673 34680 1090333 34679->34680 34681 10903a6 34679->34681 34680->34681 34682 1090386 34680->34682 34690 104add0 34680->34690 34681->34675 34682->34681 34683 104add0 169 API calls 34682->34683 34685 109039c 34683->34685 34687 104ac80 ___std_exception_copy 11 API calls 34685->34687 34686 109037c 34688 104ac80 ___std_exception_copy 11 API calls 34686->34688 34687->34681 34688->34682 34689->34677 34691 104ade4 34690->34691 34693 104ae55 _unexpected 34691->34693 34695 106a330 34691->34695 34721 106b1f0 EnterCriticalSection LeaveCriticalSection ___std_exception_copy 34691->34721 34693->34686 34696 106a347 34695->34696 34712 106a4f4 _unexpected 34695->34712 34697 1069810 140 API calls 34696->34697 34715 106a351 _unexpected 34697->34715 34698 106a788 TryAcquireSRWLockExclusive 34698->34715 34699 105c5a0 TryAcquireSRWLockExclusive AcquireSRWLockExclusive 34699->34715 34700 106a9be 34702 106a9f3 34700->34702 34716 106aa19 _unexpected 34700->34716 34701 106a5f9 34703 106a62a 34701->34703 34706 105c1c0 9 API calls 34701->34706 34704 105cb10 155 API calls 34702->34704 34709 106a4ea 34703->34709 34711 105c2f0 9 API calls 34703->34711 34708 106aa03 34704->34708 34705 106a807 ReleaseSRWLockExclusive 34705->34709 34706->34703 34707 106a694 TryAcquireSRWLockExclusive 34707->34715 34713 1082573 CatchGuardHandler 5 API calls 34708->34713 34709->34691 34710 106ab24 34711->34709 34712->34698 34712->34701 34712->34709 34712->34715 34714 106aa0f 34713->34714 34714->34691 34715->34698 34715->34699 34715->34700 34715->34705 34715->34707 34715->34709 34717 106a714 ReleaseSRWLockExclusive 34715->34717 34719 105c1c0 9 API calls 34715->34719 34720 105c2f0 9 API calls 34715->34720 34716->34710 34718 105c730 11 API calls 34716->34718 34717->34709 34718->34710 34719->34715 34720->34715 34721->34691 34722 109b92c GetStartupInfoW 34723 109b949 34722->34723 34725 109b9dd 34722->34725 34723->34725 34728 1090e35 34723->34728 34726 109b971 34726->34725 34727 109b9a1 GetFileType 34726->34727 34727->34726 34729 1090e41 ___std_exception_copy 34728->34729 34730 1090e6b 34729->34730 34731 1090e4a 34729->34731 34737 109b871 EnterCriticalSection 34730->34737 34745 109c332 15 API calls 34731->34745 34734 1090e77 34736 1090e59 34734->34736 34738 1090d85 34734->34738 34736->34726 34737->34734 34739 104ad00 _unexpected 130 API calls 34738->34739 34744 1090d97 34739->34744 34740 1090da4 34741 104ac80 ___std_exception_copy 11 API calls 34740->34741 34743 1090df9 34741->34743 34743->34734 34744->34740 34746 109b2ec 6 API calls 34744->34746 34745->34736 34746->34744
                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 0105CBBB
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 0105CBF3
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?,?,?), ref: 0105D1A6
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 0105D2D6
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 0105D39A
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 0105D42B
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 0105D4F7
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 0105D6AA
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 0105D70A
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 0105D762
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 0105D7C2
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 0105D888
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 0105D91C
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 0105DC21
                                                                                      • Part of subcall function 0105C5A0: TryAcquireSRWLockExclusive.KERNEL32(010F3EE0,00000000,FBE85001,0000000A,0CFC9968,0105F533,010814B2), ref: 0105C5BC
                                                                                      • Part of subcall function 0105C5A0: AcquireSRWLockExclusive.KERNEL32(010F3EE0), ref: 0105C5ED
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 0105D9DD
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 0105DA71
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 0105DBCE
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 0105DC74
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 0105DCC7
                                                                                      • Part of subcall function 0105BFC0: TryAcquireSRWLockExclusive.KERNEL32(?), ref: 0105C00C
                                                                                      • Part of subcall function 0105BFC0: ReleaseSRWLockExclusive.KERNEL32(?,?,00000021,?,00004000,000000FF), ref: 0105C161
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$Acquire$Release
                                                                                    • String ID: first
                                                                                    • API String ID: 1678258262-2456940119
                                                                                    • Opcode ID: ddda818c63c767154a207f1b9a9c67a7b0d7f3936650b64147223b2ba3cf047b
                                                                                    • Instruction ID: 6aad283e3bd8217148e8b7fd18a6f1f800006c9f3ab09c58262809d619ac6749
                                                                                    • Opcode Fuzzy Hash: ddda818c63c767154a207f1b9a9c67a7b0d7f3936650b64147223b2ba3cf047b
                                                                                    • Instruction Fuzzy Hash: 0DE2E0716043029FD799CF28C884BAABBE2FF84314F19856DEDC98B291D735E945CB81
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 476 1069290-10692ae 477 10692b4-10692bd 476->477 478 10694be-10694bf 476->478 479 10694c6 call 106af20 477->479 480 10692c3-10692d0 477->480 478->479 487 10694cb 479->487 481 10692d6-10692ea 480->481 482 10697d3-10697d4 480->482 485 10692f2-1069321 481->485 486 10692ec-10692ef 481->486 484 10697d6-10697da 482->484 488 10697e8-10697ee ReleaseSRWLockExclusive 484->488 489 1069323-1069337 485->489 490 1069339-1069349 485->490 486->485 493 10694d0-10694d9 call 105e9d0 487->493 498 10697f5-10697f8 488->498 489->490 491 1069435-106944e TryAcquireSRWLockExclusive 490->491 492 106934f-106936b 490->492 496 1069457-1069461 491->496 497 1069450-1069452 call 105c5a0 491->497 492->493 494 1069371-1069378 492->494 507 10694e0-10694ec 493->507 494->491 499 106937e-106938d 494->499 502 1069467-1069488 496->502 503 10696b1-10696c4 call 1073e90 496->503 497->496 504 1069781-1069787 498->504 506 1069393-1069399 499->506 499->507 508 106948e-10694a2 502->508 509 10695ff 502->509 510 10696c9-10696cf 503->510 514 106978f-10697a2 504->514 511 1069584-10695aa call 105bfc0 506->511 512 106939f-10693a3 506->512 513 10694f0-106950c TryAcquireSRWLockExclusive 507->513 508->514 515 10694a8-10694b0 508->515 516 1069601-106964d ReleaseSRWLockExclusive 509->516 510->484 517 10696d5-1069709 510->517 518 10693a7-10693b0 511->518 534 10695b0 511->534 512->518 519 1069515-1069527 513->519 520 106950e-1069510 call 105c5a0 513->520 523 10697b7-10697ce call 1053f70 call 100a680 call 105c370 514->523 515->514 521 10694b6-10694b9 515->521 533 1069656 516->533 526 106970f-1069712 517->526 527 10697dc-10697df 517->527 528 10693c7 518->528 529 10693b2-10693bc 518->529 531 1069723-106973f call 1073e90 519->531 532 106952d-106954e 519->532 520->519 521->516 523->482 536 1069715-106971b 526->536 527->536 540 10693c9-10693f3 528->540 537 10695d2-10695fa call 1053f70 call 100a680 call 105c370 529->537 538 10693c2-10693c5 529->538 552 10697e4 531->552 553 1069745-1069779 531->553 532->533 541 1069554-1069568 532->541 542 1069658-10696a8 ReleaseSRWLockExclusive 533->542 534->513 536->531 537->509 538->540 546 1069405-1069409 540->546 547 10693f5-1069402 call 1085340 540->547 548 10697a4-10697b6 541->548 549 106956e-1069576 541->549 542->503 556 1069420-1069434 call 1082573 546->556 557 106940b-1069411 546->557 547->546 548->523 549->548 555 106957c-106957f 549->555 552->488 553->498 561 106977b-106977e 553->561 555->542 563 1069417-106941a 557->563 564 10695b5-10695c7 557->564 561->504 563->556 564->537
                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 01069446
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 01069645
                                                                                      • Part of subcall function 0105C5A0: TryAcquireSRWLockExclusive.KERNEL32(010F3EE0,00000000,FBE85001,0000000A,0CFC9968,0105F533,010814B2), ref: 0105C5BC
                                                                                      • Part of subcall function 0105C5A0: AcquireSRWLockExclusive.KERNEL32(010F3EE0), ref: 0105C5ED
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?,?), ref: 010697E8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$Acquire$Release
                                                                                    • String ID: first
                                                                                    • API String ID: 1678258262-2456940119
                                                                                    • Opcode ID: 9b7b97fea8ca01abc45a549e3538799937b25a959ce24a0a06d7ed059667562d
                                                                                    • Instruction ID: 5ace3e9b00b225ed76ef2b9d423c711b81a5a1ffc4e9b1a10c9063971dbceb5f
                                                                                    • Opcode Fuzzy Hash: 9b7b97fea8ca01abc45a549e3538799937b25a959ce24a0a06d7ed059667562d
                                                                                    • Instruction Fuzzy Hash: 86F11472A043118FD718CF28C484B6ABBE5BF88318F0985ADE9C99B785D735ED45CB81
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 568 1068830-1068851 569 1068857-1068864 568->569 570 1068a2c-1068a31 call 106af20 568->570 571 1068d31-1068d32 569->571 572 106886a-106887e 569->572 581 1068a36-1068a3f call 105e9d0 570->581 576 1068d34-1068d38 571->576 574 1068886-10688b5 572->574 575 1068880-1068883 572->575 578 10688b7-10688cb 574->578 579 10688cd-10688dd 574->579 575->574 580 1068d3e-1068d44 ReleaseSRWLockExclusive 576->580 578->579 582 10689b2-10689cb TryAcquireSRWLockExclusive 579->582 583 10688e3-10688ff 579->583 588 1068d4b-1068d4e 580->588 596 1068a46-1068a52 581->596 585 10689d4-10689de 582->585 586 10689cd-10689cf call 105c5a0 582->586 583->581 587 1068905-106890c 583->587 592 10689e4-10689ed 585->592 593 1068c13-1068c26 call 1073e90 585->593 586->585 587->582 591 1068912-1068921 587->591 594 1068cc7-1068cd0 588->594 591->596 597 1068927-106892d 591->597 598 1068b65 592->598 599 10689f3-1068a10 592->599 601 1068c2b-1068c2d 593->601 600 1068bd7-1068c0a ReleaseSRWLockExclusive 594->600 602 1068a56-1068a72 TryAcquireSRWLockExclusive 596->602 603 1068933-1068937 597->603 604 1068aea-1068b10 call 105bfc0 597->604 605 1068b67-1068b7d 598->605 606 1068a16-1068a1e 599->606 607 1068cd5-1068cfd call 1053f70 call 100a680 call 105c370 599->607 600->593 601->576 608 1068c33-1068c60 601->608 609 1068a74-1068a76 call 105c5a0 602->609 610 1068a7b-1068a8d 602->610 611 106893b-1068944 603->611 604->611 623 1068b16 604->623 612 1068b80-1068bb1 ReleaseSRWLockExclusive 605->612 606->607 613 1068a24-1068a27 606->613 634 1068d02-1068d2c call 1053f70 call 100a680 call 105c370 607->634 608->612 609->610 617 1068c65-1068c81 call 1073e90 610->617 618 1068a93-1068ab4 610->618 619 1068946-1068950 611->619 620 106895b 611->620 626 1068bb8 612->626 613->605 645 1068c87-1068cbb 617->645 646 1068d3a 617->646 625 1068aba-1068ace 618->625 618->626 627 1068956-1068959 619->627 628 1068b38-1068b60 call 1053f70 call 100a680 call 105c370 619->628 629 106895d-1068986 620->629 623->602 633 1068ad4-1068adc 625->633 625->634 635 1068bba-1068bd4 626->635 627->629 628->598 636 106899d-10689b1 call 1082573 629->636 637 1068988-106898e 629->637 633->634 647 1068ae2-1068ae5 633->647 634->571 635->600 639 1068994-1068997 637->639 640 1068b1b-1068b2d 637->640 639->636 640->628 645->588 651 1068cc1-1068cc4 645->651 646->580 647->635 651->594
                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 010689C3
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?,?,00000000,00000000,00004000,00000000), ref: 01068BAB
                                                                                      • Part of subcall function 0105C5A0: TryAcquireSRWLockExclusive.KERNEL32(010F3EE0,00000000,FBE85001,0000000A,0CFC9968,0105F533,010814B2), ref: 0105C5BC
                                                                                      • Part of subcall function 0105C5A0: AcquireSRWLockExclusive.KERNEL32(010F3EE0), ref: 0105C5ED
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 01068D3E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$Acquire$Release
                                                                                    • String ID: first
                                                                                    • API String ID: 1678258262-2456940119
                                                                                    • Opcode ID: 053d9be5068bd73515b9768b3ffd34f28a7d271c20b8d938927c8efdb165b651
                                                                                    • Instruction ID: 565fd74d6ca443fe788e6293c2e924fea891d32642b79ae247a7fb6cb5824c44
                                                                                    • Opcode Fuzzy Hash: 053d9be5068bd73515b9768b3ffd34f28a7d271c20b8d938927c8efdb165b651
                                                                                    • Instruction Fuzzy Hash: 59E100726043018FD758CF28C88476ABBE6BF84314F19C56EE9C99B385D775E941CB82
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 791 1073e90-1073ebc 792 1073ec2-1073ec8 791->792 793 1073f6d-1073f74 791->793 794 1073fae-1073fb5 792->794 795 1073ece-1073ed7 call 1074a20 792->795 796 1073f56-1073f6a call 1082573 793->796 797 1073f76-1073f87 call 1074660 793->797 794->796 799 1073fb7-1073ff6 794->799 807 1073f97-1073f9c 795->807 808 1073edd-1073edf 795->808 809 1073f8c-1073f92 797->809 810 1073f89 797->810 803 1073ffc-1074038 799->803 804 10742e8-1074363 call 1053f70 call 100a680 call 1053f70 call 100a680 call 1074b40 799->804 811 1074045-10740b4 call 100bd60 803->811 812 107403a-1074043 803->812 866 107450d-1074512 804->866 867 1074369-1074376 804->867 815 1073fa2-1073fa8 807->815 816 107453b-1074544 807->816 814 1073ee1-1073ee3 808->814 809->814 810->809 830 10740b6-10740d2 811->830 831 10740ef-1074109 811->831 812->811 812->812 819 1073ee9-1073ef4 814->819 820 1074638-107463f 814->820 815->794 821 1074533-1074535 815->821 822 1074546-1074552 816->822 823 1074554-10745bb 816->823 826 1073ef6 819->826 827 1073ef9-1073f01 819->827 820->796 832 1074645-107465a ReleaseSRWLockExclusive call 105c9a0 820->832 821->816 828 10745c6-10745cb 821->828 822->821 829 10745bf-10745c1 823->829 826->827 837 1073f07-1073f0b 827->837 838 1074120-10741db 827->838 828->820 839 10745cd-10745d5 828->839 829->819 840 10740d4-10740e6 830->840 835 107410f-107411b 831->835 836 107452d-107452e 831->836 835->814 845 1074530-1074531 836->845 846 1073f35 837->846 847 1073f0d-1073f1d 837->847 844 10741e1-10741f9 838->844 839->796 848 10745db-1074636 839->848 840->840 849 10740e8-10740ec 840->849 844->844 851 10741fb-1074208 call 1076160 844->851 845->821 854 1073f37-1073f50 846->854 852 1073f23-1073f2a 847->852 853 107426c-1074294 call 1053f70 call 100a680 call 105c370 847->853 848->829 849->831 860 107420d-1074212 851->860 852->853 857 1073f30-1073f33 852->857 879 1074299-107429b 853->879 854->796 857->854 863 10742cb-10742e3 call 105c930 call 1076150 860->863 864 1074218-107423d 860->864 863->864 869 1074250-107425d 864->869 870 107423f-107424e 864->870 873 1074514-1074528 ReleaseSRWLockExclusive call 1074ce0 866->873 874 10744cf-10744db 866->874 875 10744c5-10744cd 867->875 876 107437c-1074380 867->876 878 107425f-1074267 869->878 869->879 870->869 870->870 873->836 884 10744e3-1074502 874->884 875->874 875->884 882 1074384-10743d7 876->882 878->796 881 10742b2-10742c1 879->881 885 10742c3-10742c9 881->885 886 107429d-10742a1 881->886 887 10743dd-10743ef 882->887 884->845 889 1074504 884->889 890 10742a3-10742b0 885->890 886->890 887->887 891 10743f1-1074408 call 1076150 887->891 889->866 890->878 890->881 893 107440d-1074414 891->893 894 1074457-1074480 893->894 895 1074416-107441f 893->895 896 1074496-1074498 894->896 897 1074482 894->897 898 1074425-107443a 895->898 900 10744b6-10744c3 896->900 901 107449a-107449e 896->901 899 1074486-107448e 897->899 898->898 902 107443c-1074454 call 1076150 898->902 899->882 904 1074494 899->904 905 10744a1-10744b4 900->905 901->905 902->894 904->875 905->899
                                                                                    APIs
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 0107451B
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 0107464C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLockRelease
                                                                                    • String ID: first$slotsize$spansize
                                                                                    • API String ID: 1766480654-3908016032
                                                                                    • Opcode ID: 071775116ea53779ac78338b4eaa53fa16c2465b14e2f6eb0f8e4cc387e17838
                                                                                    • Instruction ID: a8c93bbc7ad76dec8edaa537441a849b2d47be87519c98f7a6b6e8af9eb7e77f
                                                                                    • Opcode Fuzzy Hash: 071775116ea53779ac78338b4eaa53fa16c2465b14e2f6eb0f8e4cc387e17838
                                                                                    • Instruction Fuzzy Hash: 40329F71A043019FD718CF28C881B9AB7E2BF88314F19C56DE999CB396D774E841CB95
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1135 106a330-106a341 1136 106a347-106a353 call 1069810 1135->1136 1137 106a4f4-106a4f8 1135->1137 1146 106a80e 1136->1146 1147 106a359-106a35d 1136->1147 1139 106a810-106a819 1137->1139 1140 106a4fe-106a544 1137->1140 1142 106a546-106a54f 1140->1142 1143 106a591-106a595 1140->1143 1148 106a555-106a562 1142->1148 1149 106a893-106a8a6 1142->1149 1144 106a59b-106a5b3 1143->1144 1145 106a788-106a79d TryAcquireSRWLockExclusive 1143->1145 1144->1145 1150 106a5b9-106a5c6 1144->1150 1152 106a7a6-106a7b9 1145->1152 1153 106a79f-106a7a1 call 105c5a0 1145->1153 1146->1139 1147->1139 1151 106a363-106a3a7 1147->1151 1154 106a564-106a568 1148->1154 1155 106a56e 1148->1155 1165 106a8b1-106a8dc 1149->1165 1158 106a75f-106a766 1150->1158 1159 106a5cc-106a5d4 1150->1159 1160 106a65d 1151->1160 1161 106a3ad-106a3f2 call 1084dc0 1151->1161 1163 106a9c4-106a9c5 1152->1163 1164 106a7bf-106a7d8 1152->1164 1153->1152 1154->1155 1156 106a924-106a92b 1154->1156 1157 106a570-106a579 1155->1157 1169 106a9a5-106a9ab 1156->1169 1170 106a92d-106a933 1156->1170 1157->1157 1166 106a57b-106a57d 1157->1166 1167 106a97e 1158->1167 1168 106a76c-106a784 1158->1168 1159->1158 1171 106a5da-106a5f3 1159->1171 1175 106a665-106a669 1160->1175 1195 106a444-106a448 1161->1195 1196 106a3f4-106a3fa 1161->1196 1172 106a9c7-106a9f1 1163->1172 1164->1172 1174 106a7de-106a7f9 1164->1174 1165->1139 1177 106a655-106a658 call 1054000 1166->1177 1178 106a583-106a58b 1166->1178 1191 106a986-106a98c 1167->1191 1168->1145 1176 106a936-106a943 1169->1176 1170->1176 1179 106a754-106a75c 1171->1179 1180 106a5f9-106a624 1171->1180 1181 106a9f3-106a9fe call 105cb10 1172->1181 1182 106aa19 1172->1182 1184 106a7ff-106a801 1174->1184 1185 106a96a-106a971 call 100bda0 1174->1185 1187 106a66d-106a674 1175->1187 1189 106a945-106a954 call 1085340 1176->1189 1190 106a9ad-106a9bc 1176->1190 1177->1160 1178->1143 1178->1165 1179->1158 1192 106a81a-106a82e call 105c1c0 1180->1192 1193 106a62a-106a630 1180->1193 1210 106aa03-106aa18 call 1082573 1181->1210 1186 106aa1b-106aa25 1182->1186 1184->1185 1198 106a807-106a808 ReleaseSRWLockExclusive 1184->1198 1200 106a976 1185->1200 1186->1186 1199 106aa27-106aa2f 1186->1199 1187->1200 1201 106a67a-106a690 1187->1201 1237 106a957-106a959 1189->1237 1190->1237 1206 106a8f4-106a904 1191->1206 1209 106a835-106a83c call 105c2f0 1192->1209 1208 106a636-106a63b 1193->1208 1193->1209 1204 106a694-106a6a8 TryAcquireSRWLockExclusive 1195->1204 1205 106a44e-106a469 1195->1205 1211 106a843-106a85e 1196->1211 1212 106a400-106a40d 1196->1212 1198->1146 1213 106aa35-106ab24 call 1085340 * 2 call 105c730 1199->1213 1214 106ab2a 1199->1214 1200->1167 1201->1204 1216 106a6b1-106a6c4 1204->1216 1217 106a6aa-106a6ac call 105c5a0 1204->1217 1205->1204 1218 106a46f-106a47a 1205->1218 1220 106a991-106a9a0 1206->1220 1221 106a90a-106a919 call 1085340 1206->1221 1224 106a63e-106a650 1208->1224 1209->1211 1235 106a866-106a88e 1211->1235 1226 106a40f-106a413 1212->1226 1227 106a419-106a41b 1212->1227 1213->1214 1232 106a9be-106a9bf 1216->1232 1233 106a6ca-106a6e3 1216->1233 1217->1216 1218->1187 1231 106a480-106a48e 1218->1231 1255 106a91c-106a91f 1220->1255 1221->1255 1224->1139 1226->1227 1239 106a8e1-106a8e5 1226->1239 1228 106a420-106a429 1227->1228 1228->1228 1240 106a42b-106a42d 1228->1240 1231->1187 1242 106a494-106a4aa 1231->1242 1243 106a9c1-106a9c2 1232->1243 1233->1243 1244 106a6e9-106a706 1233->1244 1245 106a71b-106a71e 1235->1245 1237->1155 1239->1191 1247 106a8eb-106a8f1 1239->1247 1240->1177 1250 106a433-106a43e 1240->1250 1242->1175 1252 106a4b0-106a4d8 1242->1252 1243->1163 1253 106a95e-106a965 call 100bda0 1244->1253 1254 106a70c-106a70e 1244->1254 1245->1139 1247->1206 1250->1195 1250->1235 1257 106a723-106a73a call 105c1c0 1252->1257 1258 106a4de-106a4e4 1252->1258 1253->1185 1254->1253 1259 106a714-106a715 ReleaseSRWLockExclusive 1254->1259 1255->1227 1264 106a742-106a74c call 105c2f0 1257->1264 1258->1264 1265 106a4ea-106a4ef 1258->1265 1259->1245 1264->1179 1265->1224
                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 0106A6A0
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 0106A715
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 0106A795
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 0106A808
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$AcquireRelease
                                                                                    • String ID:
                                                                                    • API String ID: 17069307-0
                                                                                    • Opcode ID: 9b127f1cbc1da464f0bf1872b8d0af0523e2241f204836433bee1eb2f2ef6ce2
                                                                                    • Instruction ID: 4bf3fda8dc0c048b31cbe92862caee4127d12e5cdb1841031ff590e96d30d4dc
                                                                                    • Opcode Fuzzy Hash: 9b127f1cbc1da464f0bf1872b8d0af0523e2241f204836433bee1eb2f2ef6ce2
                                                                                    • Instruction Fuzzy Hash: 00321371B00202CFDB64DF68C8857BABBF9BF45314F1981A8E985AB246D739DC45CB90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 374 1075a70-1075a94 VirtualAlloc 375 1075cd4-1075cd8 374->375 376 1075a9a-1075aa2 374->376 376->375 377 1075aa8-1075aaa 376->377 377->375 378 1075ab0-1075ab2 377->378 378->375 379 1075ab8-1075ac7 GetLastError 378->379 380 1075ad4-1075aec Sleep VirtualAlloc 379->380 381 1075ac9-1075ace 379->381 380->375 383 1075af2-1075b01 GetLastError 380->383 381->380 382 1075cd2 381->382 382->375 384 1075b03-1075b08 383->384 385 1075b0e-1075b26 Sleep VirtualAlloc 383->385 384->382 384->385 385->375 386 1075b2c-1075b3b GetLastError 385->386 387 1075b3d-1075b42 386->387 388 1075b48-1075b60 Sleep VirtualAlloc 386->388 387->382 387->388 388->375 389 1075b66-1075b75 GetLastError 388->389 390 1075b77-1075b7c 389->390 391 1075b82-1075b9a Sleep VirtualAlloc 389->391 390->382 390->391 391->375 392 1075ba0-1075baf GetLastError 391->392 393 1075bb1-1075bb6 392->393 394 1075bbc-1075bd4 Sleep VirtualAlloc 392->394 393->382 393->394 394->375 395 1075bda-1075be9 GetLastError 394->395 396 1075bf6-1075c0e Sleep VirtualAlloc 395->396 397 1075beb-1075bf0 395->397 396->375 398 1075c14-1075c23 GetLastError 396->398 397->382 397->396 399 1075c25-1075c2a 398->399 400 1075c30-1075c48 Sleep VirtualAlloc 398->400 399->382 399->400 400->375 401 1075c4e-1075c5d GetLastError 400->401 402 1075c66-1075c7e Sleep VirtualAlloc 401->402 403 1075c5f-1075c64 401->403 402->375 404 1075c80-1075c8f GetLastError 402->404 403->382 403->402 405 1075c91-1075c96 404->405 406 1075c98-1075cb0 Sleep VirtualAlloc 404->406 405->382 405->406 406->375 407 1075cb2-1075cc1 GetLastError 406->407 408 1075cc3-1075cc8 407->408 409 1075cca-1075ccc Sleep 407->409 408->382 408->409 409->382
                                                                                    APIs
                                                                                    • VirtualAlloc.KERNEL32(00000000,00000002,00000002,3FE08300,00000002,?,00000002,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694), ref: 01075A8B
                                                                                    • GetLastError.KERNEL32(?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075AB8
                                                                                    • Sleep.KERNEL32(00000032,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075AD6
                                                                                    • VirtualAlloc.KERNEL32(00000000,00000002,00000002,3FE08300,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002), ref: 01075AE4
                                                                                    • GetLastError.KERNEL32(?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075AF2
                                                                                    • Sleep.KERNEL32(00000032,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075B10
                                                                                    • VirtualAlloc.KERNEL32(00000000,00000002,00000002,3FE08300,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002), ref: 01075B1E
                                                                                    • GetLastError.KERNEL32(?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075B2C
                                                                                    • Sleep.KERNEL32(00000032,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075B4A
                                                                                    • VirtualAlloc.KERNEL32(00000000,00000002,00000002,3FE08300,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002), ref: 01075B58
                                                                                    • GetLastError.KERNEL32(?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075B66
                                                                                    • Sleep.KERNEL32(00000032,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075B84
                                                                                    • VirtualAlloc.KERNEL32(00000000,00000002,00000002,3FE08300,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002), ref: 01075B92
                                                                                    • GetLastError.KERNEL32(?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075BA0
                                                                                    • Sleep.KERNEL32(00000032,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075BBE
                                                                                    • VirtualAlloc.KERNEL32(00000000,00000002,00000002,3FE08300,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002), ref: 01075BCC
                                                                                    • GetLastError.KERNEL32(?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075BDA
                                                                                    • Sleep.KERNEL32(00000032,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075BF8
                                                                                    • VirtualAlloc.KERNEL32(00000000,00000002,00000002,3FE08300,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002), ref: 01075C06
                                                                                    • GetLastError.KERNEL32(?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075C14
                                                                                    • Sleep.KERNEL32(00000032,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075C32
                                                                                    • VirtualAlloc.KERNEL32(00000000,00000002,00000002,3FE08300,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002), ref: 01075C40
                                                                                    • GetLastError.KERNEL32(?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075C4E
                                                                                    • Sleep.KERNEL32(00000032,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075C68
                                                                                    • VirtualAlloc.KERNEL32(00000000,00000002,00000002,3FE08300,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002), ref: 01075C76
                                                                                    • GetLastError.KERNEL32(?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075C80
                                                                                    • Sleep.KERNEL32(00000032,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075C9A
                                                                                    • VirtualAlloc.KERNEL32(00000000,00000002,00000002,3FE08300,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002), ref: 01075CA8
                                                                                    • GetLastError.KERNEL32(?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075CB2
                                                                                    • Sleep.KERNEL32(00000032,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075CCC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocErrorLastSleepVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 2288223010-0
                                                                                    • Opcode ID: e02f6c99086d6d8df878b8d007757f8dd14a7a902b79f8107243dce75f8cf2a0
                                                                                    • Instruction ID: cede2448f7ac18596add0e558754120a84a5cc5b56da85624680952c826a2ff5
                                                                                    • Opcode Fuzzy Hash: e02f6c99086d6d8df878b8d007757f8dd14a7a902b79f8107243dce75f8cf2a0
                                                                                    • Instruction Fuzzy Hash: C6517F30B0224AAFDF321F64CD4DBAA3E79EF42751F2541A8FAC9C9050DB768940CB56
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 410 1076160-1076170 411 1076172-1076177 410->411 412 107618c-1076191 410->412 413 10764a7-10764b2 411->413 414 1076185-107618a 411->414 415 10764a1-10764a5 411->415 416 1076489-1076490 411->416 417 1076437-107643e 411->417 418 1076455-107645d 411->418 419 1076495-107649c 411->419 420 10764b4-10764ba 411->420 421 1076193 411->421 422 10761b0-10761bd VirtualFree 411->422 423 107617e-1076183 411->423 424 107647d-1076484 411->424 425 1076198-10761a0 call 1075a70 411->425 412->425 428 1076523-1076545 call 1020450 413->428 414->425 431 1076516-1076520 call 101fbe5 415->431 416->428 417->428 429 10764d6-10764e1 call 105ea6c 418->429 430 107645f-1076465 418->430 419->428 432 1076504-107650b call 105ea6c 420->432 433 10764bc-10764be 420->433 421->425 427 10761a8-10761af 422->427 423->425 424->428 437 10761a5 425->437 449 107654b-107656a call 1082573 428->449 450 107641a-107641e 428->450 447 10764e4-10764e6 429->447 434 1076583-107658f 430->434 435 107646b-107647b 430->435 431->428 448 107650e-1076510 432->448 433->434 439 10764c4-10764d4 433->439 446 1076594-1076615 call 100df3c call 101fd32 call 1076618 call 101fd8c call 101fd4a call 1082573 434->446 435->447 437->427 439->448 451 107656d-1076581 447->451 452 10764ec-1076502 call 101fbe5 447->452 448->451 454 1076512-1076515 448->454 456 1076427-107642e 450->456 457 1076420-1076424 450->457 451->446 452->428 454->431 463 1076443-1076450 call 101f8ac 456->463 464 1076430 456->464 457->456 463->428 464->413 464->415 464->416 464->417 464->418 464->419 464->420 464->424
