Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Player reports algnet 07-10-2024 .pdf www.skype.com.exe

Overview

General Information

Sample name:Player reports algnet 07-10-2024 .pdf www.skype.com.exe
Analysis ID:1528513
MD5:005245fcbca50a836235392c802198a8
SHA1:e53c665ed01e497874627ac654d6f90832dba1af
SHA256:be1d320f773a860897be73dd16f805902effaead313873b0c622bc6eff9db715
Tags:exegibbooc2comRemcosuser-PeterGabaldon
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Creates an autostart registry key pointing to binary in C:\Windows
Found direct / indirect Syscall (likely to bypass EDR)
Initial sample is a PE file and has a suspicious name
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Network Connection Initiated By Regsvr32.EXE
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Sigma detected: Use Short Name Path in Command Line
Uses 32bit PE files
Uses reg.exe to modify the Windows registry

Classification

  • System is w10x64
  • Player reports algnet 07-10-2024 .pdf www.skype.com.exe (PID: 6444 cmdline: "C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exe" MD5: 005245FCBCA50A836235392C802198A8)
    • HitPawInfo.exe (PID: 6652 cmdline: "C:\Users\user~1\AppData\Local\Temp\HitPawInfo.exe" MD5: 00CED89A573AD1E1F96C94C763222E1E)
      • regsvr32.exe (PID: 7284 cmdline: ResPrompt.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
      • WerFault.exe (PID: 7356 cmdline: C:\Windows\system32\WerFault.exe -u -p 6652 -s 524 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • regsvr32.exe (PID: 7412 cmdline: regsvr32.exe /s ResPrompt.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
  • reg.exe (PID: 7428 cmdline: C:\Windows\system32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PMP" /t REG_SZ /F /D "schtasks /run /tn PMP" MD5: 227F63E1D9008B36BDBCC4B397780BE4)
    • conhost.exe (PID: 7436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • regsvr32.exe (PID: 1964 cmdline: regsvr32.exe /s ResPrompt.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: schtasks /run /tn PMP, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\reg.exe, ProcessId: 7428, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PMP
Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: C:\Windows\system32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PMP" /t REG_SZ /F /D "schtasks /run /tn PMP", CommandLine: C:\Windows\system32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PMP" /t REG_SZ /F /D "schtasks /run /tn PMP", CommandLine|base64offset|contains: 0, Image: C:\Windows\System32\reg.exe, NewProcessName: C:\Windows\System32\reg.exe, OriginalFileName: C:\Windows\System32\reg.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 932, ProcessCommandLine: C:\Windows\system32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PMP" /t REG_SZ /F /D "schtasks /run /tn PMP", ProcessId: 7428, ProcessName: reg.exe
Source: Network ConnectionAuthor: Dmitriy Lifanov, oscd.community: Data: DestinationIp: 154.21.14.89, DestinationIsIpv6: false, DestinationPort: 22455, EventID: 3, Image: C:\Windows\System32\regsvr32.exe, Initiated: true, ProcessId: 7284, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49753
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PMP" /t REG_SZ /F /D "schtasks /run /tn PMP", CommandLine: C:\Windows\system32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PMP" /t REG_SZ /F /D "schtasks /run /tn PMP", CommandLine|base64offset|contains: 0, Image: C:\Windows\System32\reg.exe, NewProcessName: C:\Windows\System32\reg.exe, OriginalFileName: C:\Windows\System32\reg.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 932, ProcessCommandLine: C:\Windows\system32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PMP" /t REG_SZ /F /D "schtasks /run /tn PMP", ProcessId: 7428, ProcessName: reg.exe
Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: "C:\Users\user~1\AppData\Local\Temp\HitPawInfo.exe" , CommandLine: "C:\Users\user~1\AppData\Local\Temp\HitPawInfo.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\HitPawInfo.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\HitPawInfo.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\HitPawInfo.exe, ParentCommandLine: "C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exe", ParentImage: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exe, ParentProcessId: 6444, ParentProcessName: Player reports algnet 07-10-2024 .pdf www.skype.com.exe, ProcessCommandLine: "C:\Users\user~1\AppData\Local\Temp\HitPawInfo.exe" , ProcessId: 6652, ProcessName: HitPawInfo.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: Player reports algnet 07-10-2024 .pdf www.skype.com.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Player reports algnet 07-10-2024 .pdf www.skype.com.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4EBC74 FindFirstFileExW,8_2_00007FFB0C4EBC74
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4B3530 Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileW,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,FindNextFileW,FindClose,8_2_00007FFB0C4B3530
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4B3250 Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileW,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,FindNextFileW,FindClose,8_2_00007FFB0C4B3250
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4EBC74 FindFirstFileExW,12_2_00007FFB0C4EBC74
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4B3530 Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileW,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,FindNextFileW,FindClose,12_2_00007FFB0C4B3530
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4B3250 Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileW,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,FindNextFileW,FindClose,12_2_00007FFB0C4B3250
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4EBC74 FindFirstFileExW,20_2_00007FFB0C4EBC74
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4B3530 Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileW,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,FindNextFileW,FindClose,20_2_00007FFB0C4B3530
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4B3250 Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileW,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,FindNextFileW,FindClose,20_2_00007FFB0C4B3250
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4B3830 std::_Fac_node::_Fac_node,std::_Fac_node::_Fac_node,std::_Fac_node::_Fac_node,GetLogicalDriveStringsA,GetDriveTypeA,8_2_00007FFB0C4B3830

Networking

barindex
Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 154.21.14.89 22455Jump to behavior
Source: global trafficTCP traffic: 192.168.2.7:49753 -> 154.21.14.89:22455
Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C498340 LoadLibraryA,GetProcAddress,FreeLibrary,recv,8_2_00007FFB0C498340
Source: global trafficDNS traffic detected: DNS query: gibbooc2.com
Source: HitPawInfo.exe.5.dr, 0String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: HitPawInfo.exe.5.dr, 0String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: HitPawInfo.exe.5.dr, 0String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: HitPawInfo.exe.5.dr, 0String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: HitPawInfo.exe.5.dr, 0String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: HitPawInfo.exe.5.dr, 0String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: HitPawInfo.exe.5.dr, 0String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: 0String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: HitPawInfo.exe.5.dr, 0String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: HitPawInfo.exe.5.dr, 0String found in binary or memory: http://ocsp.digicert.com0
Source: HitPawInfo.exe.5.dr, 0String found in binary or memory: http://ocsp.digicert.com0A
Source: HitPawInfo.exe.5.dr, 0String found in binary or memory: http://ocsp.digicert.com0C
Source: HitPawInfo.exe.5.dr, 0String found in binary or memory: http://ocsp.digicert.com0X
Source: Amcache.hve.11.drString found in binary or memory: http://upx.sf.net
Source: Player reports algnet 07-10-2024 .pdf www.skype.com.exeString found in binary or memory: http://www.actualinstaller.com
Source: HitPawInfo.exe.5.dr, 0String found in binary or memory: http://www.digicert.com/CPS0
Source: Player reports algnet 07-10-2024 .pdf www.skype.com.exeString found in binary or memory: https://www.actualinstaller.comU
Source: Player reports algnet 07-10-2024 .pdf www.skype.com.exe, 00000005.00000003.1370907201.00000000046E4000.00000004.00001000.00020000.00000000.sdmp, Player reports algnet 07-10-2024 .pdf www.skype.com.exe, 00000005.00000003.1371083740.00000000028A7000.00000004.00001000.00020000.00000000.sdmp, Player reports algnet 07-10-2024 .pdf www.skype.com.exe, 00000005.00000003.1371083740.00000000028AD000.00000004.00001000.00020000.00000000.sdmp, Player reports algnet 07-10-2024 .pdf www.skype.com.exe, 00000005.00000003.1371083740.00000000028BC000.00000004.00001000.00020000.00000000.sdmp, Dutchai.lng.5.drString found in binary or memory: https://www.daproverb.be)
Source: Player reports algnet 07-10-2024 .pdf www.skype.com.exeString found in binary or memory: https://www.google.comU

System Summary

barindex
Source: initial sampleStatic PE information: Filename: Player reports algnet 07-10-2024 .pdf www.skype.com.exe
Source: C:\Windows\System32\regsvr32.exeProcess Stats: CPU usage > 49%
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4DF6948_2_00007FFB0C4DF694
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4EACC48_2_00007FFB0C4EACC4
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4E2DD88_2_00007FFB0C4E2DD8
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4E4FE48_2_00007FFB0C4E4FE4
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4EE8F88_2_00007FFB0C4EE8F8
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4DABD88_2_00007FFB0C4DABD8
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4F25008_2_00007FFB0C4F2500
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4DA8408_2_00007FFB0C4DA840
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4DA0E08_2_00007FFB0C4DA0E0
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4E03108_2_00007FFB0C4E0310
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4F03E88_2_00007FFB0C4F03E8
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4D9CD88_2_00007FFB0C4D9CD8
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4F1E648_2_00007FFB0C4F1E64
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4D9EDC8_2_00007FFB0C4D9EDC
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4E19588_2_00007FFB0C4E1958
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4DFA408_2_00007FFB0C4DFA40
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4E5AF88_2_00007FFB0C4E5AF8
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4E9B1C8_2_00007FFB0C4E9B1C
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4EBC748_2_00007FFB0C4EBC74
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4ED6808_2_00007FFB0C4ED680
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4DB6A48_2_00007FFB0C4DB6A4
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4C16D08_2_00007FFB0C4C16D0
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4DB26C8_2_00007FFB0C4DB26C
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4E54788_2_00007FFB0C4E5478
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4EACC412_2_00007FFB0C4EACC4
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4E2DD812_2_00007FFB0C4E2DD8
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4E4FE412_2_00007FFB0C4E4FE4
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4EE8F812_2_00007FFB0C4EE8F8
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4DABD812_2_00007FFB0C4DABD8
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4F250012_2_00007FFB0C4F2500
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4DA84012_2_00007FFB0C4DA840
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4DA0E012_2_00007FFB0C4DA0E0
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4E031012_2_00007FFB0C4E0310
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4F03E812_2_00007FFB0C4F03E8
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4D9CD812_2_00007FFB0C4D9CD8
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4F1E6412_2_00007FFB0C4F1E64
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4D9EDC12_2_00007FFB0C4D9EDC
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4E195812_2_00007FFB0C4E1958
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4DFA4012_2_00007FFB0C4DFA40
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4E5AF812_2_00007FFB0C4E5AF8
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4E9B1C12_2_00007FFB0C4E9B1C
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4EBC7412_2_00007FFB0C4EBC74
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4DF69412_2_00007FFB0C4DF694
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4ED68012_2_00007FFB0C4ED680
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4DB6A412_2_00007FFB0C4DB6A4
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4C16D012_2_00007FFB0C4C16D0
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4DB26C12_2_00007FFB0C4DB26C
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4E547812_2_00007FFB0C4E5478
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4EACC420_2_00007FFB0C4EACC4
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4E2DD820_2_00007FFB0C4E2DD8
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4E4FE420_2_00007FFB0C4E4FE4
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4EE8F820_2_00007FFB0C4EE8F8
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4DABD820_2_00007FFB0C4DABD8
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4F250020_2_00007FFB0C4F2500
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4DA84020_2_00007FFB0C4DA840
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4DA0E020_2_00007FFB0C4DA0E0
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4E031020_2_00007FFB0C4E0310
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4F03E820_2_00007FFB0C4F03E8
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4D9CD820_2_00007FFB0C4D9CD8
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4F1E6420_2_00007FFB0C4F1E64
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4D9EDC20_2_00007FFB0C4D9EDC
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4E195820_2_00007FFB0C4E1958
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4DFA4020_2_00007FFB0C4DFA40
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4E5AF820_2_00007FFB0C4E5AF8
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4E9B1C20_2_00007FFB0C4E9B1C
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4EBC7420_2_00007FFB0C4EBC74
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4DF69420_2_00007FFB0C4DF694
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4ED68020_2_00007FFB0C4ED680
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4DB6A420_2_00007FFB0C4DB6A4
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4C16D020_2_00007FFB0C4C16D0
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4DB26C20_2_00007FFB0C4DB26C
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4E547820_2_00007FFB0C4E5478
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\HitPawInfo.exe 5FC1BD27C679B1B5306996CFA518FA1A7B4FB60E0FE6EA92BB4BA3B82C471A85
Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFB0C4A2E50 appears 63 times
Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFB0C495120 appears 36 times
Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFB0C4E4154 appears 75 times
Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFB0C4D598C appears 39 times
Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFB0C497410 appears 33 times
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6652 -s 524
Source: Player reports algnet 07-10-2024 .pdf www.skype.com.exeStatic PE information: Number of sections : 11 > 10
Source: Player reports algnet 07-10-2024 .pdf www.skype.com.exe, 00000005.00000003.1319569569.000000007F120000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameResourceCommander.exeD vs Player reports algnet 07-10-2024 .pdf www.skype.com.exe
Source: Player reports algnet 07-10-2024 .pdf www.skype.com.exe, 00000005.00000003.1370907201.00000000046E4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameResourceCommander.exeD vs Player reports algnet 07-10-2024 .pdf www.skype.com.exe
Source: Player reports algnet 07-10-2024 .pdf www.skype.com.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknownProcess created: C:\Windows\System32\reg.exe C:\Windows\system32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PMP" /t REG_SZ /F /D "schtasks /run /tn PMP"
Source: classification engineClassification label: mal60.evad.winEXE@10/17@1/1
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeFile created: C:\Users\user\AppData\Roaming\ResourceCommanderJump to behavior
Source: C:\Windows\System32\regsvr32.exeMutant created: \Sessions\1\BaseNamedObjects\{E27727EB-367C-4A9D-96C6-6520160ADF9B}
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7436:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6652
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeFile created: C:\Users\user~1\AppData\Local\Temp\AITMP0Jump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeFile read: C:\Users\user\AppData\Local\Temp\AITMP0\aisetup.iniJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeFile read: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exe "C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exe"
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeProcess created: C:\Users\user\AppData\Local\Temp\HitPawInfo.exe "C:\Users\user~1\AppData\Local\Temp\HitPawInfo.exe"
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeProcess created: C:\Windows\System32\regsvr32.exe ResPrompt.dll
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6652 -s 524
Source: unknownProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s ResPrompt.dll
Source: unknownProcess created: C:\Windows\System32\reg.exe C:\Windows\system32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PMP" /t REG_SZ /F /D "schtasks /run /tn PMP"
Source: C:\Windows\System32\reg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s ResPrompt.dll
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeProcess created: C:\Users\user\AppData\Local\Temp\HitPawInfo.exe "C:\Users\user~1\AppData\Local\Temp\HitPawInfo.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeProcess created: C:\Windows\System32\regsvr32.exe ResPrompt.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: msftedit.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: windows.globalization.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: bcp47mrm.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: globinputhost.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeSection loaded: pcinfo.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: resprompt.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: resprompt.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: resprompt.dllJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeFile written: C:\Users\user\AppData\Local\Temp\AITMP0\aisetup.iniJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeWindow found: window name: TComboBoxJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeFile opened: C:\Windows\SysWOW64\MSFTEDIT.DLLJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Player reports algnet 07-10-2024 .pdf www.skype.com.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: Player reports algnet 07-10-2024 .pdf www.skype.com.exeStatic file information: File size 4284934 > 1048576
Source: Player reports algnet 07-10-2024 .pdf www.skype.com.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x274e00
Source: Player reports algnet 07-10-2024 .pdf www.skype.com.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4B9030 LoadLibraryA,GetProcAddress,GetUserNameW,8_2_00007FFB0C4B9030
Source: PCInfo.dll.5.drStatic PE information: real checksum: 0x0 should be: 0x60c5c
Source: HitPawInfo.exe.5.drStatic PE information: real checksum: 0x7d382 should be: 0x7cdc6
Source: Player reports algnet 07-10-2024 .pdf www.skype.com.exeStatic PE information: real checksum: 0x0 should be: 0x41a78b
Source: Player reports algnet 07-10-2024 .pdf www.skype.com.exeStatic PE information: section name: .didata
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeProcess created: C:\Windows\System32\regsvr32.exe ResPrompt.dll
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeFile created: \player reports algnet 07-10-2024 .pdf www.skype.com.exe
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeFile created: \player reports algnet 07-10-2024 .pdf www.skype.com.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeFile created: C:\Users\user\AppData\Roaming\ResourceCommander\ResPrompt.dllJump to dropped file
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeFile created: C:\Users\user\AppData\Local\Temp\PCInfo.dllJump to dropped file
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeFile created: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeJump to dropped file

Boot Survival

barindex
Source: C:\Windows\System32\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PMPJump to behavior
Source: C:\Windows\System32\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PMPJump to behavior
Source: C:\Windows\System32\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PMPJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_8-38746
Source: C:\Windows\System32\regsvr32.exeAPI coverage: 2.9 %
Source: C:\Windows\System32\regsvr32.exeAPI coverage: 2.9 %
Source: C:\Windows\System32\regsvr32.exeLast function: Thread delayed
Source: C:\Windows\System32\regsvr32.exeLast function: Thread delayed
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4EBC74 FindFirstFileExW,8_2_00007FFB0C4EBC74
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4B3530 Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileW,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,FindNextFileW,FindClose,8_2_00007FFB0C4B3530
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4B3250 Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileW,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,FindNextFileW,FindClose,8_2_00007FFB0C4B3250
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4EBC74 FindFirstFileExW,12_2_00007FFB0C4EBC74
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4B3530 Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileW,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,FindNextFileW,FindClose,12_2_00007FFB0C4B3530
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4B3250 Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileW,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,FindNextFileW,FindClose,12_2_00007FFB0C4B3250
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4EBC74 FindFirstFileExW,20_2_00007FFB0C4EBC74
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4B3530 Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileW,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,FindNextFileW,FindClose,20_2_00007FFB0C4B3530
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4B3250 Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileW,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,FindNextFileW,FindClose,20_2_00007FFB0C4B3250
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4B3830 std::_Fac_node::_Fac_node,std::_Fac_node::_Fac_node,std::_Fac_node::_Fac_node,GetLogicalDriveStringsA,GetDriveTypeA,8_2_00007FFB0C4B3830
Source: Amcache.hve.11.drBinary or memory string: VMware
Source: Amcache.hve.11.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.11.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.11.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.11.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.11.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.11.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.11.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Player reports algnet 07-10-2024 .pdf www.skype.com.exe, 00000005.00000003.1372382822.0000000000E07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: Amcache.hve.11.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.11.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.11.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.11.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: regsvr32.exe, 00000008.00000002.3179259080.0000000000DF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll]]
Source: Amcache.hve.11.drBinary or memory string: vmci.sys
Source: Player reports algnet 07-10-2024 .pdf www.skype.com.exe, 00000005.00000003.1372382822.0000000000E07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: Amcache.hve.11.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.11.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.11.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.11.drBinary or memory string: VMware20,1
Source: Amcache.hve.11.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.11.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.11.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.11.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.11.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.11.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.11.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.11.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.11.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.11.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.11.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
Source: Amcache.hve.11.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4D40A0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00007FFB0C4D40A0
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4B9030 LoadLibraryA,GetProcAddress,GetUserNameW,8_2_00007FFB0C4B9030
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4ED000 GetProcessHeap,8_2_00007FFB0C4ED000
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4D40A0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00007FFB0C4D40A0
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4D4354 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_00007FFB0C4D4354
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4D9238 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00007FFB0C4D9238
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4D40A0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00007FFB0C4D40A0
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4D4354 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_00007FFB0C4D4354
Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00007FFB0C4D9238 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00007FFB0C4D9238
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4D40A0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_00007FFB0C4D40A0
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4D4354 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,20_2_00007FFB0C4D4354
Source: C:\Windows\System32\regsvr32.exeCode function: 20_2_00007FFB0C4D9238 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_00007FFB0C4D9238

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 154.21.14.89 22455Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\HitPawInfo.exeNtCreateUserProcess: Indirect: 0x7FFB0C5768ABJump to behavior
Source: C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exeProcess created: C:\Users\user\AppData\Local\Temp\HitPawInfo.exe "C:\Users\user~1\AppData\Local\Temp\HitPawInfo.exe" Jump to behavior
Source: regsvr32.exe, 00000008.00000002.3179259080.0000000000DF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 367706/user<-->Windows 10 Pro=19045<-->C:\Windows\System32\regsvr32.exe<-->Microsoft Defender Antivirus-<-->1709044087<-->A<-->7/12/2019 4:9 a.m.<-->Program Manager<-->o
Source: regsvr32.exe, 00000008.00000002.3179259080.0000000000DF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 367706/user<-->Windows 10 Pro=19045<-->C:\Windows\System32\regsvr32.exe<-->Microsoft Defender Antivirus-<-->1709044087<-->A<-->7/12/2019 4:9 a.m.<-->Program Manager<-->
Source: regsvr32.exe, 00000008.00000002.3179259080.0000000000DF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ClientInfo>>//>>367706/user<-->Windows 10 Pro=19045<-->C:\Windows\System32\regsvr32.exe<-->Microsoft Defender Antivirus-<-->1709044087<-->A<-->7/12/2019 4:9 a.m.<-->Program Manager<-->lication Error<-->H
Source: regsvr32.exe, 00000008.00000002.3179259080.0000000000DF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ClientInfo>>//>>367706/user<-->Windows 10 Pro=19045<-->C:\Windows\System32\regsvr32.exe<-->Microsoft Defender Antivirus-<-->1709044087<-->A<-->7/12/2019 4:9 a.m.<-->Program Manager<-->
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4F4F90 cpuid 8_2_00007FFB0C4F4F90
Source: C:\Windows\System32\regsvr32.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,8_2_00007FFB0C4EEE88
Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,8_2_00007FFB0C4E44C4
Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,8_2_00007FFB0C4E40D8
Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,8_2_00007FFB0C4EF8D0
Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,8_2_00007FFB0C4EF594
Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,8_2_00007FFB0C4EF6EC
Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,8_2_00007FFB0C4EF79C
Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,8_2_00007FFB0C4EF1E4
Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,8_2_00007FFB0C4EF2B4
Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,8_2_00007FFB0C4EF34C
Source: C:\Windows\System32\regsvr32.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,12_2_00007FFB0C4EEE88
Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,12_2_00007FFB0C4E44C4
Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,12_2_00007FFB0C4E40D8
Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,12_2_00007FFB0C4EF8D0
Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,12_2_00007FFB0C4EF594
Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,12_2_00007FFB0C4EF6EC
Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,12_2_00007FFB0C4EF79C
Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,12_2_00007FFB0C4EF1E4
Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,12_2_00007FFB0C4EF2B4
Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,12_2_00007FFB0C4EF34C
Source: C:\Windows\System32\regsvr32.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,20_2_00007FFB0C4EEE88
Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,20_2_00007FFB0C4E44C4
Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,20_2_00007FFB0C4E40D8
Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,20_2_00007FFB0C4EF8D0
Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,20_2_00007FFB0C4EF594
Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,20_2_00007FFB0C4EF6EC
Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,20_2_00007FFB0C4EF79C
Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,20_2_00007FFB0C4EF1E4
Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,20_2_00007FFB0C4EF2B4
Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,20_2_00007FFB0C4EF34C
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4D2F8C GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,8_2_00007FFB0C4D2F8C
Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00007FFB0C4B9030 LoadLibraryA,GetProcAddress,GetUserNameW,8_2_00007FFB0C4B9030
Source: Amcache.hve.11.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.11.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.11.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.11.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.11.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Native API
1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
1
Deobfuscate/Decode Files or Information
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Scheduled Task/Job
1
Scheduled Task/Job
1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
LSASS Memory1
Account Discovery
Remote Desktop ProtocolData from Removable Media1
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt11
Registry Run Keys / Startup Folder
112
Process Injection
1
Obfuscated Files or Information
Security Account Manager4
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Standard Port
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Scheduled Task/Job
1
DLL Side-Loading
NTDS22
System Information Discovery
Distributed Component Object ModelInput Capture1
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script11
Registry Run Keys / Startup Folder
1
Masquerading
LSA Secrets41
Security Software Discovery
SSHKeylogging1
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Modify Registry
Cached Domain Credentials1
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Virtualization/Sandbox Evasion
DCSync1
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job112
Process Injection
Proc Filesystem1
System Owner/User Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
Regsvr32
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1528513 Sample: Player reports algnet 07-10... Startdate: 08/10/2024 Architecture: WINDOWS Score: 60 36 gibbooc2.com 2->36 40 Initial sample is a PE file and has a suspicious name 2->40 8 Player reports algnet 07-10-2024 .pdf       www.skype.com.exe 12 2->8         started        11 reg.exe 1 1 2->11         started        14 regsvr32.exe 2->14         started        16 regsvr32.exe 2->16         started        signatures3 process4 file5 32 C:\Users\user\AppData\...\HitPawInfo.exe, PE32+ 8->32 dropped 34 C:\Users\user\AppData\Local\Temp\PCInfo.dll, PE32+ 8->34 dropped 18 HitPawInfo.exe 3 8->18         started        46 Creates an autostart registry key pointing to binary in C:\Windows 11->46 22 conhost.exe 11->22         started        signatures6 process7 file8 30 C:\Users\user\AppData\...\ResPrompt.dll, PE32+ 18->30 dropped 42 Found direct / indirect Syscall (likely to bypass EDR) 18->42 24 regsvr32.exe 18->24         started        28 WerFault.exe 19 16 18->28         started        signatures9 process10 dnsIp11 38 gibbooc2.com 154.21.14.89, 22455, 49753, 49788 COGENT-174US United States 24->38 44 System process connects to network (likely due to code injection or exploit) 24->44 signatures12