                                                                                    APIs
                                                                                    • VirtualFree.KERNEL32(00000000,00000002,00004000,?,?,0105E694,3FE08300,00000002,00000002,00000000,?,?,?,3FE08300,3FE08340,?), ref: 010761B7
                                                                                    Strings
                                                                                    • ..\..\buildtools\third_party\libc++\trunk\include\vector, xrefs: 0107657C
                                                                                    • %s:%d: assertion %s failed: %s, xrefs: 01076594
                                                                                    • ..\..\buildtools\third_party\libc++\trunk\include\__memory\construct_at.h, xrefs: 0107658F
                                                                                    • null pointer given to construct_at, xrefs: 01076583
                                                                                    • back() called on an empty vector, xrefs: 0107656D
                                                                                    • !empty(), xrefs: 01076572
                                                                                    • __location != nullptr, xrefs: 01076588
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeVirtual
                                                                                    • String ID: !empty()$%s:%d: assertion %s failed: %s$..\..\buildtools\third_party\libc++\trunk\include\__memory\construct_at.h$..\..\buildtools\third_party\libc++\trunk\include\vector$__location != nullptr$back() called on an empty vector$null pointer given to construct_at
                                                                                    • API String ID: 1263568516-751371438
                                                                                    • Opcode ID: 43bf2dcea16b6806b7ed5111ccd866933d7e2b9c54ae0a3aad5da156ce84899a
                                                                                    • Instruction ID: 3e42e51d5eec6700293773bc833cb0826b54f5185d53bf2cfd13851d886041e6
                                                                                    • Opcode Fuzzy Hash: 43bf2dcea16b6806b7ed5111ccd866933d7e2b9c54ae0a3aad5da156ce84899a
                                                                                    • Instruction Fuzzy Hash: D061F0B1E087029FE7109F28C8819AEB7E5FB88710F444A2DF5C797640EB75E900CB5A
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 657 1075ce0-1075cf5 VirtualFree 658 1075cf7-1075d02 657->658 659 1075d03-1075d20 657->659 660 1075d22-1075d27 659->660 661 1075d3c-1075d41 659->661 662 1075f47-1075f4c 660->662 663 1075d43 660->663 664 1076001-1076006 660->664 665 1075f60-1075f72 call 1075a70 660->665 666 1075f40-1075f45 660->666 667 10760ef 660->667 668 1075d2e-1075d33 660->668 669 107600d-1076023 call 1075a70 660->669 670 1075d48-1075d50 call 1075a70 660->670 671 10760d7-10760dc 660->671 672 1075d76-1075d85 VirtualFree 660->672 673 1075d35-1075d3a 660->673 674 10760f4-1076106 call 1075a70 660->674 675 1075ff3-1075ff8 660->675 676 1075f32-1075f37 660->676 677 10760de-10760e3 660->677 678 1075ffa-1075fff 660->678 661->670 662->665 663->670 664->669 694 1075f74-1075f83 GetLastError 665->694 695 1075f8c-1075f8f 665->695 666->665 667->674 668->670 687 1076028-107602d 669->687 686 1075d55-1075d5a 670->686 671->674 683 1075d87-1075d8f GetLastError 672->683 684 1075d91-1075d93 672->684 673->670 692 1076031-1076038 674->692 693 107610c-1076118 GetLastError 674->693 675->669 676->665 677->674 678->669 683->684 688 1075d94-1075d97 683->688 686->684 696 1075d5c-1075d67 GetLastError 686->696 690 107602f 687->690 691 107603a-1076050 GetLastError 687->691 697 1075ec0-1075ed1 call 1075fd0 688->697 690->692 700 1076052-107605b 691->700 703 107605c-1076069 TryAcquireSRWLockExclusive 691->703 692->700 693->700 704 107617e-1076183 693->704 694->697 701 1075f96 695->701 698 1075d6f-1075d71 696->698 699 1075d69-1075d6a call 1065090 696->699 709 1075f98-1075fa1 697->709 712 1075ed7-1075ef8 697->712 698->684 708 1075d73-1075d74 698->708 699->698 701->709 710 1076075-107607c 703->710 711 107606b-1076070 call 105c5a0 703->711 705 1076198-10761a0 call 1075a70 704->705 720 10761a5 705->720 708->672 715 10760b5-10760c6 ReleaseSRWLockExclusive 710->715 716 107607e-1076094 VirtualFree 710->716 711->710 712->701 719 1075efe-1075f0e VirtualFree 712->719 717 10760e5-10760ed 715->717 718 10760c8-10760d0 715->718 721 107611d-107611e 716->721 722 107609a-10760ab 716->722 717->667 717->674 718->667 718->671 718->674 718->677 718->704 718->705 723 10764a7-10764b2 718->723 724 1076185-107618a 718->724 725 10764a1-10764a5 718->725 726 1076489-1076490 718->726 727 1076437-107643e 718->727 728 1076455-107645d 718->728 729 1076495-107649c 718->729 730 10764b4-10764ba 718->730 731 1076193 718->731 732 10761b0-10761bd VirtualFree 718->732 733 107647d-1076484 718->733 734 1075f14-1075f24 719->734 735 1075fa2-1075fc4 call 1075da0 719->735 736 10761a8-10761af 720->736 721->704 722->715 739 1076523-1076545 call 1020450 723->739 724->705 743 1076516-1076520 call 101fbe5 725->743 726->739 727->739 740 10764d6-10764e1 call 105ea6c 728->740 741 107645f-1076465 728->741 729->739 744 1076504-107650b call 105ea6c 730->744 745 10764bc-10764be 730->745 731->705 732->736 733->739 737 1075f26-1075f2b 734->737 738 1075f4e-1075f53 734->738 774 1075fc9-1075fcd 735->774 737->662 737->664 737->665 737->666 737->667 737->669 737->671 737->674 737->675 737->676 737->677 737->678 737->704 737->705 737->724 737->731 737->732 738->665 762 107654b-107656a call 1082573 739->762 763 107641a-107641e 739->763 759 10764e4-10764e6 740->759 746 1076583-107658f 741->746 747 107646b-107647b 741->747 743->739 761 107650e-1076510 744->761 745->746 751 10764c4-10764d4 745->751 758 1076594-1076615 call 100df3c call 101fd32 call 1076618 call 101fd8c call 101fd4a call 1082573 746->758 747->759 751->761 764 107656d-1076581 759->764 765 10764ec-1076502 call 101fbe5 759->765 761->764 767 1076512-1076515 761->767 770 1076427-107642e 763->770 771 1076420-1076424 763->771 764->758 765->739 767->743 778 1076443-1076450 call 101f8ac 770->778 779 1076430 770->779 771->770 778->739 779->723 779->725 779->726 779->727 779->728 779->729 779->730 779->733
                                                                                    APIs
                                                                                    • VirtualFree.KERNEL32(-00000100,00000000,00008000,?,010758FE,?,?,?,01074CD2,00000002,00000000,-00000100,?,00000000,-00000100,00000000), ref: 01075CED
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 1263568516-0
                                                                                    • Opcode ID: 535162facc06004760f05a832abd8d3ff623e2c7331e36928b481123a7f98aa8
                                                                                    • Instruction ID: 5449c321245b233a03864d997cbf4a3d55f3834b26e29d062ec6d48a759b128c
                                                                                    • Opcode Fuzzy Hash: 535162facc06004760f05a832abd8d3ff623e2c7331e36928b481123a7f98aa8
                                                                                    • Instruction Fuzzy Hash: EA510371E00205ABFB246A68DC49BFF3699EB40340F184439FB8AD7285EA7ADC4147D9
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 907 1075fd0-1075fe5 908 1075fe7-1075fec 907->908 909 1076008 907->909 910 1076185-107618a 908->910 911 1076001-1076006 908->911 912 10760ef 908->912 913 107600d-1076023 call 1075a70 908->913 914 10760d7-10760dc 908->914 915 10760f4-1076106 call 1075a70 908->915 916 1075ff3-1075ff8 908->916 917 1076193 908->917 918 10761b0-10761bd VirtualFree 908->918 919 10760de-10760e3 908->919 920 107617e-1076183 908->920 921 1075ffa-1075fff 908->921 922 1076198-10761a0 call 1075a70 908->922 909->913 910->922 911->913 912->915 927 1076028-107602d 913->927 914->915 932 1076031-1076038 915->932 933 107610c-1076118 GetLastError 915->933 916->913 917->922 926 10761a8-10761af 918->926 919->915 920->922 921->913 928 10761a5 922->928 930 107602f 927->930 931 107603a-1076050 GetLastError 927->931 928->926 930->932 934 1076052-107605b 931->934 935 107605c-1076069 TryAcquireSRWLockExclusive 931->935 932->934 933->920 933->934 936 1076075-107607c 935->936 937 107606b-1076070 call 105c5a0 935->937 939 10760b5-10760c6 ReleaseSRWLockExclusive 936->939 940 107607e-1076094 VirtualFree 936->940 937->936 941 10760e5-10760ed 939->941 942 10760c8-10760d0 939->942 943 107611d-107611e 940->943 944 107609a-10760ab 940->944 941->912 941->915 942->910 942->912 942->914 942->915 942->917 942->918 942->919 942->920 942->922 945 10764a7-10764b2 942->945 946 10764a1-10764a5 942->946 947 1076489-1076490 942->947 948 1076437-107643e 942->948 949 1076455-107645d 942->949 950 1076495-107649c 942->950 951 10764b4-10764ba 942->951 952 107647d-1076484 942->952 943->920 944->939 953 1076523-1076545 call 1020450 945->953 956 1076516-1076520 call 101fbe5 946->956 947->953 948->953 954 10764d6-10764e1 call 105ea6c 949->954 955 107645f-1076465 949->955 950->953 957 1076504-107650b call 105ea6c 951->957 958 10764bc-10764be 951->958 952->953 973 107654b-107656a call 1082573 953->973 974 107641a-107641e 953->974 971 10764e4-10764e6 954->971 959 1076583-107658f 955->959 960 107646b-107647b 955->960 956->953 972 107650e-1076510 957->972 958->959 963 10764c4-10764d4 958->963 970 1076594-1076615 call 100df3c call 101fd32 call 1076618 call 101fd8c call 101fd4a call 1082573 959->970 960->971 963->972 975 107656d-1076581 971->975 976 10764ec-1076502 call 101fbe5 971->976 972->975 978 1076512-1076515 972->978 980 1076427-107642e 974->980 981 1076420-1076424 974->981 975->970 976->953 978->956 987 1076443-1076450 call 101f8ac 980->987 988 1076430 980->988 981->980 987->953 988->945 988->946 988->947 988->948 988->949 988->950 988->951 988->952
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,01075DDC,?,00000000,00000000,?,-00000100,?,00000000), ref: 0107603D
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(010F2E8C,?,?,?,?,?,01075DDC,?,00000000,00000000,?,-00000100,?,00000000), ref: 01076061
                                                                                    • VirtualFree.KERNEL32(?,00000000,00008000,?,?,?,?,?,01075DDC,?,00000000,00000000,?,-00000100,?,00000000), ref: 0107608C
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(010F2E8C,?,?,?,?,?,01075DDC,?,00000000,00000000,?,-00000100,?,00000000), ref: 010760BA
                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,01075DDC,?,00000000,00000000,?,-00000100), ref: 0107610C
                                                                                    • VirtualFree.KERNEL32(00000000,00000002,00004000,?,?,0105E694,3FE08300,00000002,00000002,00000000,?,?,?,3FE08300,3FE08340,?), ref: 010761B7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorExclusiveFreeLastLockVirtual$AcquireRelease
                                                                                    • String ID:
                                                                                    • API String ID: 1130761037-0
                                                                                    • Opcode ID: 522fa9175929e47cdf7fb47743f950b52a2b33582c21d24d0779023ea2c018f8
                                                                                    • Instruction ID: 6cc8c990b31a0e1cd3fbe17f07359cf4190eccabe4e31bc2f2121a41e0a6e345
                                                                                    • Opcode Fuzzy Hash: 522fa9175929e47cdf7fb47743f950b52a2b33582c21d24d0779023ea2c018f8
                                                                                    • Instruction Fuzzy Hash: 6C71AF71E087029BE7118F68D885BAB77F8FB84340F14496DF6C797640EB76E8008B99
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1000 1075da0-1075db8 1001 1075dca-1075de3 call 1075fd0 1000->1001 1002 1075dba-1075dc7 call 107f640 1000->1002 1007 1075e17-1075e1f 1001->1007 1008 1075de5-1075dec 1001->1008 1002->1001 1011 1075e25-1075e42 call 1075fd0 1007->1011 1012 1075f88-1075f8a 1007->1012 1009 1075df2-1075e02 VirtualFree 1008->1009 1010 1075f98-1075fa1 1008->1010 1013 1075fa5-1075fa6 1009->1013 1014 1075e08-1075e15 1009->1014 1019 1075e75-1075e7a 1011->1019 1020 1075e44-1075e4d 1011->1020 1012->1010 1016 1075fa8-1075fc4 call 1075da0 1013->1016 1014->1011 1025 1075fc9-1075fcd 1016->1025 1019->1012 1021 1075e80-1075e8e 1019->1021 1020->1010 1023 1075e53-1075e63 VirtualFree 1020->1023 1021->1016 1024 1075e94-1075eb1 1021->1024 1023->1013 1026 1075e69-1075e73 1023->1026 1027 1075ec0-1075ed1 call 1075fd0 1024->1027 1026->1021 1027->1010 1030 1075ed7-1075ef8 1027->1030 1031 1075f96 1030->1031 1032 1075efe-1075f0e VirtualFree 1030->1032 1031->1010 1033 1075f14-1075f24 1032->1033 1034 1075fa2-1075fa3 1032->1034 1035 1075f26-1075f2b 1033->1035 1036 1075f4e-1075f53 1033->1036 1034->1013 1037 1075f47-1075f4c 1035->1037 1038 1076185-107618a 1035->1038 1039 1076001-1076006 1035->1039 1040 1075f60-1075f72 call 1075a70 1035->1040 1041 1075f40-1075f45 1035->1041 1042 10760ef 1035->1042 1043 107600d-1076023 call 1075a70 1035->1043 1044 10760d7-10760dc 1035->1044 1045 10760f4-1076106 call 1075a70 1035->1045 1046 1075ff3-1075ff8 1035->1046 1047 1076193 1035->1047 1048 1075f32-1075f37 1035->1048 1049 10761b0-10761bd VirtualFree 1035->1049 1050 10760de-10760e3 1035->1050 1051 107617e-1076183 1035->1051 1052 1075ffa-1075fff 1035->1052 1053 1076198-10761a0 call 1075a70 1035->1053 1036->1040 1037->1040 1038->1053 1039->1043 1067 1075f74-1075f83 GetLastError 1040->1067 1068 1075f8c-1075f8f 1040->1068 1041->1040 1042->1045 1060 1076028-107602d 1043->1060 1044->1045 1065 1076031-1076038 1045->1065 1066 107610c-1076118 GetLastError 1045->1066 1046->1043 1047->1053 1048->1040 1057 10761a8-10761af 1049->1057 1050->1045 1051->1053 1052->1043 1061 10761a5 1053->1061 1063 107602f 1060->1063 1064 107603a-1076050 GetLastError 1060->1064 1061->1057 1063->1065 1069 1076052-107605b 1064->1069 1070 107605c-1076069 TryAcquireSRWLockExclusive 1064->1070 1065->1069 1066->1051 1066->1069 1067->1027 1068->1031 1071 1076075-107607c 1070->1071 1072 107606b-1076070 call 105c5a0 1070->1072 1074 10760b5-10760c6 ReleaseSRWLockExclusive 1071->1074 1075 107607e-1076094 VirtualFree 1071->1075 1072->1071 1076 10760e5-10760ed 1074->1076 1077 10760c8-10760d0 1074->1077 1078 107611d-107611e 1075->1078 1079 107609a-10760ab 1075->1079 1076->1042 1076->1045 1077->1038 1077->1042 1077->1044 1077->1045 1077->1047 1077->1049 1077->1050 1077->1051 1077->1053 1080 10764a7-10764b2 1077->1080 1081 10764a1-10764a5 1077->1081 1082 1076489-1076490 1077->1082 1083 1076437-107643e 1077->1083 1084 1076455-107645d 1077->1084 1085 1076495-107649c 1077->1085 1086 10764b4-10764ba 1077->1086 1087 107647d-1076484 1077->1087 1078->1051 1079->1074 1088 1076523-1076545 call 1020450 1080->1088 1091 1076516-1076520 call 101fbe5 1081->1091 1082->1088 1083->1088 1089 10764d6-10764e1 call 105ea6c 1084->1089 1090 107645f-1076465 1084->1090 1085->1088 1092 1076504-107650b call 105ea6c 1086->1092 1093 10764bc-10764be 1086->1093 1087->1088 1108 107654b-107656a call 1082573 1088->1108 1109 107641a-107641e 1088->1109 1106 10764e4-10764e6 1089->1106 1094 1076583-107658f 1090->1094 1095 107646b-107647b 1090->1095 1091->1088 1107 107650e-1076510 1092->1107 1093->1094 1098 10764c4-10764d4 1093->1098 1105 1076594-1076615 call 100df3c call 101fd32 call 1076618 call 101fd8c call 101fd4a call 1082573 1094->1105 1095->1106 1098->1107 1110 107656d-1076581 1106->1110 1111 10764ec-1076502 call 101fbe5 1106->1111 1107->1110 1113 1076512-1076515 1107->1113 1115 1076427-107642e 1109->1115 1116 1076420-1076424 1109->1116 1110->1105 1111->1088 1113->1091 1122 1076443-1076450 call 101f8ac 1115->1122 1123 1076430 1115->1123 1116->1115 1122->1088 1123->1080 1123->1081 1123->1082 1123->1083 1123->1084 1123->1085 1123->1086 1123->1087
                                                                                    APIs
                                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,00000000,?,-00000100,?,00000000), ref: 01075DFA
                                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,00000000,00000000,?,-00000100,?,00000000), ref: 01075E5B
                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 01075F74
                                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 01075F06
                                                                                      • Part of subcall function 01075A70: VirtualAlloc.KERNEL32(00000000,00000002,00000002,3FE08300,00000002,?,00000002,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694), ref: 01075A8B
                                                                                      • Part of subcall function 01075A70: GetLastError.KERNEL32(?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075AB8
                                                                                      • Part of subcall function 01075A70: Sleep.KERNEL32(00000032,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075AD6
                                                                                      • Part of subcall function 01075A70: VirtualAlloc.KERNEL32(00000000,00000002,00000002,3FE08300,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002), ref: 01075AE4
                                                                                      • Part of subcall function 01075A70: GetLastError.KERNEL32(?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075AF2
                                                                                      • Part of subcall function 01075A70: Sleep.KERNEL32(00000032,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075B10
                                                                                      • Part of subcall function 01075A70: VirtualAlloc.KERNEL32(00000000,00000002,00000002,3FE08300,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002), ref: 01075B1E
                                                                                      • Part of subcall function 01075A70: GetLastError.KERNEL32(?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075B2C
                                                                                      • Part of subcall function 01075A70: Sleep.KERNEL32(00000032,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075B4A
                                                                                      • Part of subcall function 01075A70: VirtualAlloc.KERNEL32(00000000,00000002,00000002,3FE08300,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002), ref: 01075B58
                                                                                      • Part of subcall function 01075A70: GetLastError.KERNEL32(?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075B66
                                                                                      • Part of subcall function 01075A70: Sleep.KERNEL32(00000032,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075B84
                                                                                      • Part of subcall function 01075A70: VirtualAlloc.KERNEL32(00000000,00000002,00000002,3FE08300,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002), ref: 01075B92
                                                                                      • Part of subcall function 01075A70: GetLastError.KERNEL32(?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075BA0
                                                                                      • Part of subcall function 01075A70: Sleep.KERNEL32(00000032,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075BBE
                                                                                      • Part of subcall function 01075A70: VirtualAlloc.KERNEL32(00000000,00000002,00000002,3FE08300,?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002), ref: 01075BCC
                                                                                      • Part of subcall function 01075A70: GetLastError.KERNEL32(?,010761A5,00000000,00000002,00001000,00000001,?,?,0105E694,3FE08300,00000002,00000002,00000000,?), ref: 01075BDA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: Virtual$ErrorLast$Alloc$Sleep$Free
                                                                                    • String ID:
                                                                                    • API String ID: 2167363077-0
                                                                                    • Opcode ID: 257b8ff49d228f9338670853913e9d3ec9299e70a1a6de73766d4a2186df6f75
                                                                                    • Instruction ID: dc587e1d22e0bbae3bba10aebd5a04bb3db4bc591d0a4c342949b510c02fd48f
                                                                                    • Opcode Fuzzy Hash: 257b8ff49d228f9338670853913e9d3ec9299e70a1a6de73766d4a2186df6f75
                                                                                    • Instruction Fuzzy Hash: 8971F772F002069BFB109E68DC85BEF37A9EB84344F184479FE89D7244EA76DC118799
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1271 105c730-105c74c TryAcquireSRWLockExclusive 1272 105c74e-105c755 1271->1272 1273 105c768-105c776 call 105c5a0 1271->1273 1275 105c757-105c763 ReleaseSRWLockExclusive 1272->1275 1276 105c778-105c78c call 100a680 1272->1276 1273->1275 1273->1276 1277 105c91c-105c920 1275->1277 1281 105c7ee-105c80f 1276->1281 1282 105c78e-105c7e9 call 1075fb0 * 4 1276->1282 1284 105c811-105c813 1281->1284 1285 105c819-105c830 1281->1285 1282->1281 1284->1285 1286 105c923-105c926 1284->1286 1287 105c842-105c846 1285->1287 1288 105c832-105c83d 1285->1288 1290 105c84f-105c885 call 100c110 1287->1290 1292 105c848 1287->1292 1288->1290 1291 105c83f-105c840 1288->1291 1298 105c890-105c8ab call 1073d80 1290->1298 1291->1287 1292->1290 1303 105c8ad-105c8b4 1298->1303 1304 105c8b6-105c8b8 1303->1304 1305 105c8dd-105c8ed call 105b910 1303->1305 1307 105c8c0-105c8db call 1073d80 1304->1307 1310 105c8f7-105c919 ReleaseSRWLockExclusive 1305->1310 1311 105c8ef-105c8f2 call 105ba90 1305->1311 1307->1305 1310->1277 1311->1310
                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32 ref: 0105C741
                                                                                    • ReleaseSRWLockExclusive.KERNEL32 ref: 0105C75A
                                                                                    • ReleaseSRWLockExclusive.KERNEL32 ref: 0105C904
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$Release$Acquire
                                                                                    • String ID:
                                                                                    • API String ID: 1021914862-0
                                                                                    • Opcode ID: c442fabdb58280e181c0530568ea10a8308205813c28e0a7bc9e346ba5674c3d
                                                                                    • Instruction ID: e519e18465680dff3dda73057e65afba6706a384c7c9cf54eb76c23130f78541
                                                                                    • Opcode Fuzzy Hash: c442fabdb58280e181c0530568ea10a8308205813c28e0a7bc9e346ba5674c3d
                                                                                    • Instruction Fuzzy Hash: 6851C4708087869AFB52AB38C9443EAFFE4BF51318F498699DCD44A242D775A1D8C7C2
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1314 108fed8-108ff40 1316 108ff49-108ff4d 1314->1316 1317 108ff42-108ff44 1314->1317 1319 108ff6a-108ff8d GetModuleFileNameW 1316->1319 1320 108ff4f-108ff52 1316->1320 1318 1090065-1090067 1317->1318 1322 108ff8f-108ff92 1319->1322 1323 108ff94 1319->1323 1320->1319 1321 108ff54-108ff65 call 1090b6c call 109c332 1320->1321 1332 1090064 1321->1332 1322->1323 1325 108ff99-108ffb7 call 1090068 call 108fee3 1322->1325 1323->1325 1333 108ffbc-108ffc3 1325->1333 1332->1318 1334 108ffd1-108ffed call 1090068 1333->1334 1335 108ffc5-108ffcf call 1090b6c 1333->1335 1341 109000b-1090020 call 109fbb2 1334->1341 1342 108ffef-108fffe 1334->1342 1340 1090000-1090009 call 104ac80 1335->1340 1347 1090062-1090063 1340->1347 1348 109002c-1090035 1341->1348 1349 1090022-109002a call 104ac80 1341->1349 1342->1340 1347->1332 1350 109003f-1090054 call 104ac80 1348->1350 1351 1090037-109003d 1348->1351 1355 1090056-1090060 call 104ac80 1349->1355 1350->1355 1351->1350 1351->1351 1355->1347
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: C:\Users\Public\Documents\identity_helper.exe
                                                                                    • API String ID: 0-3719357055
                                                                                    • Opcode ID: 600bcf494e92a4b6f02e37127716c0266c4fe16c02ff1dd0de31f764923c5f00
                                                                                    • Instruction ID: c77054189e4fc0e4b9e3966982270a729d5e3bac282844d23bfb6f2c1e419a20
                                                                                    • Opcode Fuzzy Hash: 600bcf494e92a4b6f02e37127716c0266c4fe16c02ff1dd0de31f764923c5f00
                                                                                    • Instruction Fuzzy Hash: 8641C372A04219EFDB31AFA9D88499FBBEDEF85660F1100AAF5C5D7205D6718900DB90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1359 106ab40-106ab4e 1360 106ab54-106ab95 1359->1360 1361 106ac8a-106ac91 1359->1361 1362 106ab97-106ab9d 1360->1362 1363 106abe1-106abe5 1360->1363 1364 106aba3-106abb0 1362->1364 1365 106ad78-106ad8d 1362->1365 1366 106acc1-106acd5 TryAcquireSRWLockExclusive 1363->1366 1367 106abeb-106ac03 1363->1367 1368 106abb2-106abb6 1364->1368 1369 106abbc-106abbe 1364->1369 1374 106ad98-106ad9b call 1054000 1365->1374 1370 106acd7-106acd9 call 105c5a0 1366->1370 1371 106acde-106acf1 1366->1371 1367->1366 1372 106ac09-106ac11 1367->1372 1368->1369 1373 106adcd-106add1 1368->1373 1375 106abc0-106abc9 1369->1375 1370->1371 1377 106acf7-106ad10 1371->1377 1378 106ae32-106ae33 1371->1378 1379 106ac17-106ac1f 1372->1379 1380 106ac9a-106aca1 1372->1380 1386 106add3-106add6 1373->1386 1387 106ae1c-106ae1f 1373->1387 1393 106ada0-106adc8 1374->1393 1375->1375 1385 106abcb-106abcd 1375->1385 1388 106ad16-106ad31 1377->1388 1389 106ae35-106ae48 1377->1389 1378->1389 1379->1380 1381 106ac21-106ac37 1379->1381 1382 106aca7-106acbd 1380->1382 1383 106ae14 1380->1383 1390 106ac92-106ac96 1381->1390 1391 106ac39-106ac61 1381->1391 1382->1366 1383->1387 1385->1374 1394 106abd3-106abdb 1385->1394 1392 106add9-106ade9 1386->1392 1387->1392 1395 106ad37-106ad39 1388->1395 1396 106ae08-106ae0a call 100bda0 1388->1396 1397 106ae93-106ae96 1389->1397 1398 106ae4a-106ae84 1389->1398 1390->1380 1401 106ac67-106ac6d 1391->1401 1402 106ad4b-106ad63 call 105c1c0 1391->1402 1404 106ae21-106ae30 1392->1404 1405 106adeb-106adfa call 1085340 1392->1405 1393->1361 1394->1363 1394->1393 1395->1396 1406 106ad3f-106ad46 ReleaseSRWLockExclusive 1395->1406 1411 106ae0f 1396->1411 1399 106ae86-106ae89 1398->1399 1400 106ae97-106ae9a 1398->1400 1407 106ae8c-106ae92 1399->1407 1400->1407 1409 106ac73-106ac86 1401->1409 1410 106ad68-106ad73 call 105c2f0 1401->1410 1402->1401 1417 106adfd-106ae03 1404->1417 1405->1417 1406->1361 1409->1361 1410->1409 1411->1406 1417->1369
                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 0106ACCD
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?,00000001), ref: 0106AD40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$AcquireRelease
                                                                                    • String ID:
                                                                                    • API String ID: 17069307-0
                                                                                    • Opcode ID: 9911e061f845cc41efdf0a5e9f498fd51e0abda407571eed800d7d817fb4a3f5
                                                                                    • Instruction ID: 3d85c5aa96b26df57ca1cd477c3602979734376b5703794716f6c2fbcb55619a
                                                                                    • Opcode Fuzzy Hash: 9911e061f845cc41efdf0a5e9f498fd51e0abda407571eed800d7d817fb4a3f5
                                                                                    • Instruction Fuzzy Hash: E4A14532700206CFD755DF28C8807A5FBE9FF41324F0886A8E9899F656D775E851CB80
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1420 109aa5b-109aa6f GetLastError 1421 109aa8b-109aa95 call 109b193 1420->1421 1422 109aa71-109aa79 call 109b154 1420->1422 1429 109aa9b-109aaa3 call 104ad00 1421->1429 1430 109aa97-109aa99 1421->1430 1427 109aa7b-109aa84 1422->1427 1428 109aa86 1422->1428 1431 109ab00-109ab0b SetLastError 1427->1431 1428->1421 1433 109aaa8-109aaae 1429->1433 1430->1431 1434 109aac1-109aacf call 109b193 1433->1434 1435 109aab0-109aabf call 109b193 1433->1435 1441 109aae8-109aafd call 109ac1c call 104ac80 1434->1441 1442 109aad1-109aadf call 109b193 1434->1442 1440 109aae0-109aae6 call 104ac80 1435->1440 1449 109aaff 1440->1449 1441->1449 1442->1440 1449->1431
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(00000000,00000001,01090B71,01097BB4,010DF0E0,00000028,01092A4C,00000016,0109A9C4,?,?), ref: 0109AA5F
                                                                                    • SetLastError.KERNEL32(00000000,?,00000008,000000FF,?,?), ref: 0109AB01
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 1452528299-0
                                                                                    • Opcode ID: 7622f9c58277673f919566dc6812ea24dbb779fcb1cf8dc8584b85b69b59ad16
                                                                                    • Instruction ID: 13b7d4cb26829ef8335d8c95d0d72bda9b79d145c83ac3e20c43e71522515b2d
                                                                                    • Opcode Fuzzy Hash: 7622f9c58277673f919566dc6812ea24dbb779fcb1cf8dc8584b85b69b59ad16
                                                                                    • Instruction Fuzzy Hash: 00114CF1304212EFEF6176B5BDE4EAB3AD89B40578F100134F5C1970A5DF5D48006220
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1452 1076120-1076136 VirtualFree 1453 1076142-1076143 1452->1453 1454 1076138-1076140 GetLastError 1452->1454 1454->1453 1455 1076144-1076147 1454->1455
                                                                                    APIs
                                                                                    • VirtualFree.KERNELBASE(?,00000001,00004000,?,0100C1DF,00000001,?,00000001,?,?,?,?), ref: 0107612E
                                                                                    • GetLastError.KERNEL32(?,0100C1DF,00000001,?,00000001,?,?,?,?), ref: 01076138
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFreeLastVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 499627090-0
                                                                                    • Opcode ID: 0820cd158c85b89e5585a9563da43a5be50fe7ca92c2899f47b47e843654c0be
                                                                                    • Instruction ID: 6bbec0a19fcc53aa8380f4939758688759d7534b3c7155a4ef2b7b008b9194db
                                                                                    • Opcode Fuzzy Hash: 0820cd158c85b89e5585a9563da43a5be50fe7ca92c2899f47b47e843654c0be
                                                                                    • Instruction Fuzzy Hash: 43D0C93164020C6BAB211E65BC09B153F9DAB01B55B0844A4FB498A412EB7390919748
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • __Init_thread_header.LIBCMT ref: 01024BB0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: Init_thread_header
                                                                                    • String ID:
                                                                                    • API String ID: 3738618077-0
                                                                                    • Opcode ID: 9053591e887eee7e57cb4da5ae1e614434e4ddb2eabb6684955dd70189305469
                                                                                    • Instruction ID: 3e714b9b3f7d9d3c47ef7954c2798e28b9d13aaa9077898aeac1a6418f0d19d2
                                                                                    • Opcode Fuzzy Hash: 9053591e887eee7e57cb4da5ae1e614434e4ddb2eabb6684955dd70189305469
                                                                                    • Instruction Fuzzy Hash: CF8149B0A042198FD724AF9BE85CB5A7BF1FB54B04F014209E4E5DF395DB7A98188F81
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ___free_lconv_mon
                                                                                    • String ID:
                                                                                    • API String ID: 3903695350-0
                                                                                    • Opcode ID: 64f37b87885ef83afc357c5affb43ff5f4d87a1eae1dcb138633d2853619fe2b
                                                                                    • Instruction ID: aff2e9290578b4eabab0e736556c23202021892453149918cb9d4049792682cc
                                                                                    • Opcode Fuzzy Hash: 64f37b87885ef83afc357c5affb43ff5f4d87a1eae1dcb138633d2853619fe2b
                                                                                    • Instruction Fuzzy Hash: 02319F71600306DFFFA1EA78D884B9AB7E9BF00251F144469E1DAD7190DF34EC809B69
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __Init_thread_header.LIBCMT ref: 010283BB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: Init_thread_header
                                                                                    • String ID:
                                                                                    • API String ID: 3738618077-0
                                                                                    • Opcode ID: 1fea2600dd122d2c8cc5378ce6b612213f81e996c735caae2395ffc9d1b1b01d
                                                                                    • Instruction ID: 6c044ef60be1d8596958996e0637599523a5f6a682397df2f1fbbd3070d64923
                                                                                    • Opcode Fuzzy Hash: 1fea2600dd122d2c8cc5378ce6b612213f81e996c735caae2395ffc9d1b1b01d
                                                                                    • Instruction Fuzzy Hash: 532198B4904300CFC718EF09E949A99BBF0FB49724F0581AEF9998F351E3369814CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __Init_thread_header.LIBCMT ref: 010247C3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: Init_thread_header
                                                                                    • String ID:
                                                                                    • API String ID: 3738618077-0
                                                                                    • Opcode ID: 9cddbe0a5ab05ef884c2f090452f80b61cb2687c8b7a25f8f04a13941bce3e04
                                                                                    • Instruction ID: 59decad429719a6a6dc716c7d331350b17c2012a0e3e4561fe12f52ae542a8c8
                                                                                    • Opcode Fuzzy Hash: 9cddbe0a5ab05ef884c2f090452f80b61cb2687c8b7a25f8f04a13941bce3e04
                                                                                    • Instruction Fuzzy Hash: 3411C0B19006A0CFC720EF59E849B9AB7F0FB46B20F054279D596DB380D3356800CBE1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __Init_thread_header.LIBCMT ref: 01037265
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: Init_thread_header
                                                                                    • String ID:
                                                                                    • API String ID: 3738618077-0
                                                                                    • Opcode ID: a9f021799ea2d34f8a1cfdef475ae3ef75c22bcc036d059ec6988f25bd0b37ee
                                                                                    • Instruction ID: b08ffeaad4a1bdf51c907cfb7642f4792c6fde9daa350d24d33a8bf389a5590b
                                                                                    • Opcode Fuzzy Hash: a9f021799ea2d34f8a1cfdef475ae3ef75c22bcc036d059ec6988f25bd0b37ee
                                                                                    • Instruction Fuzzy Hash: 8D118EB8504640CFD320EF5AE949A59BBF4FB48B28F00866AF5954B340C3366404CBD1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __Init_thread_header.LIBCMT ref: 01036F15
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: Init_thread_header
                                                                                    • String ID:
                                                                                    • API String ID: 3738618077-0
                                                                                    • Opcode ID: c7ac9b212fb73fda7ebacde389d026543f4be623597293be335082e902940cfc
                                                                                    • Instruction ID: 455b1f72cce225d7bccb09f133eb6e86d2fc08b968f0ad8c80542b70ad3c0335
                                                                                    • Opcode Fuzzy Hash: c7ac9b212fb73fda7ebacde389d026543f4be623597293be335082e902940cfc
                                                                                    • Instruction Fuzzy Hash: 9E11AC78540640CFD320EF0AE849B99BBE4FB88B28F404A6AF5C50B780C3362514CBD1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetInstallDetailsPayload.MSEDGE_ELF(?,%s:%d: assertion %s failed: %s,..\..\buildtools\third_party\libc++\trunk\include\string,00000387,__s != nullptr,basic_string(const char*) detected nullptr,?,00000000,0100CC06,?,0105F0CB,extended,?), ref: 0100CEC7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: DetailsInstallPayload
                                                                                    • String ID:
                                                                                    • API String ID: 3030567736-0
                                                                                    • Opcode ID: 6ec441e05d17875c870612afcfc8379d0070038f3e0b1a8cb2b6a4418320408a
                                                                                    • Instruction ID: d629b0be44656a371a3de9696c65c9274ada8528b5b7110361c350d79022ea50
                                                                                    • Opcode Fuzzy Hash: 6ec441e05d17875c870612afcfc8379d0070038f3e0b1a8cb2b6a4418320408a
                                                                                    • Instruction Fuzzy Hash: 6EB012F280060907869037E07C0E447320C04210207850060AD4D45104EC5EF090439A
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 01069BA7
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?,?), ref: 01069FCE
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 0106A2C8
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?,?,00000000,00000000,00004000,?), ref: 0106A301
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$Release$Acquire
                                                                                    • String ID: A$first
                                                                                    • API String ID: 1021914862-3078553561
                                                                                    • Opcode ID: e0ad8233f84d1865d8742ee5598d195f1ca9dda9bc01e28e486dbe881b40b112
                                                                                    • Instruction ID: 04caa7ef436ef78fad6f0fb21d22d4fadf2eda2d4da7aee718108f4726fae959
                                                                                    • Opcode Fuzzy Hash: e0ad8233f84d1865d8742ee5598d195f1ca9dda9bc01e28e486dbe881b40b112
                                                                                    • Instruction Fuzzy Hash: B8621272604302CFD718DF28C88076ABBE6FF88318F09866DE9C59B685D775E945CB81
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 3333$3333$3333$3333$3333$3333$3333$3333$UUUU$UUUU$UUUU$UUUU$UUUU$UUUU$UUUU$UUUU$UUUU
                                                                                    • API String ID: 0-3925639157
                                                                                    • Opcode ID: 5886f80acb38bb4a72f48d7ef223183355da908bd1e2f2f65a90cc3244282943
                                                                                    • Instruction ID: a01a762cf72bf99a0c188d367c3e6cfc0970bad371fc4b630614da49b81e3eec
                                                                                    • Opcode Fuzzy Hash: 5886f80acb38bb4a72f48d7ef223183355da908bd1e2f2f65a90cc3244282943
                                                                                    • Instruction Fuzzy Hash: 0CE120B7F209258BCB54CF5DC88168DB7F2AB9C32072D816AD919F7305D674ED068B80
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: _strlen$CountLocalTickTime
                                                                                    • String ID: )] $:$:$UNKNOWN$VERBOSE
                                                                                    • API String ID: 3535325690-776901039
                                                                                    • Opcode ID: 92209fda0a0041ef82fc4ed203f0fef36e870b173ea5f6cf7646e5eb8896b73e
                                                                                    • Instruction ID: 0a5083de052b8025a05b5ab7312325191ddbf726c59268ce80c246b9472d812d
                                                                                    • Opcode Fuzzy Hash: 92209fda0a0041ef82fc4ed203f0fef36e870b173ea5f6cf7646e5eb8896b73e
                                                                                    • Instruction Fuzzy Hash: 7B9116B4E00305AFEB11EBA0CC44FEF7BB9AF56708F044458E8856B3C1EA755945CB62
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • OQS_CPU_has_extension.IDENTITY_HELPER(00000002), ref: 0100E00E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: U_has_extension
                                                                                    • String ID: """"$""""$DDDD$DDDD$DDDD$DDDD$UUUU
                                                                                    • API String ID: 2855587727-881520860
                                                                                    • Opcode ID: 73a17f70ee3613b9c9635ee9e1dff68991dba0e8e9c2c8efa304526f8b6c0332
                                                                                    • Instruction ID: 919b6e6d0ec80690afcddb66e61be87863838a78840f4f02e2fd8d627e19f733
                                                                                    • Opcode Fuzzy Hash: 73a17f70ee3613b9c9635ee9e1dff68991dba0e8e9c2c8efa304526f8b6c0332
                                                                                    • Instruction Fuzzy Hash: 10024673A083508FE715CF68C84119AFBE1FBD5314F0985ADE8D897282E6359906CB81
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetModuleHandleExW.KERNEL32(00000001,FFFFFFFF,00000000), ref: 0106417C
                                                                                      • Part of subcall function 01092A3C: IsProcessorFeaturePresent.KERNEL32(00000017,0109A9C4,?,?), ref: 01092A58
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: FeatureHandleModulePresentProcessor
                                                                                    • String ID: ..\..\base\native_library_win.cc$GetFileAttributesExFromAppW$PinSystemLibrary$msedge.exe
                                                                                    • API String ID: 1274991676-3668766867
                                                                                    • Opcode ID: 876035f3a2a426d9d9adaeae173c2b5655bd48d08602a5e06e91fecb6889e642
                                                                                    • Instruction ID: 5041a5af0c9f7f88c1093c73eb3bdbd6b2e833798bf54c47583ac80ae92e52b8
                                                                                    • Opcode Fuzzy Hash: 876035f3a2a426d9d9adaeae173c2b5655bd48d08602a5e06e91fecb6889e642
                                                                                    • Instruction Fuzzy Hash: 8991C470A083829BE710CF28D88476FBBD9ABD5714F144A6CF5D5CB281DB74D948C792
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • CreateFileMappingW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 0106714F
                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,01049C1A,00000000), ref: 01067160
                                                                                    • SetLastError.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,01049C1A,00000000), ref: 01067199
                                                                                    • MapViewOfFile.KERNEL32(?,?,?,?,?), ref: 01067297
                                                                                    Strings
                                                                                    • MapFileRegionToMemory, xrefs: 010670DA
                                                                                    • ..\..\base\files\memory_mapped_file_win.cc, xrefs: 010670D5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFileLast$CreateMappingView
                                                                                    • String ID: ..\..\base\files\memory_mapped_file_win.cc$MapFileRegionToMemory
                                                                                    • API String ID: 2231327692-2123313340
                                                                                    • Opcode ID: 50e9e77c938dc588830077b3b8ba866487c02bad4f89ecbfe5924f8519af419a
                                                                                    • Instruction ID: 5215710da195190356c9b8f060272653a601fe4a839523f356330996792a4ac2
                                                                                    • Opcode Fuzzy Hash: 50e9e77c938dc588830077b3b8ba866487c02bad4f89ecbfe5924f8519af419a
                                                                                    • Instruction Fuzzy Hash: A57118716003029BD7149F68C891B6FB7EAEBD4314F148A2DEAD68B380EB75D805C782
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %s:%d: assertion %s failed: %s$..\..\buildtools\third_party\libc++\trunk\include\vector$__n < size()$bucket_count$max$min$type$vector[] index out of bounds
                                                                                    • API String ID: 0-596577333
                                                                                    • Opcode ID: 52f0c1813f19acdd2ddd200741a0eb931675c910b1bd7dd0de1050c94c6cb17a
                                                                                    • Instruction ID: dd5e11bc82e33bf631fc84dbfe6055cb5881c1d2abdb866913a8a0eb433a9fe1
                                                                                    • Opcode Fuzzy Hash: 52f0c1813f19acdd2ddd200741a0eb931675c910b1bd7dd0de1050c94c6cb17a
                                                                                    • Instruction Fuzzy Hash: F371AFB0E0020A9BCF14DF68D890AAFB7B5EF84714F044129ED96AB385DB71ED158BD1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(00000000), ref: 0107A31C
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?,?), ref: 0107A3D9
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(00000000,?), ref: 0107A40C
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 0107A4A4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$AcquireRelease
                                                                                    • String ID:
                                                                                    • API String ID: 17069307-0
                                                                                    • Opcode ID: 17de3c6c69107562f21f340faae861103118ad807a92f3cb00e5fc3d010f9289
                                                                                    • Instruction ID: bfb848012738d4ecfdd5f2d8283a14a4bd380e0a17d54097040f01c0ae9d36c8
                                                                                    • Opcode Fuzzy Hash: 17de3c6c69107562f21f340faae861103118ad807a92f3cb00e5fc3d010f9289
                                                                                    • Instruction Fuzzy Hash: 6BD10F71F00356DBCB14DF28D880AAEBBE4BF94210F084A29EAC18B641DB75E905CBD5
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • ___from_strstr_to_strchr.LIBCMT ref: 0107942D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ___from_strstr_to_strchr
                                                                                    • String ID: Genu$OPENSSL_ia32cap$ineI$ntel
                                                                                    • API String ID: 601868998-3767422159
                                                                                    • Opcode ID: e69b99a42c9d7dcd8c4ae4e557bd07e2929540c4ebc2faa67110592b060b230b
                                                                                    • Instruction ID: bcbea59fa275089cc2b48583764d339e11803b56f323072b74d2da158f01aa22
                                                                                    • Opcode Fuzzy Hash: e69b99a42c9d7dcd8c4ae4e557bd07e2929540c4ebc2faa67110592b060b230b
                                                                                    • Instruction Fuzzy Hash: B5412AB2F0420507EF6C857CE8963BE75C6AB9133CF18927EEA97D22C5DD3599408289
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetLocaleInfoW.KERNEL32(00000006,2000000B,0109F36D,00000002,00000000,?,?,?,0109F36D,?,00000000), ref: 0109FA50
                                                                                    • GetLocaleInfoW.KERNEL32(00000006,20001004,0109F36D,00000002,00000000,?,?,?,0109F36D,?,00000000), ref: 0109FA79
                                                                                    • GetACP.KERNEL32(?,?,0109F36D,?,00000000), ref: 0109FA8E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoLocale
                                                                                    • String ID: ACP$OCP
                                                                                    • API String ID: 2299586839-711371036
                                                                                    • Opcode ID: bc539f8336e623a3db9b142f090c33f8651ca11c8ac3f3d655454448781339bf
                                                                                    • Instruction ID: 3f2a23105b6982be00123b18a43817841540f902c78f7f3f67ac55a543362001
                                                                                    • Opcode Fuzzy Hash: bc539f8336e623a3db9b142f090c33f8651ca11c8ac3f3d655454448781339bf
                                                                                    • Instruction Fuzzy Hash: 7921C7B2600103AAEF758B18C820A9B7BE6AF44E54B5A80A4E9CAD7115EB36DD41E350
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • CloseHandle.KERNEL32(?), ref: 010653F0
                                                                                    • CloseHandle.KERNEL32(?), ref: 01065405
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 01065455
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 010654C3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandle$AcquireCurrentExclusiveLockThread
                                                                                    • String ID:
                                                                                    • API String ID: 436005173-0
                                                                                    • Opcode ID: 29ca9caf9696fe85918788f0c2e5e829ad24f1f8a7e985984e0ca91d65fe07da
                                                                                    • Instruction ID: ee9d6fa3510d1b64c8418f4f8e3269957bfe98440cf65117dcd910a7110d8cac
                                                                                    • Opcode Fuzzy Hash: 29ca9caf9696fe85918788f0c2e5e829ad24f1f8a7e985984e0ca91d65fe07da
                                                                                    • Instruction Fuzzy Hash: B661F570E0020A9BDB14DF68E854BFE7BE9AF85244F044468EAC69F341DB75A911C7A1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 0109A90A: GetLastError.KERNEL32(?,?,0108922D,?,?,?,?,01092CDC,?,?,?,?), ref: 0109A90E
                                                                                      • Part of subcall function 0109A90A: SetLastError.KERNEL32(00000000,?,?), ref: 0109A9B0
                                                                                    • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 0109F33F
                                                                                    • IsValidCodePage.KERNEL32(00000000), ref: 0109F37D
                                                                                    • IsValidLocale.KERNEL32(?,00000001), ref: 0109F390
                                                                                    • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 0109F3D8
                                                                                    • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 0109F3F3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                    • String ID:
                                                                                    • API String ID: 415426439-0
                                                                                    • Opcode ID: 4b9237979c5bef12814d7e244d4a4807e4d3ddc73c6e00c097d8681d916e5ed0
                                                                                    • Instruction ID: 0ab270d1f829aceacda67cda2b0a8c4403cae7e0ddd523d5b58eefcf72b7fb5f
                                                                                    • Opcode Fuzzy Hash: 4b9237979c5bef12814d7e244d4a4807e4d3ddc73c6e00c097d8681d916e5ed0
                                                                                    • Instruction Fuzzy Hash: 58516171A00207ABEF60DFA9DC50AFE7BF8BF14700F0484A9E990EB190EB749540DB61
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Strings
                                                                                    • Histogram.MismatchedConstructionArguments, xrefs: 0105181A
                                                                                    • ..\..\buildtools\third_party\libc++\trunk\include\vector, xrefs: 01051851
                                                                                    • %s:%d: assertion %s failed: %s, xrefs: 01051856
                                                                                    • vector[] index out of bounds, xrefs: 01051842
                                                                                    • __n < size(), xrefs: 01051847
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$AcquireInit_thread_headerRelease
                                                                                    • String ID: %s:%d: assertion %s failed: %s$..\..\buildtools\third_party\libc++\trunk\include\vector$Histogram.MismatchedConstructionArguments$__n < size()$vector[] index out of bounds
                                                                                    • API String ID: 1281622111-748511
                                                                                    • Opcode ID: 9a00bea3ad92741d56150e44093124b12b62e524166a347257f9481af0a22fdc
                                                                                    • Instruction ID: 932d0f97cef6a05d0a0cdba44976fe0eef82c654ec59b01bc1c1670f35c24c0a
                                                                                    • Opcode Fuzzy Hash: 9a00bea3ad92741d56150e44093124b12b62e524166a347257f9481af0a22fdc
                                                                                    • Instruction Fuzzy Hash: 99C18174F0020A9FDB64DFA9D894AAFBBF5FF88204B04451DE9969B341D735E904CBA0
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c45bac9f3abf0a78b0ba354ff54b440fea3dfc5006bfe2d00687007389b833a7
                                                                                    • Instruction ID: 77505ab5a403899ca969e1deeea01f29e84a39ec0c3632ae957c104fda8e12de
                                                                                    • Opcode Fuzzy Hash: c45bac9f3abf0a78b0ba354ff54b440fea3dfc5006bfe2d00687007389b833a7
                                                                                    • Instruction Fuzzy Hash: C5024D71E052199BDF14EFA8C880AEEFBF1FF88318F148269D599A7341D731A901CB90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetVersionExW.KERNEL32(0000011C), ref: 0104564D
                                                                                    • GetProductInfo.KERNEL32(?,?,00000000,00000000,00000000), ref: 01045674
                                                                                    • __Init_thread_header.LIBCMT ref: 010456D3
                                                                                    • GetNativeSystemInfo.KERNEL32(010E5978), ref: 01045704
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: Info$Init_thread_headerNativeProductSystemVersion
                                                                                    • String ID:
                                                                                    • API String ID: 2164803554-0
                                                                                    • Opcode ID: c60746f55cad188bdebea861856e8195a828ff30deb5d5871e8359236315517a
                                                                                    • Instruction ID: bfc6a74e99fde56c37f146be6fc3de0c33fa707b552897cd449985953d741ed5
                                                                                    • Opcode Fuzzy Hash: c60746f55cad188bdebea861856e8195a828ff30deb5d5871e8359236315517a
                                                                                    • Instruction Fuzzy Hash: BB212875A402049FD730EB55EC85BED73B4BB9E728F000569E6C45A140DB7A2990CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 010658B0
                                                                                      • Part of subcall function 01047600: AcquireSRWLockExclusive.KERNEL32(00000000,?,01065318), ref: 01047604
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 010659B5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$Acquire$Release
                                                                                    • String ID: MZx
                                                                                    • API String ID: 1678258262-2575928145
                                                                                    • Opcode ID: aa8a20e35dbace10338a1d3fa59cff00bdb3532447c2bdfe14725bf6f3839abe
                                                                                    • Instruction ID: e1e321627dae74fee7696570af13edc8f3791feb4390acf64c129a54e23f882f
                                                                                    • Opcode Fuzzy Hash: aa8a20e35dbace10338a1d3fa59cff00bdb3532447c2bdfe14725bf6f3839abe
                                                                                    • Instruction Fuzzy Hash: 1E510531E005068FDB14CE5CD8406AEB7EAAF85360F188069D989EB305DB31AD40CBA1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • VirtualQuery.KERNEL32(?,?,0000001C), ref: 010821C2
                                                                                    • GetSystemInfo.KERNEL32(?), ref: 010821DD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoQuerySystemVirtual
                                                                                    • String ID: D
                                                                                    • API String ID: 401686933-2746444292
                                                                                    • Opcode ID: f6fed817eeb4d8f349e03b01dfc6b3dd30ef42dbf88210776b7671743934db53
                                                                                    • Instruction ID: 7496f13480aa3112e95d1d168409831e5831e885eac48f9fbdbd5acb62b588f1
                                                                                    • Opcode Fuzzy Hash: f6fed817eeb4d8f349e03b01dfc6b3dd30ef42dbf88210776b7671743934db53
                                                                                    • Instruction Fuzzy Hash: 2101FC726001096BDF14EE2DCC05BDE7BE9AFC4324F1DC165ED99D7145D634D411C680
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 0107268F
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 01072813
                                                                                      • Part of subcall function 01047600: AcquireSRWLockExclusive.KERNEL32(00000000,?,01065318), ref: 01047604
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$Acquire$Release
                                                                                    • String ID:
                                                                                    • API String ID: 1678258262-0
                                                                                    • Opcode ID: 23f78fa0e51871061867106a9d7106d1e6e3dfd04432b1c5ead3be10afa17de5
                                                                                    • Instruction ID: eb4ce698c9a2404818e0893536b82a7cd499a1e3f1e552c10b937718d9937bce
                                                                                    • Opcode Fuzzy Hash: 23f78fa0e51871061867106a9d7106d1e6e3dfd04432b1c5ead3be10afa17de5
                                                                                    • Instruction Fuzzy Hash: 5A61F431F002058BCB54DF28D884A6EBBF6FB84210B18846DE986DB345DB32E951C7D5
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 0109A90A: GetLastError.KERNEL32(?,?,0108922D,?,?,?,?,01092CDC,?,?,?,?), ref: 0109A90E
                                                                                      • Part of subcall function 0109A90A: SetLastError.KERNEL32(00000000,?,?), ref: 0109A9B0
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0109F584
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0109F5CE
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0109F694
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoLocale$ErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 661929714-0
                                                                                    • Opcode ID: cd63615218132cba28a543007162297d8790b435a2b5276a48138c18d6286a79
                                                                                    • Instruction ID: c08af54c3d2c12365fcfbbe33edd1b0145714f4639518436a099df5bfa6cba3e
                                                                                    • Opcode Fuzzy Hash: cd63615218132cba28a543007162297d8790b435a2b5276a48138c18d6286a79
                                                                                    • Instruction Fuzzy Hash: FC61C1719102079FEF699F28CDA1BBABBE8FF08300F1040B9E995C6195EB75D941EB50
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 0109C46E
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0109C478
                                                                                    • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 0109C485
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                    • String ID:
                                                                                    • API String ID: 3906539128-0
                                                                                    • Opcode ID: f04b01812eef07979d3aaa342cba325a40f65f88bc54d6be6b3dbf4850a73d98
                                                                                    • Instruction ID: 40753dd44dc1ae2940146d18dd109b7c1f9c3359d162682ae29078fa1a06f189
                                                                                    • Opcode Fuzzy Hash: f04b01812eef07979d3aaa342cba325a40f65f88bc54d6be6b3dbf4850a73d98
                                                                                    • Instruction Fuzzy Hash: 1031D47494121DABCB21EF69D9887DCBBF8BF18310F5041DAE84CA7250EB749B858F45