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Player reports algnet 07-10-2024 .pdf www.skype.com.exe0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\HitPawInfo.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\PCInfo.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\ResourceCommander\ResPrompt.dll8%ReversingLabsWin64.Trojan.SpywareX
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
gibbooc2.com
154.21.14.89
truetrue
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://www.actualinstaller.comUPlayer reports algnet 07-10-2024 .pdf www.skype.com.exefalse
      unknown
      http://upx.sf.netAmcache.hve.11.drfalse
      • URL Reputation: safe
      unknown
      https://www.google.comUPlayer reports algnet 07-10-2024 .pdf www.skype.com.exefalse
        unknown
        http://www.actualinstaller.comPlayer reports algnet 07-10-2024 .pdf www.skype.com.exefalse
          unknown
          https://www.daproverb.be)Player reports algnet 07-10-2024 .pdf www.skype.com.exe, 00000005.00000003.1370907201.00000000046E4000.00000004.00001000.00020000.00000000.sdmp, Player reports algnet 07-10-2024 .pdf www.skype.com.exe, 00000005.00000003.1371083740.00000000028A7000.00000004.00001000.00020000.00000000.sdmp, Player reports algnet 07-10-2024 .pdf www.skype.com.exe, 00000005.00000003.1371083740.00000000028AD000.00000004.00001000.00020000.00000000.sdmp, Player reports algnet 07-10-2024 .pdf www.skype.com.exe, 00000005.00000003.1371083740.00000000028BC000.00000004.00001000.00020000.00000000.sdmp, Dutchai.lng.5.drfalse
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            154.21.14.89
            gibbooc2.comUnited States
            174COGENT-174UStrue
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1528513
            Start date and time:2024-10-08 00:39:46 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 7m 46s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Run name:Run with higher sleep bypass
            Number of analysed new started processes analysed:22
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:Player reports algnet 07-10-2024 .pdf www.skype.com.exe
            Detection:MAL
            Classification:mal60.evad.winEXE@10/17@1/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 58
            • Number of non-executed functions: 256
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
            • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing disassembly code.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Report size getting too big, too many NtSetInformationFile calls found.
            • VT rate limit hit for: Player reports algnet 07-10-2024 .pdf www.skype.com.exe
            TimeTypeDescription
            00:40:55Task SchedulerRun new task: PMP path: regsvr32.exe s>/s ResPrompt.dll
            00:40:55Task SchedulerRun new task: Res path: REG s>ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PMP" /t REG_SZ /F /D "schtasks /run /tn PMP"
            00:40:58AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run PMP schtasks /run /tn PMP
            02:08:00AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run PMP schtasks /run /tn PMP
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            154.21.14.89Player reports algnet 07-10-2024 .pdf www.skype.com.7zGet hashmaliciousUnknownBrowse
              SecuriteInfo.com.Trojan-Dropper.Win32.Agent.tjawiq.27210.15987.exeGet hashmaliciousUnknownBrowse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                gibbooc2.comPlayer reports algnet 07-10-2024 .pdf www.skype.com.7zGet hashmaliciousUnknownBrowse
                • 154.21.14.89
                SecuriteInfo.com.Trojan-Dropper.Win32.Agent.tjawiq.27210.15987.exeGet hashmaliciousUnknownBrowse
                • 154.21.14.89
                hi.zip.exeGet hashmaliciousUnknownBrowse
                • 172.111.186.180
                hi.zip.exeGet hashmaliciousUnknownBrowse
                • 172.111.186.180
                Screenshoot Error Feed Today 24-05 Skype.comGet hashmaliciousUnknownBrowse
                • 172.111.186.180
                Screenshoot Error Feed Today 24-05 Skype.comGet hashmaliciousUnknownBrowse
                • 172.111.186.180
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                COGENT-174UScenSXPimaG.elfGet hashmaliciousMirai, OkiruBrowse
                • 38.9.223.35
                2UngC9fiGa.elfGet hashmaliciousMirai, OkiruBrowse
                • 38.9.223.19
                970Qh1XiFt.elfGet hashmaliciousMirai, OkiruBrowse
                • 38.208.16.112
                SecuriteInfo.com.Win64.TrojanX-gen.22573.8055.exeGet hashmaliciousUnknownBrowse
                • 143.244.33.74
                Player reports algnet 07-10-2024 .pdf www.skype.com.7zGet hashmaliciousUnknownBrowse
                • 154.21.14.89
                IRYzGMMbSw.exeGet hashmaliciousFormBookBrowse
                • 154.23.184.60
                rInvoiceCM60916_xlx.exeGet hashmaliciousFormBookBrowse
                • 38.55.251.233
                NEW INVOICE.exeGet hashmaliciousFormBookBrowse
                • 206.238.91.127
                invoice_45009.xlsGet hashmaliciousRemcosBrowse
                • 38.240.44.9
                xd.arm7.elfGet hashmaliciousMiraiBrowse
                • 38.50.28.156
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                C:\Users\user\AppData\Roaming\ResourceCommander\ResPrompt.dllPlayer reports algnet 07-10-2024 .pdf www.skype.com.7zGet hashmaliciousUnknownBrowse
                  C:\Users\user\AppData\Local\Temp\PCInfo.dllPlayer reports algnet 07-10-2024 .pdf www.skype.com.7zGet hashmaliciousUnknownBrowse
                    C:\Users\user\AppData\Local\Temp\HitPawInfo.exePlayer reports algnet 07-10-2024 .pdf www.skype.com.7zGet hashmaliciousUnknownBrowse
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.8150383911723728
                      Encrypted:false
                      SSDEEP:384:r7WtYs7HnAP7zAKrkqjHzuiFCY4lO8Ty:WlAP7zAK7jHzuiFCY4lO8
                      MD5:03698524701246C881403C8980A0FBF2
                      SHA1:33250B6F954A295083EB332495CF16F3E9F0815B
                      SHA-256:ADC30D0926D144869462D503437E236392DDDC209F34E77797ADE284747A3252
                      SHA-512:9CAB9F1DC13208D6DFDD8DC9D9B8BBCEAB6AC74C2E46EC007C69789834E66BE98C13A1E0D436E725DF4F7A43965BA83CD43F63F1DBCB941A97EC4B013E51C40F
                      Malicious:false
                      Reputation:low
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.8.1.4.4.5.5.0.6.8.2.0.7.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.9.e.c.c.a.0.d.-.2.8.b.0.-.4.2.2.f.-.a.7.b.e.-.5.0.a.9.e.1.8.e.0.0.1.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.e.c.b.6.e.3.b.-.8.a.e.2.-.4.d.d.6.-.8.6.0.d.-.5.b.5.8.0.d.4.1.4.4.8.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.H.i.t.P.a.w.I.n.f.o...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.f.c.-.0.0.0.1.-.0.0.1.4.-.5.9.2.f.-.a.6.f.3.0.9.1.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.7.1.5.e.c.d.3.8.5.8.f.f.0.3.f.d.4.2.9.3.0.0.b.4.6.f.9.d.3.2.3.0.0.0.0.0.9.0.4.!.0.0.0.0.8.0.8.1.8.3.d.9.1.6.0.a.8.9.a.d.3.c.8.7.3.0.d.2.b.6.b.7.6.8.0.3.c.a.9.7.f.3.8.f.!.H.i.t.P.a.w.I.n.f.o...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.6././.2.0.:.0.6.:.3.2.:.0.8.!.7.d.3.8.2.!.H.i.t.P.a.w.I.n.f.o...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.7.2.9.5.....T.
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:Mini DuMP crash report, 15 streams, Mon Oct 7 22:40:55 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):65048
                      Entropy (8bit):1.7297642325618234
                      Encrypted:false
                      SSDEEP:192:EISagvWOyjYPZ89REpSg/RXWQmOSJXjn6:3chkYPZ8c8MRmQpSx6
                      MD5:525FBCB9F2FA3E975CF9A9C51A4AE2FD
                      SHA1:CB9838B6A942ADACC725C69A3EE15C7A9F153D97
                      SHA-256:F17391BC11DDA5BBEE47387BD3FB351052DBF26909D48B92A10C1A487DCA3BC0
                      SHA-512:1543A25CE9A53865869C565A47C2F853F5C7F80B7A7CF99B5486C0B2846F0444D67088905AFF3D88A3357169E4884A675523BC62F8778E8BFCEEBC48A4E20A6F
                      Malicious:false
                      Reputation:low
                      Preview:MDMP..a..... .......wc.g....................................l...T...........p...........`.......8...........T...........p...........................................................................................................eJ......D.......Lw......................T...........oc.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):6722
                      Entropy (8bit):3.7176785443667146
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJlxhqvGYpM4hrLfpBy89b8O+f0oBUm:R6lXJlHqOYpM4hrLL83fzH
                      MD5:67DC1D76CD68AA96D8B7E5908FDA447F
                      SHA1:A905DDE37543F2457E619CA307EE18C5FE137DD1
                      SHA-256:AC7C5DD0ABCB9E82FBB733F359D7833F83CA7CFD79FE5072C6ED89247DD3D368
                      SHA-512:F5D3BC4CB3EDC3287824A5AEB3A2722226E3AC6E5F62DE44C80316AC9913C283F6A06C585734A67A4DD39FF34DF304A9CFACEA15532C0F9B430FFB5E8DFBC641
                      Malicious:false
                      Reputation:low
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.6.5.2.<./.P.i.
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4657
                      Entropy (8bit):4.484496955120546
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsYJg771I94rWpW8VY72Ym8M4JL8F4yq85USCr9PBvzEpTd:uIjfeI7ba7Ve/JxJr9PBvzEpTd
                      MD5:30A6927ABDB42B091B87F35A7C8813B5
                      SHA1:B5BC38DE263D5C7C47A5522F1F341A8227F5EBF9
                      SHA-256:AF94AFF81F8D0FD50CD87230602EA2B3E3D4810D858B449A0BEF13221A9FC5DD
                      SHA-512:EBB2D5EC7687BB2C47A300BC7EDCA5F8A1FFA8CA71F430A77ABA09E702991292257D999B34BDEA3ADA1C70122C7F7061133A9EA4E6A683B4EF6675F17DA373CF
                      Malicious:false
                      Reputation:low
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="533623" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exe
                      File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (348), with CRLF line terminators
                      Category:dropped
                      Size (bytes):9854
                      Entropy (8bit):4.955567924478758
                      Encrypted:false
                      SSDEEP:192:G6bfLftPfe6WyeDf5Z/tesgtqbkktW/8plKJAxzt6:RLft3e6WyeTIltqtw8pn76
                      MD5:95291CB96482A97215C2C2EE737619F4
                      SHA1:A256C8E1A5D12EEA3FF5FB5A7A3891B0CFB6AC2E
                      SHA-256:B58A44302AA11D1FA02732879F806B35E65E7C7C2FF6A6E7C48C66E327E66373
                      SHA-512:D176A38B52E8DC8C33C08A405108541D576AA0AAD7FA8CA0AEFD55FBC811DC1A8EE2CC555FA29883B25397968575A12F97E1299FAD834F4EC3B4A4F397A09268
                      Malicious:false
                      Preview:.[Info]..id=1043..lng=nl..translator=Jacques Deseure (https://www.daproverb.be) 13/05/2020....[Buttons]..0=< &Terug..1=&Volgende >..2=&Annuleren..3=&Installeren..4=&Sluiten..5=&Ja..6=&Nee..7=&Bladeren.....8=&Voltooien..9=&Uitpakken..10=OK..11=A&kkoord..12=Afdrukken....[Title]..0=<AppNameVersion> Installatie....[Language]..0=<AppName> Installatie..1=Selecteer de installatietaal:....[Welcome]..0=<AppName> Installatie..1=Hiermee zal <AppNameVersion> worden ge.nstalleerd.<#><#>Klik op Volgende om verder te gaan, of op Annuleren om af te sluiten...2=Copyright . %s..3=Opties....[LicenseAgreement]..0=Gebruiksrechtovereenkomst..1=Lees de volgende belangrijke informatie voordat u verder gaat...2=Lees de volgende gebruiksrechtovereenkomst. U moet akkoord gaan met deze overeenkomst voordat u verder kunt gaan met de installatie...3=Indien u akkoord gaat met de gebruiksrechtovereenkomst, klik op Akkoord...4=Ik ga akkoord met de overeenkomst...5=Door het installeren van dit programma, gaat u akk
                      Process:C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exe
                      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                      Category:modified
                      Size (bytes):1294
                      Entropy (8bit):4.998390290636298
                      Encrypted:false
                      SSDEEP:24:EyMtE0ZIaRZY+Z5V14hmtEs5HjI4He93hmtEswba/2PNRyZag+:Ee0rRZY+ZR1tEdMSgtENbaqNYZ2
                      MD5:98EF129CD7FC258ECE3C468F089B04CE
                      SHA1:14DFA1715C7BF50DB4B78D3AC60C1CD906137EB9
                      SHA-256:9BBEC2A97023FAFB540D6B346636C3F4362B12CFB2ECC0002E183C6DDDF376B7
                      SHA-512:F83305A6BEDE9EF60612A066CD47DB089BD30F80287348FF10AC63844D05777221666B1EDDB5D220686A38C04BD1EA86CA4FAC63028A840C751504149B847A05
                      Malicious:false
                      Preview:.[General]..AppName=HitPaw FotorPea..AppEdition=..AppVersion=4.0.1..GUID={1E697A61-832E-478F-9EE0-909B3BDAB870}..AllUsers=0..Admin=1..x64=0..InstallDir=C:\Users\user~1\AppData\Local\Temp..MainExe=C:\Users\user~1\AppData\Local\Temp\HitPawInfo.exe....[Messages]..0=%s verwijderen..1=Weet u zeker dat u %s volledig wilt verwijderen?..2=%s is van de computer verwijderd...3=Wilt u met ons uw opinie over dit product delen?..4=%s moet worden afgesloten om door te gaan met verwijderen.%n%nOm door te gaan, sluit %s en klik op OK.%nOm de verwijdering af te sluiten, klik op Annuleren...5=Om de verwijdering van %s te voltooien, moet de computer opnieuw worden opgestart.%n%nWilt u nu opnieuw opstarten?..6=%s kan alleen worden verwijderd als de gebruiker administrator-rechten heeft...7=Wilt u de instellingenbestanden van %s verwijderen?..8=%s moet worden afgesloten om door te gaan met verwijderen.%n%nOm door te gaan, sluit %s en klik dan op Opnieuw.%nOm dit bestand over te slaan, klik op Negeren
                      Process:C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exe
                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                      Category:dropped
                      Size (bytes):1030414
                      Entropy (8bit):7.995083770357619
                      Encrypted:true
                      SSDEEP:24576:/MfC0TKcWCOnqrftqSXv6SAGIzY9EGajR/5Pevhv3:/MfZWgftq4bIzY98jR/5PeZv
                      MD5:76258CA71C5D5200C20FF1C5309AA8F2
                      SHA1:CCB79681CA9CE13D5B60888564C5E9FE35059237
                      SHA-256:2CEF521504F3C843B22C9F7B2EE203DE17493D9738FF4467D2967F85FAB61CA2
                      SHA-512:BE2E5331B2F41130F6076E2AC1360EB2B677EAECFA3D87FCB2EDB22C128663BE71D93DE75EACC0D8EDAB6951099DA7DE1ACD72DAD18FB0802E5E60EA5790753A
                      Malicious:false
                      Preview:PK..........FY...aL...........0.}.XSW..IH ....G......E%A......+ DA.h.......mZ.Rmk[[..m..k[........h.Fi.j[q.?s..............uf.3s.,7DN($....<6.!........"B...u'.Ot.-........0.O7$.R&&.....S.JCV.2%M.>r.rVz.....E%....Q...N...&........C..M...c.,.x....X.|.Px2....[...w..+z.d.Z..B9.;.)......'hztJb2.o...B.^s$....iU.#i"voK&A...m.._.&:...bB..:vH.:Qa/.....s....x. ...TG...i..[.I..q".Q...H...,B..E..@~..NB.!.......F./M...K.Q...gHJ0&..{g..t.'.~95...b..YK...k...e.....V*.%..3d... .....|..r..t(.2BYQ.QN...X...}..I*.W....;N3.3............r.....<a...T-./v...w....w....Y...?.u.X.W..,Q...q......C.`..S...........\.-'.YrD[T!..p...A.4][.&.).s.6j..'..au.2...c6....6...Z6.. R9..u...+.:qfO.Wt................nN-.j.W:......k.EN.. (W......(.$.:..#....0.o}M.k..Tr........f.!ue...0.w.... G...g7A..pG.;.2..0.....B.g..PL{l...L.EY......3...v.P.N{..#.{.d.V...2D..Ft.^...1.0..u.I..-?.G.....?i..M)>^....P76>....a.$.96>8:>>.4......O.X.......\.....p,.w.q...r........R...n...q.......Q.....?Bq
                      Process:C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exe
                      File Type:PC bitmap, Windows 3.x format, 498 x 55 x 24, image size 82280, cbSize 82334, bits offset 54
                      Category:dropped
                      Size (bytes):82334
                      Entropy (8bit):0.6686601662037086
                      Encrypted:false
                      SSDEEP:96:NxPnHCSst/INv/Q/6760tuLAdPhfvejG9NscS11wolaIsp7Jzx7:fgtc/tJdtejd11Y7Jzx7
                      MD5:A620C87E69889F459C022578F3F5E420
                      SHA1:125AF2C1D2D822982109D79A56703063EADCB683
                      SHA-256:AC34D2317F948C0D02E90C6F2473C4CC2A78D99D21C341FFA02FF4908B48DB2B
                      SHA-512:8CBD9CEAA52204B9049618170579AE99C4425DE37DBD89787CF00A192C8A69A8390D692BF25A38C83A1D72BB05516EE6857B429EAAB995B92DEF12C68D6E3027
                      Malicious:false
                      Preview:BM.A......6...(.......7...........hA....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exe
                      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1880
                      Entropy (8bit):5.3763216431025045
                      Encrypted:false
                      SSDEEP:48:adMJ34BYIvCrN2SJ/dpvvYrvz3fb46OxVOsOSiXwlZoxsDp:adm37sCZdJ/dp3WvLoiXwboxsDp
                      MD5:BAA63F11F9C2E4DDC827B0B36DA75C4F
                      SHA1:A882761158CC5271EBC889642CD5BFC1EB957139
                      SHA-256:C7F53E52BCAFB0F9975AC2EBA6F6B8DE434B30E88656EFF2B5721C24EE3213F4
                      SHA-512:0D6B6819D5234FCB2C38174D68303F254CAFD94562601D6CD0A2DFD0C3FEDCC92A2B47A990F0BC2558AC1B89DF01D16EC9798C53EB9B4F9689D5FBC2415A87DC
                      Malicious:false
                      Preview:.[Setup]..AIVer=10.1..BDID=20241006..GUID={1E697A61-832E-478F-9EE0-909B3BDAB870}..AppName=HitPaw FotorPea..AppVersion=4.0.1..AppEdition=..AppDescription=HitPaw FotorPea..Publisher=HitPawSoftware..WebSite=..SupportLink=..Copyright=Copyright . 2024 <Publisher>..PackageType=0..InstallLevel=0..UpgradeMode=0..RunAsAdmin=0..IfInstalled=0..Windows Server 2003=1..Windows XP=1..Windows Vista=1..Windows 7=1..Windows 8=1..Windows 8.1=1..Windows 10=1..Windows 11=1..Windows Server 2008=1..Windows Server 2008 R2=1..Windows Server 2012=1..Windows Server 2012 R2=1..Windows Server 2016=1..Windows Server 2019=1..Windows Server 2022=1..Enab=1..SystemType=0..Internet=0..Archive=0..InstallDir=<TempDir>..MainExe=<InstallDir>\HitPawInfo.exe..ProgramGroup=<AppName>..Uninstall=0..Updater=0..LaunchOnStatup=0..RegisterAppPath=0..ActiveSetup=0..CacheSetup=0..SelectFolderMode=0..AltInstallDir=<AppData>\<AppName>..DataExtractParam=-o"<InstallDir>" -aoa..UninstallFile=Uninstall.exe..LangIDMethod=0..AllowInstallIf
                      Process:C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exe
                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                      Category:dropped
                      Size (bytes):93930
                      Entropy (8bit):7.979028337427802
                      Encrypted:false
                      SSDEEP:1536:Lo5J7yB3siNX6YmFOXg69t6vEPtZbP8xM7odVBUXF/J07khE9RV:eyCuKYnXRmUbP8modVBUHUtp
                      MD5:493C36038828A5EF850DA2106AB956C3
                      SHA1:8DDEEE9E5A5266982B41EB33F26676D7B0797E41
                      SHA-256:F18F571A0826A626095C6D81E1F7063340436156569FAEC173474A2EEEC5B29B
                      SHA-512:D422D8BBF7E5E121D7A63045E7BBD4FC81AB742157F05503748F089106102505DE2FDA6154456AD6709F5DB7B9007E5A1BF246A4F75749E408B412CC2D71953B
                      Malicious:false
                      Preview:PK.........FY..1sf...X.......aisetup.ini}U.n.8....;...l...+..[....f.v..4...I...d.>P....}.}....%!.........BPE.W..?..\..[.`.x}.?t.g.n..E..]..c..v'...;.OV..r.t..t>...|2v...<.....@..;+....1.. )g.g. .......H.../..!.2...(.Gu&..;8.T....<.Bm(.G.....I.....{G..].].k....O9xN..fR.,...d... 1\..w....(3..R.b..(..YvB.. 0.3...s[G.)Z.q.L.....4PCV...Awv.W%.[.......t.8Y2r...I*8U.\.`....QJ.....f{8.x.~].....*..g;.kv.=x....m;....Y9.h|..........)X..P.\..hH.A .vKTjR..ffVF.......A.V<.A<....z.z."W.k.ib..........w...u...Z.+..wA...a.:.........t.>n...."......91C..\-...h.:..Qjb.`..(.xr.Y.OP.....5b.$.+.J..9...(#z..?.D~l.....M.O.\Q....D.+?..',.6.%.....*JQ.P<..-.H.Bo.V.LJ;wG.(..9.|A......y8../...K.&....A6....5..U..$..nXy....qm...lf.#...\..P..U]a.Bt.s...w../.!.7.P....WkIoP....qG.....O(......x...=....:.g...v...7. .8S&Y|5b.p.6<.f.\{.9...24ZG.YW..e..0....6A.&I.......nSc.0.8....@.Q..<1.v.?PK.........R.X..,.*...~&......Dutchai.lng.Z.n...}....(.`.2-..X........${.M....p......
                      Process:C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exe
                      File Type:PC bitmap, Windows 3.x format, 500 x 314 x 24, image size 471000, cbSize 471054, bits offset 54
                      Category:dropped
                      Size (bytes):471054
                      Entropy (8bit):3.2443524520002636
                      Encrypted:false
                      SSDEEP:1536:/tfIWZ9jM6WivZDowwJH2lg0t5zspYuGDkGJK+HZky/iDOhyNlLgyOXwBJJPwcMG:52iv24SYxDmkZ3qOsBggr6Jla
                      MD5:5B5B3247038C1AF153DFCB567B11DAA8
                      SHA1:F35F529797188E9ABA2F7C5BECBD70309BD14541
                      SHA-256:48260B05BA47BF1CE3ECA2FC7899C65E95609CA3B6AB3A9F71F61C67493A3604
                      SHA-512:9396A455BAD36896F33F5456B89E4B7D0AF401399A8603939F485061143EAEB90A9EF5418844A4117975E6850FE3C9EAD7E913D3979D44314D1EF70B2459DC8F
                      Malicious:false
                      Preview:BM.0......6...(.......:............/.......................................................................................................................................................................................................................{.{.z.........................................~..~..~..}..|..}..|..{..{..................................................~..|..|..{..z..y..x..x..v..v..u..t..s..s..r..q..p..o..o..n..n..m..l..l..k..k..j..j..i..i......................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exe
                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):500488
                      Entropy (8bit):7.912186742228876
                      Encrypted:false
                      SSDEEP:12288:8NgbfebCK2Zc88TonN0jeidRntIYRRCQYffq+:ugbEjkc8ConiFztIwR92j
                      MD5:00CED89A573AD1E1F96C94C763222E1E
                      SHA1:808183D9160A89AD3C8730D2B6B76803CA97F38F
                      SHA-256:5FC1BD27C679B1B5306996CFA518FA1A7B4FB60E0FE6EA92BB4BA3B82C471A85
                      SHA-512:A527A55B7874E619379F18DF0EBF3BE17505D310B9AFD9E1FCCF21210EB4B93AA358F7A7BE1AA4616309D99810A0629389024738D36AEF867910419A410E0F55
                      Malicious:true
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Joe Sandbox View:
                      • Filename: Player reports algnet 07-10-2024 .pdf www.skype.com.7z, Detection: malicious, Browse
                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........:...i...i...i..\i..i...h..i...h..i...h..i...h..i...h..i}..h...i}..h..iV..h..iW..h..i...i...i...h...i..0i...i..Xi...i...h...iRich...i................PE..d.....sf.........."......\...........W.........@..........................................`.................................................,...................h....T...Q......T...Xu...............................u..8............p..H............................text...7[.......\.................. ..`.rdata...%...p...&...`..............@..@.data...............................@....pdata..h...........................@..@.rsrc...............................@..@.reloc..T............P..............@..B................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exe
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):358400
                      Entropy (8bit):6.138682134890285
                      Encrypted:false
                      SSDEEP:6144:jZdYCSKWdQPJLxlAG10PT02qHfhLLnII0E0Mu2:k59QPJLxlAGOPTQHFDV0
                      MD5:438909882796242739C542D4AA5E94DA
                      SHA1:E2A82D09C76C6A59F909CB35D4BF4F4F862213E1
                      SHA-256:B81A96A53AB20F43624CE4E8D25468AB8F65EF88441368CDA0C9C54525DB31F6
                      SHA-512:2F972CE6901734E3217AA1982695DA589A52926C7C49C0A340C41E963B3CC03D2EFD3DE5A6AF6E61691CAE211D756710D722234457D01B4642BF463EFE641652
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Joe Sandbox View:
                      • Filename: Player reports algnet 07-10-2024 .pdf www.skype.com.7z, Detection: malicious, Browse
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Zm.7...d...d...dUt.e...dUt.e...dUt.e...d...e...d...e...dUt.e...d...eQ..dUt.e...d...do..dV..e...dV..e...dV..d...dV..e...dRich...d................PE..d.....g.........." ...)............4.....................................................`.........................................@...H.......x............P.. C..............p......................................@...............(............................text............................... ..`.rdata..............................@..@.data...</... ......................@....pdata.. C...P...D...&..............@..@.rsrc................j..............@..@.reloc..p............l..............@..B................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exe
                      File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, Exif Standard: [TIFF image data, little-endian, direntries=4, manufacturer=Canon, model=Canon PowerShot SX20 IS, orientation=upper-left], baseline, precision 8, 640x480, components 3
                      Category:dropped
                      Size (bytes):770719
                      Entropy (8bit):6.712677731362388
                      Encrypted:false
                      SSDEEP:12288:SIO0TqHrAKgmuN0KeNtK7781ybIsOCuy+kj62iBYzZx1ldbO52/i:pULj9oQyAf2aYpbG
                      MD5:E9FC238F898B1F0763B4A2EA5BF6DA2B
                      SHA1:090CC66E5C8CBA33C1B0F63F76B33C3190F6D789
                      SHA-256:F7249877EA94D997512FD5CF67C64DE8E9302D164FED5F2C2F3B6180E0DFC293
                      SHA-512:1FBAA8DA4D1A1F791133B126AE66E587215C73DCBE73B2F93687097C87A283F2BCD16D340CD8ED3A30506A47549156D6BF4575A8250BC0F96E4CD610894AFE6F
                      Malicious:false
                      Preview:......JFIF..............Exif..II*...............>...........D...............i.......\.......Canon.Canon PowerShot SX20 IS...........................'...........................................................8.......2012:05:10 05:31:51.A..........C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...'.>..u+?.jH.s}.........u2`.<......h>.....5.CR*...[..m&.... 6y=q.5..xw.VV6..Y\[...VA...O'...8...0......%X....N<....w...g.-4...7R.....[7.H.....U|
                      Process:C:\Users\user\AppData\Local\Temp\HitPawInfo.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):970
                      Entropy (8bit):5.5220747862495365
                      Encrypted:false
                      SSDEEP:24:VnA/LJ/L59/L5QSIDO/LJ/Lbxw/Lp+/L6vSIDn/Lzb:VM1fNcS11cpiXcjzb
                      MD5:923CCF347E169F5533DBFC41D829B9DA
                      SHA1:0360807D4C2A4923A679FC6F1175BB87A8749841
                      SHA-256:C57D35C439689668E10C53E86662E297DEDE3B96F1D37E4A9FAD20689DE646FB
                      SHA-512:F5CA8F9F7206FFDE49CA4C3A106C68A7F076665042BD9E53FCD0FF01B0E71C847B157C493AB0C3202033ACB30A87BC50E9627B97DFC20AC62B81505C10346BFA
                      Malicious:false
                      Preview:. Windows Registry Editor Version 5.00..[HKEY_CURRENT_USER\Software\Classes\CLSID\{C346C9EC-A908-4164-A9B7-CD00EA3A99E8}]..@="ResPrompt"..[HKEY_CURRENT_USER\Software\Classes\CLSID\{C346C9EC-A908-4164-A9B7-CD00EA3A99E8}\ImplementedCategories]..[HKEY_CURRENT_USER\Software\Classes\CLSID\{C346C9EC-A908-4164-A9B7-CD00EA3A99E8}\ImplementedCategories\{EDF4B444-2758-45C1-A25A-F9ED8B5E5145}]..[HKEY_CURRENT_USER\Software\Classes\CLSID\{C346C9EC-A908-4164-A9B7-CD00EA3A99E8}\InprocServer32]..@="ResPrompt.dll".."ThreadingModel"="Apartment"..[HKEY_CURRENT_USER\Software\Classes\CLSID\{C346C9EC-A908-4164-A9B7-CD00EA3A99E8}\ProgID]..@="ResPrompt"..[HKEY_CURRENT_USER\Software\Classes\CLSID\{C346C9EC-A908-4164-A9B7-CD00EA3A99E8}\Programmable]..[HKEY_CURRENT_USER\Software\Classes\CLSID\{C346C9EC-A908-4164-A9B7-CD00EA3A99E8}TypeLib]..@="{EDF4B444-2758-45C1-A25A-F9ED8B5E5145}"..[HKEY_CURRENT_USER\Software\Classes\CLSID\{C346C9EC-A908-4164-A9B7-CD00EA3A99E8}\VERSION]..@="1.0"
                      Process:C:\Users\user\AppData\Local\Temp\HitPawInfo.exe
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):32843280
                      Entropy (8bit):7.9672098266294284
                      Encrypted:false
                      SSDEEP:49152:r+NwYVYVYVYVYVYVYVYVYVYVYVYVYVYVYVYVYVYVYVYVYVYVYVYVYVYVYVYVYVYT:Cm
                      MD5:E1BDFA7BC2EC8370102E69DE1FDC2800
                      SHA1:1B26BCEC613EE069C0905055B40F0E858143562D
                      SHA-256:15C4C03C0E4345A3FCC08E55164ED5CF004D8C2C40A46D7F7DB891F312226497
                      SHA-512:333F62FB4ABBA81F09A5D12AFAAFD8ED716CA03E7EF251C49B4DCF75EEA7D6ADF790C1FA9EED346AC8D22831904B8729DC771F9D66CE94C8F23F23BD0643A6E8
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 8%
                      Joe Sandbox View:
                      • Filename: Player reports algnet 07-10-2024 .pdf www.skype.com.7z, Detection: malicious, Browse
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........"..L...L...L...O...L...I...L...H...L...K...L..cH...L..cO...L..cI...L...M...L...M.}.L..bI...L..bL...L..b....L......L..bN...L.Rich..L.........PE..d......g.........." ...)............$<....................................................`..........................................u..l...<v.......p..............................0...........................(......@...............`............................text...x........................... ..`.rdata.............................@..@.data....I...........~..............@....pdata..............................@..@.rsrc........p.......8..............@..@.reloc...............>..............@..B................................................................................................................................................................................................................................
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:MS Windows registry file, NT/2000 or above
                      Category:dropped
                      Size (bytes):1835008
                      Entropy (8bit):4.416756136146776
                      Encrypted:false
                      SSDEEP:6144:gcifpi6ceLPL9skLmb0mnSWSPtaJG8nAgex285i2MMhA20X4WABlGuNi5+:Fi58nSWIZBk2MM6AFBYo
                      MD5:50FB39C82E93073338034769D715E7CD
                      SHA1:B2EA561B148D74A81227AAF4289F1B4AF5433A2E
                      SHA-256:E9301DA96E65A854DFC5C669866767BDE8E4350FC59B71745C49B919FA7419EA
                      SHA-512:3F750ABAD30BC6CFA66D56AB8B9EAD79B304521DD57D964EB641B0E5C0F8D801E821BCE516CF094CBF39FDC1B14A7C4CDCF98A4296C56EA644B617E6E4A0E8E4
                      Malicious:false
                      Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmn.\...................................................................................................................................................................................................................................................................................................................................................K.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.211500858406131
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 98.45%
                      • Inno Setup installer (109748/4) 1.08%
                      • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                      • Win16/32 Executable Delphi generic (2074/23) 0.02%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      File name:Player reports algnet 07-10-2024 .pdf www.skype.com.exe
                      File size:4'284'934 bytes
                      MD5:005245fcbca50a836235392c802198a8
                      SHA1:e53c665ed01e497874627ac654d6f90832dba1af
                      SHA256:be1d320f773a860897be73dd16f805902effaead313873b0c622bc6eff9db715
                      SHA512:c4297732536440eee0d666e1e52b4777d2444f4d91ab77c779e3fb0acbbc20b61ccd3d6654d8ab7ff3af71283109fb633f5d83b21be00fd14e52720a8eab0d26
                      SSDEEP:98304:gqwsVKHOycs8IZPGQe92Mxvtq44djR/1eZhRj:gHrelDVq4OjR/+Rj
                      TLSH:5816AF13B285A53EC07B1E396937D710993BBA213A53DC4B57F40A8CDF359902E3A687
                      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                      Icon Hash:13fb8f9cd15b3c2f
                      Entrypoint:0x677dcc
                      Entrypoint Section:.itext
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x6700C0CE [Sat Oct 5 04:30:06 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:2b038313242eff88172dd3dbdaa72202
                      Instruction