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: __floor_pentium4
                                                                                    • String ID: 3333
                                                                                    • API String ID: 4168288129-2924271548
                                                                                    • Opcode ID: 96c217c76f7c4207befab1f918e9ab3147ffa3dfb3b488b4f81b184c692d3b2c
                                                                                    • Instruction ID: 49e1d94b8399838f989f7db980316213498c2cdd87963935919117d3e238eded
                                                                                    • Opcode Fuzzy Hash: 96c217c76f7c4207befab1f918e9ab3147ffa3dfb3b488b4f81b184c692d3b2c
                                                                                    • Instruction Fuzzy Hash: 2491B572E012258FCB15CFA9C8905ADB7F2AF9D310B18C669E885FB345DB31AD51CB90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 628cf17758620656c93a10a8f2422b6853aa12be61e6eb80a71993105bcaec6a
                                                                                    • Instruction ID: 657c76733b240036f0f32fed95cce507ca713e82f618a1169ccff4b54cd50a94
                                                                                    • Opcode Fuzzy Hash: 628cf17758620656c93a10a8f2422b6853aa12be61e6eb80a71993105bcaec6a
                                                                                    • Instruction Fuzzy Hash: 91B1D371F046068FCB19CF69C4901ADF7F2BF99210B19C669D986EB340EB31EC818B55
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 5eac2f82ff8a49288a71953a6be5f6cae8aa4df0be02da2e328df90da2e4254f
                                                                                    • Instruction ID: abaa147a16283b04b3e425ae83c65194b113db9528c325130ebab3207a37a7b9
                                                                                    • Opcode Fuzzy Hash: 5eac2f82ff8a49288a71953a6be5f6cae8aa4df0be02da2e328df90da2e4254f
                                                                                    • Instruction Fuzzy Hash: 52B1A4B1A046168FDB15CFA9C48056DF7F2BF99310719CA6AD986EB340E731EC81CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: __floor_pentium4
                                                                                    • String ID:
                                                                                    • API String ID: 4168288129-0
                                                                                    • Opcode ID: c9f7efda38a63956c6c6bbf567a1fea01dd862c22b139c49977daf8ee77444e1
                                                                                    • Instruction ID: 13927be53fdb02dabbe10db62dae38ba1758afe0f3c2497963fcf57e7b7444d8
                                                                                    • Opcode Fuzzy Hash: c9f7efda38a63956c6c6bbf567a1fea01dd862c22b139c49977daf8ee77444e1
                                                                                    • Instruction Fuzzy Hash: 10A1C5B1F046268FDB15CE69C4C066EF7F2BF99210B19C669D895AF344E731E8818B81
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: __floor_pentium4
                                                                                    • String ID:
                                                                                    • API String ID: 4168288129-0
                                                                                    • Opcode ID: 2bb5f0d637f7e0040248baca96505cddde2701d5d2337bd2f01dbd999a398e8e
                                                                                    • Instruction ID: 27bf344c3b9eb0e902652c866666c74e21344bf07ea0959b9dfabfdf73aba2b3
                                                                                    • Opcode Fuzzy Hash: 2bb5f0d637f7e0040248baca96505cddde2701d5d2337bd2f01dbd999a398e8e
                                                                                    • Instruction Fuzzy Hash: 79A1C4B1B046258FCB15CE29C4C166DF7B2BFD9210719C269D986AF345E731EC818B81
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: __floor_pentium4
                                                                                    • String ID:
                                                                                    • API String ID: 4168288129-0
                                                                                    • Opcode ID: 8a3c16bdf63a777c3c63b60a3713d6ed8724968e56fd5701729e26241f283ff1
                                                                                    • Instruction ID: 7fcce0bf603053f1dcb251e07dfccb0acbb7c554cee3bd16f701765e11811057
                                                                                    • Opcode Fuzzy Hash: 8a3c16bdf63a777c3c63b60a3713d6ed8724968e56fd5701729e26241f283ff1
                                                                                    • Instruction Fuzzy Hash: 6AA1B6B6B44616CFCB15CE29C8C02ADB7B2BF99210719C679D986EB344E731EC81CB41
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?,010729C0,01072A30,?,?,?,?,?,?,?,?,?,?,?,01070367,?), ref: 01070423
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: AcquireExclusiveLock
                                                                                    • String ID:
                                                                                    • API String ID: 4021432409-0
                                                                                    • Opcode ID: 532cd460a45db10f825ea83149ceb928af790ce632073535ce479ba69f9e1c0d
                                                                                    • Instruction ID: b92c794cf89196ac5139ec2c80b0bc90ed7fd8dccc22e5240f6e46a78d32b8f4
                                                                                    • Opcode Fuzzy Hash: 532cd460a45db10f825ea83149ceb928af790ce632073535ce479ba69f9e1c0d
                                                                                    • Instruction Fuzzy Hash: 7561A4B0E0020A9FCF44DF69D450AEEB7B0FF99304F044129E986AB345DB71A951CBD5
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,00000000,?,?,?,0106561A,?,?), ref: 01065675
                                                                                      • Part of subcall function 01047600: AcquireSRWLockExclusive.KERNEL32(00000000,?,01065318), ref: 01047604
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?,00000000,?), ref: 010657D1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$Acquire$Release
                                                                                    • String ID:
                                                                                    • API String ID: 1678258262-0
                                                                                    • Opcode ID: 8d718841ee0ca83e4607b59bcc668c9231e31a2f07e4809cffc2f081489113f5
                                                                                    • Instruction ID: 253dfe3bb83c2c614ff36ae06ba6e50b1a1a131e3bf74936dc25d836ab8410cb
                                                                                    • Opcode Fuzzy Hash: 8d718841ee0ca83e4607b59bcc668c9231e31a2f07e4809cffc2f081489113f5
                                                                                    • Instruction Fuzzy Hash: 0251F571E0011A8FDB14CF58EC846EDB7F9BF58754F188069E986AB301DB39AD01CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: __floor_pentium4
                                                                                    • String ID:
                                                                                    • API String ID: 4168288129-0
                                                                                    • Opcode ID: e8bd05cd26adfce5c48da4e138535f0407838352621e484ecd1ccc4252635dfd
                                                                                    • Instruction ID: eee63ba2db16884f698cc9673bc4d5b14964290f62ce44fc5c4cfc66fd306182
                                                                                    • Opcode Fuzzy Hash: e8bd05cd26adfce5c48da4e138535f0407838352621e484ecd1ccc4252635dfd
                                                                                    • Instruction Fuzzy Hash: D812B372A083469FC725EF64C890AEFB7E9AFD9314F04451DF9C997240DB30A949CB92
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetTimeZoneInformation.KERNEL32(00000000,00000000,00000000,01094A02,?,-00000004), ref: 010945E0
                                                                                      • Part of subcall function 010A0FBA: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0109A874,?,00000000,-00000008), ref: 010A101B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharInformationMultiTimeWideZone
                                                                                    • String ID:
                                                                                    • API String ID: 1123094072-0
                                                                                    • Opcode ID: ad12fe000acba302dc93f4a35ae899b6ac7264a6fa4f5de16ba632a51fb177d4
                                                                                    • Instruction ID: 6dfb256869b975e5ec2ac417025b45c3e9c773ad2154067a3941967a3555a206
                                                                                    • Opcode Fuzzy Hash: ad12fe000acba302dc93f4a35ae899b6ac7264a6fa4f5de16ba632a51fb177d4
                                                                                    • Instruction Fuzzy Hash: 0F4125B1E00216BBDF107FAADC00A9E7FA8EF14610F0140A5F984EB161EB72D910DB95
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 0109A90A: GetLastError.KERNEL32(?,?,0108922D,?,?,?,?,01092CDC,?,?,?,?), ref: 0109A90E
                                                                                      • Part of subcall function 0109A90A: SetLastError.KERNEL32(00000000,?,?), ref: 0109A9B0
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0109F844
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$InfoLocale
                                                                                    • String ID:
                                                                                    • API String ID: 3736152602-0
                                                                                    • Opcode ID: 97f15b8d92346a8d7af9e808dac50b6c5adb8824d23d6e1bc482b2ea4a9749ab
                                                                                    • Instruction ID: e210de652235530d3fb1d2ffaa0c1b53bb63184ff4824f724a97a2c48de38cd6
                                                                                    • Opcode Fuzzy Hash: 97f15b8d92346a8d7af9e808dac50b6c5adb8824d23d6e1bc482b2ea4a9749ab
                                                                                    • Instruction Fuzzy Hash: C121D732605117ABEF689E29DC61ABB3BE8EF04310F1040BAED41DB145EB74DD00EB50
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 0
                                                                                    • API String ID: 0-4108050209
                                                                                    • Opcode ID: e2bd2493e5c5c6af9822e48c28b877bec80e8b13805e7ae313f78877320dddee
                                                                                    • Instruction ID: 81c16b1ea4d34f2986504a0d06530aad85d1102b504a3c723dad81214ac88cd0
                                                                                    • Opcode Fuzzy Hash: e2bd2493e5c5c6af9822e48c28b877bec80e8b13805e7ae313f78877320dddee
                                                                                    • Instruction Fuzzy Hash: BEB1053090C60B9BDF69FEACC8956BEBBE2AF01204F34465DDAD297B49C731A501CB51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 0109A90A: GetLastError.KERNEL32(?,?,0108922D,?,?,?,?,01092CDC,?,?,?,?), ref: 0109A90E
                                                                                      • Part of subcall function 0109A90A: SetLastError.KERNEL32(00000000,?,?), ref: 0109A9B0
                                                                                    • EnumSystemLocalesW.KERNEL32(0109F530,00000001,00000000,?,-00000050,?,0109F313,00000000,-00000002,00000000,?,00000055,?), ref: 0109F4FA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$EnumLocalesSystem
                                                                                    • String ID:
                                                                                    • API String ID: 2417226690-0
                                                                                    • Opcode ID: e2a5714bacfe688e8cd420a3e5a235d4822e0bf97b45434dd7908d70625db2b7
                                                                                    • Instruction ID: 6824e90e630606dcc7f7f7d8a8441da8da88c7e8d02f5312574b8d42a443add5
                                                                                    • Opcode Fuzzy Hash: e2a5714bacfe688e8cd420a3e5a235d4822e0bf97b45434dd7908d70625db2b7
                                                                                    • Instruction Fuzzy Hash: 7811E9372007069FDF289F39D8A16BABB91FF84368B15842DD9C687A40D771B943D740
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 0109A90A: GetLastError.KERNEL32(?,?,0108922D,?,?,?,?,01092CDC,?,?,?,?), ref: 0109A90E
                                                                                      • Part of subcall function 0109A90A: SetLastError.KERNEL32(00000000,?,?), ref: 0109A9B0
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0109F964
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$InfoLocale
                                                                                    • String ID:
                                                                                    • API String ID: 3736152602-0
                                                                                    • Opcode ID: 4676e51cd13fbea6a81ca98d1b6a781256d25989bd395e83132586742ded0d83
                                                                                    • Instruction ID: 30f8e9809206a39552b5d78f69eb693f4905d4974a710a49f0d4450202c9d52d
                                                                                    • Opcode Fuzzy Hash: 4676e51cd13fbea6a81ca98d1b6a781256d25989bd395e83132586742ded0d83
                                                                                    • Instruction Fuzzy Hash: A711C672651217ABDF14EF28DC61ABA7BE8EF04314B11407AE545D7140EB78E9419750
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 0109A90A: GetLastError.KERNEL32(?,?,0108922D,?,?,?,?,01092CDC,?,?,?,?), ref: 0109A90E
                                                                                      • Part of subcall function 0109A90A: SetLastError.KERNEL32(00000000,?,?), ref: 0109A9B0
                                                                                    • EnumSystemLocalesW.KERNEL32(0109F7F0,00000001,00001002,?,-00000050,?,0109F2DB,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?), ref: 0109F7CD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$EnumLocalesSystem
                                                                                    • String ID:
                                                                                    • API String ID: 2417226690-0
                                                                                    • Opcode ID: f481eb18db22e13f36e5ad28790a0a8f8ed074a68ba819ab23e1b6323faea0a5
                                                                                    • Instruction ID: 3ded2ba86dfa2182be388d34c3b67d2982639af4e276f9eaa4981e8af39b5991
                                                                                    • Opcode Fuzzy Hash: f481eb18db22e13f36e5ad28790a0a8f8ed074a68ba819ab23e1b6323faea0a5
                                                                                    • Instruction Fuzzy Hash: F7F0C23620030A5FDF255E3998A1A6ABFD5FF80768B15846DE985CB680C6B1A842A650
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 0109B871: EnterCriticalSection.KERNEL32(-000999D6,?,0108E1EB,00000000), ref: 0109B880
                                                                                    • EnumSystemLocalesW.KERNEL32(0109B760,00000001,010DF2E8,0000000C,0109B0D1,-00000050), ref: 0109B7A5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                    • String ID:
                                                                                    • API String ID: 1272433827-0
                                                                                    • Opcode ID: 260e5618121f6e18e3db38bb1855307fc996dcfb6e023600ffe6616e2c342053
                                                                                    • Instruction ID: ab0d73e7c7fe0a61f99074e2bb1eadc9e27f71da12060c6540f2941e123b8940
                                                                                    • Opcode Fuzzy Hash: 260e5618121f6e18e3db38bb1855307fc996dcfb6e023600ffe6616e2c342053
                                                                                    • Instruction Fuzzy Hash: 7DF03776A40309DFDB20EF99E441B9DB7F0FB59B20F10812AF891DB290CABA5901DF40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 0109A90A: GetLastError.KERNEL32(?,?,0108922D,?,?,?,?,01092CDC,?,?,?,?), ref: 0109A90E
                                                                                      • Part of subcall function 0109A90A: SetLastError.KERNEL32(00000000,?,?), ref: 0109A9B0
                                                                                    • EnumSystemLocalesW.KERNEL32(0109F910,00000001,00001002,?,?,0109F335,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?,?), ref: 0109F8FC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$EnumLocalesSystem
                                                                                    • String ID:
                                                                                    • API String ID: 2417226690-0
                                                                                    • Opcode ID: 750ef9d88ad2d8a67d97d36dd389977827985c49522c9eea529214afcc07c4b7
                                                                                    • Instruction ID: 4465691b415c2fa3efe2f6afb19518e1d0d0723119ed79ae69e5140907d1b575
                                                                                    • Opcode Fuzzy Hash: 750ef9d88ad2d8a67d97d36dd389977827985c49522c9eea529214afcc07c4b7
                                                                                    • Instruction Fuzzy Hash: CBF0553A30020A67CF159F39D82466BBF94EFC1610B0B4098EE89CF280CA329842D790
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,00000000,?,0108FCD3,?,20001004,00000000,00000002,?,?,0108EBE4), ref: 0109B260
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoLocale
                                                                                    • String ID:
                                                                                    • API String ID: 2299586839-0
                                                                                    • Opcode ID: 1d9fbf1dac92167fde59fea3f1f83df197fa2c98afc0b7915d21e6980ea52c4b
                                                                                    • Instruction ID: 89370d79b0bad2d5961718d5b1872e052ca6eb7e54ca3ea0350ca57ca165398d
                                                                                    • Opcode Fuzzy Hash: 1d9fbf1dac92167fde59fea3f1f83df197fa2c98afc0b7915d21e6980ea52c4b
                                                                                    • Instruction Fuzzy Hash: D5E01A31500218BBCF222E60EC14FAE7F19EF44660F008021FD85651248F768921AAD4
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d07c37c28ef5aacb06e90172e787fbe1ad4cc83c27a3eeaf349aeff335fa224d
                                                                                    • Instruction ID: 70c7ee6758c6fc4059d3d3c7524e88b930c89e510acd2451fc86f1f911d86d6b
                                                                                    • Opcode Fuzzy Hash: d07c37c28ef5aacb06e90172e787fbe1ad4cc83c27a3eeaf349aeff335fa224d
                                                                                    • Instruction Fuzzy Hash: 9D323731D69F014DD7339638C821336B698AFB72D5F55D727E85AB5D9AEF2AC0834200
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c33fb274095a188932260f0ea2736bc6a8e3ca316cc910230737caadc8204e01
                                                                                    • Instruction ID: e5ef7e560a2aa38ed7f22d26cade27102aef4201e682cda08e996320a0c429e1
                                                                                    • Opcode Fuzzy Hash: c33fb274095a188932260f0ea2736bc6a8e3ca316cc910230737caadc8204e01
                                                                                    • Instruction Fuzzy Hash: 96F17121C1DFDA87D6139B3A8542166F3A0BFFA288F14EB1AFDD435412EB70B2D59240
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: dd09723fc643d0e2ee6b257d94cca0fce2373df82c73f826f93028f387d61145
                                                                                    • Instruction ID: 47aeaaac46cadc797a226e4c34e547b17c64e59c69488b17d9ed8be6dbaff1af
                                                                                    • Opcode Fuzzy Hash: dd09723fc643d0e2ee6b257d94cca0fce2373df82c73f826f93028f387d61145
                                                                                    • Instruction Fuzzy Hash: 3DB14D72700B164BD728EEA9DC91796B3E3AB84326F8EC73C9046C6F55F2BCA4454680
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c1c4f81371896f28a0e6c1027a95801f77d1efa8d7dda990d94ee719606f2aaf
                                                                                    • Instruction ID: 710611f3d3aa4a292af5338f29c7da3e88d845a7c35b147e06f6f443743ee8e3
                                                                                    • Opcode Fuzzy Hash: c1c4f81371896f28a0e6c1027a95801f77d1efa8d7dda990d94ee719606f2aaf
                                                                                    • Instruction Fuzzy Hash: C7C13B33E00B148E8B0CDA19CAA626CEBAB9BD4700B9B917FD907DB1A1CEB1D405C5D5
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fd86f6601f0fc04a6833768a6de5a0992ba7d6652606db14d1c5a459c7ef2ca1
                                                                                    • Instruction ID: 3be2bba6ea2876aad0c0f6312f45c105a9c7c316ad0f0bc30fbacded6fa67033
                                                                                    • Opcode Fuzzy Hash: fd86f6601f0fc04a6833768a6de5a0992ba7d6652606db14d1c5a459c7ef2ca1
                                                                                    • Instruction Fuzzy Hash: 25B1DF30D2AF408DD32396398931336B69CAFBB2C5B52D71BFC9774D56EB2685834640
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a46fd9a0c7651f21d0a439fba3ad5ffb515a0e8e1e41b4cee262b977e9b59456
                                                                                    • Instruction ID: 5583d1dcf39fea7f8632635a6ddfb2d50cb36aea0ea41ffe157d8b8a4b78555b
                                                                                    • Opcode Fuzzy Hash: a46fd9a0c7651f21d0a439fba3ad5ffb515a0e8e1e41b4cee262b977e9b59456
                                                                                    • Instruction Fuzzy Hash: 32A12622D18FD793E7155F3ACA005B6B760BEB9348B05FB08DDD915922DB34B6E4D280
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: dbebc6bf74e8b6d55a407b1e54c708d6680680bc0a23a1261344b0f5cf1f4284
                                                                                    • Instruction ID: 14879c6233b7b738de9676251c82e00a82992dcdc174f3f8e8a3ef7e9e69293c
                                                                                    • Opcode Fuzzy Hash: dbebc6bf74e8b6d55a407b1e54c708d6680680bc0a23a1261344b0f5cf1f4284
                                                                                    • Instruction Fuzzy Hash: 5B61E871E003258FDB15CE69C4847FEFBF2EFC8350F25816AE985AB645C33958468B90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 614bbcbf78afe7056ed1ecbd2a9075d3dd4773dda811e9671364f1ab090cf45b
                                                                                    • Instruction ID: 69de955d5ca74a1dcd973c2a553c75693b7cedb9b1e54f7f7574d1c3372c1750
                                                                                    • Opcode Fuzzy Hash: 614bbcbf78afe7056ed1ecbd2a9075d3dd4773dda811e9671364f1ab090cf45b
                                                                                    • Instruction Fuzzy Hash: EC510731F001194BDB98CE69C8806AEBBE3ABC7210B18C2ADE4C5DB24EE731D901C758
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 20e27cd1294e25ddc6d7be20974898094e3d3db1bf7931f2d7eb99be54948a70
                                                                                    • Instruction ID: 8351b2a664c45e89b85cda14845288999d58b502bcdcd9ae46bc29a3e46ce0c1
                                                                                    • Opcode Fuzzy Hash: 20e27cd1294e25ddc6d7be20974898094e3d3db1bf7931f2d7eb99be54948a70
                                                                                    • Instruction Fuzzy Hash: 71514CDAC29FAA45E323673E5983292EA10AEF7598610E347FCF835E11F701B5C47220
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 317d05d2ce900e8523991b84dfe16fc7496aa4d16bea1db389e819f745b1c7b2
                                                                                    • Instruction ID: 26f25fd4d412322dcdd1041477883884954192d07f1365c256e43e6649bf5b8e
                                                                                    • Opcode Fuzzy Hash: 317d05d2ce900e8523991b84dfe16fc7496aa4d16bea1db389e819f745b1c7b2
                                                                                    • Instruction Fuzzy Hash: 22518DB0E0010A8BCF54DF59D8A4AAEB7B5FF84308F144129ED86AB345D771ED15CBA1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7843b180895422b3b0bcc0ba4a262943549954c7f4171b96b157888fc70d2e22
                                                                                    • Instruction ID: 311669716090957f8679d7992403cf5dc000a06c2b0a2c1c7858420e3da70835
                                                                                    • Opcode Fuzzy Hash: 7843b180895422b3b0bcc0ba4a262943549954c7f4171b96b157888fc70d2e22
                                                                                    • Instruction Fuzzy Hash: 4C51ACF380D3985BD3249FA5CC8129AF3E0BFD8250F4B872DED88E7601EB7496019681
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7a5f0ccd61e87605ef42d33d3aae0f02861f2c28ac56394109ac1bc1c5e57cda
                                                                                    • Instruction ID: 5a93fdfdf8deec1ec549e4749ed766ff4285d6233e5d97b9f4a97513d9f9c93d
                                                                                    • Opcode Fuzzy Hash: 7a5f0ccd61e87605ef42d33d3aae0f02861f2c28ac56394109ac1bc1c5e57cda
                                                                                    • Instruction Fuzzy Hash: 9A41CB79D1AF6A16EB13A73A6803363E6109FF355CA42DB1BFCB4399A9D70275003214
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 88447afc45a1f6bcb49f5dd9d78a59160c77bbb213f53383de30a712b68f4499
                                                                                    • Instruction ID: 0de0b20eeb53940733590dd5ee7fa1f608efa641baa2fc2b6ccb14a6b69e3624
                                                                                    • Opcode Fuzzy Hash: 88447afc45a1f6bcb49f5dd9d78a59160c77bbb213f53383de30a712b68f4499
                                                                                    • Instruction Fuzzy Hash: 0141CBA9D1AF6A16EB23B73A6803363D6109FF355DA42DB1BFCB439DA9D30275003254
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d7ad43ef9492b0eabf3af094ecf28adf8b082ba3035ed07e572c91c519b4f747
                                                                                    • Instruction ID: d91dc97b24c5aa302df46519c06b93841821d9954a33b92eebbbb5264f5f59e4
                                                                                    • Opcode Fuzzy Hash: d7ad43ef9492b0eabf3af094ecf28adf8b082ba3035ed07e572c91c519b4f747
                                                                                    • Instruction Fuzzy Hash: 1A41B534D0CF9A87D7129F3EC541566F3A0BFAA254F04CB1EED9436162E731B6C4A681
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c15dae88d9d877f94ed26aa412ba681ccaab8d15b693bcf817a8c1c7b506dd10
                                                                                    • Instruction ID: 99689e3ea12587408ccff73e29fce5b5a103c4e934683312ecf6ae513152fefa
                                                                                    • Opcode Fuzzy Hash: c15dae88d9d877f94ed26aa412ba681ccaab8d15b693bcf817a8c1c7b506dd10
                                                                                    • Instruction Fuzzy Hash: A9314DB2B146168BEB2D8A1FE82037A36E1F744719F09416DD986CF7C4CB7A9904D784
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9616ebb1345d3b8bad18ed5f1731ce2cbf60fb93b3bb8f0cda6dde8ef9c2d8fc
                                                                                    • Instruction ID: 8992ebdaf648f15564c62a0cfa581d8fe688e76face7df2cf5a0097247bf217d
                                                                                    • Opcode Fuzzy Hash: 9616ebb1345d3b8bad18ed5f1731ce2cbf60fb93b3bb8f0cda6dde8ef9c2d8fc
                                                                                    • Instruction Fuzzy Hash: 7C31C4B6A043129FC715DE28C88066ABBE5FFC9364F05852DF8E9C7389D7349940CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 60a23c78da3b6716c584f250082441a8c334e7b2b212062c327525d921f6641d
                                                                                    • Instruction ID: a5e0a4ce7d7a262e7892f4f125322dfc952568b54fc176d5ccb6b1fb832c92aa
                                                                                    • Opcode Fuzzy Hash: 60a23c78da3b6716c584f250082441a8c334e7b2b212062c327525d921f6641d
                                                                                    • Instruction Fuzzy Hash: 37318F34C0CB9A97D7029F3AC441156F7A0BFAA258F00CB1EEDD433261D771BA84AA52
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                    • Instruction ID: 49bbfb3df503cfccbeba92d706836226a12534d2bc0feedb2f7b737626bf6121
                                                                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                    • Instruction Fuzzy Hash: 6B1138BB30D08143E294BA2DD8B45BBBBD5FBC962972CC2FAC2C24F754D223D0659600
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 51f477ecbd8c86e18464dd12c1106ff108f6fe7e53e3396059e243e6e9527724
                                                                                    • Instruction ID: 3e4aa2ddb2d8e81c8354a7a9abd9c0855dd406e35942f766b766150b3b172115
                                                                                    • Opcode Fuzzy Hash: 51f477ecbd8c86e18464dd12c1106ff108f6fe7e53e3396059e243e6e9527724
                                                                                    • Instruction Fuzzy Hash: DD1151D9C2AF7A06E713633B5D42242DA105EF7989550D347FCB439D61F701B5C17210
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d35fea1031711773cf9ca4232a4cd6f839659ec201a35b62fd392b4a4f0e2cbd
                                                                                    • Instruction ID: 7b954fd7434b16f392998e7452f15770c1e012c64c0d35b07d88df37a7d881fe
                                                                                    • Opcode Fuzzy Hash: d35fea1031711773cf9ca4232a4cd6f839659ec201a35b62fd392b4a4f0e2cbd
                                                                                    • Instruction Fuzzy Hash: CB014FDAC24FAA45E313A33D6843282E6109FF7548620E347FCF838E62F70176D46220
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b478e1f546ce9a5c90263f502841de5ed2815c13aa0d6343b5217c81eca3c23b
                                                                                    • Instruction ID: b7e5fbf0d9c632281ddf35d32e110880ce2daf8bbec9c2d4db82308f25af64ff
                                                                                    • Opcode Fuzzy Hash: b478e1f546ce9a5c90263f502841de5ed2815c13aa0d6343b5217c81eca3c23b
                                                                                    • Instruction Fuzzy Hash: EDE012305183418FC746DF20C190866FBF1EF87311B06E689D4599B566D334EE88CB55
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: _strlen
                                                                                    • String ID: "-Infinity"$"0x%llx"$"Infinity"$"NaN"$"Unsupported (crbug.com/1225176)"$%lld$%llu$-Infinity$0x%llx$Infinity$NULL$NaN$false$true
                                                                                    • API String ID: 4218353326-265266769
                                                                                    • Opcode ID: a3d33f01a3fe3b15a2644b1a466d3678b0f03e3919cfca369ee82848a9f1553c
                                                                                    • Instruction ID: b547c5c0ecc8fd0827350357a1090d968485f8685f3cd102f05b3dea6d93ff16
                                                                                    • Opcode Fuzzy Hash: a3d33f01a3fe3b15a2644b1a466d3678b0f03e3919cfca369ee82848a9f1553c
                                                                                    • Instruction Fuzzy Hash: 62718670E08301ABE711AE24CC49BBF7BE6AFC2694F10895CFAC55A191E73089458757
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: _strlen
                                                                                    • String ID: MSEdgeBeta$MSEdgeCanary$MSEdgeDev$MSEdgeInternal$MSEdgeWebView$Microsoft.MSEdgeBeta$Microsoft.MSEdgeCanary$Microsoft.MSEdgeDev$Microsoft.MSEdgeInternal$Microsoft.MSEdgeStable$Microsoft.MSEdgeWebView
                                                                                    • API String ID: 4218353326-4251218085
                                                                                    • Opcode ID: 485158b7c1f9b0ecc796e6d4ef88a0acd642639cf403449313c22b6a8dfca9a6
                                                                                    • Instruction ID: 00343d3a5b2545782299bf4a8625ae67319715d82b23fa284eb7afb498c6efed
                                                                                    • Opcode Fuzzy Hash: 485158b7c1f9b0ecc796e6d4ef88a0acd642639cf403449313c22b6a8dfca9a6
                                                                                    • Instruction Fuzzy Hash: C861E5B1E40309AFDB04EF65DC42BDE7AF5AF94704F14402DE984EF240EAB19916CBA5
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetCurrentThread.KERNEL32 ref: 010471EF
                                                                                    • SetThreadPriority.KERNEL32(00000000,00020000,?,000000CF,?), ref: 0104720C
                                                                                    • GetCurrentThread.KERNEL32 ref: 010472DC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: Thread$Current$Priority
                                                                                    • String ID: SetThreadInformation$kernel32.dll
                                                                                    • API String ID: 3341643625-3009701951
                                                                                    • Opcode ID: ad2ad3b1040b96b5453b9d10c133d885d029664d000e6f34154d0447bd0a0ce8
                                                                                    • Instruction ID: 98ffc7261fb6d40fe929a5ad0c07c00dc63c35fc4225ae65d5a038e786ba9566
                                                                                    • Opcode Fuzzy Hash: ad2ad3b1040b96b5453b9d10c133d885d029664d000e6f34154d0447bd0a0ce8
                                                                                    • Instruction Fuzzy Hash: 0A316DF1A003459FDB316B29D9C99AD3BF5FB06625F040579F9D1DB184DB3A4500CB41
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32 ref: 010540B9
                                                                                    • GetCurrentDirectoryW.KERNEL32(00000104,00000000), ref: 010540FC
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0105416C
                                                                                    • CreateFileW.KERNEL32 ref: 01054270
                                                                                    Strings
                                                                                    • %s:%d: assertion %s failed: %s, xrefs: 010542FB
                                                                                    • string::back(): string is empty, xrefs: 010542D6
                                                                                    • __s should never be greater than or equal to the short string capacity, xrefs: 010542E7
                                                                                    • !empty(), xrefs: 010542DB
                                                                                    • ..\..\buildtools\third_party\libc++\trunk\include\string, xrefs: 010542F6
                                                                                    • debug.log, xrefs: 01054237, 010542A9
                                                                                    • __s < __min_cap, xrefs: 010542EC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Create$CurrentDirectoryModuleName
                                                                                    • String ID: !empty()$%s:%d: assertion %s failed: %s$..\..\buildtools\third_party\libc++\trunk\include\string$__s < __min_cap$__s should never be greater than or equal to the short string capacity$debug.log$string::back(): string is empty
                                                                                    • API String ID: 4120427848-116757326
                                                                                    • Opcode ID: 91644d57cd22d9ebcbf7d967c89d7a8f7f7e478f295f962bbb534317867ad5b5
                                                                                    • Instruction ID: 003085cb43eb30b002d98334b2d9f850bfae41ae1b7db6e57f47fb2d4fa9e902
                                                                                    • Opcode Fuzzy Hash: 91644d57cd22d9ebcbf7d967c89d7a8f7f7e478f295f962bbb534317867ad5b5
                                                                                    • Instruction Fuzzy Hash: A96122306403158FD7609F69C888BEA7BF1BF90B18F84819CE9C59F2C1EBB59585CB81
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32 ref: 0105C9DE
                                                                                    • IsWow64Process.KERNEL32(00000000,00000000), ref: 0105C9EA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$CurrentWow64
                                                                                    • String ID: allo$c$comm$is_w$it$ize$ow_6$size$va_s
                                                                                    • API String ID: 1905925150-1478685300
                                                                                    • Opcode ID: 3f66afbd0eb6ad8f512db89d6b64e3dec903edc73006f7aa2f3f11a5509a78b9
                                                                                    • Instruction ID: 779197015a32b6ba64c5a35f41f2ae0e0dd6faf33f18123642c14a4cc96f1d75
                                                                                    • Opcode Fuzzy Hash: 3f66afbd0eb6ad8f512db89d6b64e3dec903edc73006f7aa2f3f11a5509a78b9
                                                                                    • Instruction Fuzzy Hash: 69315BB19083419BE714DFA4D88879BBBF8BB99304F140A2DF9C987240D776D5088B87
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • _strrchr.LIBCMT ref: 01054982
                                                                                    • OutputDebugStringA.KERNEL32(?), ref: 01054A71
                                                                                    • _strlen.LIBCMT ref: 01054C18
                                                                                      • Part of subcall function 01054050: CreateFileW.KERNEL32 ref: 010540B9
                                                                                      • Part of subcall function 01054050: GetCurrentDirectoryW.KERNEL32(00000104,00000000), ref: 010540FC
                                                                                      • Part of subcall function 01054050: CreateFileW.KERNEL32 ref: 01054270
                                                                                    • WriteFile.KERNEL32(?,?,?,00000000), ref: 01054B0F
                                                                                    • __Init_thread_header.LIBCMT ref: 01054D36
                                                                                      • Part of subcall function 010816E7: EnterCriticalSection.KERNEL32(010E3D70,?,?,?,01065379,010F0438,00000000,?,?,?,?,010650F7,00000000,00000000), ref: 010816F2
                                                                                      • Part of subcall function 010816E7: LeaveCriticalSection.KERNEL32(010E3D70,?,?,?,01065379,010F0438,00000000,?,?,?,?,010650F7,00000000,00000000), ref: 0108172F
                                                                                    • __Init_thread_header.LIBCMT ref: 01054D79
                                                                                    • __Init_thread_header.LIBCMT ref: 01054DAF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileInit_thread_header$CreateCriticalSection$CurrentDebugDirectoryEnterLeaveOutputStringWrite_strlen_strrchr
                                                                                    • String ID: %s:%d: %s$LOG_FATAL$LogMessage
                                                                                    • API String ID: 3233774340-1864124823
                                                                                    • Opcode ID: 5668180e4ba772bf623054141026df487a28103605c489ca8afa7be9effb0804
                                                                                    • Instruction ID: a5ca129768c4c5d032f8f34b5bc3a8eae1169f5ba1382249ca0b801990546e6d
                                                                                    • Opcode Fuzzy Hash: 5668180e4ba772bf623054141026df487a28103605c489ca8afa7be9effb0804
                                                                                    • Instruction Fuzzy Hash: 5E02F1746083419FD751EF24C884AAFBBE1BF99718F08492CF9C99B241E731E985CB52
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,00000000,0000011C,00000000,?,010456B7,0000011C,010E5978,00000000), ref: 01045860
                                                                                    • GetModuleHandleW.KERNEL32(api-ms-win-core-wow64-l1-1-1.dll,?,?,?,?,?,?,?,00000000,0000011C,00000000,?,010456B7,0000011C,010E5978,00000000), ref: 0104586D
                                                                                    • GetProcAddress.KERNEL32(00000000,IsWow64Process2), ref: 01045886
                                                                                    • GetCurrentProcess.KERNEL32(?,?,?,80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000001), ref: 01045A64
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: CurrentProcess$AddressHandleModuleProc
                                                                                    • String ID: DisplayVersion$IsWow64Process2$ReleaseId$SOFTWARE\Microsoft\Windows NT\CurrentVersion$UBR$api-ms-win-core-wow64-l1-1-1.dll
                                                                                    • API String ID: 1114296175-236569533
                                                                                    • Opcode ID: 32b7fb085e658cb2c07085209acf74032dc3b15b3fd13eaa9914d3e7817032ec
                                                                                    • Instruction ID: 566cdbf40c701e0449d3b4ea046bdacf6309d9a069a5a61d578c01cc83e5e617
                                                                                    • Opcode Fuzzy Hash: 32b7fb085e658cb2c07085209acf74032dc3b15b3fd13eaa9914d3e7817032ec
                                                                                    • Instruction Fuzzy Hash: A8A1C1B4A007099FEB20CF68C8C47AEBBF1EF49314F14452DE8C697681E775A985CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __Init_thread_header.LIBCMT ref: 0103A4EF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: Init_thread_header
                                                                                    • String ID: April$August$December$February$January$March$November$October$September
                                                                                    • API String ID: 3738618077-521072420
                                                                                    • Opcode ID: 89dfb4b4f1b960939ae8ac6a663a9e2fa1a6dec27146479decf22bbb53332ca0
                                                                                    • Instruction ID: bc9fda2f2ab36b7453f8e159ebe80558c596b6f1b1ef661550cb1577a2576ba1
                                                                                    • Opcode Fuzzy Hash: 89dfb4b4f1b960939ae8ac6a663a9e2fa1a6dec27146479decf22bbb53332ca0
                                                                                    • Instruction Fuzzy Hash: 6FA18CF9B05341DFE3259F02D8287197BD9BB90B1EF448C0C96D96F285DBBA28448B52
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 01040790: _strlen.LIBCMT ref: 01040828
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 01040968
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 01040972
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?,?,?,?,010434A0,01043530,010434F0), ref: 010409D0
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 010409DA
                                                                                    Strings
                                                                                    • %s:%d: assertion %s failed: %s, xrefs: 01040AC2
                                                                                    • __x != nullptr, xrefs: 01040AB3
                                                                                    • ..\..\buildtools\third_party\libc++\trunk\include\__tree, xrefs: 01040ABD
                                                                                    • SetDisabledWhileLocked, xrefs: 01040A65
                                                                                    • node shouldn't be null, xrefs: 01040AAE
                                                                                    • ..\..\base\trace_event\trace_log.cc, xrefs: 01040A60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$AcquireRelease$_strlen
                                                                                    • String ID: %s:%d: assertion %s failed: %s$..\..\base\trace_event\trace_log.cc$..\..\buildtools\third_party\libc++\trunk\include\__tree$SetDisabledWhileLocked$__x != nullptr$node shouldn't be null
                                                                                    • API String ID: 1657474455-3419696668
                                                                                    • Opcode ID: 7861dabbfd7fe901bc502bca0dcb9224ad50575c93f1eea4df4bbd0d6629c7c0
                                                                                    • Instruction ID: 304a7dae66daa1ffcb90fd58f019c54b41c06f25a913784246d4c1bd8f412103
                                                                                    • Opcode Fuzzy Hash: 7861dabbfd7fe901bc502bca0dcb9224ad50575c93f1eea4df4bbd0d6629c7c0
                                                                                    • Instruction Fuzzy Hash: D151EFB5A002159FEB10EF68D4C0AEEB7B1BF58714F050168FAC2BB245D731AC01CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __Init_thread_header.LIBCMT ref: 01039A0A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: Init_thread_header
                                                                                    • String ID: Friday$Monday$Saturday$Sunday$Thursday$Tuesday$Wednesday
                                                                                    • API String ID: 3738618077-1471634407
                                                                                    • Opcode ID: 863301630a6557af6150ca86c9244df2f8359a1372e9e584862a67a0c3f7cfd3
                                                                                    • Instruction ID: 86284929a52fd0946a34cb162b5e390cc9e0ff977fde8b448ec74876c2215e56
                                                                                    • Opcode Fuzzy Hash: 863301630a6557af6150ca86c9244df2f8359a1372e9e584862a67a0c3f7cfd3
                                                                                    • Instruction Fuzzy Hash: 1151AF789043429EE3256B42D8197597BE9BBD2B1CF44080DF6D92F385C7FA28458781
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    • char_traits::copy overlapped range, xrefs: 0100D833
                                                                                    • %s:%d: assertion %s failed: %s, xrefs: 0100D847
                                                                                    • __s2 < __s1 || __s2 >= __s1+__n, xrefs: 0100D838
                                                                                    • ..\..\buildtools\third_party\libc++\trunk\include\__string\char_traits.h, xrefs: 0100D842
                                                                                    • basic_string(const char*, n) detected nullptr, xrefs: 0100D81D
                                                                                    • ..\..\buildtools\third_party\libc++\trunk\include\string, xrefs: 0100D82C
                                                                                    • __n == 0 || __s != nullptr, xrefs: 0100D822
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: _strlen
                                                                                    • String ID: %s:%d: assertion %s failed: %s$..\..\buildtools\third_party\libc++\trunk\include\__string\char_traits.h$..\..\buildtools\third_party\libc++\trunk\include\string$__n == 0 || __s != nullptr$__s2 < __s1 || __s2 >= __s1+__n$basic_string(const char*, n) detected nullptr$char_traits::copy overlapped range
                                                                                    • API String ID: 4218353326-3850207310
                                                                                    • Opcode ID: 4dfdd0d73dd22746ec1eb075ae4cf70038b6207be0dffdaf60551c3f7ef280c8
                                                                                    • Instruction ID: 77ac8ac6d0196ae5425b8353d87879ef8f00d2bf766a2ef5f15640ce1f41ce8f
                                                                                    • Opcode Fuzzy Hash: 4dfdd0d73dd22746ec1eb075ae4cf70038b6207be0dffdaf60551c3f7ef280c8
                                                                                    • Instruction Fuzzy Hash: 18213C713003466BF7236AD99CC1EAEB689EB51E54F18413FF5C9D7381E9A09D0087B6
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __Init_thread_header.LIBCMT ref: 010462A7
                                                                                    • GetProcAddress.KERNEL32(00000000,RoInitialize), ref: 010462E4
                                                                                    • __Init_thread_header.LIBCMT ref: 0104630A
                                                                                      • Part of subcall function 010816E7: EnterCriticalSection.KERNEL32(010E3D70,?,?,?,01065379,010F0438,00000000,?,?,?,?,010650F7,00000000,00000000), ref: 010816F2
                                                                                      • Part of subcall function 010816E7: LeaveCriticalSection.KERNEL32(010E3D70,?,?,?,01065379,010F0438,00000000,?,?,?,?,010650F7,00000000,00000000), ref: 0108172F
                                                                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,?,010E59B8,?,?,?,?,?,?,?,?,?,-00000001), ref: 01046358
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalInit_thread_headerSection$AddressEnterLeaveLibraryLoadProc
                                                                                    • String ID: ..\..\base\win\scoped_winrt_initializer.cc$RoInitialize$combase.dll$operator()
                                                                                    • API String ID: 882557473-4077768022
                                                                                    • Opcode ID: 495929756e3d8e613947944b1c0474724e889f2d147484e94df4c129a79f4d3c
                                                                                    • Instruction ID: d14df7fa95ac6c9985cde4b6adffa55fe93e4b4a34930f37154e4f2fb8f328a9
                                                                                    • Opcode Fuzzy Hash: 495929756e3d8e613947944b1c0474724e889f2d147484e94df4c129a79f4d3c
                                                                                    • Instruction Fuzzy Hash: E1313BB4A05201AFD760EB6AED85EEA33E0BB4AB24F04053CE8C69F244E77758008756
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __Init_thread_header.LIBCMT ref: 010463E3
                                                                                    • GetProcAddress.KERNEL32(00000000,RoUninitialize), ref: 01046420
                                                                                    • __Init_thread_header.LIBCMT ref: 01046446
                                                                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,?,010E59B8), ref: 01046494
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: Init_thread_header$AddressLibraryLoadProc
                                                                                    • String ID: ..\..\base\win\scoped_winrt_initializer.cc$RoUninitialize$combase.dll$operator()
                                                                                    • API String ID: 900114960-1867938867
                                                                                    • Opcode ID: ca305065996fae7f6601d097d1f0071f7666ba26980389da039491d63ce44ad2
                                                                                    • Instruction ID: 2330a4002102a185ddb4260e4f924fdbdca34d0de6770606d9cd996486ee8b66
                                                                                    • Opcode Fuzzy Hash: ca305065996fae7f6601d097d1f0071f7666ba26980389da039491d63ce44ad2
                                                                                    • Instruction Fuzzy Hash: FD31E8B4A053419BD760AB2AEC85AED77E1BB86B24F00457DE8C55F240EB376441CB45
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: _strlen
                                                                                    • String ID: %s:%d: assertion %s failed: %s$..\..\buildtools\third_party\libc++\trunk\include\__string\char_traits.h$..\..\buildtools\third_party\libc++\trunk\include\string$__s != nullptr$__s2 < __s1 || __s2 >= __s1+__n$basic_string(const char*) detected nullptr$char_traits::copy overlapped range
                                                                                    • API String ID: 4218353326-4006657160
                                                                                    • Opcode ID: b4c0f9ae69622032404ca2c8a55a418640b7b9546604553bd7a5229cbb7b4763
                                                                                    • Instruction ID: 5d10dbb5e27d993ffeda15019b0090550d64fe65d72f1ab3977aa3defe13b602
                                                                                    • Opcode Fuzzy Hash: b4c0f9ae69622032404ca2c8a55a418640b7b9546604553bd7a5229cbb7b4763
                                                                                    • Instruction Fuzzy Hash: FE1108713403066BF3262BEA9CC1AAFB68A9B55D54F18453EF2C9DB381DCA0DD0047B6
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • type_info::operator==.LIBVCRUNTIME ref: 01099A37
                                                                                    • CatchIt.LIBVCRUNTIME ref: 01099B96
                                                                                    • _UnwindNestedFrames.LIBCMT ref: 01099C97
                                                                                    • CallUnexpected.LIBVCRUNTIME ref: 01099CB2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallCatchFramesNestedUnexpectedUnwindtype_info::operator==
                                                                                    • String ID: csm$csm$csm
                                                                                    • API String ID: 2332921423-393685449
                                                                                    • Opcode ID: a87d70bdcee861c44895536f672a9c72f7ccf24fb956f837bd3e8cdb3c3e540c
                                                                                    • Instruction ID: bc0c1f2cbbcab394e5370d09016d30bada7b2b80fd840db945ce869107bdccb9
                                                                                    • Opcode Fuzzy Hash: a87d70bdcee861c44895536f672a9c72f7ccf24fb956f837bd3e8cdb3c3e540c
                                                                                    • Instruction Fuzzy Hash: 28B1ACB180020ADFCF15DFA9C9A09AEBBF5FF54318F14419EE8916B202D335DA51EB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(010CED04,010CED04,ThreadLocalEventBuffer,?,?,?,?,?,?,?,?,__location != nullptr,null pointer given to construct_at), ref: 0103F91E
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?,?,?,010D2DFC,?,?,?,?,?,?,?,?,?,__location != nullptr,null pointer given to construct_at), ref: 0103F992
                                                                                    Strings
                                                                                    • %s:%d: assertion %s failed: %s, xrefs: 0103F800
                                                                                    • ..\..\buildtools\third_party\libc++\trunk\include\__memory\construct_at.h, xrefs: 0103F7FB
                                                                                    • null pointer given to construct_at, xrefs: 0103F7EF
                                                                                    • ThreadLocalEventBuffer, xrefs: 0103F907
                                                                                    • __location != nullptr, xrefs: 0103F7F4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$AcquireRelease
                                                                                    • String ID: %s:%d: assertion %s failed: %s$..\..\buildtools\third_party\libc++\trunk\include\__memory\construct_at.h$ThreadLocalEventBuffer$__location != nullptr$null pointer given to construct_at
                                                                                    • API String ID: 17069307-3489168812
                                                                                    • Opcode ID: 7d49de60396bfd51b29c09b85b4ab8fac43ea103ea54c14ab8b666256f8040a3
                                                                                    • Instruction ID: edbe3c4ee55671826b9f5d9143878a755760279cc6e6ed9b74e1d68a8ea71aa8
                                                                                    • Opcode Fuzzy Hash: 7d49de60396bfd51b29c09b85b4ab8fac43ea103ea54c14ab8b666256f8040a3
                                                                                    • Instruction Fuzzy Hash: 368128B1E002069FDB14EF68C884AAEB7F5BF94314F09466DE5899B341DB31E905CBD1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(00000000,010535C7,?,?,?,?,?,?,?,?,?,01057E08,?,010E3CC8), ref: 01053238
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(00000000,FFFFFFFF,?), ref: 0105327D
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(00000000,FFFFFFFF,?), ref: 010532E5
                                                                                      • Part of subcall function 01047600: AcquireSRWLockExclusive.KERNEL32(00000000,?,01065318), ref: 01047604
                                                                                    Strings
                                                                                    • char_traits::copy overlapped range, xrefs: 0105338F
                                                                                    • %s:%d: assertion %s failed: %s, xrefs: 010533A3
                                                                                    • __s2 < __s1 || __s2 >= __s1+__n, xrefs: 01053394
                                                                                    • ..\..\buildtools\third_party\libc++\trunk\include\__string\char_traits.h, xrefs: 0105339E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$AcquireRelease
                                                                                    • String ID: %s:%d: assertion %s failed: %s$..\..\buildtools\third_party\libc++\trunk\include\__string\char_traits.h$__s2 < __s1 || __s2 >= __s1+__n$char_traits::copy overlapped range
                                                                                    • API String ID: 17069307-2841209950
                                                                                    • Opcode ID: 0f130966648f0cbb7042988e396ab05168a49b532267344651d083cd6b542203
                                                                                    • Instruction ID: 2dac7d91b126093ce52b79cdd53f9e892b86fb7ebb38626fe51da2dda901f89a
                                                                                    • Opcode Fuzzy Hash: 0f130966648f0cbb7042988e396ab05168a49b532267344651d083cd6b542203
                                                                                    • Instruction Fuzzy Hash: 0E41CF70A00205AFDBA1DF68C8C4AAF7BA4BF05794F14819DECD59F242DB35E941CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __aulldiv.LIBCMT ref: 0107CA59
                                                                                    • __aullrem.LIBCMT ref: 0107CA6E
                                                                                    • __aulldiv.LIBCMT ref: 0107CAE8
                                                                                    • __aullrem.LIBCMT ref: 0107CAF6
                                                                                    • __aulldiv.LIBCMT ref: 0107CB35
                                                                                    • __aulldiv.LIBCMT ref: 0107CB52
                                                                                    • __aullrem.LIBCMT ref: 0107CB93
                                                                                    • __aullrem.LIBCMT ref: 0107CBD7
                                                                                      • Part of subcall function 0107CDE7: __aullrem.LIBCMT ref: 0107CE05
                                                                                      • Part of subcall function 0107CDE7: __aulldiv.LIBCMT ref: 0107CE18
                                                                                      • Part of subcall function 0107CDE7: __aullrem.LIBCMT ref: 0107CE28
                                                                                      • Part of subcall function 0107CDE7: __aulldiv.LIBCMT ref: 0107CE3D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: __aulldiv__aullrem
                                                                                    • String ID:
                                                                                    • API String ID: 3839614884-0
                                                                                    • Opcode ID: 07c2b291fe048204a1ab1e6223226ffe436b5c3e35a24254ad53b8aa803f6942
                                                                                    • Instruction ID: f79cf8406497de951ad8e0fd5a0811b3a2a5c5b227bbbb2b092e856c2cdee26f