                      push ebp
                      mov ebp, esp
                      add esp, FFFFFFF0h
                      mov eax, 0066E544h
                      call 00007F3568C2E58Dh
                      mov eax, dword ptr [00682278h]
                      mov eax, dword ptr [eax]
                      call 00007F3568E2C401h
                      mov eax, dword ptr [00682278h]
                      mov eax, dword ptr [eax]
                      mov edx, 00677E30h
                      call 00007F3568E2BE24h
                      mov ecx, dword ptr [00681EF0h]
                      mov eax, dword ptr [00682278h]
                      mov eax, dword ptr [eax]
                      mov edx, dword ptr [006401B0h]
                      call 00007F3568E2C3F0h
                      mov eax, dword ptr [00682278h]
                      mov eax, dword ptr [eax]
                      call 00007F3568E2C544h
                      call 00007F3568C26E8Fh
                      add byte ptr [eax], al
                      mov al, 04h
                      add al, byte ptr [eax]
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x2900000x97.edata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x28b0000x3a9c.idata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c90000x475b4.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x2930000x35dcc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x2920000x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x28ba140x8fc.idata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x28f0000xce2.didata
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x274c180x274e0068e4c2a381f4345dbbb44ee41c8fa94aunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .itext0x2760000x1e3c0x200081fb32b1ce226bae6b5c8fdf4a80376eFalse0.511962890625data6.150585523530168IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .data0x2780000xa59c0xa600f80101c37a15ec9291d0930e8a30dc0eFalse0.5673004518072289data6.177864641492512IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .bss0x2830000x72c80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .idata0x28b0000x3a9c0x3c009795ff32dc393b54c43a05fdbf42b9acFalse0.3219401041666667data5.218146922474968IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .didata0x28f0000xce20xe001c62b6eb4dc46277eff26ad45ad7c4d7False0.337890625data4.190105521637175IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .edata0x2900000x970x2009749a8241934d1ca1139755eb913449bFalse0.251953125data1.7561102101709039IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .tls0x2910000x540x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rdata0x2920000x5d0x200f73729dda1bbfa72002223975ffe4b57False0.189453125data1.375319454273433IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x2930000x35dcc0x35e00c42b5ac91a6b48bda088a98cedc9634aFalse0.5711599115429234data6.728160253041536IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      .rsrc0x2c90000x475b40x47600129c8b3bf1bdc6341fa25ac8f34f20a4False0.4300877024956217data6.824922097379193IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_CURSOR0x2ca53c0x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                      RT_CURSOR0x2ca6700x134dataEnglishUnited States0.4642857142857143
                      RT_CURSOR0x2ca7a40x134dataEnglishUnited States0.4805194805194805
                      RT_CURSOR0x2ca8d80x134dataEnglishUnited States0.38311688311688313
                      RT_CURSOR0x2caa0c0x134dataEnglishUnited States0.36038961038961037
                      RT_CURSOR0x2cab400x134dataEnglishUnited States0.4090909090909091
                      RT_CURSOR0x2cac740x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
                      RT_BITMAP0x2cada80xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.5208333333333334
                      RT_BITMAP0x2cae680xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.42857142857142855
                      RT_BITMAP0x2caf480xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.4955357142857143
                      RT_BITMAP0x2cb0280xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.38392857142857145
                      RT_BITMAP0x2cb1080xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.4947916666666667
                      RT_BITMAP0x2cb1c80xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.484375
                      RT_BITMAP0x2cb2880xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.42410714285714285
                      RT_BITMAP0x2cb3680xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.5104166666666666
                      RT_BITMAP0x2cb4280xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.5
                      RT_BITMAP0x2cb5080xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.4895833333333333
                      RT_BITMAP0x2cb5c80xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.3794642857142857
                      RT_ICON0x2cb6a80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.6934968017057569
                      RT_ICON0x2cc5500x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.8055054151624549
                      RT_ICON0x2ccdf80x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.6560693641618497
                      RT_ICON0x2cd3600x8695PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9864453022958813
                      RT_ICON0x2d59f80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.38150656571631375
                      RT_ICON0x2e62200x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.4750630649569056
                      RT_ICON0x2ef6c80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.599896265560166
                      RT_ICON0x2f1c700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6836303939962477
                      RT_ICON0x2f2d180x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.7978723404255319
                      RT_STRING0x2f31800x760data0.3172669491525424
                      RT_STRING0x2f38e00xba8data0.2272117962466488
                      RT_STRING0x2f44880x45cdata0.35842293906810035
                      RT_STRING0x2f48e40x328data0.40470297029702973
                      RT_STRING0x2f4c0c0x454data0.40703971119133575
                      RT_STRING0x2f50600xf0data0.6583333333333333
                      RT_STRING0x2f51500xccdata0.6764705882352942
                      RT_STRING0x2f521c0x124data0.6027397260273972
                      RT_STRING0x2f53400x358data0.4264018691588785
                      RT_STRING0x2f56980x3f8data0.375
                      RT_STRING0x2f5a900x3acdata0.3829787234042553
                      RT_STRING0x2f5e3c0x4f8data0.31446540880503143
                      RT_STRING0x2f63340x2f4data0.3637566137566138
                      RT_STRING0x2f66280x2e0data0.35733695652173914
                      RT_STRING0x2f69080x3f8data0.4005905511811024
                      RT_STRING0x2f6d000x584data0.38526912181303113
                      RT_STRING0x2f72840x4a8data0.3087248322147651
                      RT_STRING0x2f772c0x37cdata0.39349775784753366
                      RT_STRING0x2f7aa80x3bcdata0.32217573221757323
                      RT_STRING0x2f7e640x40cdata0.3735521235521235
                      RT_STRING0x2f82700xf4data0.5491803278688525
                      RT_STRING0x2f83640xc4data0.6275510204081632
                      RT_STRING0x2f84280x268data0.48863636363636365
                      RT_STRING0x2f86900x434data0.3308550185873606
                      RT_STRING0x2f8ac40x360data0.3912037037037037
                      RT_STRING0x2f8e240x2dcdata0.3770491803278688
                      RT_STRING0x2f91000x318data0.33080808080808083
                      RT_RCDATA0x2f94180xd5dPNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0032154340836013
                      RT_RCDATA0x2fa1780xd57PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.003221083455344
                      RT_RCDATA0x2faed00xcfcPNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.003309265944645
                      RT_RCDATA0x2fbbcc0xcd9PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0033444816053512
                      RT_RCDATA0x2fc8a80xd5dPNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0032154340836013
                      RT_RCDATA0x2fd6080xd57PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.003221083455344
                      RT_RCDATA0x2fe3600xc4ePNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0034920634920634
                      RT_RCDATA0x2fefb00xc4ePNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0034920634920634
                      RT_RCDATA0x2ffc000xcb5PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0033814940055334
                      RT_RCDATA0x3008b80xcb0PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0033866995073892
                      RT_RCDATA0x3015680xd56PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0032220269478618
                      RT_RCDATA0x3022c00xd47PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0032362459546926
                      RT_RCDATA0x3030080xdc2PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0031232254400908
                      RT_RCDATA0x303dcc0xdc5PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0031205673758865
                      RT_RCDATA0x304b940xcf3PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.003318250377074
                      RT_RCDATA0x3058880xcedPNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0033242671501965
                      RT_RCDATA0x3065780xda9PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0031455533314269
                      RT_RCDATA0x3073240xda6PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0031482541499714
                      RT_RCDATA0x3080cc0xcf3PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.003318250377074
                      RT_RCDATA0x308dc00xcedPNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0033242671501965
                      RT_RCDATA0x309ab00x10data1.5
                      RT_RCDATA0x309ac00x148bPNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0020916524054002
                      RT_RCDATA0x30af4c0x111ePNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0025102692834322
                      RT_RCDATA0x30c06c0xd8cPNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0031718569780854
                      RT_RCDATA0x30cdf80x780data0.5161458333333333
                      RT_RCDATA0x30d5780x2dataEnglishUnited States5.0
                      RT_RCDATA0x30d57c0x2644Delphi compiled form 'TFormMain'0.27133523887300937
                      RT_GROUP_CURSOR0x30fbc00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                      RT_GROUP_CURSOR0x30fbd40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                      RT_GROUP_CURSOR0x30fbe80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                      RT_GROUP_CURSOR0x30fbfc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                      RT_GROUP_CURSOR0x30fc100x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                      RT_GROUP_CURSOR0x30fc240x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                      RT_GROUP_CURSOR0x30fc380x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                      RT_GROUP_ICON0x30fc4c0x84dataEnglishUnited States0.6742424242424242
                      RT_VERSION0x30fcd00x250dataEnglishUnited States0.4814189189189189
                      RT_MANIFEST0x30ff200x691XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.40690065437239736
                      DLLImport
                      wininet.dllInternetCloseHandle, InternetReadFile, HttpOpenRequestW, HttpSendRequestW, InternetConnectW, InternetOpenW, InternetOpenUrlW, HttpQueryInfoW
                      winspool.drvDocumentPropertiesW, ClosePrinter, OpenPrinterW, GetDefaultPrinterW, EnumPrintersW
                      comdlg32.dllGetSaveFileNameW, GetOpenFileNameW
                      comctl32.dllImageList_GetImageInfo, FlatSB_SetScrollInfo, InitCommonControls, ImageList_DragMove, ImageList_Destroy, _TrackMouseEvent, ImageList_DragShowNolock, ImageList_Add, FlatSB_SetScrollProp, ImageList_GetDragImage, ImageList_Create, ImageList_EndDrag, ImageList_DrawEx, ImageList_SetImageCount, FlatSB_GetScrollPos, FlatSB_SetScrollPos, InitializeFlatSB, ImageList_Copy, FlatSB_GetScrollInfo, ImageList_Write, ImageList_DrawIndirect, ImageList_SetBkColor, ImageList_GetBkColor, ImageList_BeginDrag, ImageList_GetIcon, ImageList_Replace, ImageList_GetImageCount, ImageList_DragEnter, ImageList_GetIconSize, ImageList_SetIconSize, ImageList_Read, ImageList_DragLeave, ImageList_LoadImageW, ImageList_Draw, ImageList_Remove, ImageList_ReplaceIcon, ImageList_SetOverlayImage
                      shell32.dllSHBrowseForFolderW, SHGetSpecialFolderLocation, Shell_NotifyIconW, ShellExecuteExW, SHGetPathFromIDListW, SHGetFileInfoW, SHGetFolderPathW, SHGetMalloc, SHGetDesktopFolder, SHChangeNotify, SHAppBarMessage, ShellExecuteW
                      user32.dllMoveWindow, CopyImage, SetMenuItemInfoW, GetMenuItemInfoW, DefFrameProcW, GetDlgCtrlID, FrameRect, RegisterWindowMessageW, GetMenuStringW, FillRect, SendMessageA, EnumWindows, ShowOwnedPopups, GetClassInfoW, GetScrollRange, SetActiveWindow, GetActiveWindow, DrawEdge, GetKeyboardLayoutList, LoadBitmapW, EnumChildWindows, GetScrollBarInfo, UnhookWindowsHookEx, SetCapture, GetCapture, ShowCaret, CreatePopupMenu, GetMenuItemID, CharLowerBuffW, PostMessageW, SetWindowLongW, IsZoomed, SetParent, DrawMenuBar, GetClientRect, IsChild, IsIconic, CallNextHookEx, ShowWindow, GetWindowTextW, SetForegroundWindow, IsDialogMessageW, DestroyWindow, RegisterClassW, EndMenu, CharNextW, GetFocus, GetDC, SetFocus, ReleaseDC, ExitWindowsEx, GetClassLongW, SetScrollRange, DrawTextW, PeekMessageA, MessageBeep, SetClassLongW, RemovePropW, GetSubMenu, DestroyIcon, IsWindowVisible, FlashWindow, DispatchMessageA, UnregisterClassW, GetTopWindow, SendMessageW, SendMessageTimeoutW, LoadStringW, CreateMenu, CharLowerW, SetWindowRgn, SetWindowPos, GetMenuItemCount, GetSysColorBrush, GetWindowDC, DrawTextExW, GetScrollInfo, SetWindowTextW, GetMessageExtraInfo, GetSysColor, EnableScrollBar, TrackPopupMenu, DrawIconEx, GetClassNameW, GetMessagePos, GetIconInfo, SetScrollInfo, GetKeyNameTextW, GetDesktopWindow, SetCursorPos, GetCursorPos, SetMenu, GetMenuState, GetMenu, SetRect, GetKeyState, ValidateRect, GetCursor, KillTimer, BeginDeferWindowPos, WaitMessage, TranslateMDISysAccel, GetWindowPlacement, CreateIconIndirect, CreateWindowExW, GetDCEx, PeekMessageW, MonitorFromWindow, GetUpdateRect, SetTimer, WindowFromPoint, BeginPaint, RegisterClipboardFormatW, MapVirtualKeyW, IsWindowUnicode, DispatchMessageW, CreateAcceleratorTableW, DefMDIChildProcW, GetSystemMenu, SetScrollPos, GetScrollPos, DrawFocusRect, ReleaseCapture, LoadCursorW, ScrollWindow, GetLastActivePopup, GetSystemMetrics, CharUpperBuffW, SetClipboardData, GetClipboardData, ClientToScreen, SetWindowPlacement, GetMonitorInfoW, CheckMenuItem, CharUpperW, DefWindowProcW, GetForegroundWindow, EnableWindow, GetWindowThreadProcessId, RedrawWindow, EndPaint, MsgWaitForMultipleObjectsEx, LoadKeyboardLayoutW, ActivateKeyboardLayout, GetParent, MonitorFromRect, InsertMenuItemW, GetPropW, MessageBoxW, SetPropW, UpdateWindow, MsgWaitForMultipleObjects, DestroyMenu, SetWindowsHookExW, EmptyClipboard, GetDlgItem, AdjustWindowRectEx, IsWindow, DrawIcon, EnumThreadWindows, InvalidateRect, GetKeyboardState, ScreenToClient, DrawFrameControl, SetCursor, CreateIcon, RemoveMenu, GetKeyboardLayoutNameW, OpenClipboard, TranslateMessage, MapWindowPoints, EnumDisplayMonitors, CallWindowProcW, CloseClipboard, DestroyCursor, CopyIcon, PostQuitMessage, ShowScrollBar, EnableMenuItem, DeferWindowPos, HideCaret, EndDeferWindowPos, FindWindowExW, MonitorFromPoint, LoadIconW, SystemParametersInfoW, GetWindow, GetWindowRect, GetWindowLongW, InsertMenuW, IsWindowEnabled, IsDialogMessageA, FindWindowW, GetKeyboardLayout, DeleteMenu
                      version.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
                      oleaut32.dllLoadTypeLib, SysFreeString, VariantClear, VariantInit, GetErrorInfo, SysReAllocStringLen, SafeArrayCreate, SysAllocStringLen, SafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, VariantCopy, RegisterTypeLib, VariantChangeType
                      advapi32.dllRegSetValueExW, RegConnectRegistryW, OpenThreadToken, RegQueryInfoKeyW, RegUnLoadKeyW, RegSaveKeyW, EqualSid, RegReplaceKeyW, GetTokenInformation, RegCreateKeyExW, RegLoadKeyW, RegEnumKeyExW, AdjustTokenPrivileges, RegDeleteKeyW, LookupPrivilegeValueW, RegOpenKeyExW, OpenProcessToken, FreeSid, AllocateAndInitializeSid, RegDeleteValueW, RegFlushKey, RegEnumValueW, RegQueryValueExW, RegCloseKey, RegRestoreKeyW
                      msvcrt.dllmemcpy, memset
                      kernel32.dllSetFileAttributesW, GetFileType, SetFileTime, QueryDosDeviceW, GetACP, GetExitCodeProcess, CloseHandle, LocalFree, GetCurrentProcessId, GetSystemDefaultLangID, SizeofResource, QueryPerformanceFrequency, IsDebuggerPresent, FindNextFileW, GetFullPathNameW, VirtualFree, HeapAlloc, ExitProcess, GetCPInfoExW, GetSystemTime, GetLongPathNameW, RtlUnwind, GetCPInfo, EnumSystemLocalesW, GetStdHandle, GetTimeZoneInformation, FileTimeToLocalFileTime, SystemTimeToTzSpecificLocalTime, GetModuleHandleW, FreeLibrary, TryEnterCriticalSection, HeapDestroy, FileTimeToDosDateTime, ReadFile, GetLastError, GetModuleFileNameW, SetLastError, GlobalAlloc, GlobalUnlock, FindResourceW, lstrlenA, CreateThread, CompareStringW, CopyFileW, MapViewOfFile, LoadLibraryA, GetVolumeInformationW, ResetEvent, MulDiv, FreeResource, GetDriveTypeW, GetVersion, RaiseException, GlobalAddAtomW, FormatMessageW, OpenProcess, SwitchToThread, GetExitCodeThread, GetCurrentThread, GetLogicalDrives, GetFileAttributesExW, LoadLibraryExW, TerminateProcess, LockResource, FileTimeToSystemTime, GetCurrentThreadId, UnhandledExceptionFilter, GlobalFindAtomW, VirtualQuery, GlobalFree, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GlobalDeleteAtom, GetStartupInfoW, GetFileAttributesW, GetCurrentDirectoryW, SetCurrentDirectoryW, InitializeCriticalSection, GetThreadPriority, GetCurrentProcess, GlobalLock, SetThreadPriority, VirtualAlloc, GetTempPathW, GetCommandLineW, GetSystemInfo, LeaveCriticalSection, GetProcAddress, ResumeThread, GetLogicalDriveStringsW, GetVersionExW, VerifyVersionInfoW, HeapCreate, LCMapStringW, GetDiskFreeSpaceW, VerSetConditionMask, FindFirstFileW, GetUserDefaultUILanguage, GetConsoleOutputCP, UnmapViewOfFile, GetConsoleCP, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, GetLocaleInfoW, CreateFileW, SystemTimeToFileTime, EnumResourceNamesW, DeleteFileW, IsDBCSLeadByteEx, GetEnvironmentVariableW, GetLocalTime, WaitForSingleObject, WriteFile, CreateFileMappingW, ExitThread, DeleteCriticalSection, GetDateFormatW, TlsGetValue, SetErrorMode, TzSpecificLocalTimeToSystemTime, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, CreateEventW, WaitForMultipleObjectsEx, GetThreadLocale, SetThreadLocale
                      ole32.dllIsEqualGUID, OleInitialize, OleUninitialize, CoInitialize, CoCreateGuid, CoCreateInstance, CoUninitialize, CoTaskMemFree, CoTaskMemAlloc, StringFromCLSID
                      gdi32.dllPie, SetBkMode, CreateCompatibleBitmap, GetEnhMetaFileHeader, RectVisible, AngleArc, ResizePalette, SetAbortProc, SetTextColor, StretchBlt, RoundRect, SelectClipRgn, RestoreDC, SetRectRgn, GetTextMetricsW, RemoveFontResourceW, GetWindowOrgEx, CreatePalette, PolyBezierTo, CreateICW, CreateDCW, GetStockObject, CreateSolidBrush, Polygon, MoveToEx, PlayEnhMetaFile, Ellipse, StartPage, GetBitmapBits, StartDocW, AbortDoc, GetSystemPaletteEntries, GetEnhMetaFileBits, AddFontResourceW, GetEnhMetaFilePaletteEntries, CreatePenIndirect, SetMapMode, CreateFontIndirectW, PolyBezier, RemoveFontResourceExW, EndDoc, GetObjectW, GetWinMetaFileBits, SetROP2, GetEnhMetaFileDescriptionW, ArcTo, Arc, SelectPalette, ExcludeClipRect, MaskBlt, SetWindowOrgEx, EndPage, DeleteEnhMetaFile, Chord, SetDIBits, SetViewportOrgEx, CreateRectRgn, RealizePalette, SetDIBColorTable, GetDIBColorTable, CreateBrushIndirect, PatBlt, SetEnhMetaFileBits, AddFontResourceExW, Rectangle, SaveDC, DeleteDC, BitBlt, FrameRgn, GetDeviceCaps, GetTextExtentPoint32W, GetClipBox, IntersectClipRect, Polyline, CreateBitmap, SetWinMetaFileBits, GetStretchBltMode, CreateDIBitmap, SetStretchBltMode, GetDIBits, CreateDIBSection, LineTo, GetRgnBox, EnumFontsW, CreateHalftonePalette, SelectObject, DeleteObject, ExtFloodFill, UnrealizeObject, CopyEnhMetaFileW, SetBkColor, CreateCompatibleDC, GetBrushOrgEx, GetCurrentPositionEx, GetNearestPaletteIndex, GetTextExtentPointW, ExtTextOutW, SetBrushOrgEx, GetPixel, GdiFlush, SetPixel, EnumFontFamiliesExW, StretchDIBits, GetPaletteEntries
                      NameOrdinalAddress
                      TMethodImplementationIntercept30x471050
                      __dbk_fcall_wrapper20x4126d8
                      dbkFCallWrapperAddr10x68663c
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 8, 2024 00:41:00.207323074 CEST4975322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:00.212357044 CEST2245549753154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:00.212440014 CEST4975322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:00.215517998 CEST4975322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:00.223222971 CEST2245549753154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:00.223278999 CEST4975322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:00.228336096 CEST2245549753154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:01.930526972 CEST2245549753154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:01.932346106 CEST4975322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:05.300762892 CEST4978822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:05.307121992 CEST2245549788154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:05.307216883 CEST4978822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:05.307917118 CEST4978822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:05.308254957 CEST4975322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:05.312728882 CEST2245549788154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:05.312796116 CEST4978822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:05.313174009 CEST2245549753154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:05.318564892 CEST2245549788154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:07.020719051 CEST2245549788154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:07.020771027 CEST4978822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:09.332336903 CEST4981422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:09.339513063 CEST2245549814154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:09.339647055 CEST4981422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:09.340564966 CEST4981422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:09.341135979 CEST4978822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:09.348381042 CEST2245549814154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:09.348438978 CEST4981422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:09.348464012 CEST2245549788154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:09.355849028 CEST2245549814154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:11.067265034 CEST2245549814154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:11.067420959 CEST4981422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:13.363399982 CEST4983622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:13.370292902 CEST2245549836154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:13.370408058 CEST4983622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:13.371057034 CEST4983622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:13.371951103 CEST4981422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:13.377968073 CEST2245549836154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:13.378041983 CEST4983622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:13.378823042 CEST2245549814154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:13.384656906 CEST2245549836154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:15.200669050 CEST2245549836154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:15.200730085 CEST4983622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:17.394459963 CEST4986222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:17.399339914 CEST2245549862154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:17.399424076 CEST4986222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:17.400264978 CEST4986222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:17.400516987 CEST4983622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:17.405397892 CEST2245549862154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:17.405457020 CEST4986222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:17.405546904 CEST2245549836154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:17.410609007 CEST2245549862154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:19.217902899 CEST2245549862154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:19.218065023 CEST4986222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:21.425961018 CEST4988722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:21.432321072 CEST2245549887154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:21.432424068 CEST4988722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:21.433084965 CEST4988722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:21.433463097 CEST4986222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:21.439956903 CEST2245549887154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:21.440022945 CEST4988722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:21.440206051 CEST2245549862154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:21.446948051 CEST2245549887154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:23.195993900 CEST2245549887154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:23.196090937 CEST4988722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:25.457287073 CEST4991322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:25.462104082 CEST2245549913154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:25.462263107 CEST4991322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:25.470081091 CEST4991322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:25.471170902 CEST4988722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:25.474944115 CEST2245549913154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:25.475020885 CEST4991322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:25.475929022 CEST2245549887154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:25.479827881 CEST2245549913154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:26.065853119 CEST4991322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:26.070911884 CEST2245549913154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:26.070992947 CEST4991322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:26.075803995 CEST2245549913154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:27.175410032 CEST2245549913154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:27.175503016 CEST4991322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:29.488234043 CEST4994322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:29.495275021 CEST2245549943154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:29.495405912 CEST4994322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:29.496001005 CEST4994322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:29.496402025 CEST4991322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:29.503062010 CEST2245549943154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:29.503222942 CEST4994322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:29.503712893 CEST2245549913154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:29.510596037 CEST2245549943154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:31.222316980 CEST4994322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:31.227806091 CEST2245549943154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:31.228915930 CEST4994322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:31.234549999 CEST2245549943154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:31.243427038 CEST2245549943154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:31.245991945 CEST4994322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:33.535276890 CEST4996922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:33.542371035 CEST2245549969154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:33.542485952 CEST4996922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:33.543184042 CEST4996922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:33.543668985 CEST4994322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:33.550409079 CEST2245549969154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:33.550425053 CEST2245549943154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:33.550514936 CEST4996922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:33.556905031 CEST2245549969154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:35.271652937 CEST2245549969154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:35.271771908 CEST4996922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:37.566363096 CEST4998022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:37.574450016 CEST2245549980154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:37.574544907 CEST4998022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:37.575162888 CEST4998022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:37.575517893 CEST4996922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:37.801166058 CEST2245549980154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:37.801182032 CEST2245549969154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:37.801234007 CEST4998022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:37.808378935 CEST2245549980154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:39.308710098 CEST2245549980154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:39.308911085 CEST4998022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:41.598979950 CEST4998122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:41.605317116 CEST2245549981154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:41.605483055 CEST4998122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:41.606259108 CEST4998122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:41.606846094 CEST4998022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:41.612468958 CEST2245549981154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:41.612778902 CEST4998122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:41.612937927 CEST2245549980154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:41.619155884 CEST2245549981154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:43.355313063 CEST2245549981154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:43.355611086 CEST4998122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:45.629246950 CEST4998422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:45.637959957 CEST2245549984154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:45.638109922 CEST4998422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:45.639017105 CEST4998422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:45.639579058 CEST4998122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:45.647325039 CEST2245549984154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:45.647470951 CEST4998422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:45.647828102 CEST2245549981154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:45.656260014 CEST2245549984154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:48.223752975 CEST2245549984154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:48.223844051 CEST4998422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:48.224308014 CEST2245549984154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:48.224347115 CEST4998422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:48.224541903 CEST2245549984154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:48.224601030 CEST4998422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:48.227360010 CEST2245549984154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:48.227402925 CEST4998422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:49.672207117 CEST4998522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:49.677728891 CEST2245549985154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:49.677815914 CEST4998522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:49.752782106 CEST4998522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:49.756031990 CEST4998422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:49.757745981 CEST2245549985154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:49.757826090 CEST4998522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:49.760951996 CEST2245549984154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:49.764046907 CEST2245549985154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:50.378582954 CEST4998522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:50.383476973 CEST2245549985154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:50.383542061 CEST4998522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:50.388381004 CEST2245549985154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:51.398080111 CEST2245549985154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:51.398359060 CEST4998522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:53.785193920 CEST4998622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:53.792102098 CEST2245549986154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:53.792232037 CEST4998622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:53.792937994 CEST4998622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:53.793051004 CEST4998522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:53.800158978 CEST2245549986154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:53.800174952 CEST2245549985154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:53.800240040 CEST4998622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:53.807341099 CEST2245549986154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:55.543483019 CEST2245549986154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:55.543622971 CEST4998622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:57.843652964 CEST4998722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:57.848555088 CEST2245549987154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:57.848637104 CEST4998722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:57.852905035 CEST4998722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:57.853241920 CEST4998622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:57.858088970 CEST2245549987154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:57.858160973 CEST2245549986154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:57.858169079 CEST4998722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:41:57.863063097 CEST2245549987154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:59.575078011 CEST2245549987154.21.14.89192.168.2.7