                                                                                    • Opcode Fuzzy Hash: 07c2b291fe048204a1ab1e6223226ffe436b5c3e35a24254ad53b8aa803f6942
                                                                                    • Instruction Fuzzy Hash: 4BC1C071F0021B9FEF149E6CC990BAFBBE6AFC9310F154128E995E7385D6349C118BA0
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • IsValidSecurityDescriptor.ADVAPI32(00000000), ref: 01079541
                                                                                    • GetSecurityDescriptorControl.ADVAPI32(00000000,0000FFFF,FFFFFFFF), ref: 0107956D
                                                                                    • GetSecurityDescriptorOwner.ADVAPI32(00000000,FFFFFFFF,FFFFFFFF), ref: 0107958E
                                                                                      • Part of subcall function 01064880: IsValidSid.ADVAPI32(00000000), ref: 010647BE
                                                                                      • Part of subcall function 01064880: GetLengthSid.ADVAPI32(00000000), ref: 010647C9
                                                                                    • SetLastError.KERNEL32(0000053A), ref: 010795B3
                                                                                    • GetSecurityDescriptorGroup.ADVAPI32(00000000,FFFFFFFF,FFFFFFFF), ref: 01079615
                                                                                    • GetSecurityDescriptorDacl.ADVAPI32(00000000,FFFFFFFF,FFFFFFFF,FFFFFFFF), ref: 01079664
                                                                                    • GetSecurityDescriptorSacl.ADVAPI32(00000000,FFFFFFFF,FFFFFFFF,FFFFFFFF), ref: 010796C7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: DescriptorSecurity$Valid$ControlDaclErrorGroupLastLengthOwnerSacl
                                                                                    • String ID:
                                                                                    • API String ID: 1486342557-0
                                                                                    • Opcode ID: b7d036d2c42f75954011a2a23bc4e137a4548273f02ad9061837080f4fa02d38
                                                                                    • Instruction ID: 6087c4f000e2287e95ee5785759e25f8994feb1127f6a5b8e6a63bf4e9f04602
                                                                                    • Opcode Fuzzy Hash: b7d036d2c42f75954011a2a23bc4e137a4548273f02ad9061837080f4fa02d38
                                                                                    • Instruction Fuzzy Hash: F8918770D0029D9EEF21DFA8CC44BEEBFB8AF16328F044299D4D9661C1DB345689CB25
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32 ref: 0105869E
                                                                                    • ReleaseSRWLockExclusive.KERNEL32 ref: 01058794
                                                                                    • ReleaseSRWLockExclusive.KERNEL32 ref: 01058854
                                                                                    • __Init_thread_header.LIBCMT ref: 010588E2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$Release$AcquireInit_thread_header
                                                                                    • String ID: DumpWithoutCrashing
                                                                                    • API String ID: 3494467697-3234294828
                                                                                    • Opcode ID: 687e63589a9ed1afe2a28bf760e79c2eb6fd75a3773f05ee2c4d18fcbb7de6af
                                                                                    • Instruction ID: 52e6ac3564e6e6be9ea6dddd8513e0092997807b0d238116d0bf28fe002e4c96
                                                                                    • Opcode Fuzzy Hash: 687e63589a9ed1afe2a28bf760e79c2eb6fd75a3773f05ee2c4d18fcbb7de6af
                                                                                    • Instruction Fuzzy Hash: CC916A74A08341CFC754EF2AD49466ABBF0BF89318F558A1EEDD58B280D775A844CF42
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __Init_thread_header.LIBCMT ref: 010396E9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: Init_thread_header
                                                                                    • String ID: Friday$Monday$Sunday$Tuesday$rday
                                                                                    • API String ID: 3738618077-4029317968
                                                                                    • Opcode ID: 7b582c63d7b9c3b507339783aff909f224802e738204edb2402ddc0392109138
                                                                                    • Instruction ID: 6b31a951c3c2f643e42a3ec67d928e91c7811abcac2dfbf22cac0d9d71d6ca97
                                                                                    • Opcode Fuzzy Hash: 7b582c63d7b9c3b507339783aff909f224802e738204edb2402ddc0392109138
                                                                                    • Instruction Fuzzy Hash: B9818C7CA092428EE3219F16E8083157BE5BB96B1CF04489DD9D92F384C7FEA844CB42
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: _strlen
                                                                                    • String ID: , {$} l,
                                                                                    • API String ID: 4218353326-191534019
                                                                                    • Opcode ID: a92ea460695c84438fd303ffddfb0940678543dc21bc000b1249e4cc078e4183
                                                                                    • Instruction ID: 3ebcdaea572103baba83b8841045b089c6f6d0d0a6d28cf4c46296ec962a3f3d
                                                                                    • Opcode Fuzzy Hash: a92ea460695c84438fd303ffddfb0940678543dc21bc000b1249e4cc078e4183
                                                                                    • Instruction Fuzzy Hash: 7A51F7B1D002167BEF11EFA48C45BFF7BB8AF16208F040159ED8477291E77A5A458BA2
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • _strlen.LIBCMT ref: 010214E0
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01021535
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_strlen
                                                                                    • String ID: %*s:%s$%s%s %s$[%03u.%03u] $[printf format error]
                                                                                    • API String ID: 2172594012-3351823563
                                                                                    • Opcode ID: 840346b074328f40ff5c8b8a1905f18758cff1d55077a07f02b95becd66aa8e4
                                                                                    • Instruction ID: 6c959174aea343968ab296db6f3e081ea2fc8bd2b00c6f353766516012f3fbda
                                                                                    • Opcode Fuzzy Hash: 840346b074328f40ff5c8b8a1905f18758cff1d55077a07f02b95becd66aa8e4
                                                                                    • Instruction Fuzzy Hash: AA515AB2E003526BEB10AF648C46EAFB7A9EFD5710F04873CF9D956180EB7195148B92
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(00000000,?,00000000,?,01074CAD,?,00000000,-00000100,?,00000000,-00000100,00000000,?,?,-00000100), ref: 01075920
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(00000000,00000002,?,?,0100BF10,00000002,?,?), ref: 010759D0
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(00000000,?,01074CAD,?,00000000,-00000100,?,00000000,-00000100,00000000,?,?,-00000100,?,00000000), ref: 010759A0
                                                                                      • Part of subcall function 0105C5A0: TryAcquireSRWLockExclusive.KERNEL32(010F3EE0,00000000,FBE85001,0000000A,0CFC9968,0105F533,010814B2), ref: 0105C5BC
                                                                                      • Part of subcall function 0105C5A0: AcquireSRWLockExclusive.KERNEL32(010F3EE0), ref: 0105C5ED
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(00000000,?,0100BF10,00000002,?,?), ref: 01075A50
                                                                                    Strings
                                                                                    • bitset set argument out of range, xrefs: 010759AC
                                                                                    • bitset reset argument out of range, xrefs: 01075A5C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$Acquire$Release
                                                                                    • String ID: bitset reset argument out of range$bitset set argument out of range
                                                                                    • API String ID: 1678258262-3395121086
                                                                                    • Opcode ID: 30623f5e2358a1d5306685c87d5c551b9e9f92f77afff6c67d8b9cadde72dd70
                                                                                    • Instruction ID: c88c7fd53c96c3bf6fc705351ee8de3fc1c24cb208eed03e12488a2dd7c14208
                                                                                    • Opcode Fuzzy Hash: 30623f5e2358a1d5306685c87d5c551b9e9f92f77afff6c67d8b9cadde72dd70
                                                                                    • Instruction Fuzzy Hash: CD317D32A1010997CB686958DC846FE374ADBD3231F154269E9D387285DB71D842C3A9
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(010E2C58), ref: 0105B918
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(010E2C58), ref: 0105B962
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 0105B9E6
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?,00000001), ref: 0105BA52
                                                                                    • TlsSetValue.KERNEL32(00000001), ref: 0105BA60
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$AcquireRelease$Value
                                                                                    • String ID: first
                                                                                    • API String ID: 3402380315-2456940119
                                                                                    • Opcode ID: 9fbe9a70228e7dada893496014aca2545cad9fc55c815c31871e9f64a66d4892
                                                                                    • Instruction ID: b40236c00185127ee4401dd9eb4aed4128b4a80b073702af3e784fae24206ffe
                                                                                    • Opcode Fuzzy Hash: 9fbe9a70228e7dada893496014aca2545cad9fc55c815c31871e9f64a66d4892
                                                                                    • Instruction Fuzzy Hash: 8D412531A002468FDB649F6AD849BBA7BF6EF85315F040478EEC98B690D77AA441CB41
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 01083517
                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 0108351F
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 010835A8
                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 010835D3
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 01083628
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                    • String ID: csm
                                                                                    • API String ID: 1170836740-1018135373
                                                                                    • Opcode ID: b7b4d44603399c60adba9d2224dbaffbeb0e2f0d279f05990374abda276f3df7
                                                                                    • Instruction ID: 68dfed93f1b660c0815abbc62b5792b9e88e4b99d98bcbf8c7f7d6634e5f6f20
                                                                                    • Opcode Fuzzy Hash: b7b4d44603399c60adba9d2224dbaffbeb0e2f0d279f05990374abda276f3df7
                                                                                    • Instruction Fuzzy Hash: B141D134A04219DBCF10EF6CC880A9EBBE4BF84724F048095E8D49F351D772EA15CBA0
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetFileAttributesW.KERNEL32(?,?,00000000), ref: 01049460
                                                                                    • CreateFileW.KERNEL32(?,010497CC,00000007,00000000,00000003,02000000,00000000,?,00000000), ref: 0104948B
                                                                                    • GetLastError.KERNEL32(?,00000000), ref: 01049497
                                                                                    • SetLastError.KERNEL32(00000000,?,00000000), ref: 010494B4
                                                                                    Strings
                                                                                    • ..\..\base\files\file_util_win.cc, xrefs: 01049438
                                                                                    • PathHasAccess, xrefs: 0104943D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFileLast$AttributesCreate
                                                                                    • String ID: ..\..\base\files\file_util_win.cc$PathHasAccess
                                                                                    • API String ID: 1299224125-128198036
                                                                                    • Opcode ID: 428a126b5d8f6b957cbf3e15fff38ad4efd4805672415e6265c23c65a46c2fec
                                                                                    • Instruction ID: 3ad30b372b3c3355aaf043bd6974d20d62f9c034cd1f69321b8ec5ebfd80ab89
                                                                                    • Opcode Fuzzy Hash: 428a126b5d8f6b957cbf3e15fff38ad4efd4805672415e6265c23c65a46c2fec
                                                                                    • Instruction Fuzzy Hash: B22106B16043416BE7206F78CCC5B6B7794ABDA774F100738FAE5961C0EFA5A9048391
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetThreadId.KERNEL32(000000CF,?,?,?,?,00000014,00000000,?,01063800,?,?,?,?,01044849,?,?), ref: 010470FA
                                                                                    • GetLastError.KERNEL32 ref: 01047110
                                                                                    • WaitForSingleObject.KERNEL32(000000CF,000000FF,?,00000000,?,?,?,?,?,?,?,?,?,?,00000014,00000000), ref: 01047185
                                                                                    • CloseHandle.KERNEL32(000000CF,?,?,?,?,?,?,?,?,?,?,00000014,00000000,?,01063800,?), ref: 01047190
                                                                                    Strings
                                                                                    • ..\..\base\threading\platform_thread_win.cc, xrefs: 01047163
                                                                                    • Join, xrefs: 01047168
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseErrorHandleLastObjectSingleThreadWait
                                                                                    • String ID: ..\..\base\threading\platform_thread_win.cc$Join
                                                                                    • API String ID: 813778123-1746769387
                                                                                    • Opcode ID: a751ec879c6eb913eaec632ac325575d1aae4a80d634130f793bd05f92f9b36f
                                                                                    • Instruction ID: 4acdaf913be78b75931621bcadb0eb311845957964de1b7ab64d40b36fa678c2
                                                                                    • Opcode Fuzzy Hash: a751ec879c6eb913eaec632ac325575d1aae4a80d634130f793bd05f92f9b36f
                                                                                    • Instruction Fuzzy Hash: 3711C3719043459BD310EF68DC45AAFB7E8AFD9724F000B2DF9E096180EB7492498B93
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • FreeLibrary.KERNEL32(00000000,?,0109B5CD,?,01092CDC,00000000,?,?,?,0109B1AF,00000022,FlsSetValue,010C0614,FlsSetValue,?), ref: 0109B57F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeLibrary
                                                                                    • String ID: api-ms-$ext-ms-
                                                                                    • API String ID: 3664257935-537541572
                                                                                    • Opcode ID: 1b9485c61eb58297c697441eedd5a4c7acab4355952a4ca66350dcd7593c8385
                                                                                    • Instruction ID: a4339ef0479d2232556734a876fa54ba3b747eaca87b131995c13865341cb106
                                                                                    • Opcode Fuzzy Hash: 1b9485c61eb58297c697441eedd5a4c7acab4355952a4ca66350dcd7593c8385
                                                                                    • Instruction Fuzzy Hash: C6213831A02110EBCF729A69FC50F6A37A8AB41B70F110254FDD6A7290EA34E900DBD0
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,010820D0,010822D8), ref: 0108206C
                                                                                    • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 01082082
                                                                                    • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 01082097
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$HandleModule
                                                                                    • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                    • API String ID: 667068680-1718035505
                                                                                    • Opcode ID: 49f5fb0c7d8752a9b63435d129c60dacc2859ccabff9e1e9767f441a3f9e5bfb
                                                                                    • Instruction ID: 29a92a1899e91f87098d68dcb24736839be735acce46e610f8fa627fd1f98328
                                                                                    • Opcode Fuzzy Hash: 49f5fb0c7d8752a9b63435d129c60dacc2859ccabff9e1e9767f441a3f9e5bfb
                                                                                    • Instruction Fuzzy Hash: 3FF028717492225F2BB13DAA684057A36CABB0654034202BDFDC1DB102D61BD403DFA1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e1f1a70b5acc471c6f10bd1560ce76198d7ef98acd69d0efb7ecc7d49dcfe97c
                                                                                    • Instruction ID: 9d6f2938861527c94f129a65f11facdfeb38299b2705d4d1ed25f978c7fe6ca5
                                                                                    • Opcode Fuzzy Hash: e1f1a70b5acc471c6f10bd1560ce76198d7ef98acd69d0efb7ecc7d49dcfe97c
                                                                                    • Instruction Fuzzy Hash: F5B1F170E0424ABBEF11DFADC8A0BAD7BF5BF55314F048198E9C5AB282C7719941DB60
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,00000001,0109909E,01083644,00000011), ref: 010990B5
                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 010990C3
                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 010990DC
                                                                                    • SetLastError.KERNEL32(00000000), ref: 0109912E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                    • String ID:
                                                                                    • API String ID: 3852720340-0
                                                                                    • Opcode ID: 2d8fc5906eb5ac6155cc821005b41f7309f20ce442c2fee2b5535adeec8ea674
                                                                                    • Instruction ID: a4462dc3b923ed0893643afce40619a80079055f47a1b46f34dbcdc6c57cd6e6
                                                                                    • Opcode Fuzzy Hash: 2d8fc5906eb5ac6155cc821005b41f7309f20ce442c2fee2b5535adeec8ea674
                                                                                    • Instruction Fuzzy Hash: FB01DDF23092125EAF7636F97C9889A27C5EB1177EB20022EF6E4550D4EF5648016241
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    • ..\..\buildtools\third_party\libc++\trunk\include\vector, xrefs: 010522A4
                                                                                    • %s:%d: assertion %s failed: %s, xrefs: 010522A9
                                                                                    • vector[] index out of bounds, xrefs: 01052295
                                                                                    • __n < size(), xrefs: 0105229A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: _strlen
                                                                                    • String ID: %s:%d: assertion %s failed: %s$..\..\buildtools\third_party\libc++\trunk\include\vector$__n < size()$vector[] index out of bounds
                                                                                    • API String ID: 4218353326-797005249
                                                                                    • Opcode ID: 53e49f97bd7d82173bd39453e99e7ed6065b578fac8240dfe267dcf79f90bb0f
                                                                                    • Instruction ID: 4d24c0c12f64be172024b91317c8bebfa3c7cdf2d7862609117a9f5f1e1b0e36
                                                                                    • Opcode Fuzzy Hash: 53e49f97bd7d82173bd39453e99e7ed6065b578fac8240dfe267dcf79f90bb0f
                                                                                    • Instruction Fuzzy Hash: 98319274B002069F8B54DFA8C4D18BFBBB5EF89664B10415EED599B341CB31A8418BE1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • _strlen.LIBCMT ref: 010416B2
                                                                                      • Part of subcall function 0103CF98: _strlen.LIBCMT ref: 0103CFA3
                                                                                    Strings
                                                                                    • __s != nullptr, xrefs: 01041659
                                                                                    • %s:%d: assertion %s failed: %s, xrefs: 01041668
                                                                                    • ..\..\buildtools\third_party\libc++\trunk\include\string, xrefs: 01041663
                                                                                    • string::assign received nullptr, xrefs: 01041654
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: _strlen
                                                                                    • String ID: %s:%d: assertion %s failed: %s$..\..\buildtools\third_party\libc++\trunk\include\string$__s != nullptr$string::assign received nullptr
                                                                                    • API String ID: 4218353326-1155457705
                                                                                    • Opcode ID: 2107e9defeaa5801bd55e44f6acf53e7af211303e29a34c003b86548cc34f491
                                                                                    • Instruction ID: 9f2b84a42b3caecb10afa4124d1fea8d3b414b9e6f71f168304ff43753b56807
                                                                                    • Opcode Fuzzy Hash: 2107e9defeaa5801bd55e44f6acf53e7af211303e29a34c003b86548cc34f491
                                                                                    • Instruction Fuzzy Hash: 0301F9F270030A6BBA10565EEDC0E6AB7CD9F59954B0C4076FE84AB601D670FC8086A1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • _strlen.LIBCMT ref: 010580B6
                                                                                    • __Init_thread_header.LIBCMT ref: 01058151
                                                                                      • Part of subcall function 010816E7: EnterCriticalSection.KERNEL32(010E3D70,?,?,?,01065379,010F0438,00000000,?,?,?,?,010650F7,00000000,00000000), ref: 010816F2
                                                                                      • Part of subcall function 010816E7: LeaveCriticalSection.KERNEL32(010E3D70,?,?,?,01065379,010F0438,00000000,?,?,?,?,010650F7,00000000,00000000), ref: 0108172F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$EnterInit_thread_headerLeave_strlen
                                                                                    • String ID: ..\..\base\feature_list.cc$Fail$FeatureList-feature-accessed-too-early
                                                                                    • API String ID: 3908761850-1983271533
                                                                                    • Opcode ID: 5c89a3422e44960e6eec2dcdb66d7ac9a4aabb099f4151246faeb7fc22a91a8c
                                                                                    • Instruction ID: c2a2dd2c11bc2d6b7d7578e37ced205bb52f67a0fd42693fd890456cbe4a58ae
                                                                                    • Opcode Fuzzy Hash: 5c89a3422e44960e6eec2dcdb66d7ac9a4aabb099f4151246faeb7fc22a91a8c
                                                                                    • Instruction Fuzzy Hash: 802148B1A007029BD360EF269C8195B77E5BB85728F444A2DFCD20F280E772590487E2
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    • __s != nullptr, xrefs: 0103D4DF
                                                                                    • %s:%d: assertion %s failed: %s, xrefs: 0103D4EE
                                                                                    • string::append received nullptr, xrefs: 0103D4DA
                                                                                    • ..\..\buildtools\third_party\libc++\trunk\include\string, xrefs: 0103D4E9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: _strlen
                                                                                    • String ID: %s:%d: assertion %s failed: %s$..\..\buildtools\third_party\libc++\trunk\include\string$__s != nullptr$string::append received nullptr
                                                                                    • API String ID: 4218353326-424192179
                                                                                    • Opcode ID: 975257546627291b1b1b3fbd0cb891220ab6dddf8d3750494f7b6a942d52fbe9
                                                                                    • Instruction ID: c199c2080a944bdb61ccc22cb24fcb226313faac79fc0268bd03a7466746f649
                                                                                    • Opcode Fuzzy Hash: 975257546627291b1b1b3fbd0cb891220ab6dddf8d3750494f7b6a942d52fbe9
                                                                                    • Instruction Fuzzy Hash: EFF04C2334411937961161EA5C01DFF7F9ECAD1E34B04802FF9849B242DEA0A90183F3
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?,?,?,?,00000000,?,?,?,01073F80,?,?), ref: 01074687
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?,?), ref: 010748F1
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?,?,?,?,00000000,?,?,?,01073F80,?,?), ref: 0107493B
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?,?), ref: 0107496D
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 01074986
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$Release$Acquire
                                                                                    • String ID:
                                                                                    • API String ID: 1021914862-0
                                                                                    • Opcode ID: 6e757f7886178ddb2a1cc85c597693eb48c3e3995d3f934d9e3d9b5b6641a5e3
                                                                                    • Instruction ID: 30f60a6f2c30dc1d012d3365a76e107fa203f473161df5c6dba21e16487525a6
                                                                                    • Opcode Fuzzy Hash: 6e757f7886178ddb2a1cc85c597693eb48c3e3995d3f934d9e3d9b5b6641a5e3
                                                                                    • Instruction Fuzzy Hash: 9EB1C274E003099FEB15DFA8C880BEEB7F5BF49304F184468DA96A7382D775A941CB94
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __floor_pentium4.LIBCMT ref: 0106B815
                                                                                    • __floor_pentium4.LIBCMT ref: 0106B8AF
                                                                                    • __floor_pentium4.LIBCMT ref: 0106B8DD
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32 ref: 0106B93B
                                                                                    • ReleaseSRWLockExclusive.KERNEL32 ref: 0106B970
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: __floor_pentium4$ExclusiveLock$AcquireRelease
                                                                                    • String ID:
                                                                                    • API String ID: 2497314063-0
                                                                                    • Opcode ID: 9f23d5beb6a6c7063ef548c8f40dd3533ccb389de97a98c2663f5a5c1705873c
                                                                                    • Instruction ID: eff638d521b8f1f2f4e0c91cd79d50c7c8e862ff527a66c55d06ca0fe54ae621
                                                                                    • Opcode Fuzzy Hash: 9f23d5beb6a6c7063ef548c8f40dd3533ccb389de97a98c2663f5a5c1705873c
                                                                                    • Instruction Fuzzy Hash: 8B81A271A08B05CFC712DF38D49029AB7E5BF96780F458B2DE8C5A7251EB35D885CB42
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • InitOnceExecuteOnce.KERNEL32(010F2EA0,01079130,01079290,00000000), ref: 01079187
                                                                                    • TlsGetValue.KERNEL32 ref: 010791A8
                                                                                    • AcquireSRWLockExclusive.KERNEL32(010F2EAC), ref: 010791BD
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(010F2EAC), ref: 010791EC
                                                                                    • TlsAlloc.KERNEL32 ref: 01079293
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLockOnce$AcquireAllocExecuteInitReleaseValue
                                                                                    • String ID:
                                                                                    • API String ID: 655554649-0
                                                                                    • Opcode ID: 1929cce0b3e067cd775bd423ce8ad85f0a34821149d8e995e7f601cc72d548ef
                                                                                    • Instruction ID: 49b4a5a1ca4f74f4b2bd0e0e105b474d82ba4897b2e173a2270a693a267cc381
                                                                                    • Opcode Fuzzy Hash: 1929cce0b3e067cd775bd423ce8ad85f0a34821149d8e995e7f601cc72d548ef
                                                                                    • Instruction Fuzzy Hash: AC31A275A012089FDB24EFA4E886A7E77B4BF44720B24002CED8697644DB3AE801CB55
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • EnterCriticalSection.KERNEL32(010E3D70,FFFFFF00,?,01024420,010E4BA0,?,010245A3), ref: 01081767
                                                                                    • LeaveCriticalSection.KERNEL32(010E3D70,?,01024420,010E4BA0,?,010245A3), ref: 0108179A
                                                                                    • WakeAllConditionVariable.KERNEL32(?,010E4BA0,?,010245A3), ref: 0108180D
                                                                                    • SetEvent.KERNEL32(?,010E4BA0,?,010245A3), ref: 01081817