                      Oct 8, 2024 00:41:59.575149059 CEST4998722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:01.879553080 CEST4998822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:01.884701014 CEST2245549988154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:01.884933949 CEST4998822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:01.885490894 CEST4998822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:01.885610104 CEST4998722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:01.891782999 CEST2245549988154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:01.891869068 CEST4998822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:01.892281055 CEST2245549987154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:01.896779060 CEST2245549988154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:03.621555090 CEST2245549988154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:03.621653080 CEST4998822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:05.910460949 CEST4998922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:05.917121887 CEST2245549989154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:05.917299032 CEST4998922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:05.918497086 CEST4998922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:05.918731928 CEST4998822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:05.924613953 CEST2245549989154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:05.924710035 CEST4998922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:05.925141096 CEST2245549988154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:05.931308985 CEST2245549989154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:06.143975973 CEST4998922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:06.150660992 CEST2245549989154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:06.150801897 CEST4998922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:06.157355070 CEST2245549989154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:07.534625053 CEST4998922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:07.541205883 CEST2245549989154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:07.541318893 CEST4998922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:07.548794031 CEST2245549989154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:07.669919968 CEST2245549989154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:07.670188904 CEST4998922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:09.942598104 CEST4999022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:09.950530052 CEST2245549990154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:09.950702906 CEST4999022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:09.952562094 CEST4999022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:09.953114033 CEST4998922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:09.959599018 CEST2245549990154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:09.959728003 CEST4999022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:09.959898949 CEST2245549989154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:09.964598894 CEST2245549990154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:11.315911055 CEST4999022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:11.320867062 CEST2245549990154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:11.321105957 CEST4999022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:11.325953960 CEST2245549990154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:11.836005926 CEST2245549990154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:11.836206913 CEST4999022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:13.973659992 CEST4999122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:13.980859041 CEST2245549991154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:13.981014013 CEST4999122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:13.983064890 CEST4999122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:13.983423948 CEST4999022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:13.990247011 CEST2245549991154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:13.990291119 CEST2245549990154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:13.990361929 CEST4999122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:13.997875929 CEST2245549991154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:15.362864017 CEST4999122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:15.370196104 CEST2245549991154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:15.370343924 CEST4999122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:15.378212929 CEST2245549991154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:15.744293928 CEST2245549991154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:15.744462967 CEST4999122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:18.004868984 CEST4999222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:18.009989977 CEST2245549992154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:18.010183096 CEST4999222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:18.011961937 CEST4999222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:18.012315989 CEST4999122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:18.016762018 CEST2245549992154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:18.016936064 CEST4999222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:18.017086029 CEST2245549991154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:18.021823883 CEST2245549992154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:19.748555899 CEST2245549992154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:19.748893976 CEST4999222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:22.035476923 CEST4999322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:22.043226957 CEST2245549993154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:22.043364048 CEST4999322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:22.046264887 CEST4999322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:22.046420097 CEST4999222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:22.052468061 CEST2245549993154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:22.052551031 CEST4999322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:22.052952051 CEST2245549992154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:22.060986042 CEST2245549993154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:23.757072926 CEST2245549993154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:23.757205963 CEST4999322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:26.083635092 CEST4999422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:26.090312958 CEST2245549994154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:26.090512037 CEST4999422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:26.092386961 CEST4999422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:26.092802048 CEST4999322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:26.099163055 CEST2245549994154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:26.099282026 CEST4999422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:26.099728107 CEST2245549993154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:26.105859995 CEST2245549994154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:27.954169035 CEST2245549994154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:27.954289913 CEST4999422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:30.145150900 CEST4999522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:30.152242899 CEST2245549995154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:30.152319908 CEST4999522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:30.153291941 CEST4999522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:30.153400898 CEST4999422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:30.159634113 CEST2245549995154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:30.159646034 CEST2245549994154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:30.159697056 CEST4999522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:30.166832924 CEST2245549995154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:31.887953997 CEST2245549995154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:31.888075113 CEST4999522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:34.177548885 CEST4999622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:34.182620049 CEST2245549996154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:34.182796001 CEST4999622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:34.184586048 CEST4999622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:34.184951067 CEST4999522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:34.189817905 CEST2245549996154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:34.189920902 CEST4999622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:34.190114021 CEST2245549995154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:34.195200920 CEST2245549996154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:35.915709972 CEST2245549996154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:35.915851116 CEST4999622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:38.207089901 CEST4999722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:38.430330992 CEST2245549997154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:38.430506945 CEST4999722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:38.464771986 CEST4999722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:38.464898109 CEST4999622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:38.471230984 CEST2245549997154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:38.471266031 CEST2245549996154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:38.471344948 CEST4999722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:38.478051901 CEST2245549997154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:40.180012941 CEST2245549997154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:40.180236101 CEST4999722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:42.488516092 CEST4999822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:42.493479013 CEST2245549998154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:42.493582010 CEST4999822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:42.494256973 CEST4999822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:42.494376898 CEST4999722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:42.499263048 CEST2245549998154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:42.499317884 CEST2245549997154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:42.499363899 CEST4999822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:42.504385948 CEST2245549998154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:43.019047022 CEST4999822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:43.024228096 CEST2245549998154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:43.026163101 CEST4999822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:43.030977964 CEST2245549998154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:44.228851080 CEST2245549998154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:44.228916883 CEST4999822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:46.520327091 CEST4999922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:46.525150061 CEST2245549999154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:46.525306940 CEST4999922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:46.526149035 CEST4999922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:46.526292086 CEST4999822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:46.530934095 CEST2245549999154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:46.531006098 CEST4999922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:46.531121016 CEST2245549998154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:46.535872936 CEST2245549999154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:47.644309998 CEST4999922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:47.649276018 CEST2245549999154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:47.649365902 CEST4999922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:47.654370070 CEST2245549999154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:48.277458906 CEST2245549999154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:48.277522087 CEST4999922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:50.551039934 CEST5000022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:50.578007936 CEST2245550000154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:50.578114986 CEST5000022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:50.579092979 CEST5000022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:50.579221964 CEST4999922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:50.586771011 CEST2245550000154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:50.586801052 CEST2245549999154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:50.586853027 CEST5000022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:50.593369961 CEST2245550000154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:52.304307938 CEST2245550000154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:52.304426908 CEST5000022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:54.598572016 CEST5000122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:54.605148077 CEST2245550001154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:54.605340958 CEST5000122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:54.607132912 CEST5000022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:54.607156992 CEST5000122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:54.613756895 CEST2245550000154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:54.615416050 CEST2245550001154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:54.615541935 CEST5000122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:54.622865915 CEST2245550001154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:54.675787926 CEST5000122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:54.682909966 CEST2245550001154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:54.683238983 CEST5000122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:54.689757109 CEST2245550001154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:56.323116064 CEST2245550001154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:56.323251009 CEST5000122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:58.652652025 CEST5000222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:58.831301928 CEST2245550002154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:58.831520081 CEST5000222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:58.910175085 CEST5000222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:58.910309076 CEST5000122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:58.917818069 CEST2245550002154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:58.917836905 CEST2245550001154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:58.917880058 CEST5000222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:58.924997091 CEST2245550002154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:59.722186089 CEST5000222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:59.728924990 CEST2245550002154.21.14.89192.168.2.7
                      Oct 8, 2024 00:42:59.729038000 CEST5000222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:42:59.735636950 CEST2245550002154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:00.556129932 CEST2245550002154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:00.556272030 CEST5000222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:02.943176031 CEST5000322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:02.950645924 CEST2245550003154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:02.950803041 CEST5000322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:02.952452898 CEST5000322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:02.952773094 CEST5000222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:02.959459066 CEST2245550003154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:02.959621906 CEST5000322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:02.959980011 CEST2245550002154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:02.967128992 CEST2245550003154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:04.081720114 CEST5000322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:04.393876076 CEST5000322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:04.779478073 CEST2245550003154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:04.779494047 CEST2245550003154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:04.780194044 CEST2245550003154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:04.780428886 CEST5000322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:06.972920895 CEST5000422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:06.980966091 CEST2245550004154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:06.981089115 CEST5000422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:06.981836081 CEST5000422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:06.982000113 CEST5000322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:06.989895105 CEST2245550004154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:06.989972115 CEST5000422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:06.991456032 CEST2245550003154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:06.998342037 CEST2245550004154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:08.718144894 CEST2245550004154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:08.718399048 CEST5000422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:11.004057884 CEST5000522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:11.012013912 CEST2245550005154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:11.012176037 CEST5000522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:11.013087034 CEST5000522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:11.013257027 CEST5000422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:11.021222115 CEST2245550005154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:11.021234989 CEST2245550004154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:11.021312952 CEST5000522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:11.029788971 CEST2245550005154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:11.910665035 CEST5000522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:11.918864965 CEST2245550005154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:11.918967009 CEST5000522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:11.927807093 CEST2245550005154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:12.727941036 CEST2245550005154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:12.728055000 CEST5000522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:15.036494970 CEST5000622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:15.044564009 CEST2245550006154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:15.044763088 CEST5000622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:15.046660900 CEST5000622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:15.047072887 CEST5000522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:15.054522038 CEST2245550006154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:15.054620028 CEST5000622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:15.055116892 CEST2245550005154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:15.062197924 CEST2245550006154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:16.790770054 CEST2245550006154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:16.790884018 CEST5000622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:19.066585064 CEST5000722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:19.074429989 CEST2245550007154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:19.074529886 CEST5000722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:19.075370073 CEST5000722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:19.075679064 CEST5000622455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:19.083633900 CEST2245550007154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:19.083697081 CEST5000722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:19.083991051 CEST2245550006154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:19.091959953 CEST2245550007154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:20.940979958 CEST2245550007154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:20.941042900 CEST5000722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:23.099164009 CEST5000822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:23.107760906 CEST2245550008154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:23.107888937 CEST5000822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:23.108536959 CEST5000822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:23.108661890 CEST5000722455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:23.116492033 CEST2245550008154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:23.116525888 CEST2245550007154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:23.116585970 CEST5000822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:23.124288082 CEST2245550008154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:24.895241022 CEST2245550008154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:24.895344019 CEST5000822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:25.241080999 CEST2245550008154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:25.241221905 CEST5000822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:27.129286051 CEST5000922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:27.137408018 CEST2245550009154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:27.137510061 CEST5000922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:27.138207912 CEST5000922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:27.138365984 CEST5000822455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:27.146596909 CEST2245550009154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:27.146610022 CEST2245550008154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:27.146694899 CEST5000922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:27.154405117 CEST2245550009154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:28.347848892 CEST5000922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:28.523505926 CEST2245550009154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:28.523622036 CEST5000922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:28.532996893 CEST2245550009154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:28.872560978 CEST2245550009154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:28.872720957 CEST5000922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:31.160636902 CEST5001022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:31.168732882 CEST2245550010154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:31.168919086 CEST5001022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:31.170840025 CEST5001022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:31.171171904 CEST5000922455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:31.179192066 CEST2245550010154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:31.179208040 CEST2245550009154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:31.179322958 CEST5001022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:31.187788963 CEST2245550010154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:32.753741026 CEST5001022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:32.763503075 CEST2245550010154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:32.763627052 CEST5001022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:32.771168947 CEST2245550010154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:32.902139902 CEST2245550010154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:32.902367115 CEST5001022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:35.192303896 CEST5001122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:35.200843096 CEST2245550011154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:35.201359987 CEST5001122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:35.201893091 CEST5001022455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:35.202002048 CEST5001122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:35.208586931 CEST2245550010154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:35.208695889 CEST2245550011154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:35.208789110 CEST5001122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:35.215137959 CEST2245550011154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:36.947031975 CEST2245550011154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:36.947165012 CEST5001122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:39.222986937 CEST5001222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:39.227946043 CEST2245550012154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:39.228044987 CEST5001222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:39.228677034 CEST5001222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:39.228810072 CEST5001122455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:39.233426094 CEST2245550012154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:39.233498096 CEST5001222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:39.233614922 CEST2245550011154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:39.238435984 CEST2245550012154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:40.948730946 CEST2245550012154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:40.948852062 CEST5001222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:43.281338930 CEST5001322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:43.286221981 CEST2245550013154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:43.290170908 CEST5001322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:43.298983097 CEST5001322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:43.302591085 CEST5001222455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:43.303805113 CEST2245550013154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:43.303881884 CEST5001322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:43.307581902 CEST2245550012154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:43.308830976 CEST2245550013154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:45.031501055 CEST2245550013154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:45.032573938 CEST5001322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:47.363521099 CEST5001422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:47.368451118 CEST2245550014154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:47.368596077 CEST5001422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:47.373270988 CEST5001422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:47.373400927 CEST5001322455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:47.378011942 CEST2245550014154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:47.378182888 CEST2245550013154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:47.378221989 CEST5001422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:47.383017063 CEST2245550014154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:48.331779957 CEST5001422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:48.340662003 CEST2245550014154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:48.340718031 CEST5001422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:48.348340988 CEST2245550014154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:49.255762100 CEST2245550014154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:49.255846977 CEST5001422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:51.395212889 CEST5001522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:51.401185989 CEST2245550015154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:51.401305914 CEST5001522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:51.402077913 CEST5001522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:51.402225018 CEST5001422455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:51.408272028 CEST2245550015154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:51.408289909 CEST2245550014154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:51.408390045 CEST5001522455192.168.2.7154.21.14.89
                      Oct 8, 2024 00:43:51.413885117 CEST2245550015154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:53.196394920 CEST2245550015154.21.14.89192.168.2.7
                      Oct 8, 2024 00:43:53.196504116 CEST5001522455192.168.2.7154.21.14.89
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 8, 2024 00:41:00.191730976 CEST5098253192.168.2.71.1.1.1
                      Oct 8, 2024 00:41:00.204094887 CEST53509821.1.1.1192.168.2.7
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Oct 8, 2024 00:41:00.191730976 CEST192.168.2.71.1.1.10x24aaStandard query (0)gibbooc2.comA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Oct 8, 2024 00:41:00.204094887 CEST1.1.1.1192.168.2.70x24aaNo error (0)gibbooc2.com154.21.14.89A (IP address)IN (0x0001)false

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:5
                      Start time:18:40:46
                      Start date:07/10/2024
                      Path:C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\Player reports algnet 07-10-2024 .pdf www.skype.com.exe"
                      Imagebase:0x330000
                      File size:4'284'934 bytes
                      MD5 hash:005245FCBCA50A836235392C802198A8
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:Borland Delphi
                      Reputation:low
                      Has exited:true

                      Target ID:7
                      Start time:18:40:47
                      Start date:07/10/2024
                      Path:C:\Users\user\AppData\Local\Temp\HitPawInfo.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Users\user~1\AppData\Local\Temp\HitPawInfo.exe"
                      Imagebase:0x7ff7973f0000
                      File size:500'488 bytes
                      MD5 hash:00CED89A573AD1E1F96C94C763222E1E
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Antivirus matches:
                      • Detection: 0%, ReversingLabs
                      Reputation:low
                      Has exited:false

                      Target ID:8
                      Start time:18:40:54
                      Start date:07/10/2024
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:ResPrompt.dll
                      Imagebase:0x7ff62cef0000
                      File size:25'088 bytes
                      MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:11
                      Start time:18:40:54
                      Start date:07/10/2024
                      Path:C:\Windows\System32\WerFault.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\WerFault.exe -u -p 6652 -s 524
                      Imagebase:0x7ff66b850000
                      File size:570'736 bytes
                      MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:12
                      Start time:18:40:55
                      Start date:07/10/2024
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:regsvr32.exe /s ResPrompt.dll
                      Imagebase:0x7ff62cef0000
                      File size:25'088 bytes
                      MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:13
                      Start time:18:40:55
                      Start date:07/10/2024
                      Path:C:\Windows\System32\reg.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PMP" /t REG_SZ /F /D "schtasks /run /tn PMP"
                      Imagebase:0x7ff776990000
                      File size:77'312 bytes
                      MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:14
                      Start time:18:40:55
                      Start date:07/10/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff75da10000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:20
                      Start time:20:10:00
                      Start date:07/10/2024
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:regsvr32.exe /s ResPrompt.dll
                      Imagebase:0x7ff62cef0000
                      File size:25'088 bytes
                      MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:8.5%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:1.3%
                        Total number of Nodes:1407
                        Total number of Limit Nodes:11
                        execution_graph 38585 7ffb0c4d2b88 38614 7ffb0c4d2aac GetModuleHandleExW 38585->38614 38588 7ffb0c4d2bd9 38590 7ffb0c4d2aac Concurrency::details::_Schedule_chore GetModuleHandleExW 38588->38590 38592 7ffb0c4d2bde 38590->38592 38594 7ffb0c4d2be2 GetModuleHandleExW 38592->38594 38595 7ffb0c4d2c0d 38592->38595 38593 7ffb0c4d2c8f 38645 7ffb0c4d29f4 57 API calls std::_Throw_Cpp_error 38593->38645 38594->38595 38596 7ffb0c4d2bfa 38594->38596 38616 7ffb0c4aefb0 38595->38616 38596->38595 38599 7ffb0c4d2c04 FreeLibraryWhenCallbackReturns 38596->38599 38598 7ffb0c4d2c7b 38644 7ffb0c4d29f4 57 API calls std::_Throw_Cpp_error 38598->38644 38599->38595 38604 7ffb0c4d2aac Concurrency::details::_Schedule_chore GetModuleHandleExW 38605 7ffb0c4d2c20 38604->38605 38606 7ffb0c4d2c6f 38605->38606 38607 7ffb0c4d246c std::_Throw_Cpp_error 14 API calls 38605->38607 38608 7ffb0c4d2c31 38607->38608 38608->38593 38608->38598 38609 7ffb0c4d2c41 38608->38609 38610 7ffb0c4d2474 Concurrency::details::WorkQueue::IsStructuredEmpty ReleaseSRWLockExclusive 38609->38610 38611 7ffb0c4d2c5e 38610->38611 38611->38606 38643 7ffb0c4d25c8 WakeAllConditionVariable 38611->38643 38615 7ffb0c4d2ac6 38614->38615 38615->38588 38624 7ffb0c4d246c 38615->38624 38617 7ffb0c4aefc8 38616->38617 38646 7ffb0c4ad920 38617->38646 38619 7ffb0c4aefe7 Concurrency::scheduler_ptr::scheduler_ptr 38650 7ffb0c4b0fe0 38619->38650 38620 7ffb0c4af00d 38621 7ffb0c4ad920 CloseThreadpoolWork 38620->38621 38622 7ffb0c4af018 38621->38622 38622->38604 38625 7ffb0c4d2494 GetCurrentThreadId 38624->38625 38626 7ffb0c4d24d3 38625->38626 38627 7ffb0c4d24ed 38625->38627 38629 7ffb0c4d24d8 AcquireSRWLockExclusive 38626->38629 38631 7ffb0c4d24e5 38626->38631 38628 7ffb0c4d24f2 38627->38628 38633 7ffb0c4d2506 38627->38633 38630 7ffb0c4d24fa AcquireSRWLockExclusive 38628->38630 38628->38631 38629->38631 38630->38631 38737 7ffb0c4d3cf0 38631->38737 38632 7ffb0c4d254b 38632->38631 38634 7ffb0c4d2553 TryAcquireSRWLockExclusive 38632->38634 38633->38632 38639 7ffb0c4d2514 38633->38639 38634->38631 38638 7ffb0c4d253b TryAcquireSRWLockExclusive 38638->38631 38638->38639 38639->38631 38639->38638 38746 7ffb0c4d0e44 GetSystemTimeAsFileTime _Xtime_get_ticks 38639->38746 38640 7ffb0c4d2474 38641 7ffb0c4d248c 38640->38641 38642 7ffb0c4d247e ReleaseSRWLockExclusive 38640->38642 38641->38588 38642->38641 38643->38606 38647 7ffb0c4ad934 construct 38646->38647 38648 7ffb0c4ad951 38646->38648 38654 7ffb0c4ae560 CloseThreadpoolWork 38647->38654 38648->38619 38651 7ffb0c4b0ff8 Concurrency::scheduler_ptr::scheduler_ptr 38650->38651 38655 7ffb0c4ce410 38651->38655 38652 7ffb0c4b1026 38652->38620 38654->38648 38656 7ffb0c4ce42a Concurrency::details::WorkQueue::IsStructuredEmpty 38655->38656 38661 7ffb0c4b1b80 38656->38661 38658 7ffb0c4ce432 Concurrency::details::WorkQueue::IsStructuredEmpty shared_ptr 38659 7ffb0c4ce439 Concurrency::details::WorkQueue::IsStructuredEmpty std::_Throw_Cpp_error 38658->38659 38669 7ffb0c4ce220 38658->38669 38659->38652 38672 7ffb0c4ac430 38661->38672 38663 7ffb0c4b1b9f Concurrency::details::_Task_impl_base::_IsPendingCancel 38664 7ffb0c4b1bc7 38663->38664 38665 7ffb0c4b1bb1 38663->38665 38666 7ffb0c4ad890 ReleaseSRWLockExclusive 38664->38666 38675 7ffb0c4ad890 38665->38675 38668 7ffb0c4b1bc0 38666->38668 38668->38658 38692 7ffb0c4ce010 38669->38692 38678 7ffb0c4b23f0 38672->38678 38688 7ffb0c4b2b00 38675->38688 38679 7ffb0c4b2403 construct 38678->38679 38680 7ffb0c4d246c std::_Throw_Cpp_error 14 API calls 38679->38680 38681 7ffb0c4b240b 38680->38681 38682 7ffb0c4b2419 unique_lock 38681->38682 38686 7ffb0c4d29f4 57 API calls std::_Throw_Cpp_error 38681->38686 38685 7ffb0c4ac458 38682->38685 38687 7ffb0c4d29f4 57 API calls std::_Throw_Cpp_error 38682->38687 38685->38663 38689 7ffb0c4b2b13 construct 38688->38689 38690 7ffb0c4d2474 Concurrency::details::WorkQueue::IsStructuredEmpty ReleaseSRWLockExclusive 38689->38690 38691 7ffb0c4ad8a6 38690->38691 38691->38668 38693 7ffb0c4ce050 38692->38693 38700 7ffb0c4b0bf0 38693->38700 38695 7ffb0c4ce064 38703 7ffb0c4aa8a0 38695->38703 38697 7ffb0c4ce085 Concurrency::details::WorkQueue::IsStructuredEmpty 38707 7ffb0c4b0000 121 API calls 2 library calls 38697->38707 38699 7ffb0c4ce0aa 38699->38659 38708 7ffb0c4b0900 38700->38708 38702 7ffb0c4b0c15 std::locale::_Locimp::_Makeushloc 38702->38695 38704 7ffb0c4aa8bf Concurrency::details::WorkQueue::IsStructuredEmpty 38703->38704 38721 7ffb0c4ae4c0 38704->38721 38706 7ffb0c4aa8dd std::locale::_Locimp::_Makeushloc 38706->38697 38707->38699 38709 7ffb0c4b092b 38708->38709 38712 7ffb0c4a8ed0 38709->38712 38711 7ffb0c4b094c 38711->38702 38713 7ffb0c4a8ee8 construct std::runtime_error::runtime_error 38712->38713 38716 7ffb0c4aac40 38713->38716 38715 7ffb0c4a8f00 38715->38711 38717 7ffb0c4aac58 construct std::runtime_error::runtime_error 38716->38717 38718 7ffb0c4aac5f _Func_class 38717->38718 38720 7ffb0c4aa2a0 49 API calls 2 library calls 38717->38720 38718->38715 38720->38718 38722 7ffb0c4ae4d3 _Func_class 38721->38722 38724 7ffb0c4ae4df _Func_class 38722->38724 38730 7ffb0c4d0d68 RtlPcToFileHeader RaiseException std::_Throw_Cpp_error SafeRWList 38722->38730 38727 7ffb0c4afe00 38724->38727 38731 7ffb0c4ab8f0 38727->38731 38734 7ffb0c4ae1d0 38731->38734 38735 7ffb0c4ae510 SafeRWList 121 API calls 38734->38735 38736 7ffb0c4ab903 38735->38736 38736->38706 38738 7ffb0c4d3cf9 38737->38738 38739 7ffb0c4d25b0 38738->38739 38740 7ffb0c4d4388 IsProcessorFeaturePresent 38738->38740 38739->38593 38739->38598 38739->38640 38741 7ffb0c4d43a0 38740->38741 38747 7ffb0c4d4580 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 38741->38747 38743 7ffb0c4d43b3 38748 7ffb0c4d4354 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 38743->38748 38746->38639 38747->38743 38749 7ffb0c4df114 38766 7ffb0c4e2408 GetLastError 38749->38766 38753 7ffb0c4df13d 38754 7ffb0c4df14e GetLastError ExitThread 38753->38754 38755 7ffb0c4df15d 38753->38755 38756 7ffb0c4e2408 _Getctype 47 API calls 38755->38756 38757 7ffb0c4df162 38756->38757 38758 7ffb0c4ea208 Concurrency::details::ResourceManager::CreateNodeTopology 5 API calls 38757->38758 38759 7ffb0c4df16e 38758->38759 38760 7ffb0c4df17b 38759->38760 38761 7ffb0c4e4864 Concurrency::details::ResourceManager::CreateNodeTopology 5 API calls 38759->38761 38765 7ffb0c4ccd60 86 API calls 38760->38765 38761->38760 38762 7ffb0c4df19a 38763 7ffb0c4df354 Concurrency::details::ResourceManager::CreateNodeTopology 19 API calls 38762->38763 38764 7ffb0c4df1a1 BuildCatchObjectHelperInternal 38763->38764 38765->38762 38767 7ffb0c4e2449 FlsSetValue 38766->38767 38768 7ffb0c4e242c FlsGetValue 38766->38768 38770 7ffb0c4e2439 38767->38770 38771 7ffb0c4e245b 38767->38771 38769 7ffb0c4e2443 38768->38769 38768->38770 38769->38767 38772 7ffb0c4e24b5 SetLastError 38770->38772 38797 7ffb0c4e3fec 38771->38797 38774 7ffb0c4e24d5 38772->38774 38775 7ffb0c4df11d 38772->38775 38777 7ffb0c4dc470 BuildCatchObjectHelperInternal 40 API calls 38774->38777 38788 7ffb0c4dc470 38775->38788 38782 7ffb0c4e24da 38777->38782 38778 7ffb0c4e2488 FlsSetValue 38780 7ffb0c4e2494 FlsSetValue 38778->38780 38781 7ffb0c4e24a6 38778->38781 38779 7ffb0c4e2478 FlsSetValue 38783 7ffb0c4e2481 38779->38783 38780->38783 38810 7ffb0c4e2174 11 API calls memcpy_s 38781->38810 38804 7ffb0c4e4064 38783->38804 38786 7ffb0c4e24ae 38787 7ffb0c4e4064 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 38786->38787 38787->38772 38822 7ffb0c4e62e4 EnterCriticalSection LeaveCriticalSection BuildCatchObjectHelperInternal 38788->38822 38790 7ffb0c4dc479 38791 7ffb0c4dc488 38790->38791 38823 7ffb0c4e6334 47 API calls 5 library calls 38790->38823 38793 7ffb0c4dc491 IsProcessorFeaturePresent 38791->38793 38796 7ffb0c4dc4bb BuildCatchObjectHelperInternal 38791->38796 38794 7ffb0c4dc4a0 38793->38794 38824 7ffb0c4d9238 14 API calls 3 library calls 38794->38824 38802 7ffb0c4e3ffd memcpy_s 38797->38802 38798 7ffb0c4e404e 38814 7ffb0c4e01fc 11 API calls memcpy_s 38798->38814 38799 7ffb0c4e4032 HeapAlloc 38800 7ffb0c4e246a 38799->38800 38799->38802 38800->38778 38800->38779 38802->38798 38802->38799 38811 7ffb0c4e0e14 38802->38811 38805 7ffb0c4e4069 HeapFree 38804->38805 38809 7ffb0c4e4098 38804->38809 38806 7ffb0c4e4084 GetLastError 38805->38806 38805->38809 38807 7ffb0c4e4091 Concurrency::details::SchedulerProxy::DeleteThis 38806->38807 38821 7ffb0c4e01fc 11 API calls memcpy_s 38807->38821 38809->38770 38810->38786 38815 7ffb0c4e0e54 38811->38815 38814->38800 38820 7ffb0c4df5b0 EnterCriticalSection 38815->38820 38817 7ffb0c4e0e61 38818 7ffb0c4df604 Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 38817->38818 38819 7ffb0c4e0e26 38818->38819 38819->38802 38821->38809 38822->38790 38823->38791 38824->38796 38825 7ffb0c495be0 38828 7ffb0c495c20 38825->38828 38829 7ffb0c495d02 construct std::_Fac_node::_Fac_node 38828->38829 38871 7ffb0c497210 38829->38871 38831 7ffb0c495d39 construct 38875 7ffb0c496170 38831->38875 38833 7ffb0c495da4 38879 7ffb0c497430 38833->38879 38835 7ffb0c495dc0 38883 7ffb0c4973e0 38835->38883 38837 7ffb0c495dcd Concurrency::details::WorkQueue::IsStructuredEmpty 38838 7ffb0c495dda CreateMutexExW 38837->38838 38839 7ffb0c495dfd GetLastError 38838->38839 38866 7ffb0c495e0a 38838->38866 38840 7ffb0c495e0f 38839->38840 38839->38866 38886 7ffb0c496fb0 38840->38886 38842 7ffb0c496098 38970 7ffb0c494b70 38842->38970 38849 7ffb0c495e6d 38918 7ffb0c4d3314 38849->38918 38851 7ffb0c495e58 38967 7ffb0c4d4720 RtlPcToFileHeader RaiseException 38851->38967 38855 7ffb0c495ea8 38959 7ffb0c496f30 38855->38959 38858 7ffb0c495ee9 38859 7ffb0c496fb0 2 API calls 38858->38859 38868 7ffb0c495f0c Concurrency::details::WorkQueue::IsStructuredEmpty 38859->38868 38860 7ffb0c495ff0 Concurrency::details::WorkQueue::IsStructuredEmpty 38861 7ffb0c49600a 38860->38861 38862 7ffb0c49605f Concurrency::details::WorkQueue::IsStructuredEmpty 38860->38862 38861->38860 38968 7ffb0c4c7140 GetCurrentProcessId OpenProcess TerminateProcess CloseHandle 38861->38968 38862->38866 38863 7ffb0c496f80 QueryPerformanceCounter QueryPerformanceFrequency 38863->38868 38969 7ffb0c4960d0 GetCurrentProcessId OpenProcess TerminateProcess 38866->38969 38867 7ffb0c4d3314 std::_Facet_Register 4 API calls 38867->38868 38868->38860 38868->38861 38868->38863 38868->38867 38869 7ffb0c4ca7f0 188 API calls 38868->38869 38870 7ffb0c496f30 57 API calls 38868->38870 38962 7ffb0c4c6f10 38868->38962 38869->38868 38870->38868 38872 7ffb0c49723a construct Concurrency::scheduler_ptr::scheduler_ptr std::error_condition::operator== 38871->38872 38973 7ffb0c496a40 38872->38973 38874 7ffb0c497282 38874->38831 38876 7ffb0c49619f Concurrency::cancellation_token::_FromImpl construct _Byte_length Concurrency::details::_TaskCreationCallstack::_TaskCreationCallstack 38875->38876 38877 7ffb0c4961d9 38876->38877 39009 7ffb0c4968e0 49 API calls 5 library calls 38876->39009 38877->38833 38880 7ffb0c497448 Concurrency::details::WorkQueue::IsStructuredEmpty construct 38879->38880 38882 7ffb0c49744f shared_ptr 38880->38882 39010 7ffb0c497af0 38880->39010 38882->38835 38884 7ffb0c497af0 Concurrency::agent::wait_for_all 47 API calls 38883->38884 38885 7ffb0c4973f3 Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext 38884->38885 38885->38837 39015 7ffb0c496d00 38886->39015 38888 7ffb0c496fc8 39018 7ffb0c496fe0 38888->39018 38891 7ffb0c4c9d40 38892 7ffb0c4d3314 std::_Facet_Register 4 API calls 38891->38892 38893 7ffb0c4c9d53 38892->38893 38895 7ffb0c4c9d78 38893->38895 39097 7ffb0c4a21e0 38893->39097 39031 7ffb0c4b97b0 38895->39031 38899 7ffb0c4c9dc2 39069 7ffb0c494b40 38899->39069 38901 7ffb0c4c9dcc 39072 7ffb0c4b2a70 38901->39072 38904 7ffb0c4a3500 shared_ptr 47 API calls 38905 7ffb0c4c9df5 38904->38905 38906 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 38905->38906 38907 7ffb0c4c9e02 38906->38907 39075 7ffb0c4b8e30 38907->39075 38910 7ffb0c4a3500 shared_ptr 47 API calls 38911 7ffb0c4c9e26 38910->38911 38912 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 38911->38912 38913 7ffb0c4c9e33 38912->38913 39090 7ffb0c4a3600 38913->39090 38921 7ffb0c4d331f 38918->38921 38919 7ffb0c495e81 38919->38855 38927 7ffb0c4ca7f0 38919->38927 38920 7ffb0c4e0e14 std::_Facet_Register 2 API calls 38920->38921 38921->38919 38921->38920 38922 7ffb0c4d333e 38921->38922 38923 7ffb0c4d3349 38922->38923 39222 7ffb0c4d0d48 RtlPcToFileHeader RaiseException std::_Throw_Cpp_error std::bad_alloc::bad_alloc 38922->39222 39223 7ffb0c4d405c RtlPcToFileHeader RaiseException stdext::threads::lock_error::lock_error std::_Throw_Cpp_error 38923->39223 38928 7ffb0c4ca810 Concurrency::details::_TaskCreationCallstack::_TaskCreationCallstack std::runtime_error::runtime_error 38927->38928 39224 7ffb0c4cbd80 38928->39224 38932 7ffb0c4ca8b9 38932->38855 38933 7ffb0c4ca8ac 38933->38932 38934 7ffb0c4a3500 shared_ptr 47 API calls 38933->38934 38935 7ffb0c4ca937 38934->38935 38936 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 38935->38936 38937 7ffb0c4ca944 38936->38937 39243 7ffb0c4b2890 38937->39243 38944 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 38945 7ffb0c4ca9b7 38944->38945 39310 7ffb0c4cc230 38945->39310 38951 7ffb0c4caa0f UnDecorator::getVbTableType 39323 7ffb0c4cd420 121 API calls construct 38951->39323 38953 7ffb0c4caa66 construct 39324 7ffb0c4b26b0 49 API calls construct 38953->39324 38955 7ffb0c4caaa2 39325 7ffb0c4cd4f0 121 API calls construct 38955->39325 38957 7ffb0c4caaf2 construct 39326 7ffb0c4b26b0 49 API calls construct 38957->39326 40364 7ffb0c496250 38959->40364 38961 7ffb0c496f4d Concurrency::details::VirtualProcessor::Initialize 38961->38858 38963 7ffb0c4c6f28 38962->38963 38964 7ffb0c4c6f37 38962->38964 40375 7ffb0c497550 57 API calls 38963->40375 38964->38868 38966 7ffb0c497300 47 API calls std::bad_exception::bad_exception 38966->38851 38967->38849 38968->38866 38969->38842 40376 7ffb0c4953d0 38970->40376 38974 7ffb0c496a62 Concurrency::details::WorkQueue::IsStructuredEmpty std::_Throw_Cpp_error 38973->38974 38976 7ffb0c496b05 shared_ptr 38974->38976 38979 7ffb0c494e70 38974->38979 38976->38874 38977 7ffb0c496aa9 construct 38985 7ffb0c494ae0 47 API calls Concurrency::details::ResourceManager::SetTaskExecutionResources 38977->38985 38980 7ffb0c494e88 38979->38980 38984 7ffb0c494e94 38980->38984 38990 7ffb0c495570 49 API calls Concurrency::task_continuation_context::task_continuation_context 38980->38990 38986 7ffb0c494eb0 38984->38986 38985->38976 38987 7ffb0c494ef8 Concurrency::details::WorkQueue::IsStructuredEmpty 38986->38987 38991 7ffb0c4939e0 38987->38991 38990->38984 38994 7ffb0c4955b0 38991->38994 38995 7ffb0c4955c8 allocator 38994->38995 38998 7ffb0c4939a0 38995->38998 38999 7ffb0c4939b5 38998->38999 39000 7ffb0c4939b1 38998->39000 39001 7ffb0c4939cc 38999->39001 39002 7ffb0c4939c0 38999->39002 39000->38977 39005 7ffb0c494e50 39001->39005 39008 7ffb0c493a70 49 API calls 2 library calls 39002->39008 39006 7ffb0c4d3314 std::_Facet_Register 4 API calls 39005->39006 39007 7ffb0c494e63 39006->39007 39007->39000 39008->39000 39009->38877 39011 7ffb0c497b0d Concurrency::details::WorkQueue::IsStructuredEmpty shared_ptr 39010->39011 39012 7ffb0c497b49 Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext char_traits 39011->39012 39014 7ffb0c4976f0 47 API calls Concurrency::agent::wait_for_all 39011->39014 39012->38882 39014->39012 39022 7ffb0c497da0 39015->39022 39017 7ffb0c496d21 Concurrency::details::_TaskProcThunk::_TaskProcThunk 39017->38888 39021 7ffb0c496fe9 39018->39021 39019 7ffb0c497da0 2 API calls 39019->39021 39020 7ffb0c495e31 39020->38891 39021->39019 39021->39020 39027 7ffb0c4d0e18 39022->39027 39026 7ffb0c497dbb _Subatomic 39026->39017 39028 7ffb0c4d0e28 QueryPerformanceFrequency 39027->39028 39029 7ffb0c497db1 39027->39029 39028->39029 39030 7ffb0c4d0dfc QueryPerformanceCounter 39029->39030 39030->39026 39032 