                                                                                    • ResetEvent.KERNEL32(?,010E4BA0,?,010245A3), ref: 01081823
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalEventSection$ConditionEnterLeaveResetVariableWake
                                                                                    • String ID:
                                                                                    • API String ID: 3916383385-0
                                                                                    • Opcode ID: 4e292e809b1765696a3aa9e10ff4bd8e6862156988a5eb888669a2cc52364ff2
                                                                                    • Instruction ID: cb0ed9a33d240fba81149ac463547d68b3c077646aa177274766c08262789869
                                                                                    • Opcode Fuzzy Hash: 4e292e809b1765696a3aa9e10ff4bd8e6862156988a5eb888669a2cc52364ff2
                                                                                    • Instruction Fuzzy Hash: B4016D31609114DFC735BF19F848A987FF5FB09B10B01406AF8818B308CB7B6801CB90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ___from_strstr_to_strchr_strncpy
                                                                                    • String ID: GCTL
                                                                                    • API String ID: 19282097-4108720618
                                                                                    • Opcode ID: f2fcb3430d8727d2b9e869f9bf451cbdbb6da1b45260087240d2daf793d10225
                                                                                    • Instruction ID: 91f49a0d0f30120130f9d32ba203b999ae6db30e8e74121f9d38fd5712994577
                                                                                    • Opcode Fuzzy Hash: f2fcb3430d8727d2b9e869f9bf451cbdbb6da1b45260087240d2daf793d10225
                                                                                    • Instruction Fuzzy Hash: 3151B771D103598BCF15CF98C8806ADB7B8FF49318F14456AE985AB344E770AD44C790
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(00000000), ref: 0107A6DA
                                                                                      • Part of subcall function 01047600: AcquireSRWLockExclusive.KERNEL32(00000000,?,01065318), ref: 01047604
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?,?,?,0107B550,0107B7B0), ref: 0107A865
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$Acquire$Release
                                                                                    • String ID: ..\..\base\task\thread_pool\sequence.cc$Clear
                                                                                    • API String ID: 1678258262-2777391792
                                                                                    • Opcode ID: f51adb64d40190df19a671a1ab2b46cfe5023d808ea178b11b7f081300ff5bcd
                                                                                    • Instruction ID: 614897a39bc2a4c167627263b3e795a0f96106fab4b73842972a26f8bd1ea816
                                                                                    • Opcode Fuzzy Hash: f51adb64d40190df19a671a1ab2b46cfe5023d808ea178b11b7f081300ff5bcd
                                                                                    • Instruction Fuzzy Hash: 36517BB0A04702AFD781DF29C49475ABBF0BF88704F44492DE9898B641D775E825CBC6
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,?,?,?,0105139F), ref: 01070273
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?,FFFFFFFF,?,?), ref: 01070368
                                                                                    Strings
                                                                                    • ..\..\base\metrics\statistics_recorder.cc, xrefs: 01070333
                                                                                    • FindAndRunHistogramCallbacks, xrefs: 01070338
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$AcquireRelease
                                                                                    • String ID: ..\..\base\metrics\statistics_recorder.cc$FindAndRunHistogramCallbacks
                                                                                    • API String ID: 17069307-3431145642
                                                                                    • Opcode ID: e7f935f38f5dc079c1bc680dc28ba139fa58251b1341e10b26b8bc876dc4dc8a
                                                                                    • Instruction ID: 9d1b78b01b9d3088527619abe8643a0e32bb465d64b66f2f84c2a91f1ea08f8c
                                                                                    • Opcode Fuzzy Hash: e7f935f38f5dc079c1bc680dc28ba139fa58251b1341e10b26b8bc876dc4dc8a
                                                                                    • Instruction Fuzzy Hash: DE31E571E00301ABEB11EE55E842A9F379DEBA9714F14051CFAC61B2C5D761E90487A6
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,?,00000001,?,?,?,?,80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000001), ref: 0104672D
                                                                                    • ExpandEnvironmentStringsW.KERNEL32(?,?,00000400,?,?,?,?,?,?,?,80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000001), ref: 01046787
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: EnvironmentExpandQueryStringsValue
                                                                                    • String ID: ..\..\base\win\registry.cc$ReadValue
                                                                                    • API String ID: 1756134249-2708835790
                                                                                    • Opcode ID: 1a487cae38fac3f3be61b65cd28dc4e0eac309fb36f40700918e2a55ac7f2033
                                                                                    • Instruction ID: 5be266113c826fb7fdc61ce0fa29b9637b77cb78d0df08659048666f63a69f3b
                                                                                    • Opcode Fuzzy Hash: 1a487cae38fac3f3be61b65cd28dc4e0eac309fb36f40700918e2a55ac7f2033
                                                                                    • Instruction Fuzzy Hash: 9C31F671A4025977DB30EA64CC81FDA77ACBF54310F0044B5F5D9AB180EAB59AC59F90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll), ref: 0104B379
                                                                                    • GetProcAddress.KERNEL32(00000000,RtlGetDeviceFamilyInfoEnum), ref: 0104B385
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProc
                                                                                    • String ID: RtlGetDeviceFamilyInfoEnum$ntdll.dll
                                                                                    • API String ID: 1646373207-1730918567
                                                                                    • Opcode ID: 45b2ff59574189aa0deabe8b65e50eaaa4e7985f77347b368ca7552a8cb7fcda
                                                                                    • Instruction ID: 937e7d4da1d8993d257e1ed23e14d51d17dfbde0a4e616fdb31bbbd797c7072b
                                                                                    • Opcode Fuzzy Hash: 45b2ff59574189aa0deabe8b65e50eaaa4e7985f77347b368ca7552a8cb7fcda
                                                                                    • Instruction Fuzzy Hash: 8F21D576E042189FC7109BB5D888B5D7BB4AF0A721F0585F5ED9AEF3A0D635DC408B81
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetFileAttributesW.KERNEL32(?,?,00000000), ref: 010493B7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: AttributesFile
                                                                                    • String ID: ..\..\base\files\file_util_win.cc$PathExists$msedge.exe
                                                                                    • API String ID: 3188754299-3206840752
                                                                                    • Opcode ID: 8f02e10f34b801a6cd978f75f1fe2abe21ef325c497f1bbad767d234b5dcd227
                                                                                    • Instruction ID: 3c94b069873dd006e1fdd33c9e09e593292cca3c3070280d95d323f1e0ae6de4
                                                                                    • Opcode Fuzzy Hash: 8f02e10f34b801a6cd978f75f1fe2abe21ef325c497f1bbad767d234b5dcd227
                                                                                    • Instruction Fuzzy Hash: 851108B19187C16BD7209B248C8576FB7A4AFDA774F100B2DF8E0562C0EBA19544C382
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • RegOpenKeyExW.ADVAPI32(?,80000002,00000000,01045984,?,?,?,01045984), ref: 01046585
                                                                                    • RegCloseKey.ADVAPI32(?), ref: 0104659C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseOpen
                                                                                    • String ID: ..\..\base\win\registry.cc$Open
                                                                                    • API String ID: 47109696-830328924
                                                                                    • Opcode ID: b899d38b5dbf68d67e05555f6f447527614bef558f2c164571c05b0ee57704c6
                                                                                    • Instruction ID: 1eb3cf593787d7a47cba5acb986828223996dd8e30390534d860b4d733af9a5b
                                                                                    • Opcode Fuzzy Hash: b899d38b5dbf68d67e05555f6f447527614bef558f2c164571c05b0ee57704c6
                                                                                    • Instruction Fuzzy Hash: 2C11A371A01309ABDB10DF99CC54EDF7BB8EF59760F454428F895A7240DB35AA01CBB4
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 01023958
                                                                                    • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 01023964
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProc
                                                                                    • String ID: GetSystemTimePreciseAsFileTime$kernel32.dll
                                                                                    • API String ID: 1646373207-706389432
                                                                                    • Opcode ID: 7425f19b5b0cee08ba1014f5675c313a486518104560b745b077110b34947bbc
                                                                                    • Instruction ID: b9be44b16b41ca7f77a6b9878ee72179049dec13d4075d9f48d1be1d1d87efc6
                                                                                    • Opcode Fuzzy Hash: 7425f19b5b0cee08ba1014f5675c313a486518104560b745b077110b34947bbc
                                                                                    • Instruction Fuzzy Hash: C9D01270A4930D6B86206FE7EC0AF197BECB60AD54701005CFDC9CA108EAAAD0008F56
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,010679E4), ref: 01067808
                                                                                    • GetProcAddress.KERNEL32(00000000,PrefetchVirtualMemory), ref: 01067814
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProc
                                                                                    • String ID: PrefetchVirtualMemory$kernel32.dll
                                                                                    • API String ID: 1646373207-4069913949
                                                                                    • Opcode ID: 71685c1c695825014cf86f0f8b145d4aa4c938d6c145e81b09704d8aa29d2ab1
                                                                                    • Instruction ID: a16fb3b0342f4dc4f3962a020bd156d34f58abf340e15ba58b3d13f856da8256
                                                                                    • Opcode Fuzzy Hash: 71685c1c695825014cf86f0f8b145d4aa4c938d6c145e81b09704d8aa29d2ab1
                                                                                    • Instruction Fuzzy Hash: 2FB0927118130CB7861036E3BC0FC063A2CF516A127854119F9898A809AEBA90004762
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: AdjustPointer
                                                                                    • String ID:
                                                                                    • API String ID: 1740715915-0
                                                                                    • Opcode ID: 0b2cbd0573c87ab04b65605b1344a533e37fd1fa47dc718a08f8380bffb31d1b
                                                                                    • Instruction ID: b474def4a535da04edef7e91d5f16d33ed432846284d7fe429ff79c886c59010
                                                                                    • Opcode Fuzzy Hash: 0b2cbd0573c87ab04b65605b1344a533e37fd1fa47dc718a08f8380bffb31d1b
                                                                                    • Instruction Fuzzy Hash: B8510771505202AFEF259F58D860BBEB7E8FF44318F14455DE9C657290EB31E841EB90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • TlsGetValue.KERNEL32(FFFFFFFF), ref: 0107F6C9
                                                                                      • Part of subcall function 010814D0: TlsSetValue.KERNEL32(FFFFFFFF,0107F70B,?,0107F70B,FFFFFFFF,?), ref: 010814D9
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 0107F75E
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 0107F789
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLockValue$AcquireRelease
                                                                                    • String ID:
                                                                                    • API String ID: 541261624-0
                                                                                    • Opcode ID: 4dd4a12aade8639370d6313f6d65159953cf026e637b8ddb1f75f6f2a231839c
                                                                                    • Instruction ID: 18a8e89eeb5bb56296bd6403b59402ecc80770663e320df5031d9933d7c306ef
                                                                                    • Opcode Fuzzy Hash: 4dd4a12aade8639370d6313f6d65159953cf026e637b8ddb1f75f6f2a231839c
                                                                                    • Instruction Fuzzy Hash: 3C518B71E003064BDB60BF58EC44BE973E5BF04310F1404B8DAE99B282EB765A45CB95
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 0106F7F0
                                                                                    • _strlen.LIBCMT ref: 0106F878
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(010D9098,?,?,010D9098,?,?), ref: 0106F8B7
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(010D9098,?,?,?,?,?,010D9098,?,?), ref: 0106F91F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$Release$Acquire_strlen
                                                                                    • String ID:
                                                                                    • API String ID: 175025429-0
                                                                                    • Opcode ID: 11d44f127ad6fc6791bb27cec391ffe5dbe010e7a430479816c87bfc7e5f5e69
                                                                                    • Instruction ID: 29e8a62702a52a1d5f34120262ca2906c02181c60603b0023ff44f971516a007
                                                                                    • Opcode Fuzzy Hash: 11d44f127ad6fc6791bb27cec391ffe5dbe010e7a430479816c87bfc7e5f5e69
                                                                                    • Instruction Fuzzy Hash: 79410C71E002169FDB11EF94E891EEE77BDBF58704F14006DEAC26B281DB669D0487A1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9c600a48a09b37cf55b938c4735cfda20681c61bf7b6695a65d7da3aba75171c
                                                                                    • Instruction ID: b951c80ccf129f6fe002e3e4959240446056efa94efe5ed0c6f1983f90c99a19
                                                                                    • Opcode Fuzzy Hash: 9c600a48a09b37cf55b938c4735cfda20681c61bf7b6695a65d7da3aba75171c
                                                                                    • Instruction Fuzzy Hash: 6821AC71704207BF9F21AF69C8A08AA77ADAF15278700C569F9E59B541EB31EC40A7A0
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 010A10BE
                                                                                      • Part of subcall function 010A0FBA: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0109A874,?,00000000,-00000008), ref: 010A101B
                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 010A10F6
                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 010A1116
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                    • String ID:
                                                                                    • API String ID: 158306478-0
                                                                                    • Opcode ID: f28911b75d6dcf3931f0b38eae7c7c00c901ca81375452cdfe8bc423410e99cc
                                                                                    • Instruction ID: 5994b9f334ae6f7c1d45098b1faa1aa91e94296ec69422d20aa08c02fd9664ba
                                                                                    • Opcode Fuzzy Hash: f28911b75d6dcf3931f0b38eae7c7c00c901ca81375452cdfe8bc423410e99cc
                                                                                    • Instruction Fuzzy Hash: F711C8F160151FBF672127F55CC8CBF7A9DED85195B400125F98292100EE34ED0046B5
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(010E5A94,?,?,?,0106EC04,00000001), ref: 010514E7
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(010E5A94,?,0106EC04,0106EC04,?,?,?,0106EC04,00000001), ref: 0105151E
                                                                                    • __Init_thread_header.LIBCMT ref: 0105153B
                                                                                    • __Init_thread_header.LIBCMT ref: 01051585
                                                                                      • Part of subcall function 010816E7: EnterCriticalSection.KERNEL32(010E3D70,?,?,?,01065379,010F0438,00000000,?,?,?,?,010650F7,00000000,00000000), ref: 010816F2
                                                                                      • Part of subcall function 010816E7: LeaveCriticalSection.KERNEL32(010E3D70,?,?,?,01065379,010F0438,00000000,?,?,?,?,010650F7,00000000,00000000), ref: 0108172F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalExclusiveInit_thread_headerLockSection$AcquireEnterLeaveRelease
                                                                                    • String ID:
                                                                                    • API String ID: 35131462-0
                                                                                    • Opcode ID: a31a6a7f6a34e9e5111a2aad645f2cf5eaf712a9217c62dc87c3afbbe8b76215
                                                                                    • Instruction ID: 374e281bc1ecfdeaf42b60eb89755f19a1a0c9dc3cfb3af316ef94f4f706a090
                                                                                    • Opcode Fuzzy Hash: a31a6a7f6a34e9e5111a2aad645f2cf5eaf712a9217c62dc87c3afbbe8b76215
                                                                                    • Instruction Fuzzy Hash: D921BF78A003129FC720EF5AFCC9B9A37E1BF8561CF080968D8C64F240DB36A8458B91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?,00000000,?,?,?,?,01044B8B,00000000,?,%s:%d: assertion %s failed: %s,..\..\buildtools\third_party\libc++\trunk\include\__tree,000000CF,__x != nullptr,node shouldn't be null), ref: 01044823
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?,?,?,?,?,01044B8B,00000000,?,%s:%d: assertion %s failed: %s,..\..\buildtools\third_party\libc++\trunk\include\__tree,000000CF,__x != nullptr,node shouldn't be null), ref: 01044838
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,01044B8B,00000000,?,%s:%d: assertion %s failed: %s,..\..\buildtools\third_party\libc++\trunk\include\__tree,000000CF,__x != nullptr,node shouldn't be null), ref: 0104484A
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?,?,?,?,?,01044B8B,00000000,?,%s:%d: assertion %s failed: %s,..\..\buildtools\third_party\libc++\trunk\include\__tree,000000CF,__x != nullptr,node shouldn't be null), ref: 01044889
                                                                                      • Part of subcall function 01047600: AcquireSRWLockExclusive.KERNEL32(00000000,?,01065318), ref: 01047604
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$Acquire$Release
                                                                                    • String ID:
                                                                                    • API String ID: 1678258262-0
                                                                                    • Opcode ID: 51da32985967827353ae2c15cb4cda92e9b8d10e12ec236556a442f807b1a4a4
                                                                                    • Instruction ID: 0a1e6d2ad3c9d5b4c4d56c768ede6359c357505d3acc69290a7048c2f945abb9
                                                                                    • Opcode Fuzzy Hash: 51da32985967827353ae2c15cb4cda92e9b8d10e12ec236556a442f807b1a4a4
                                                                                    • Instruction Fuzzy Hash: D4216D742003419FEB24AF64E8C8BBE7BB9BF99604F04056CE98687241DB76A805CB61
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetFullPathNameW.KERNEL32(?,04C48300,04F39DE8,00000000,01094DB3,00000000,?,01091105,01094DB3,01094DB3,?,?,?,010492CA,?,00000001), ref: 0109127E
                                                                                    • GetLastError.KERNEL32(?,01091105,01094DB3,01094DB3,?,?,?,010492CA,?,00000001,00000000,00000000,?,01094DB3,?,010492CA), ref: 01091288
                                                                                    • __dosmaperr.LIBCMT ref: 0109128F
                                                                                    • GetFullPathNameW.KERNEL32(?,04C48300,04F39DE8,00000000,04C48301,?,01091105,01094DB3,01094DB3,?,?,?,010492CA,?,00000001,00000000), ref: 010912B9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: FullNamePath$ErrorLast__dosmaperr
                                                                                    • String ID:
                                                                                    • API String ID: 1391015842-0
                                                                                    • Opcode ID: e596a8433791f4ee0bb1994449bac4515331cb068b379eb8464ab71bd29d2584
                                                                                    • Instruction ID: 51bae2ecf26db16cc796fdb93c79c0ee3681bf5dcf85ed3bb682f1797760a4e8
                                                                                    • Opcode Fuzzy Hash: e596a8433791f4ee0bb1994449bac4515331cb068b379eb8464ab71bd29d2584
                                                                                    • Instruction Fuzzy Hash: B4F03176300306AFDF316FA9D814E5B7BE9EF4567071089A9F6D5C2150DF32E820A750
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetFullPathNameW.KERNEL32(?,04C48300,04F39DE8,00000000,01094DB3,00000000,?,01091177,01094DB3,?,?,?,010492CA,?,00000001,00000000), ref: 010912E4
                                                                                    • GetLastError.KERNEL32(?,01091177,01094DB3,?,?,?,010492CA,?,00000001,00000000,00000000,?,01094DB3,?,010492CA,?), ref: 010912EE
                                                                                    • __dosmaperr.LIBCMT ref: 010912F5
                                                                                    • GetFullPathNameW.KERNEL32(?,04C48300,04F39DE8,00000000,04C48301,?,01091177,01094DB3,?,?,?,010492CA,?,00000001,00000000,00000000), ref: 0109131F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: FullNamePath$ErrorLast__dosmaperr
                                                                                    • String ID:
                                                                                    • API String ID: 1391015842-0
                                                                                    • Opcode ID: 90e4d6648fc292c6adda60bc9c4e5eb636eca80de76eef2c0520991c5c898f50
                                                                                    • Instruction ID: 0e57736f2a789c9ae85077acfde8ab3c1f232b62a9d504740082c5e8eef6d573
                                                                                    • Opcode Fuzzy Hash: 90e4d6648fc292c6adda60bc9c4e5eb636eca80de76eef2c0520991c5c898f50
                                                                                    • Instruction Fuzzy Hash: D8F03136300206AFDF316FA9D814E577BE9EF44670710C869F595C6414DB32E810E750
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,010A30B7,00000000,00000001,?,?,?,0109558B,?,00000000,00000000), ref: 010AA821
                                                                                    • GetLastError.KERNEL32(?,010A30B7,00000000,00000001,?,?,?,0109558B,?,00000000,00000000,?,?,?,01094ED1,?), ref: 010AA82D
                                                                                      • Part of subcall function 010AA880: CloseHandle.KERNEL32(FFFFFFFE,010AA83D,?,010A30B7,00000000,00000001,?,?,?,0109558B,?,00000000,00000000,?,?), ref: 010AA890
                                                                                    • ___initconout.LIBCMT ref: 010AA83D
                                                                                      • Part of subcall function 010AA85F: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,010AA7FB,010A30A4,?,?,0109558B,?,00000000,00000000,?), ref: 010AA872
                                                                                    • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,010A30B7,00000000,00000001,?,?,?,0109558B,?,00000000,00000000,?), ref: 010AA852
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                    • String ID:
                                                                                    • API String ID: 2744216297-0
                                                                                    • Opcode ID: 2d2e2eee5381d6256d07bd61bdee65133f5109e4a2eea6617f30a06fdfafdd00
                                                                                    • Instruction ID: 3dd9568901a43fc0fcfe5807ec1c0e9f386c6ee4257bd7599d32a17d6c1ad37f
                                                                                    • Opcode Fuzzy Hash: 2d2e2eee5381d6256d07bd61bdee65133f5109e4a2eea6617f30a06fdfafdd00
                                                                                    • Instruction Fuzzy Hash: A0F01C36601119BBCF622FD5DC089993FA6FB097A0F454114FF8986164CA768820EB90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • SleepConditionVariableCS.KERNELBASE(?,0108170C,00000064), ref: 010817CA
                                                                                    • LeaveCriticalSection.KERNEL32(010E3D70,?,?,0108170C,00000064,?,?,?,01065379,010F0438,00000000,?,?,?,?,010650F7), ref: 010817D4
                                                                                    • WaitForSingleObjectEx.KERNEL32(?,00000000,?,0108170C,00000064,?,?,?,01065379,010F0438,00000000,?,?,?,?,010650F7), ref: 010817E5
                                                                                    • EnterCriticalSection.KERNEL32(010E3D70,?,0108170C,00000064,?,?,?,01065379,010F0438,00000000,?,?,?,?,010650F7,00000000), ref: 010817EC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
                                                                                    • String ID:
                                                                                    • API String ID: 3269011525-0
                                                                                    • Opcode ID: 1615acf4414aee1fb83f92749f35756d826fd47257180a11d7c7e92291b8c20b
                                                                                    • Instruction ID: d269dadb5ea9126d6f64ca6d36f1973b53249eb6495d39142b425934b5d4ae4d
                                                                                    • Opcode Fuzzy Hash: 1615acf4414aee1fb83f92749f35756d826fd47257180a11d7c7e92291b8c20b
                                                                                    • Instruction Fuzzy Hash: 2CE09232509128BFC6313B5AFC09A9E3FB4BF05A51B050055F9C95F1148B7768518BD5
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: tracing/main_trace_log
                                                                                    • API String ID: 0-566173763
                                                                                    • Opcode ID: 2317a6d8ea30fa2422c2506904a4cf555132308c98f17db433aacf5bd7b9e631
                                                                                    • Instruction ID: 60f864908943474db37fb1079821021204e8d01eb1709b0860e98df5a28a6181
                                                                                    • Opcode Fuzzy Hash: 2317a6d8ea30fa2422c2506904a4cf555132308c98f17db433aacf5bd7b9e631
                                                                                    • Instruction Fuzzy Hash: DCD1F5F1E007129BEB20AB24D884BEEB7A4BF94214F190668EEC567344DB31F951CBD1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 0109A90A: GetLastError.KERNEL32(?,?,0108922D,?,?,?,?,01092CDC,?,?,?,?), ref: 0109A90E
                                                                                      • Part of subcall function 0109A90A: SetLastError.KERNEL32(00000000,?,?), ref: 0109A9B0
                                                                                    • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,0108EA7C,?,?,?,00000055,?,-00000050,?,?,?), ref: 0109E9E6
                                                                                    • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,0108EA7C,?,?,?,00000055,?,-00000050,?,?), ref: 0109EA1D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$CodePageValid
                                                                                    • String ID: utf8
                                                                                    • API String ID: 943130320-905460609
                                                                                    • Opcode ID: 796b5c249f9cf3c9b19465507cffd5dc83ba66e0d728adfb3c1db4d08b595203
                                                                                    • Instruction ID: 24a3f6ac5dacab0d7b78e4178f025dc541460048c98b1dbc6a5eff9f9fbc3bd0
                                                                                    • Opcode Fuzzy Hash: 796b5c249f9cf3c9b19465507cffd5dc83ba66e0d728adfb3c1db4d08b595203
                                                                                    • Instruction Fuzzy Hash: 8D511831604302AAEF65EB79CC65BBB77E8FF15710F040499E6C6DB181E670ED40E6A1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • TryAcquireSRWLockExclusive.KERNEL32(?), ref: 0105C456
                                                                                    • ReleaseSRWLockExclusive.KERNEL32(?), ref: 0105C549
                                                                                      • Part of subcall function 0105C5A0: TryAcquireSRWLockExclusive.KERNEL32(010F3EE0,00000000,FBE85001,0000000A,0CFC9968,0105F533,010814B2), ref: 0105C5BC
                                                                                      • Part of subcall function 0105C5A0: AcquireSRWLockExclusive.KERNEL32(010F3EE0), ref: 0105C5ED
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExclusiveLock$Acquire$Release
                                                                                    • String ID: first