7ffb0c4b97d3 construct Concurrency::details::_TaskCreationCallstack::_TaskCreationCallstack std::_Fac_node::_Fac_node 39031->39032 39033 7ffb0c497210 49 API calls 39032->39033 39034 7ffb0c4b991b construct 39033->39034 39100 7ffb0c4ba520 39034->39100 39036 7ffb0c4b9986 Concurrency::details::WorkQueue::IsStructuredEmpty 39037 7ffb0c4b9994 RegOpenKeyExA 39036->39037 39038 7ffb0c4b99c5 39037->39038 39064 7ffb0c4b9a1a Concurrency::details::WorkQueue::IsStructuredEmpty 39037->39064 39113 7ffb0c4a18a0 39038->39113 39039 7ffb0c4b9a2d RegEnumKeyExA 39041 7ffb0c4b9c24 RegCloseKey 39039->39041 39039->39064 39120 7ffb0c4b9fb0 49 API calls 5 library calls 39041->39120 39043 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39046 7ffb0c4b99f1 39043->39046 39048 7ffb0c494b70 Concurrency::details::ResourceManager::SetTaskExecutionResources 47 API calls 39046->39048 39047 7ffb0c4b9c47 39049 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39047->39049 39051 7ffb0c4b99ff 39048->39051 39052 7ffb0c4b9c5f 39049->39052 39117 7ffb0c4a2f10 39051->39117 39054 7ffb0c494b70 Concurrency::details::ResourceManager::SetTaskExecutionResources 47 API calls 39052->39054 39056 7ffb0c4b9c6d 39054->39056 39055 7ffb0c4b9a0d 39065 7ffb0c4a3500 39055->39065 39057 7ffb0c4a2f10 strtoxl 47 API calls 39056->39057 39057->39055 39058 7ffb0c4b9ae8 RegOpenKeyExA 39059 7ffb0c4b9b1d RegQueryValueExA 39058->39059 39058->39064 39059->39064 39060 7ffb0c494b40 47 API calls Concurrency::details::ResourceManager::CreateNodeTopology 39060->39064 39061 7ffb0c4a18a0 49 API calls _Mpunct 39061->39064 39062 7ffb0c4b8160 49 API calls 39062->39064 39063 7ffb0c4b9bed RegCloseKey 39063->39064 39064->39039 39064->39058 39064->39060 39064->39061 39064->39062 39064->39063 39104 7ffb0c49fe90 39064->39104 39110 7ffb0c49fe30 39064->39110 39067 7ffb0c4a3518 Concurrency::details::WorkQueue::IsStructuredEmpty construct 39065->39067 39066 7ffb0c4a351f shared_ptr 39066->38899 39067->39066 39154 7ffb0c4954a0 39067->39154 39070 7ffb0c4954a0 shared_ptr 47 API calls 39069->39070 39071 7ffb0c494b53 Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext 39070->39071 39071->38901 39159 7ffb0c4aa730 39072->39159 39168 7ffb0c4b9030 LoadLibraryA 39075->39168 39080 7ffb0c49fe30 49 API calls 39081 7ffb0c4b8e8f 39080->39081 39198 7ffb0c49fde0 39081->39198 39084 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39085 7ffb0c4b8eca 39084->39085 39086 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39085->39086 39087 7ffb0c4b8ed5 39086->39087 39088 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39087->39088 39089 7ffb0c4b8ee3 39088->39089 39089->38910 39212 7ffb0c4a5640 39090->39212 39093 7ffb0c4a2e50 39094 7ffb0c4a2e64 construct 39093->39094 39096 7ffb0c495e37 39093->39096 39221 7ffb0c4a3b90 47 API calls Concurrency::event::wait 39094->39221 39096->38849 39096->38966 39098 7ffb0c4a18a0 _Mpunct 49 API calls 39097->39098 39099 7ffb0c4a21fd 39098->39099 39099->38895 39101 7ffb0c4ba54f Concurrency::cancellation_token::_FromImpl construct _Byte_length Concurrency::details::_TaskCreationCallstack::_TaskCreationCallstack 39100->39101 39102 7ffb0c4ba589 Concurrency::cancellation_token::_FromImpl 39101->39102 39121 7ffb0c4ba790 49 API calls 5 library calls 39101->39121 39102->39036 39105 7ffb0c49feb5 Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores construct Concurrency::task_continuation_context::task_continuation_context char_traits 39104->39105 39106 7ffb0c49feef Concurrency::details::WorkQueue::IsStructuredEmpty 39105->39106 39126 7ffb0c495550 49 API calls Concurrency::task_continuation_context::task_continuation_context 39105->39126 39122 7ffb0c4a1d40 39106->39122 39109 7ffb0c49ff42 39109->39064 39130 7ffb0c4a5500 39110->39130 39112 7ffb0c49fe5a construct std::_Throw_Cpp_error 39112->39064 39114 7ffb0c4a18c0 construct _Mpunct char_traits 39113->39114 39139 7ffb0c4a0220 39114->39139 39116 7ffb0c4a18e5 39116->39043 39146 7ffb0c4a52c0 39117->39146 39120->39047 39121->39102 39123 7ffb0c4a1d64 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::cancellation_token::_FromImpl std::_Throw_Cpp_error Concurrency::task_continuation_context::task_continuation_context 39122->39123 39125 7ffb0c4a1e21 construct std::_Throw_Cpp_error Concurrency::task_continuation_context::task_continuation_context shared_ptr char_traits 39123->39125 39127 7ffb0c493a10 39123->39127 39125->39109 39126->39106 39128 7ffb0c4939e0 Concurrency::task_continuation_context::task_continuation_context 49 API calls 39127->39128 39129 7ffb0c493a49 39128->39129 39129->39125 39131 7ffb0c4a5518 construct char_traits 39130->39131 39134 7ffb0c4a5540 39131->39134 39133 7ffb0c4a5532 39133->39112 39135 7ffb0c4a5601 39134->39135 39137 7ffb0c4a557e Concurrency::details::WorkQueue::IsStructuredEmpty type_info::_name_internal_method char_traits 39134->39137 39138 7ffb0c4a0d00 49 API calls 5 library calls 39135->39138 39137->39133 39138->39137 39140 7ffb0c4a0247 Concurrency::task_continuation_context::task_continuation_context 39139->39140 39141 7ffb0c4a0253 Concurrency::details::WorkQueue::IsStructuredEmpty std::_Throw_Cpp_error Concurrency::task_continuation_context::task_continuation_context 39140->39141 39145 7ffb0c495550 49 API calls Concurrency::task_continuation_context::task_continuation_context 39140->39145 39143 7ffb0c493a10 Concurrency::task_continuation_context::task_continuation_context 49 API calls 39141->39143 39144 7ffb0c4a028c construct std::_Throw_Cpp_error Concurrency::task_continuation_context::task_continuation_context shared_ptr char_traits 39141->39144 39143->39144 39144->39116 39145->39141 39147 7ffb0c4a52d3 Concurrency::details::WorkQueue::IsStructuredEmpty shared_ptr 39146->39147 39148 7ffb0c4a2f23 39147->39148 39152 7ffb0c4a07b0 47 API calls 2 library calls 39147->39152 39148->39055 39150 7ffb0c4a5338 39153 7ffb0c4a5960 47 API calls strtoxl 39150->39153 39152->39150 39153->39148 39155 7ffb0c4954bd Concurrency::details::WorkQueue::IsStructuredEmpty shared_ptr 39154->39155 39157 7ffb0c4954f9 Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext char_traits 39155->39157 39158 7ffb0c4950e0 47 API calls Concurrency::details::ResourceManager::SetTaskExecutionResources 39155->39158 39157->39066 39158->39157 39160 7ffb0c4aa74f construct Concurrency::cancellation_token::_FromImpl 39159->39160 39163 7ffb0c493740 39160->39163 39162 7ffb0c4aa7cf 39162->38904 39164 7ffb0c49376f Concurrency::cancellation_token::_FromImpl construct Concurrency::scheduler_ptr::scheduler_ptr Concurrency::details::_TaskCreationCallstack::_TaskCreationCallstack 39163->39164 39165 7ffb0c4937a9 Concurrency::cancellation_token::_FromImpl 39164->39165 39167 7ffb0c493b00 49 API calls 6 library calls 39164->39167 39165->39162 39167->39165 39169 7ffb0c4b908a GetProcAddress 39168->39169 39170 7ffb0c4b905e 39168->39170 39172 7ffb0c4b90d5 GetUserNameW 39169->39172 39173 7ffb0c4b90a9 39169->39173 39171 7ffb0c4a18a0 _Mpunct 49 API calls 39170->39171 39185 7ffb0c4b8e51 39171->39185 39175 7ffb0c4b90f6 39172->39175 39176 7ffb0c4b919e 39172->39176 39174 7ffb0c4a18a0 _Mpunct 49 API calls 39173->39174 39174->39185 39201 7ffb0c4b61d0 49 API calls 3 library calls 39175->39201 39178 7ffb0c4a18a0 _Mpunct 49 API calls 39176->39178 39178->39185 39179 7ffb0c4b9108 construct 39202 7ffb0c4ba440 49 API calls 3 library calls 39179->39202 39181 7ffb0c4b915b std::_Throw_Cpp_error 39182 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39181->39182 39183 7ffb0c4b9189 39182->39183 39184 7ffb0c4973e0 Concurrency::agent::wait_for_all 47 API calls 39183->39184 39184->39185 39186 7ffb0c4b8f00 GetComputerNameW 39185->39186 39187 7ffb0c4b8ffa 39186->39187 39188 7ffb0c4b8f5b 39186->39188 39190 7ffb0c4a18a0 _Mpunct 49 API calls 39187->39190 39203 7ffb0c4b61d0 49 API calls 3 library calls 39188->39203 39197 7ffb0c4b8e6a 39190->39197 39191 7ffb0c4b8f6d construct 39204 7ffb0c4ba440 49 API calls 3 library calls 39191->39204 39193 7ffb0c4b8fbd std::_Throw_Cpp_error 39194 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39193->39194 39195 7ffb0c4b8fe5 39194->39195 39196 7ffb0c4973e0 Concurrency::agent::wait_for_all 47 API calls 39195->39196 39196->39197 39197->39080 39205 7ffb0c4a1940 39198->39205 39200 7ffb0c49fe14 39200->39084 39201->39179 39202->39181 39203->39191 39204->39193 39206 7ffb0c4a1967 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::cancellation_token::_FromImpl Concurrency::task_continuation_context::task_continuation_context shared_ptr 39205->39206 39208 7ffb0c4a1c0c Concurrency::details::WorkQueue::IsStructuredEmpty std::_Throw_Cpp_error 39206->39208 39209 7ffb0c4a1a4e 7 library calls 39206->39209 39211 7ffb0c495550 49 API calls Concurrency::task_continuation_context::task_continuation_context 39206->39211 39210 7ffb0c493a10 Concurrency::task_continuation_context::task_continuation_context 49 API calls 39208->39210 39209->39200 39210->39209 39211->39208 39213 7ffb0c4a5658 construct char_traits 39212->39213 39216 7ffb0c4a5680 39213->39216 39215 7ffb0c4a361d 39215->39093 39217 7ffb0c4a5703 39216->39217 39219 7ffb0c4a56a4 Concurrency::details::WorkQueue::IsStructuredEmpty type_info::_name_internal_method char_traits 39216->39219 39220 7ffb0c4a0bf0 49 API calls 5 library calls 39217->39220 39219->39215 39220->39219 39221->39096 39327 7ffb0c498040 LoadLibraryA 39224->39327 39228 7ffb0c4ca88d 39228->38932 39229 7ffb0c4cb1b0 39228->39229 39230 7ffb0c4cb1fb Concurrency::details::WorkQueue::IsStructuredEmpty 39229->39230 39336 7ffb0c4c9ef0 39230->39336 39232 7ffb0c4cb20a Concurrency::details::WorkQueue::IsStructuredEmpty 39403 7ffb0c498620 LoadLibraryA 39232->39403 39235 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39236 7ffb0c4cb24b 39235->39236 39237 7ffb0c4cb253 39236->39237 39409 7ffb0c498480 LoadLibraryA 39236->39409 39237->38933 39240 7ffb0c4cb297 39414 7ffb0c4986c0 LoadLibraryA GetProcAddress FreeLibrary 39240->39414 39242 7ffb0c4cb2a1 39242->39237 39244 7ffb0c4b28af 39243->39244 39245 7ffb0c4b28b4 39243->39245 39250 7ffb0c4ba0b0 39244->39250 39245->39244 39246 7ffb0c4b28d9 39245->39246 39248 7ffb0c4b292c Concurrency::details::WorkQueue::IsStructuredEmpty 39245->39248 39572 7ffb0c4aaa40 49 API calls 4 library calls 39246->39572 39248->39244 39573 7ffb0c4aec30 47 API calls 5 library calls 39248->39573 39251 7ffb0c4d3314 std::_Facet_Register 4 API calls 39250->39251 39252 7ffb0c4ba0ce 39251->39252 39253 7ffb0c4a18a0 _Mpunct 49 API calls 39252->39253 39256 7ffb0c4ba10d 39252->39256 39254 7ffb0c4ba0ef 39253->39254 39574 7ffb0c4c0370 39254->39574 39257 7ffb0c4ba154 39256->39257 39259 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39256->39259 39710 7ffb0c4ba3d0 SHTestTokenMembership 39257->39710 39259->39257 39260 7ffb0c4ba162 Concurrency::scheduler_ptr::scheduler_ptr 39261 7ffb0c4a3500 shared_ptr 47 API calls 39260->39261 39262 7ffb0c4ba190 39261->39262 39263 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39262->39263 39264 7ffb0c4ba19d 39263->39264 39265 7ffb0c4b8e30 53 API calls 39264->39265 39266 7ffb0c4ba1ab Concurrency::scheduler_ptr::scheduler_ptr 39265->39266 39267 7ffb0c4a3500 shared_ptr 47 API calls 39266->39267 39268 7ffb0c4ba1d7 39267->39268 39269 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39268->39269 39270 7ffb0c4ba1e4 39269->39270 39716 7ffb0c4b9ca0 GetModuleFileNameA 39270->39716 39272 7ffb0c4ba1f2 Concurrency::scheduler_ptr::scheduler_ptr 39273 7ffb0c4a3500 shared_ptr 47 API calls 39272->39273 39274 7ffb0c4ba21e 39273->39274 39275 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39274->39275 39276 7ffb0c4ba22b 39275->39276 39719 7ffb0c4b91e0 39276->39719 39278 7ffb0c4ba239 Concurrency::scheduler_ptr::scheduler_ptr 39279 7ffb0c4a3500 shared_ptr 47 API calls 39278->39279 39280 7ffb0c4ba265 39279->39280 39281 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39280->39281 39282 7ffb0c4ba272 Concurrency::scheduler_ptr::scheduler_ptr 39281->39282 39768 7ffb0c4a3580 39282->39768 39286 7ffb0c4ba2aa Concurrency::scheduler_ptr::scheduler_ptr 39287 7ffb0c4a3500 shared_ptr 47 API calls 39286->39287 39288 7ffb0c4ba2d8 39287->39288 39289 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39288->39289 39290 7ffb0c4ba2e5 39289->39290 39291 7ffb0c4b2a70 49 API calls 39290->39291 39292 7ffb0c4ba2f8 Concurrency::scheduler_ptr::scheduler_ptr 39291->39292 39293 7ffb0c4a3500 shared_ptr 47 API calls 39292->39293 39294 7ffb0c4ba326 39293->39294 39295 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39294->39295 39296 7ffb0c4ba333 39295->39296 39819 7ffb0c4b9650 GetForegroundWindow 39296->39819 39298 7ffb0c4ba341 Concurrency::scheduler_ptr::scheduler_ptr 39299 7ffb0c4a3500 shared_ptr 47 API calls 39298->39299 39300 7ffb0c4ba36f 39299->39300 39301 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39300->39301 39302 7ffb0c4ba37c Concurrency::scheduler_ptr::scheduler_ptr 39301->39302 39838 7ffb0c4c27b0 39302->39838 39307 7ffb0c4cac70 40258 7ffb0c4caca0 39307->40258 39311 7ffb0c4cc24d construct 39310->39311 40321 7ffb0c4cd140 39311->40321 39313 7ffb0c4ca9e8 39314 7ffb0c4ce300 39313->39314 39315 7ffb0c4ce315 Concurrency::details::ResourceManager::CreateNodeTopology 39314->39315 39316 7ffb0c4ce326 39315->39316 40362 7ffb0c4d29f4 57 API calls std::_Throw_Cpp_error 39315->40362 40361 7ffb0c4d2e7c CloseHandle 39316->40361 39319 7ffb0c4ce345 39320 7ffb0c4caa01 39319->39320 40363 7ffb0c4d29f4 57 API calls std::_Throw_Cpp_error 39319->40363 39322 7ffb0c4cdc80 91 API calls Concurrency::details::ResourceManager::CreateNodeTopology 39320->39322 39322->38951 39323->38953 39324->38955 39325->38957 39326->38932 39328 7ffb0c498068 39327->39328 39329 7ffb0c49806f GetProcAddress 39327->39329 39328->39228 39331 7ffb0c497fb0 LoadLibraryA 39328->39331 39329->39328 39330 7ffb0c49808e FreeLibrary GetLastError 39329->39330 39330->39328 39332 7ffb0c497fe4 GetProcAddress 39331->39332 39333 7ffb0c497fdb 39331->39333 39334 7ffb0c498003 FreeLibrary 39332->39334 39335 7ffb0c498017 socket 39332->39335 39333->39228 39334->39333 39335->39333 39337 7ffb0c4d3314 std::_Facet_Register 4 API calls 39336->39337 39338 7ffb0c4c9f13 39337->39338 39339 7ffb0c4a21e0 49 API calls 39338->39339 39340 7ffb0c4c9f44 construct std::_Fac_node::_Fac_node 39338->39340 39339->39340 39341 7ffb0c497210 49 API calls 39340->39341 39342 7ffb0c4ca147 Concurrency::scheduler_ptr::scheduler_ptr 39341->39342 39415 7ffb0c4cef30 39342->39415 39344 7ffb0c4ca16a Concurrency::scheduler_ptr::scheduler_ptr 39421 7ffb0c4cead0 39344->39421 39346 7ffb0c4ca1a4 Concurrency::scheduler_ptr::scheduler_ptr 39430 7ffb0c4cee30 39346->39430 39349 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39350 7ffb0c4ca1ec 39349->39350 39351 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39350->39351 39352 7ffb0c4ca1fa construct std::_Fac_node::_Fac_node 39351->39352 39353 7ffb0c497210 49 API calls 39352->39353 39354 7ffb0c4ca2af construct std::_Fac_node::_Fac_node 39353->39354 39355 7ffb0c497210 49 API calls 39354->39355 39356 7ffb0c4ca403 Concurrency::scheduler_ptr::scheduler_ptr 39355->39356 39357 7ffb0c4cef30 49 API calls 39356->39357 39358 7ffb0c4ca426 Concurrency::scheduler_ptr::scheduler_ptr 39357->39358 39359 7ffb0c4cead0 52 API calls 39358->39359 39360 7ffb0c4ca460 Concurrency::scheduler_ptr::scheduler_ptr 39359->39360 39361 7ffb0c4cee30 49 API calls 39360->39361 39362 7ffb0c4ca49a 39361->39362 39363 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39362->39363 39364 7ffb0c4ca4a8 39363->39364 39365 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39364->39365 39366 7ffb0c4ca4b6 39365->39366 39438 7ffb0c4a20d0 39366->39438 39369 7ffb0c4a20d0 49 API calls 39370 7ffb0c4ca529 39369->39370 39371 7ffb0c4a20d0 49 API calls 39370->39371 39372 7ffb0c4ca556 39371->39372 39442 7ffb0c4931c0 39372->39442 39375 7ffb0c4a18a0 _Mpunct 49 API calls 39376 7ffb0c4ca5a5 Concurrency::scheduler_ptr::scheduler_ptr 39375->39376 39377 7ffb0c4cef30 49 API calls 39376->39377 39378 7ffb0c4ca5c8 Concurrency::scheduler_ptr::scheduler_ptr 39377->39378 39456 7ffb0c4cf310 39378->39456 39380 7ffb0c4ca60a 39470 7ffb0c4a17f0 39380->39470 39383 7ffb0c4a2f10 strtoxl 47 API calls 39384 7ffb0c4ca65f 39383->39384 39385 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39384->39385 39386 7ffb0c4ca66d 39385->39386 39387 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39386->39387 39388 7ffb0c4ca67b 39387->39388 39389 7ffb0c494b70 Concurrency::details::ResourceManager::SetTaskExecutionResources 47 API calls 39388->39389 39390 7ffb0c4ca689 39389->39390 39391 7ffb0c494b70 Concurrency::details::ResourceManager::SetTaskExecutionResources 47 API calls 39390->39391 39392 7ffb0c4ca697 39391->39392 39393 7ffb0c494b70 Concurrency::details::ResourceManager::SetTaskExecutionResources 47 API calls 39392->39393 39394 7ffb0c4ca6a5 39393->39394 39395 7ffb0c494b70 Concurrency::details::ResourceManager::SetTaskExecutionResources 47 API calls 39394->39395 39396 7ffb0c4ca6b3 39395->39396 39397 7ffb0c494b70 Concurrency::details::ResourceManager::SetTaskExecutionResources 47 API calls 39396->39397 39398 7ffb0c4ca6c1 39397->39398 39399 7ffb0c494b70 Concurrency::details::ResourceManager::SetTaskExecutionResources 47 API calls 39398->39399 39400 7ffb0c4ca6cf 39399->39400 39401 7ffb0c4a2e50 Concurrency::event::wait 47 API calls 39400->39401 39402 7ffb0c4ca6da 39401->39402 39402->39232 39404 7ffb0c49865a GetProcAddress 39403->39404 39405 7ffb0c498652 GetLastError 39403->39405 39407 7ffb0c498688 getaddrinfo 39404->39407 39408 7ffb0c498679 FreeLibrary 39404->39408 39406 7ffb0c4986a8 39405->39406 39406->39235 39407->39406 39408->39406 39410 7ffb0c4984b4 GetProcAddress 39409->39410 39411 7ffb0c4984ad 39409->39411 39412 7ffb0c4984d3 FreeLibrary 39410->39412 39413 7ffb0c4984e5 connect 39410->39413 39411->39237 39411->39240 39412->39411 39413->39411 39414->39242 39416 7ffb0c4cef59 UnDecorator::getVbTableType 39415->39416 39474 7ffb0c4d0120 39416->39474 39418 7ffb0c4cefce std::_Throw_Cpp_error 39419 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39418->39419 39420 7ffb0c4ceff6 39419->39420 39420->39344 39429 7ffb0c4ceaf8 Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores 39421->39429 39422 7ffb0c4cede7 std::_Throw_Cpp_error 39423 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39422->39423 39425 7ffb0c4cee0e 39423->39425 39424 7ffb0c4cecf3 39424->39422 39481 7ffb0c4d05c0 49 API calls Concurrency::task_continuation_context::task_continuation_context 39424->39481 39425->39346 39429->39424 39479 7ffb0c4cf490 50 API calls 39429->39479 39480 7ffb0c4d05c0 49 API calls Concurrency::task_continuation_context::task_continuation_context 39429->39480 39431 7ffb0c4cee59 Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores 39430->39431 39482 7ffb0c4d0ab0 39431->39482 39433 7ffb0c4cee74 UnDecorator::getVbTableType 39488 7ffb0c4d0030 39433->39488 39435 7ffb0c4ceee9 39436 7ffb0c494b70 Concurrency::details::ResourceManager::SetTaskExecutionResources 47 API calls 39435->39436 39437 7ffb0c4ca1de 39436->39437 39437->39349 39439 7ffb0c4a20e8 Concurrency::details::WorkQueue::IsStructuredEmpty std::_Throw_Cpp_error 39438->39439 39495 7ffb0c4a0520 39439->39495 39441 7ffb0c4a214e 39441->39369 39443 7ffb0c4931f8 Concurrency::details::FreeThreadProxyFactory::Retire 39442->39443 39502 7ffb0c4929b0 39443->39502 39445 7ffb0c493268 39505 7ffb0c4924f0 39445->39505 39447 7ffb0c493294 39448 7ffb0c494b70 Concurrency::details::ResourceManager::SetTaskExecutionResources 47 API calls 39447->39448 39449 7ffb0c4932d1 39448->39449 39450 7ffb0c494b70 Concurrency::details::ResourceManager::SetTaskExecutionResources 47 API calls 39449->39450 39451 7ffb0c4932df 39450->39451 39452 7ffb0c494b70 Concurrency::details::ResourceManager::SetTaskExecutionResources 47 API calls 39451->39452 39453 7ffb0c4932ed 39452->39453 39454 7ffb0c494b70 Concurrency::details::ResourceManager::SetTaskExecutionResources 47 API calls 39453->39454 39455 7ffb0c4932fb 39454->39455 39455->39375 39457 7ffb0c4cf33d Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores Concurrency::details::_TaskCreationCallstack::_TaskCreationCallstack 39456->39457 39458 7ffb0c4cf3f4 39457->39458 39459 7ffb0c4b8450 49 API calls 39457->39459 39465 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39457->39465 39548 7ffb0c4d0a80 49 API calls 39457->39548 39540 7ffb0c4b8450 39458->39540 39459->39457 39465->39457 39466 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39467 7ffb0c4cf44d 39466->39467 39468 7ffb0c4a2f10 strtoxl 47 API calls 39467->39468 39469 7ffb0c4cf475 39468->39469 39469->39380 39471 7ffb0c4a1808 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::cancellation_token::_FromImpl std::_Throw_Cpp_error 39470->39471 39565 7ffb0c4a03b0 39471->39565 39473 7ffb0c4a184b 39473->39383 39476 7ffb0c4d0147 construct std::_Throw_Cpp_error _Idl_distance Concurrency::details::_TaskCreationCallstack::_TaskCreationCallstack 39474->39476 39475 7ffb0c4d01df 39475->39418 39476->39475 39478 7ffb0c4d0370 49 API calls 2 library calls 39476->39478 39478->39476 39479->39429 39480->39429 39481->39424 39483 7ffb0c4d0ac8 39482->39483 39486 7ffb0c4d0ae5 39483->39486 39487 7ffb0c4d0af5 39483->39487 39492 7ffb0c495570 49 API calls Concurrency::task_continuation_context::task_continuation_context 39483->39492 39493 7ffb0c4cfce0 49 API calls 2 library calls 39486->39493 39487->39433 39490 7ffb0c4d0057 construct std::_Throw_Cpp_error _Idl_distance Concurrency::details::_TaskCreationCallstack::_TaskCreationCallstack 39488->39490 39489 7ffb0c4d00ef 39489->39435 39490->39489 39494 7ffb0c4d03b0 49 API calls construct 39490->39494 39492->39486 39493->39487 39494->39490 39496 7ffb0c4a0542 Concurrency::details::WorkQueue::IsStructuredEmpty std::_Throw_Cpp_error 39495->39496 39497 7ffb0c4a05e5 shared_ptr 39496->39497 39498 7ffb0c494e70 49 API calls 39496->39498 39497->39441 39499 7ffb0c4a0589 construct 39498->39499 39501 7ffb0c494ae0 47 API calls Concurrency::details::ResourceManager::SetTaskExecutionResources 39499->39501 39501->39497 39511 7ffb0c491d70 39502->39511 39504 7ffb0c4929de 39504->39445 39506 7ffb0c49251a construct 39505->39506 39529 7ffb0c4937f0 39506->39529 39508 7ffb0c49253e 39509 7ffb0c494b70 Concurrency::details::ResourceManager::SetTaskExecutionResources 47 API calls 39508->39509 39510 7ffb0c492563 39509->39510 39510->39447 39512 7ffb0c491d96 39511->39512 39524 7ffb0c491e0e 39511->39524 39525 7ffb0c495aa0 49 API calls 39512->39525 39514 7ffb0c491da5 39526 7ffb0c493930 49 API calls 2 library calls 39514->39526 39516 7ffb0c491dca 39527 7ffb0c4949e0 47 API calls 2 library calls 39516->39527 39518 7ffb0c491de8 39528 7ffb0c4d4720 RtlPcToFileHeader RaiseException 39518->39528 39520 7ffb0c491df9 39521 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39520->39521 39522 7ffb0c491e04 39521->39522 39523 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39522->39523 39523->39524 39524->39504 39525->39514 39526->39516 39527->39518 39528->39520 39530 7ffb0c49381f construct _Byte_length Concurrency::scheduler_ptr::scheduler_ptr Concurrency::details::_TaskCreationCallstack::_TaskCreationCallstack 39529->39530 39533 7ffb0c493ce0 39530->39533 39532 7ffb0c4938a3 39532->39508 39534 7ffb0c493d02 Concurrency::details::WorkQueue::IsStructuredEmpty std::_Throw_Cpp_error 39533->39534 39535 7ffb0c494e70 49 API calls 39534->39535 39536 7ffb0c493da5 shared_ptr 39534->39536 39537 7ffb0c493d49 construct 39535->39537 39536->39532 39539 7ffb0c494ae0 47 API calls Concurrency::details::ResourceManager::SetTaskExecutionResources 39537->39539 39539->39536 39541 7ffb0c4b847a construct 39540->39541 39549 7ffb0c4b60d0 39541->39549 39544 7ffb0c4b8160 39545 7ffb0c4b8178 construct 39544->39545 39560 7ffb0c4b4f20 39545->39560 39547 7ffb0c4b8185 39547->39466 39548->39457 39550 7ffb0c4b60ff Concurrency::cancellation_token::_FromImpl 39549->39550 39555 7ffb0c495030 39550->39555 39552 7ffb0c4b6112 Concurrency::details::WorkQueue::IsStructuredEmpty 39553 7ffb0c4a0220 std::_Throw_Cpp_error 49 API calls 39552->39553 39554 7ffb0c4b6152 39553->39554 39554->39544 39556 7ffb0c495053 39555->39556 39557 7ffb0c49504e 39555->39557 39556->39552 39559 7ffb0c495590 49 API calls 39557->39559 39559->39556 39561 7ffb0c4b4f72 construct 39560->39561 39563 7ffb0c4b4f59 construct 39560->39563 39564 7ffb0c4b4fa0 49 API calls 3 library calls 39561->39564 39563->39547 39564->39563 39566 7ffb0c4a03d7 Concurrency::task_continuation_context::task_continuation_context 39565->39566 39568 7ffb0c4a03e6 Concurrency::details::WorkQueue::IsStructuredEmpty std::_Throw_Cpp_error Concurrency::task_continuation_context::task_continuation_context 39566->39568 39571 7ffb0c495550 49 API calls Concurrency::task_continuation_context::task_continuation_context 39566->39571 39569 7ffb0c493a10 Concurrency::task_continuation_context::task_continuation_context 49 API calls 39568->39569 39570 7ffb0c4a0422 construct std::_Throw_Cpp_error Concurrency::task_continuation_context::task_continuation_context shared_ptr 39568->39570 39569->39570 39570->39473 39571->39568 39572->39244 39573->39244 39575 7ffb0c4d3314 std::_Facet_Register 4 API calls 39574->39575 39576 7ffb0c4c038d 39575->39576 39577 7ffb0c4d3314 std::_Facet_Register 4 API calls 39576->39577 39578 7ffb0c4c03f7 39577->39578 39579 7ffb0c4d3314 std::_Facet_Register 4 API calls 39578->39579 39580 7ffb0c4c0465 39579->39580 39581 7ffb0c4d3314 std::_Facet_Register 4 API calls 39580->39581 39582 7ffb0c4c04d3 construct std::_Fac_node::_Fac_node 39581->39582 39583 7ffb0c497210 49 API calls 39582->39583 39584 7ffb0c4c0638 construct std::_Fac_node::_Fac_node 39583->39584 39585 7ffb0c497210 49 API calls 39584->39585 39586 7ffb0c4c070b construct std::_Fac_node::_Fac_node 39585->39586 39587 7ffb0c497210 49 API calls 39586->39587 39588 7ffb0c4c07a2 construct std::_Fac_node::_Fac_node 39587->39588 39589 7ffb0c497210 49 API calls 39588->39589 39590 7ffb0c4c087d construct std::_Fac_node::_Fac_node 39589->39590 39591 7ffb0c497210 49 API calls 39590->39591 39592 7ffb0c4c091d construct std::_Fac_node::_Fac_node 39591->39592 39593 7ffb0c497210 49 API calls 39592->39593 39594 7ffb0c4c0996 construct std::_Fac_node::_Fac_node 39593->39594 39595 7ffb0c497210 49 API calls 39594->39595 39596 7ffb0c4c0a0f construct std::_Fac_node::_Fac_node 39595->39596 39597 7ffb0c497210 49 API calls 39596->39597 39598 7ffb0c4c0a88 construct std::_Fac_node::_Fac_node 39597->39598 39599 7ffb0c497210 49 API calls 39598->39599 39600 7ffb0c4c0b15 construct std::_Fac_node::_Fac_node 39599->39600 39601 7ffb0c497210 49 API calls 39600->39601 39602 7ffb0c4c0cb0 construct std::_Fac_node::_Fac_node 39601->39602 39603 7ffb0c497210 49 API calls 39602->39603 39604 7ffb0c4c0d2e construct std::_Fac_node::_Fac_node 39603->39604 40049 7ffb0c4a2160 39604->40049 39606 7ffb0c4c0d99 39607 7ffb0c4d3314 std::_Facet_Register 4 API calls 39606->39607 39608 7ffb0c4c0dc4 39607->39608 39609 7ffb0c4a21e0 49 API calls 39608->39609 39610 7ffb0c4c0df5 Concurrency::scheduler_ptr::scheduler_ptr 39608->39610 39609->39610 39611 7ffb0c4cef30 49 API calls 39610->39611 39612 7ffb0c4c0e6d type_info::_name_internal_method 39611->39612 39613 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39612->39613 39614 7ffb0c4c0e9b 39613->39614 39615 7ffb0c4c0ea8 39614->39615 39617 7ffb0c4c0f38 Concurrency::scheduler_ptr::scheduler_ptr 39614->39617 39616 7ffb0c4d3314 std::_Facet_Register 4 API calls 39615->39616 39619 7ffb0c4c0eb2 39616->39619 39618 7ffb0c4cef30 49 API calls 39617->39618 39621 7ffb0c4c0f77 type_info::_name_internal_method 39618->39621 40053 7ffb0c4c5a10 47 API calls construct 39619->40053 39624 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39621->39624 39622 7ffb0c4c0f15 39623 7ffb0c4a3580 49 API calls 39622->39623 39709 7ffb0c4c0f32 39623->39709 39625 7ffb0c4c0fa5 39624->39625 39627 7ffb0c4c0fb2 39625->39627 39632 7ffb0c4c103e Concurrency::scheduler_ptr::scheduler_ptr 39625->39632 39626 7ffb0c4a2e50 Concurrency::event::wait 47 API calls 39628 7ffb0c4c169a 39626->39628 39629 7ffb0c4d3314 std::_Facet_Register 4 API calls 39627->39629 40057 7ffb0c4a2f30 47 API calls _Greedy_node 39628->40057 39635 7ffb0c4c0fbc 39629->39635 39631 7ffb0c4c16a8 39631->39256 39634 7ffb0c4cef30 49 API calls 39632->39634 39637 7ffb0c4c107a type_info::_name_internal_method 39634->39637 40054 7ffb0c4c5a60 47 API calls construct 39635->40054 39636 7ffb0c4c101b 39638 7ffb0c4a3580 49 API calls 39636->39638 39639 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39637->39639 39638->39709 39640 7ffb0c4c10a8 39639->39640 39641 7ffb0c4c10b5 39640->39641 39643 7ffb0c4c1145 Concurrency::scheduler_ptr::scheduler_ptr 39640->39643 39642 7ffb0c4d3314 std::_Facet_Register 4 API calls 39641->39642 39645 7ffb0c4c10bf 39642->39645 39644 7ffb0c4cef30 49 API calls 39643->39644 39647 7ffb0c4c1184 type_info::_name_internal_method 39644->39647 40055 7ffb0c4c59c0 47 API calls construct 39645->40055 39650 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39647->39650 39648 7ffb0c4c1122 39649 7ffb0c4a3580 49 API calls 39648->39649 39649->39709 39651 7ffb0c4c11b2 39650->39651 39652 7ffb0c4c11bf 39651->39652 39654 7ffb0c4c124f Concurrency::scheduler_ptr::scheduler_ptr 39651->39654 39653 7ffb0c4d3314 std::_Facet_Register 4 API calls 39652->39653 39656 7ffb0c4c11c9 39653->39656 39655 7ffb0c4cef30 49 API calls 39654->39655 39659 7ffb0c4c128e type_info::_name_internal_method 39655->39659 40056 7ffb0c4c5ab0 47 API calls construct 39656->40056 39658 7ffb0c4c122c 39660 7ffb0c4a3580 49 API calls 39658->39660 39661 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39659->39661 39660->39709 39662 7ffb0c4c12bc 39661->39662 39663 7ffb0c4c12c5 39662->39663 39665 7ffb0c4c12e7 Concurrency::scheduler_ptr::scheduler_ptr 39662->39665 39664 7ffb0c4a3580 49 API calls 39663->39664 39664->39709 39666 7ffb0c4cef30 49 API calls 39665->39666 39667 7ffb0c4c1326 type_info::_name_internal_method 39666->39667 39668 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39667->39668 39669 7ffb0c4c1354 39668->39669 39670 7ffb0c4c135d 39669->39670 39672 7ffb0c4c137f Concurrency::scheduler_ptr::scheduler_ptr 39669->39672 39671 7ffb0c4a3580 49 API calls 39670->39671 39671->39709 39673 7ffb0c4cef30 49 API calls 39672->39673 39674 7ffb0c4c13be type_info::_name_internal_method 39673->39674 39675 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39674->39675 39676 7ffb0c4c13ec 39675->39676 39677 7ffb0c4c13f5 39676->39677 39679 7ffb0c4c1417 Concurrency::scheduler_ptr::scheduler_ptr 39676->39679 39678 7ffb0c4a3580 49 API calls 39677->39678 39678->39709 39680 7ffb0c4cef30 49 API calls 39679->39680 39681 7ffb0c4c1456 type_info::_name_internal_method 39680->39681 39682 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39681->39682 39683 7ffb0c4c1484 39682->39683 39684 7ffb0c4c148d 39683->39684 39686 7ffb0c4c14af Concurrency::scheduler_ptr::scheduler_ptr 39683->39686 39685 7ffb0c4a3580 49 API calls 39684->39685 39685->39709 39687 7ffb0c4cef30 49 API calls 39686->39687 39688 7ffb0c4c14ee type_info::_name_internal_method 39687->39688 39689 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39688->39689 39690 7ffb0c4c151c 39689->39690 39691 7ffb0c4c1525 39690->39691 39693 7ffb0c4c1547 Concurrency::scheduler_ptr::scheduler_ptr 39690->39693 39692 7ffb0c4a3580 49 API calls 39691->39692 39692->39709 39694 7ffb0c4cef30 49 API calls 39693->39694 39695 7ffb0c4c1586 type_info::_name_internal_method 39694->39695 39696 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39695->39696 39697 7ffb0c4c15b4 39696->39697 39698 7ffb0c4c15bd 39697->39698 39700 7ffb0c4c15df Concurrency::scheduler_ptr::scheduler_ptr 39697->39700 39699 7ffb0c4a3580 49 API calls 39698->39699 39699->39709 39701 7ffb0c4cef30 49 API calls 39700->39701 39702 7ffb0c4c161e type_info::_name_internal_method 39701->39702 39703 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39702->39703 39704 7ffb0c4c164c 39703->39704 39705 7ffb0c4c1655 39704->39705 39706 7ffb0c4c1674 39704->39706 39707 7ffb0c4a3580 49 API calls 39705->39707 39708 7ffb0c4a3600 type_info::_name_internal_method 49 API calls 39706->39708 39707->39709 39708->39709 39709->39626 39711 7ffb0c4ba3eb 39710->39711 39712 7ffb0c4ba410 39710->39712 39713 7ffb0c4a18a0 _Mpunct 49 API calls 39711->39713 39714 7ffb0c4a18a0 _Mpunct 49 API calls 39712->39714 39715 7ffb0c4ba3fc 39713->39715 39714->39715 39715->39260 39717 7ffb0c4a18a0 _Mpunct 49 API calls 39716->39717 39718 7ffb0c4b9ceb 39717->39718 39718->39272 39720 7ffb0c4b9244 construct std::_Fac_node::_Fac_node 39719->39720 39721 7ffb0c497210 49 API calls 39720->39721 39722 7ffb0c4b9382 39721->39722 39723 7ffb0c4a21e0 49 API calls 39722->39723 39724 7ffb0c4b9390 39723->39724 39725 7ffb0c4cef30 49 API calls 39724->39725 39726 7ffb0c4b93ae Concurrency::details::WorkQueue::IsStructuredEmpty 39725->39726 39727 7ffb0c4b93c3 RegOpenKeyA 39726->39727 39728 7ffb0c4b93dc 39727->39728 39729 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39728->39729 39730 7ffb0c4b9404 39729->39730 39731 7ffb0c4b9411 RegQueryValueExA 39730->39731 39732 7ffb0c4b95f0 39730->39732 39731->39732 39734 7ffb0c4b944a 39731->39734 39733 7ffb0c4a18a0 _Mpunct 49 API calls 39732->39733 39735 7ffb0c4b9604 39733->39735 40069 7ffb0c4bc070 39734->40069 40074 7ffb0c4a3190 47 API calls Concurrency::details::ResourceManager::CreateNodeTopology 39735->40074 39739 7ffb0c4b9546 RegCloseKey 39744 7ffb0c49fe90 49 API calls 39739->39744 39740 7ffb0c4b9499 RegCloseKey 39743 7ffb0c49fe90 49 API calls 39740->39743 39741 7ffb0c4b961c 39742 7ffb0c494b70 Concurrency::details::ResourceManager::SetTaskExecutionResources 47 API calls 39741->39742 39746 7ffb0c4b962a 39742->39746 39747 7ffb0c4b94c1 39743->39747 39745 7ffb0c4b956e 39744->39745 39748 7ffb0c49fe30 49 API calls 39745->39748 39749 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39746->39749 39750 7ffb0c49fe30 49 API calls 39747->39750 39751 7ffb0c4b95a3 39748->39751 39752 7ffb0c4b9538 39749->39752 39753 7ffb0c4b94f6 39750->39753 39754 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39751->39754 39752->39278 39755 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39753->39755 39756 7ffb0c4b95bb 39754->39756 39757 7ffb0c4b950e 39755->39757 40073 7ffb0c4a3190 47 API calls Concurrency::details::ResourceManager::CreateNodeTopology 39756->40073 40072 7ffb0c4a3190 47 API calls Concurrency::details::ResourceManager::CreateNodeTopology 39757->40072 39760 7ffb0c4b95c9 39762 7ffb0c494b70 Concurrency::details::ResourceManager::SetTaskExecutionResources 47 API calls 39760->39762 39761 7ffb0c4b951c 39763 7ffb0c494b70 Concurrency::details::ResourceManager::SetTaskExecutionResources 47 API calls 39761->39763 39764 7ffb0c4b95d7 39762->39764 39765 7ffb0c4b952a 39763->39765 39766 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39764->39766 39767 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39765->39767 39766->39752 39767->39752 39770 7ffb0c4a3598 Concurrency::details::WorkQueue::IsStructuredEmpty construct Concurrency::details::_TaskCreationCallstack::_TaskCreationCallstack 39768->39770 39769 7ffb0c4a359f 39772 7ffb0c4b9d10 39769->39772 39770->39769 39771 7ffb0c4a5680 type_info::_name_internal_method 49 API calls 39770->39771 39771->39769 40075 7ffb0c4a1f50 39772->40075 39775 7ffb0c4b9ca0 50 API calls 39776 7ffb0c4b9d44 Concurrency::details::WorkQueue::IsStructuredEmpty 39775->39776 39777 7ffb0c4b9d53 CreateFileA 39776->39777 39778 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39777->39778 39779 7ffb0c4b9d95 39778->39779 39780 7ffb0c4b9dd7 GetFileTime 39779->39780 39781 7ffb0c4b9d9e 39779->39781 39782 7ffb0c4b9df9 FileTimeToSystemTime SystemTimeToTzSpecificLocalTime 39780->39782 39783 7ffb0c4b9f27 CloseHandle 39780->39783 39784 7ffb0c4a18a0 _Mpunct 49 API calls 39781->39784 40081 7ffb0c4bbd30 39782->40081 39785 7ffb0c4a18a0 _Mpunct 49 API calls 39783->39785 39787 7ffb0c4b9db2 39784->39787 39788 7ffb0c4b9f46 39785->39788 40090 7ffb0c4a3d40 47 API calls Concurrency::details::ScheduleGroupBase::LocateSegment 39787->40090 40099 7ffb0c4a3d40 47 API calls Concurrency::details::ScheduleGroupBase::LocateSegment 39788->40099 39791 7ffb0c4b9dca 39791->39286 39794 7ffb0c4b9e45 39795 7ffb0c4bbd30 85 API calls 39794->39795 39796 7ffb0c4b9e52 39795->39796 40092 7ffb0c49fa30 49 API calls 3 library calls 39796->40092 39798 7ffb0c4b9e61 39799 7ffb0c4bbd30 85 API calls 39798->39799 39800 7ffb0c4b9e6e 39799->39800 40093 7ffb0c49fa30 49 API calls 3 library calls 39800->40093 39802 7ffb0c4b9e7d 39803 7ffb0c4bbd30 85 API calls 39802->39803 39804 7ffb0c4b9e8a 39803->39804 40094 7ffb0c49fa30 49 API calls 3 library calls 39804->40094 39806 7ffb0c4b9e99 39807 7ffb0c4bbd30 85 API calls 39806->39807 39808 7ffb0c4b9ea6 39807->39808 39809 7ffb0c4b9ecb 39808->39809 39810 7ffb0c4b9eb1 39808->39810 40096 7ffb0c49fa30 49 API calls 3 library calls 39809->40096 40095 7ffb0c49fa30 49 API calls 3 library calls 39810->40095 39813 7ffb0c4b9ec8 CloseHandle 40097 7ffb0c4a7030 49 API calls 39813->40097 39816 7ffb0c4b9f03 40098 7ffb0c4a3d40 47 API calls Concurrency::details::ScheduleGroupBase::LocateSegment 39816->40098 39818 7ffb0c4b9f1b 39818->39791 39820 7ffb0c4b9743 GetLastError 39819->39820 39821 7ffb0c4b967c GetWindowTextW 39819->39821 40232 7ffb0c495aa0 49 API calls 39820->40232 39821->39820 39823 7ffb0c4b96c8 39821->39823 40230 7ffb0c4b61d0 49 API calls 3 library calls 39823->40230 39824 7ffb0c4b9758 40233 7ffb0c493930 49 API calls 2 library calls 39824->40233 39827 7ffb0c4b96da 40231 7ffb0c4b4410 51 API calls 5 library calls 39827->40231 39828 7ffb0c4b9780 39830 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39828->39830 39832 7ffb0c4b9738 39830->39832 39831 7ffb0c4b96ef Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 39833 7ffb0c4a18a0 _Mpunct 49 API calls 39831->39833 39832->39298 39834 7ffb0c4b9718 39833->39834 39835 7ffb0c494b70 Concurrency::details::ResourceManager::SetTaskExecutionResources 47 API calls 39834->39835 39836 7ffb0c4b972d 39835->39836 39837 7ffb0c4973e0 Concurrency::agent::wait_for_all 47 API calls 39836->39837 39837->39832 39839 7ffb0c4c2830 construct std::_Fac_node::_Fac_node 39838->39839 39840 7ffb0c497210 49 API calls 39839->39840 39841 7ffb0c4c288d construct std::_Fac_node::_Fac_node 39840->39841 39842 7ffb0c497210 49 API calls 39841->39842 39843 7ffb0c4c2960 construct std::_Fac_node::_Fac_node 39842->39843 39844 7ffb0c497210 49 API calls 39843->39844 39845 7ffb0c4c2a1b construct std::_Fac_node::_Fac_node 39844->39845 39846 7ffb0c497210 49 API calls 39845->39846 39847 7ffb0c4c2af6 construct std::_Fac_node::_Fac_node 39846->39847 39848 7ffb0c497210 49 API calls 39847->39848 39849 7ffb0c4c2b8d construct std::_Fac_node::_Fac_node 39848->39849 39850 7ffb0c497210 