                                                                                    • API String ID: 1678258262-2456940119
                                                                                    • Opcode ID: 427d370ea21e2046e262e3eab24d6cd04031b9c9c232587aca48cc55cf0a18d1
                                                                                    • Instruction ID: 464e93e462839141891708a559a487fceb370fcd292fe4d1019ad9cf5a6335a9
                                                                                    • Opcode Fuzzy Hash: 427d370ea21e2046e262e3eab24d6cd04031b9c9c232587aca48cc55cf0a18d1
                                                                                    • Instruction Fuzzy Hash: A8312B316003028FE390DF6DC844BA7B7E9AFD8364F1885B8EDD98B255EB759582CB41
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32 ref: 01067988
                                                                                    • __Init_thread_header.LIBCMT ref: 010679CA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: CurrentInit_thread_headerProcess
                                                                                    • String ID: $di
                                                                                    • API String ID: 3343153627-4126818417
                                                                                    • Opcode ID: 3cd99be69eb0ae4175c3f029636e226e85413a47ad36e62921e0d9792a3b8ff4
                                                                                    • Instruction ID: 5a197985165b97699545c0592470c06598e6c7cf1dcbc80617b47a75df297547
                                                                                    • Opcode Fuzzy Hash: 3cd99be69eb0ae4175c3f029636e226e85413a47ad36e62921e0d9792a3b8ff4
                                                                                    • Instruction Fuzzy Hash: F341A172D103898AEB20CF58DC41BF877B5ABD9314F10829DE9D826242DBB91A84CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 0109981F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: ___except_validate_context_record
                                                                                    • String ID: csm$csm
                                                                                    • API String ID: 3493665558-3733052814
                                                                                    • Opcode ID: 9d991c2dfcd8aeca9219230f21bc7af241cf4e0f13784f36a1b704eb0e0ae589
                                                                                    • Instruction ID: 216d4a4fa7e4c6a84007362afbe5daa2305176cbbaa8ebd9f5ee8919d68f84af
                                                                                    • Opcode Fuzzy Hash: 9d991c2dfcd8aeca9219230f21bc7af241cf4e0f13784f36a1b704eb0e0ae589
                                                                                    • Instruction Fuzzy Hash: 8B31B23250421ADBDF368F99C8549AB7BA5FF0831DB08459EF9D44D222C333D9A1EB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000004,00000000,?,?,?,00000001), ref: 0104663C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: QueryValue
                                                                                    • String ID: ..\..\base\win\registry.cc$ReadValue
                                                                                    • API String ID: 3660427363-2708835790
                                                                                    • Opcode ID: b270a900ec623eda6365b45993311b3a2ad0f181d65a0363fb467117c7a267f7
                                                                                    • Instruction ID: 597c60f329b99d8286d35b412c275f43cb490d687f72f7ee4e92c09449cbb419
                                                                                    • Opcode Fuzzy Hash: b270a900ec623eda6365b45993311b3a2ad0f181d65a0363fb467117c7a267f7
                                                                                    • Instruction Fuzzy Hash: D911A2B1E00219ABDF11DF98CC90EEFB7B8EB49768F004229F9517B280D7715904CBA0
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • EventUnregister.ADVAPI32(?,?), ref: 01078405
                                                                                    Strings
                                                                                    • Provider unregistration failure, xrefs: 0107843D
                                                                                    • ..\..\base\trace_event\trace_logging_minimal_win.cc, xrefs: 0107842B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: EventUnregister
                                                                                    • String ID: ..\..\base\trace_event\trace_logging_minimal_win.cc$Provider unregistration failure
                                                                                    • API String ID: 1359036815-2616656650
                                                                                    • Opcode ID: 9aa9d7f8a0e71a86cd70a4548a7b2a03277efabbb92efca1ee7dbbadb747e918
                                                                                    • Instruction ID: 6d0aa12757a99856edfcb23704c655d98a48cb90195c5e419409d82586377b4f
                                                                                    • Opcode Fuzzy Hash: 9aa9d7f8a0e71a86cd70a4548a7b2a03277efabbb92efca1ee7dbbadb747e918
                                                                                    • Instruction Fuzzy Hash: 72115B70F003042BDB709F65D809BEB73E5ABD5300F00846DE9C59B385EEB59905C791
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • LoadLibraryExW.KERNEL32(advapi32.dll,00000000,00000800,010F3EE8,0105F56F,01081547,0105F567,00000008), ref: 01081622
                                                                                    • SystemFunction036.ADVAPI32(5004C483,0BE85756), ref: 01081635
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: Function036LibraryLoadSystem
                                                                                    • String ID: advapi32.dll
                                                                                    • API String ID: 2636843464-4050573280
                                                                                    • Opcode ID: a500d8d8191cf91b5a430c70c2f6986af720f167cd50e2d5f2d94df31f318f70
                                                                                    • Instruction ID: 4edc389a7057cbca582f0098dc9e797f85e079489fb5e4d1256262b017456ed7
                                                                                    • Opcode Fuzzy Hash: a500d8d8191cf91b5a430c70c2f6986af720f167cd50e2d5f2d94df31f318f70
                                                                                    • Instruction Fuzzy Hash: 11E0D831905318BEDB322A189901B953B856F15B64F190150AEE46E68497B19462C7D4
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 010650BE
                                                                                    • GetProcAddress.KERNEL32(00000000,GetHandleVerifier), ref: 010650CA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.621920951.0000000000FE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.621907280.0000000000FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010B5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622419330.00000000010BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622502489.00000000010E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.622508451.00000000010E1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623305563.00000000010F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.623389712.00000000010F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_fe0000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProc
                                                                                    • String ID: GetHandleVerifier
                                                                                    • API String ID: 1646373207-1090674830
                                                                                    • Opcode ID: 53cf9f07905d4877858f1e516f8e06bfa95782916a43de3eb45c0f3122bc3217
                                                                                    • Instruction ID: 4039958bd49c5dfe3b8a8806ec9789a048441047ea9be8b28da57a52df94fcce
                                                                                    • Opcode Fuzzy Hash: 53cf9f07905d4877858f1e516f8e06bfa95782916a43de3eb45c0f3122bc3217
                                                                                    • Instruction Fuzzy Hash: 72D05E3028530AA7F67076A5AC1AF25339C7714B86F801048FACA99489CFA9E0008792
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Execution Graph

                                                                                    Execution Coverage:8.3%
                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                    Signature Coverage:0%
                                                                                    Total number of Nodes:46
                                                                                    Total number of Limit Nodes:4
                                                                                    execution_graph 10252 73690a0 DuplicateHandle 10253 736917d 10252->10253 10197 7368e78 GetCurrentProcess 10198 7368ef2 GetCurrentThread 10197->10198 10199 7368eeb 10197->10199 10200 7368f2f GetCurrentProcess 10198->10200 10201 7368f28 10198->10201 10199->10198 10204 7368f65 10200->10204 10201->10200 10202 7368f8d GetCurrentThreadId 10203 7368fbe 10202->10203 10204->10202 10205 7367dd8 10206 7367de7 10205->10206 10209 7366a64 10206->10209 10211 7366a6f 10209->10211 10213 7368cc4 10211->10213 10212 7369765 10212->10212 10214 7368ccf 10213->10214 10215 736a1b6 10214->10215 10217 736b4e0 10214->10217 10215->10212 10218 736b501 10217->10218 10219 736b525 10218->10219 10222 736b690 10218->10222 10226 736b680 10218->10226 10219->10215 10223 736b69d 10222->10223 10225 736b6d6 10223->10225 10230 7369c9c 10223->10230 10225->10219 10227 736b690 10226->10227 10228 736b6d6 10227->10228 10229 7369c9c KiUserCallbackDispatcher 10227->10229 10228->10219 10229->10228 10231 7369ca7 10230->10231 10233 736b748 10231->10233 10234 7369cd0 10231->10234 10233->10233 10235 7369cdb 10234->10235 10237 736b7b7 10235->10237 10238 7369ce0 10235->10238 10237->10233 10239 7369ceb 10238->10239 10244 736b984 10239->10244 10241 736beec 10241->10237 10242 736b4e0 KiUserCallbackDispatcher 10242->10241 10243 736bcc4 10243->10241 10243->10242 10245 736b98f 10244->10245 10246 736d0ca 10245->10246 10248 736d118 10245->10248 10246->10243 10249 736d16b 10248->10249 10250 736d176 KiUserCallbackDispatcher 10249->10250 10251 736d1a0 10249->10251 10250->10251 10251->10246
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.627472421.0000000007360000.00000040.00000800.00020000.00000000.sdmp, Offset: 07360000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_7360000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6ab64c9b23b41318ae456eb59563dc5929c9c49555da3eb6bd615f1b9ad5c725
                                                                                    • Instruction ID: 2c58336213c41909f0ce482c66eb3169b6f0d087d03513e1f62b266688856005
                                                                                    • Opcode Fuzzy Hash: 6ab64c9b23b41318ae456eb59563dc5929c9c49555da3eb6bd615f1b9ad5c725
                                                                                    • Instruction Fuzzy Hash: EB41FB74E01208DFDB04DFA9D8856DEFBB2FF88314F10846AD818A7355DB319942CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32 ref: 07368ED8
                                                                                    • GetCurrentThread.KERNEL32 ref: 07368F15
                                                                                    • GetCurrentProcess.KERNEL32 ref: 07368F52
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 07368FAB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.627472421.0000000007360000.00000040.00000800.00020000.00000000.sdmp, Offset: 07360000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_7360000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: Current$ProcessThread
                                                                                    • String ID:
                                                                                    • API String ID: 2063062207-0
                                                                                    • Opcode ID: c531e3ab91dbe5126c60c3d22fc7370efcc687214b4dce3c05cca90d5bc647c0
                                                                                    • Instruction ID: 0866da5d0b85ee4972ff59720519bba741335fdee55d0bd9fb320acc55d0e8b8
                                                                                    • Opcode Fuzzy Hash: c531e3ab91dbe5126c60c3d22fc7370efcc687214b4dce3c05cca90d5bc647c0
                                                                                    • Instruction Fuzzy Hash: 1C5155B89002498FEB14CFAAD9487DEBBF1AF88304F20C859E449A7351D7795885CBA5
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32 ref: 07368ED8
                                                                                    • GetCurrentThread.KERNEL32 ref: 07368F15
                                                                                    • GetCurrentProcess.KERNEL32 ref: 07368F52
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 07368FAB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.627472421.0000000007360000.00000040.00000800.00020000.00000000.sdmp, Offset: 07360000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_7360000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: Current$ProcessThread
                                                                                    • String ID:
                                                                                    • API String ID: 2063062207-0
                                                                                    • Opcode ID: bc9e7ca123f7d9078f6e350d0118fadb464386e6854768427874d8d5a260981d
                                                                                    • Instruction ID: 6d877b3241f73927f747debc7cf2914ede8bf4a5f29fe034a666ce4a7424d237
                                                                                    • Opcode Fuzzy Hash: bc9e7ca123f7d9078f6e350d0118fadb464386e6854768427874d8d5a260981d
                                                                                    • Instruction Fuzzy Hash: 8C5164B89002498FEB14CFAAD9487DEBBF5FB88304F20C859E449A7351D7795884CFA5
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 38 7369098-736909e 39 73690a0-736917b DuplicateHandle 38->39 40 7369184-73691c4 39->40 41 736917d-7369183 39->41 41->40
                                                                                    APIs
                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0736916B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.627472421.0000000007360000.00000040.00000800.00020000.00000000.sdmp, Offset: 07360000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_7360000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: DuplicateHandle
                                                                                    • String ID:
                                                                                    • API String ID: 3793708945-0
                                                                                    • Opcode ID: a76a3fe548968550d3c162d512dd35ea43a2ddb3fa82cc842c37fd56231a164b
                                                                                    • Instruction ID: bde51f74b2b1855fa431de4bab4b9aa2a69288c01942469009d35dd634018d7e
                                                                                    • Opcode Fuzzy Hash: a76a3fe548968550d3c162d512dd35ea43a2ddb3fa82cc842c37fd56231a164b
                                                                                    • Instruction Fuzzy Hash: FE4176B9D002599FCF00CFA9D984ADEBBF5BB19314F24906AE818BB310D335A955CF94
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 45 73690a0-736917b DuplicateHandle 46 7369184-73691c4 45->46 47 736917d-7369183 45->47 47->46
                                                                                    APIs
                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0736916B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.627472421.0000000007360000.00000040.00000800.00020000.00000000.sdmp, Offset: 07360000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_7360000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: DuplicateHandle
                                                                                    • String ID:
                                                                                    • API String ID: 3793708945-0
                                                                                    • Opcode ID: a8857f2339babe0435548d09b343dff890bf9f522c086ddc2ac4322e7d194f8d
                                                                                    • Instruction ID: 870856298c407e3b9090e4b407e4483bd49a68a913b893a441a778b51b13605f
                                                                                    • Opcode Fuzzy Hash: a8857f2339babe0435548d09b343dff890bf9f522c086ddc2ac4322e7d194f8d
                                                                                    • Instruction Fuzzy Hash: F44166B9D002589FCF00CFA9D984ADEBBF5BB09310F24906AE818BB310D335A955CF94
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 51 736d118-736d174 53 736d176-736d19e KiUserCallbackDispatcher 51->53 54 736d1c2-736d1db 51->54 55 736d1a7-736d1bb 53->55 56 736d1a0-736d1a6 53->56 55->54 56->55
                                                                                    APIs
                                                                                    • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 0736D18D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.627472421.0000000007360000.00000040.00000800.00020000.00000000.sdmp, Offset: 07360000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_7360000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallbackDispatcherUser
                                                                                    • String ID:
                                                                                    • API String ID: 2492992576-0
                                                                                    • Opcode ID: a8891c72cf36af8454a7b85b38c72414f626d18b9e93cabfcdcf37092c2310a7
                                                                                    • Instruction ID: 7ac9817ecc28cee519e6ad8f48dc21a9f3e214a7adcd6d064355adcb08e6f867
                                                                                    • Opcode Fuzzy Hash: a8891c72cf36af8454a7b85b38c72414f626d18b9e93cabfcdcf37092c2310a7
                                                                                    • Instruction Fuzzy Hash: C721D5B59103898FDB10CFA9C4057EEBFF4EB09314F148459D898A7242D778A509CFB1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.623579264.00000000051CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 051CD000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_51cd000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7fc4293ded5816f7a70578939b19c5cbb76c27d42b7c6d63f842b4d859c30a55
                                                                                    • Instruction ID: f546fab44a55123562e9b9aceec884fbded2a4037fc0849e94d47bbedaa6e02e
                                                                                    • Opcode Fuzzy Hash: 7fc4293ded5816f7a70578939b19c5cbb76c27d42b7c6d63f842b4d859c30a55
                                                                                    • Instruction Fuzzy Hash: A221A1755042849FDB15DF18E9C0B26BF76FBA8318F2485BDE8054A246C337D856CAA2
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.623639665.00000000051DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 051DD000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_51dd000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8fe8a75387b63692c47d30453f1c6944c66afb726783b41a2f92cc30458ab90b
                                                                                    • Instruction ID: 16da44894b5957573e9c67065576252ab6dfafabcdcccd31f8617034f4520c8c
                                                                                    • Opcode Fuzzy Hash: 8fe8a75387b63692c47d30453f1c6944c66afb726783b41a2f92cc30458ab90b
                                                                                    • Instruction Fuzzy Hash: CF21B075604244EFDB15DF28E9C0B26FBA6FB84314F24C669D8094B256C33AD846CB72
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.623639665.00000000051DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 051DD000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_51dd000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7bf83f67a05e27a0230c4f4d02de6bb97634e20e5f4f3b314f702678066e7fa8
                                                                                    • Instruction ID: 2c4d3c813ac168d61803b25a0b74bf3b93317a8e505821ae3aac6603eb5ac89c
                                                                                    • Opcode Fuzzy Hash: 7bf83f67a05e27a0230c4f4d02de6bb97634e20e5f4f3b314f702678066e7fa8
                                                                                    • Instruction Fuzzy Hash: 1911E6B15443849FDB25DF28E9C4F26FBA6FBC4314F648A6DD4494B241C33AD446C6B2
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.623579264.00000000051CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 051CD000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_51cd000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3d9f03eb94b942ea62260076c27dc01dd3b7ee397cc21a262978773600340dc3
                                                                                    • Instruction ID: 0a0d6897a562e261c462023eb26ce9fd852c2991456b504d372e532611ddc139
                                                                                    • Opcode Fuzzy Hash: 3d9f03eb94b942ea62260076c27dc01dd3b7ee397cc21a262978773600340dc3
                                                                                    • Instruction Fuzzy Hash: 8511D376504280DFCB12CF14D9C4B26BF72FB94324F24C6ADD8494B656C33AD456CBA2
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.623546156.00000000051C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 051C3000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_51c3000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ecfe6a19c42a1350d980cecc1f201fe3aaa31520430af9510adc3fcfef10d6cb
                                                                                    • Instruction ID: 68e188a479adc95129a7c2cdaa1984720fdee945c494edec163deb5f74ed7af4
                                                                                    • Opcode Fuzzy Hash: ecfe6a19c42a1350d980cecc1f201fe3aaa31520430af9510adc3fcfef10d6cb
                                                                                    • Instruction Fuzzy Hash: 05116D761487C09FD712CF15C880B62BFB4EB56614F1988DED9888F692C32D9845CB72
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.623546156.00000000051C3000.00000040.00000800.00020000.00000000.sdmp, Offset: 051C3000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_51c3000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c8a93a179a7349813d1ce5bde43a9497d3e2d4ce3cebddebb0392afd0d241834
                                                                                    • Instruction ID: ece1b870919deefba8e475fa692cd81afe32b03efef87ea37e1c2e21ee3f229a
                                                                                    • Opcode Fuzzy Hash: c8a93a179a7349813d1ce5bde43a9497d3e2d4ce3cebddebb0392afd0d241834
                                                                                    • Instruction Fuzzy Hash: 0411C676104684DFE724CF5AC880B66FFA9FB64724F14C89EE9495B601C33EA854CB71
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.623639665.00000000051DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 051DD000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_51dd000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a88321ddf0ee8d9f18d4ea175bda8c6f0353f81c8d6f2df9b97beb9f48423345
                                                                                    • Instruction ID: db5dee8f0725499c642f4fd1bfbf89aa767ea8c48f28f82d4e15a1d9589b6014
                                                                                    • Opcode Fuzzy Hash: a88321ddf0ee8d9f18d4ea175bda8c6f0353f81c8d6f2df9b97beb9f48423345
                                                                                    • Instruction Fuzzy Hash: FA118B75504280DFDB11CF14E9C4B25FBA2FB84314F28C6ADD8494B656C33AD44ACBA2
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.623639665.00000000051DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 051DD000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_51dd000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c7fb63cb989930efde9e69150da000c528cb93922437e6f2d114c3f8b696c1a6
                                                                                    • Instruction ID: ee0da364027fc473a4ba89164425491e1b4e1290099ea1da09e2eaf1854795d8
                                                                                    • Opcode Fuzzy Hash: c7fb63cb989930efde9e69150da000c528cb93922437e6f2d114c3f8b696c1a6
                                                                                    • Instruction Fuzzy Hash: 701177715097C08FDB12DF24D994B15BF71FB85214F2586EEC4858B592C33AD44ACB62
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.627244743.0000000005A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A10000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_5a10000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9ad93562b8ae1aa2ec8db17f4efcf3c6d36c0892927b32011c3bb4d50a2d0c62
                                                                                    • Instruction ID: dc0cda61337b3c8614d0687aceaa2a3ad7cb99549ca42b80c628ae9acd070b5e
                                                                                    • Opcode Fuzzy Hash: 9ad93562b8ae1aa2ec8db17f4efcf3c6d36c0892927b32011c3bb4d50a2d0c62
                                                                                    • Instruction Fuzzy Hash: E8F06D7490A388AFCB41DBA8EC55A9D7FB4AF4A300F1541D6E844D73A2D2349A04CB65
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.627244743.0000000005A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A10000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_5a10000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: aa5711f397ea4c31c629116d55c52f296e914ddb0da11a9637da51db7c8b633e
                                                                                    • Instruction ID: 393807d0824d9f7d8219def59136828b7f11304c9434e12ca2e18aee2b8bd14f
                                                                                    • Opcode Fuzzy Hash: aa5711f397ea4c31c629116d55c52f296e914ddb0da11a9637da51db7c8b633e
                                                                                    • Instruction Fuzzy Hash: 4DF04974909388DFCB45CFA8E849A9E7FB0FB0A300F1580EAD840D73A2D6349A44CF55
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.627244743.0000000005A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A10000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_5a10000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3785a6ca33c706deaffc86211c1fae4f6ee8fb276858c60ff5c0ec007210645d
                                                                                    • Instruction ID: 17329d2e6381edea81facb32a4164e80c1030b82dae3dbe08a6e8574e52e086b
                                                                                    • Opcode Fuzzy Hash: 3785a6ca33c706deaffc86211c1fae4f6ee8fb276858c60ff5c0ec007210645d
                                                                                    • Instruction Fuzzy Hash: 21F0127140E3849FC7068774AC2575E7F74AF43305F1941DAD48097293C6345A58CB66
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.627244743.0000000005A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A10000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_5a10000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 54b5173183fb155ab52580e09aaf11be7912066fd92d374afbd1fb17cb7f3c15
                                                                                    • Instruction ID: 44bc9e2b0da654945d71f9374a8d2f8f8ba4cd669399c965d19e227a56fad046
                                                                                    • Opcode Fuzzy Hash: 54b5173183fb155ab52580e09aaf11be7912066fd92d374afbd1fb17cb7f3c15
                                                                                    • Instruction Fuzzy Hash: 7CE06D6140E3848FC7039BB09A257583F30EF43200B1942DBC444CB192DA341D08D72A
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.627244743.0000000005A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A10000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_5a10000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c2800cef962f53316167978f98e310e779e1e92c60a200207eae0f05494a7e6b
                                                                                    • Instruction ID: a45d6fbe8c1c6342c97fe11f4a314d9fab938bc9e382cc3c9aec0d1519b8c914
                                                                                    • Opcode Fuzzy Hash: c2800cef962f53316167978f98e310e779e1e92c60a200207eae0f05494a7e6b
                                                                                    • Instruction Fuzzy Hash: 72E0E574D05208AFCB40DFA9E54569DBFF0FF48300F2081EAD81497360D6749A40DF54
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.627244743.0000000005A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A10000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_5a10000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 61daa327766e50aec72e6360d2fd608e7de8176a6ec37b54550c43fb041f79d6
                                                                                    • Instruction ID: e0c1841124659d4cb97046d2f2605fa89706093c965662a017511408953ea3e0
                                                                                    • Opcode Fuzzy Hash: 61daa327766e50aec72e6360d2fd608e7de8176a6ec37b54550c43fb041f79d6
                                                                                    • Instruction Fuzzy Hash: 13E0E574E15208EFCB44DFA8E448A9DBBF0FB48300F2081A9D81497350D7319A40CF95
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.627244743.0000000005A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A10000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_5a10000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fec908109a70349227f1be0a6733cb90d64b83e9087f303bfadae9d424ddfa48
                                                                                    • Instruction ID: 4730203046693a069b34a71cb8064d026d70522d70836eff1496dc1de12fc948
                                                                                    • Opcode Fuzzy Hash: fec908109a70349227f1be0a6733cb90d64b83e9087f303bfadae9d424ddfa48
                                                                                    • Instruction Fuzzy Hash: BBD017B080A2189BCB059BB5A41666DBFB4BB42301F6041A9D80426380CB711A94DA99
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.627244743.0000000005A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A10000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_5a10000_identity_helper.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 311ebebc3db507f63185423cccd44d43f80a5f2c242a56f6a4749ee21cad04fe
                                                                                    • Instruction ID: ea0a37eaff4eeb480cf8eba9729eb958360313ef9d0c379a4907080840207556
                                                                                    • Opcode Fuzzy Hash: 311ebebc3db507f63185423cccd44d43f80a5f2c242a56f6a4749ee21cad04fe
                                                                                    • Instruction Fuzzy Hash: D9C0127051610C9BCF04EBE9E405B5E7B78FB01314F1002ADD80413280EF711D40DA99
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%