49 API calls 39849->39850 39851 7ffb0c4c2c06 construct std::_Fac_node::_Fac_node 39850->39851 39852 7ffb0c497210 49 API calls 39851->39852 39853 7ffb0c4c2c7f construct std::_Fac_node::_Fac_node 39852->39853 39854 7ffb0c497210 49 API calls 39853->39854 39855 7ffb0c4c2cf8 construct std::_Fac_node::_Fac_node 39854->39855 39856 7ffb0c497210 49 API calls 39855->39856 39857 7ffb0c4c2d85 construct std::_Fac_node::_Fac_node 39856->39857 39858 7ffb0c497210 49 API calls 39857->39858 39859 7ffb0c4c2f20 construct std::_Fac_node::_Fac_node 39858->39859 39860 7ffb0c497210 49 API calls 39859->39860 39861 7ffb0c4c2f9e construct std::_Fac_node::_Fac_node 39860->39861 39862 7ffb0c4a2160 49 API calls 39861->39862 39863 7ffb0c4c3009 39862->39863 39864 7ffb0c4d3314 std::_Facet_Register 4 API calls 39863->39864 39865 7ffb0c4c3034 39864->39865 39866 7ffb0c4a21e0 49 API calls 39865->39866 39867 7ffb0c4c3065 Concurrency::scheduler_ptr::scheduler_ptr 39865->39867 39866->39867 39868 7ffb0c4cef30 49 API calls 39867->39868 39869 7ffb0c4c30dd type_info::_name_internal_method 39868->39869 39870 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39869->39870 39871 7ffb0c4c3112 39870->39871 39872 7ffb0c4c31d2 Concurrency::scheduler_ptr::scheduler_ptr 39871->39872 39873 7ffb0c4c311f Concurrency::scheduler_ptr::scheduler_ptr 39871->39873 39875 7ffb0c4cef30 49 API calls 39872->39875 40234 7ffb0c4c3fc0 52 API calls 5 library calls 39873->40234 39876 7ffb0c4c3211 type_info::_name_internal_method 39875->39876 39880 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39876->39880 39877 7ffb0c4c318e 39878 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39877->39878 39879 7ffb0c4c31a6 39878->39879 39881 7ffb0c4a2e50 Concurrency::event::wait 47 API calls 39879->39881 39882 7ffb0c4c3246 39880->39882 39883 7ffb0c4c31b1 39881->39883 39884 7ffb0c4c3253 Concurrency::scheduler_ptr::scheduler_ptr 39882->39884 39885 7ffb0c4c3302 Concurrency::scheduler_ptr::scheduler_ptr 39882->39885 40235 7ffb0c4a2f30 47 API calls _Greedy_node 39883->40235 40236 7ffb0c4c3fc0 52 API calls 5 library calls 39884->40236 39888 7ffb0c4cef30 49 API calls 39885->39888 39887 7ffb0c4ba397 40045 7ffb0c4a2d50 39887->40045 39890 7ffb0c4c333e type_info::_name_internal_method 39888->39890 39894 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39890->39894 39891 7ffb0c4c32be 39892 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39891->39892 39893 7ffb0c4c32d6 39892->39893 39895 7ffb0c4a2e50 Concurrency::event::wait 47 API calls 39893->39895 39896 7ffb0c4c3373 39894->39896 39897 7ffb0c4c32e1 39895->39897 39899 7ffb0c4c3433 Concurrency::scheduler_ptr::scheduler_ptr 39896->39899 39900 7ffb0c4c3380 Concurrency::scheduler_ptr::scheduler_ptr 39896->39900 40237 7ffb0c4a2f30 47 API calls _Greedy_node 39897->40237 39902 7ffb0c4cef30 49 API calls 39899->39902 40238 7ffb0c4c3fc0 52 API calls 5 library calls 39900->40238 39903 7ffb0c4c3472 type_info::_name_internal_method 39902->39903 39907 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39903->39907 39904 7ffb0c4c33ef 39905 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39904->39905 39906 7ffb0c4c3407 39905->39906 39908 7ffb0c4a2e50 Concurrency::event::wait 47 API calls 39906->39908 39909 7ffb0c4c34a7 39907->39909 39910 7ffb0c4c3412 39908->39910 39912 7ffb0c4c3567 Concurrency::scheduler_ptr::scheduler_ptr 39909->39912 39913 7ffb0c4c34b4 Concurrency::scheduler_ptr::scheduler_ptr 39909->39913 40239 7ffb0c4a2f30 47 API calls _Greedy_node 39910->40239 39914 7ffb0c4cef30 49 API calls 39912->39914 40240 7ffb0c4c3fc0 52 API calls 5 library calls 39913->40240 39916 7ffb0c4c35a6 type_info::_name_internal_method 39914->39916 39920 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39916->39920 39917 7ffb0c4c3523 39918 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39917->39918 39919 7ffb0c4c353b 39918->39919 39921 7ffb0c4a2e50 Concurrency::event::wait 47 API calls 39919->39921 39922 7ffb0c4c35db 39920->39922 39923 7ffb0c4c3546 39921->39923 39925 7ffb0c4c35e8 39922->39925 39929 7ffb0c4c3725 Concurrency::scheduler_ptr::scheduler_ptr 39922->39929 40241 7ffb0c4a2f30 47 API calls _Greedy_node 39923->40241 39926 7ffb0c49fe90 49 API calls 39925->39926 39927 7ffb0c4c361f 39926->39927 40242 7ffb0c4c5330 49 API calls 3 library calls 39927->40242 39932 7ffb0c4cef30 49 API calls 39929->39932 39930 7ffb0c4c3657 39931 7ffb0c49fe30 49 API calls 39930->39931 39933 7ffb0c4c368b Concurrency::scheduler_ptr::scheduler_ptr 39931->39933 39934 7ffb0c4c3764 type_info::_name_internal_method 39932->39934 40243 7ffb0c4ce730 49 API calls 2 library calls 39933->40243 39936 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39934->39936 39938 7ffb0c4c3799 39936->39938 39937 7ffb0c4c36c5 39939 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39937->39939 39940 7ffb0c4c37a6 39938->39940 39946 7ffb0c4c38e3 Concurrency::scheduler_ptr::scheduler_ptr 39938->39946 39941 7ffb0c4c36dd 39939->39941 39942 7ffb0c49fe90 49 API calls 39940->39942 39943 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39941->39943 39944 7ffb0c4c37dd 39942->39944 39947 7ffb0c4c36eb 39943->39947 40245 7ffb0c4c5330 49 API calls 3 library calls 39944->40245 39951 7ffb0c4cef30 49 API calls 39946->39951 39949 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39947->39949 39948 7ffb0c4c3815 39950 7ffb0c49fe30 49 API calls 39948->39950 39952 7ffb0c4c36f9 39949->39952 39953 7ffb0c4c3849 Concurrency::scheduler_ptr::scheduler_ptr 39950->39953 39954 7ffb0c4c3922 type_info::_name_internal_method 39951->39954 39955 7ffb0c4a2e50 Concurrency::event::wait 47 API calls 39952->39955 40246 7ffb0c4ce730 49 API calls 2 library calls 39953->40246 39959 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39954->39959 39956 7ffb0c4c3704 39955->39956 40244 7ffb0c4a2f30 47 API calls _Greedy_node 39956->40244 39961 7ffb0c4c3957 39959->39961 39960 7ffb0c4c3883 39962 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39960->39962 39963 7ffb0c4c3964 39961->39963 39969 7ffb0c4c3aa1 Concurrency::scheduler_ptr::scheduler_ptr 39961->39969 39964 7ffb0c4c389b 39962->39964 39965 7ffb0c49fe90 49 API calls 39963->39965 39966 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39964->39966 39967 7ffb0c4c399b 39965->39967 39970 7ffb0c4c38a9 39966->39970 40248 7ffb0c4c5330 49 API calls 3 library calls 39967->40248 39974 7ffb0c4cef30 49 API calls 39969->39974 39972 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39970->39972 39971 7ffb0c4c39d3 39973 7ffb0c49fe30 49 API calls 39971->39973 39975 7ffb0c4c38b7 39972->39975 39976 7ffb0c4c3a07 Concurrency::scheduler_ptr::scheduler_ptr 39973->39976 39987 7ffb0c4c3ae0 Concurrency::scheduler_ptr::scheduler_ptr type_info::_name_internal_method 39974->39987 39977 7ffb0c4a2e50 Concurrency::event::wait 47 API calls 39975->39977 40249 7ffb0c4ce730 49 API calls 2 library calls 39976->40249 39978 7ffb0c4c38c2 39977->39978 40247 7ffb0c4a2f30 47 API calls _Greedy_node 39978->40247 39981 7ffb0c4c3a41 39983 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39981->39983 39982 7ffb0c4c3c69 39985 7ffb0c4c3c87 39982->39985 39988 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39982->39988 39986 7ffb0c4c3a59 39983->39986 39984 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39984->39982 39989 7ffb0c4c3ca5 39985->39989 39992 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39985->39992 39990 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39986->39990 39991 7ffb0c4cef30 49 API calls 39987->39991 40015 7ffb0c4c3bf2 type_info::_name_internal_method 39987->40015 39988->39985 39994 7ffb0c4c3cb3 39989->39994 39999 7ffb0c4c3d96 Concurrency::scheduler_ptr::scheduler_ptr 39989->39999 39993 7ffb0c4c3a67 39990->39993 40008 7ffb0c4c3b69 Concurrency::scheduler_ptr::scheduler_ptr type_info::_name_internal_method 39991->40008 39992->39989 39995 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 39993->39995 39996 7ffb0c49fe90 49 API calls 39994->39996 39997 7ffb0c4c3a75 39995->39997 39998 7ffb0c4c3cd6 39996->39998 40000 7ffb0c4a2e50 Concurrency::event::wait 47 API calls 39997->40000 40001 7ffb0c49fe30 49 API calls 39998->40001 40005 7ffb0c4cef30 49 API calls 39999->40005 40003 7ffb0c4c3a80 40000->40003 40002 7ffb0c4c3d0a Concurrency::scheduler_ptr::scheduler_ptr 40001->40002 40251 7ffb0c4ce730 49 API calls 2 library calls 40002->40251 40250 7ffb0c4a2f30 47 API calls _Greedy_node 40003->40250 40006 7ffb0c4c3dd5 type_info::_name_internal_method 40005->40006 40011 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 40006->40011 40012 7ffb0c4cef30 49 API calls 40008->40012 40008->40015 40009 7ffb0c4c3d44 40010 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 40009->40010 40013 7ffb0c4c3d5c 40010->40013 40014 7ffb0c4c3e0a 40011->40014 40012->40015 40016 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 40013->40016 40017 7ffb0c4c3e17 40014->40017 40018 7ffb0c4c3f4e 40014->40018 40015->39982 40015->39984 40019 7ffb0c4c3d6a 40016->40019 40020 7ffb0c49fe90 49 API calls 40017->40020 40021 7ffb0c4a18a0 _Mpunct 49 API calls 40018->40021 40022 7ffb0c4a2e50 Concurrency::event::wait 47 API calls 40019->40022 40023 7ffb0c4c3e4e 40020->40023 40024 7ffb0c4c3f62 40021->40024 40026 7ffb0c4c3d75 40022->40026 40253 7ffb0c4c5330 49 API calls 3 library calls 40023->40253 40025 7ffb0c4a2e50 Concurrency::event::wait 47 API calls 40024->40025 40028 7ffb0c4c3f77 40025->40028 40252 7ffb0c4a2f30 47 API calls _Greedy_node 40026->40252 40256 7ffb0c4a2f30 47 API calls _Greedy_node 40028->40256 40030 7ffb0c4c3e86 40032 7ffb0c49fe30 49 API calls 40030->40032 40033 7ffb0c4c3eba Concurrency::scheduler_ptr::scheduler_ptr 40032->40033 40254 7ffb0c4ce730 49 API calls 2 library calls 40033->40254 40035 7ffb0c4c3ef4 40036 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 40035->40036 40037 7ffb0c4c3f0c 40036->40037 40038 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 40037->40038 40039 7ffb0c4c3f1a 40038->40039 40040 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 40039->40040 40041 7ffb0c4c3f28 40040->40041 40042 7ffb0c4a2e50 Concurrency::event::wait 47 API calls 40041->40042 40043 7ffb0c4c3f33 40042->40043 40255 7ffb0c4a2f30 47 API calls _Greedy_node 40043->40255 40046 7ffb0c4a2d64 construct 40045->40046 40047 7ffb0c4a2d81 40045->40047 40257 7ffb0c4a3a70 47 API calls 40046->40257 40047->39307 40050 7ffb0c4a218a construct Concurrency::scheduler_ptr::scheduler_ptr std::error_condition::operator== 40049->40050 40058 7ffb0c4a0600 40050->40058 40052 7ffb0c4a21d2 40052->39606 40053->39622 40054->39636 40055->39648 40056->39658 40057->39631 40059 7ffb0c4a0622 Concurrency::details::WorkQueue::IsStructuredEmpty std::_Throw_Cpp_error 40058->40059 40061 7ffb0c4a06c5 shared_ptr 40059->40061 40066 7ffb0c4a4480 49 API calls Concurrency::details::_TaskCreationCallstack::_TaskCreationCallstack 40059->40066 40061->40052 40062 7ffb0c4a0669 construct 40067 7ffb0c4a1010 49 API calls 2 library calls 40062->40067 40064 7ffb0c4a06a9 40068 7ffb0c4a2990 47 API calls _Greedy_node 40064->40068 40066->40062 40067->40064 40068->40061 40070 7ffb0c4a5500 type_info::_name_internal_method 49 API calls 40069->40070 40071 7ffb0c4b945f RegQueryValueExA 40070->40071 40071->39739 40071->39740 40072->39761 40073->39760 40074->39741 40076 7ffb0c4a1f6c construct 40075->40076 40100 7ffb0c4a1440 40076->40100 40080 7ffb0c4a2025 40080->39775 40164 7ffb0c4a27b0 40081->40164 40083 7ffb0c4bbd5d 40084 7ffb0c4bbdb6 Concurrency::details::ScheduleGroupBase::LocateSegment 40083->40084 40168 7ffb0c4bb8b0 40083->40168 40182 7ffb0c4a6e60 49 API calls std::ios_base::good 40084->40182 40086 7ffb0c4bbed3 40183 7ffb0c4a3480 49 API calls 40086->40183 40089 7ffb0c4b9e36 40091 7ffb0c49fa30 49 API calls 3 library calls 40089->40091 40090->39791 40091->39794 40092->39798 40093->39802 40094->39806 40095->39813 40096->39813 40097->39816 40098->39818 40099->39818 40101 7ffb0c4a1462 40100->40101 40109 7ffb0c4a1520 40101->40109 40106 7ffb0c4a1ef0 40158 7ffb0c4a16e0 40106->40158 40108 7ffb0c4a1f07 construct 40108->40080 40111 7ffb0c4a1547 40109->40111 40117 7ffb0c4a5fb0 40111->40117 40113 7ffb0c4a1600 40115 7ffb0c4a1626 40113->40115 40114 7ffb0c4a14cd 40114->40106 40115->40114 40157 7ffb0c4d1778 7 API calls 2 library calls 40115->40157 40126 7ffb0c4a4db0 40117->40126 40121 7ffb0c4a5ff4 40122 7ffb0c4a601a 40121->40122 40137 7ffb0c4a6e60 49 API calls std::ios_base::good 40121->40137 40123 7ffb0c4a14b3 40122->40123 40138 7ffb0c4d1778 7 API calls 2 library calls 40122->40138 40123->40113 40139 7ffb0c4a5810 40126->40139 40129 7ffb0c4d3314 std::_Facet_Register 4 API calls 40130 7ffb0c4a4e36 40129->40130 40131 7ffb0c4a4e4d 40130->40131 40142 7ffb0c4a2740 57 API calls std::ios_base::_Init 40130->40142 40133 7ffb0c4a7290 40131->40133 40134 7ffb0c4a72ac 40133->40134 40143 7ffb0c4a1240 40134->40143 40136 7ffb0c4a72c5 Concurrency::details::ScheduleGroupBase::LocateSegment ctype 40136->40121 40137->40122 40138->40123 40140 7ffb0c4a5840 std::ios_base::_Init 49 API calls 40139->40140 40141 7ffb0c4a4e2b 40140->40141 40141->40129 40142->40131 40144 7ffb0c4d0efc std::_Lockit::_Lockit 6 API calls 40143->40144 40145 7ffb0c4a1255 40144->40145 40146 7ffb0c4a3880 7 API calls 40145->40146 40147 7ffb0c4a126e std::locale::_Getfacet 40146->40147 40149 7ffb0c4a49a0 85 API calls 40147->40149 40156 7ffb0c4a129b 40147->40156 40148 7ffb0c4d0f74 std::_Lockit::~_Lockit LeaveCriticalSection 40150 7ffb0c4a1338 40148->40150 40151 7ffb0c4a12b6 40149->40151 40150->40136 40152 7ffb0c4a12c4 40151->40152 40153 7ffb0c4a12bc 40151->40153 40155 7ffb0c4d1134 std::_Facet_Register RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 40152->40155 40154 7ffb0c4a5110 RtlPcToFileHeader RaiseException 40153->40154 40154->40156 40155->40156 40156->40148 40157->40114 40159 7ffb0c4d3314 std::_Facet_Register 4 API calls 40158->40159 40160 7ffb0c4a179c 40159->40160 40162 7ffb0c4a17b3 Concurrency::details::UMSSchedulerProxy::~UMSSchedulerProxy 40160->40162 40163 7ffb0c4a2740 57 API calls std::ios_base::_Init 40160->40163 40162->40108 40163->40162 40166 7ffb0c4a27cd std::ios_base::good 40164->40166 40165 7ffb0c4a27f4 std::ios_base::good 40165->40083 40166->40165 40184 7ffb0c4a5e10 49 API calls 40166->40184 40185 7ffb0c4d0efc 40168->40185 40170 7ffb0c4bb8c5 40189 7ffb0c4a3880 40170->40189 40172 7ffb0c4bb8de std::locale::_Getfacet 40181 7ffb0c4bb90b 40172->40181 40195 7ffb0c4bc290 40172->40195 40175 7ffb0c4bb9a8 40175->40084 40177 7ffb0c4bb934 40204 7ffb0c4d1134 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection std::_Facet_Register 40177->40204 40178 7ffb0c4bb92c 40203 7ffb0c4a5110 RtlPcToFileHeader RaiseException std::_Throw_Cpp_error std::bad_alloc::bad_alloc 40178->40203 40205 7ffb0c4d0f74 40181->40205 40182->40086 40183->40089 40184->40165 40186 7ffb0c4d0f0b 40185->40186 40188 7ffb0c4d0f10 40185->40188 40209 7ffb0c4df620 6 API calls std::_Lockit::_Lockit 40186->40209 40188->40170 40190 7ffb0c4a38d3 40189->40190 40191 7ffb0c4a3894 40189->40191 40190->40172 40192 7ffb0c4d0efc std::_Lockit::_Lockit 6 API calls 40191->40192 40193 7ffb0c4a38a0 40192->40193 40194 7ffb0c4d0f74 std::_Lockit::~_Lockit LeaveCriticalSection 40193->40194 40194->40190 40196 7ffb0c4bc2b8 40195->40196 40197 7ffb0c4bb926 40195->40197 40196->40197 40198 7ffb0c4d3314 std::_Facet_Register 4 API calls 40196->40198 40197->40177 40197->40178 40199 7ffb0c4bc2d4 40198->40199 40202 7ffb0c4bc2fb 40199->40202 40210 7ffb0c4a2230 40199->40210 40202->40197 40218 7ffb0c4a31d0 82 API calls std::_Lockit::~_Lockit 40202->40218 40203->40181 40204->40181 40206 7ffb0c4d0f88 40205->40206 40207 7ffb0c4d0f7f LeaveCriticalSection 40205->40207 40206->40175 40211 7ffb0c4d0efc std::_Lockit::_Lockit 6 API calls 40210->40211 40212 7ffb0c4a224d _Yarn 40211->40212 40213 7ffb0c4a22d4 40212->40213 40214 7ffb0c4a22c2 40212->40214 40224 7ffb0c4d0dd0 49 API calls 2 library calls 40213->40224 40219 7ffb0c4d12e4 40214->40219 40217 7ffb0c4a22d1 40217->40202 40218->40197 40225 7ffb0c4df930 40219->40225 40221 7ffb0c4d1326 40222 7ffb0c4d12fd _Yarn 40222->40221 40223 7ffb0c4df930 std::_Locinfo::_Locinfo_ctor 81 API calls 40222->40223 40223->40221 40224->40217 40226 7ffb0c4e497c std::_Lockit::_Lockit 5 API calls 40225->40226 40227 7ffb0c4df946 40226->40227 40228 7ffb0c4df654 std::_Locinfo::_Locinfo_ctor 81 API calls 40227->40228 40229 7ffb0c4df976 40228->40229 40229->40222 40230->39827 40231->39831 40232->39824 40233->39828 40234->39877 40235->39887 40236->39891 40237->39887 40238->39904 40239->39887 40240->39917 40241->39887 40242->39930 40243->39937 40244->39887 40245->39948 40246->39960 40247->39887 40248->39971 40249->39981 40250->39887 40251->40009 40252->39887 40253->40030 40254->40035 40255->39887 40256->39887 40257->40047 40259 7ffb0c4ac430 57 API calls 40258->40259 40261 7ffb0c4cacca std::_Throw_Cpp_error 40259->40261 40260 7ffb0c4cad07 40262 7ffb0c4cad2a 40260->40262 40265 7ffb0c4cad89 Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores 40260->40265 40261->40260 40310 7ffb0c497300 47 API calls std::bad_exception::bad_exception 40261->40310 40312 7ffb0c498160 LoadLibraryA GetProcAddress FreeLibrary GetLastError 40262->40312 40264 7ffb0c4cacf3 40311 7ffb0c4d4720 RtlPcToFileHeader RaiseException 40264->40311 40270 7ffb0c4b2a70 49 API calls 40265->40270 40268 7ffb0c4cad2f 40269 7ffb0c4b2a70 49 API calls 40268->40269 40271 7ffb0c4cad44 40269->40271 40272 7ffb0c4cada5 Concurrency::details::WorkQueue::IsStructuredEmpty 40270->40272 40313 7ffb0c4a2770 47 API calls 2 library calls 40271->40313 40305 7ffb0c4983e0 LoadLibraryA 40272->40305 40274 7ffb0c4cad65 40314 7ffb0c4d4720 RtlPcToFileHeader RaiseException 40274->40314 40277 7ffb0c4cad7a 40279 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 40277->40279 40281 7ffb0c4cad88 40279->40281 40280 7ffb0c4cadea 40315 7ffb0c498160 LoadLibraryA GetProcAddress FreeLibrary GetLastError 40280->40315 40281->40265 40283 7ffb0c4cadfe 40284 7ffb0c4b2a70 49 API calls 40283->40284 40286 7ffb0c4cae13 40284->40286 40285 7ffb0c4cafdd 40287 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 40285->40287 40316 7ffb0c4a2770 47 API calls 2 library calls 40286->40316 40289 7ffb0c4cafea 40287->40289 40295 7ffb0c4ad890 ReleaseSRWLockExclusive 40289->40295 40290 7ffb0c4cae58 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores 40290->40285 40296 7ffb0c4983e0 4 API calls 40290->40296 40303 7ffb0c4cae57 40290->40303 40291 7ffb0c4cae34 40317 7ffb0c4d4720 RtlPcToFileHeader RaiseException 40291->40317 40293 7ffb0c4cae49 40294 7ffb0c494b40 Concurrency::details::ResourceManager::CreateNodeTopology 47 API calls 40293->40294 40294->40303 40297 7ffb0c4ca9a9 40295->40297 40296->40290 40297->38944 40299 7ffb0c4b2a70 49 API calls 40299->40303 40300 7ffb0c49fe30 49 API calls 40300->40303 40303->40290 40303->40299 40303->40300 40304 7ffb0c494b40 47 API calls Concurrency::details::ResourceManager::CreateNodeTopology 40303->40304 40318 7ffb0c498160 LoadLibraryA GetProcAddress FreeLibrary GetLastError 40303->40318 40319 7ffb0c4a2770 47 API calls 2 library calls 40303->40319 40320 7ffb0c4d4720 RtlPcToFileHeader RaiseException 40303->40320 40304->40303 40306 7ffb0c498419 GetProcAddress 40305->40306 40307 7ffb0c498412 40305->40307 40308 7ffb0c498438 FreeLibrary 40306->40308 40309 7ffb0c49844a send 40306->40309 40307->40280 40307->40290 40308->40307 40309->40307 40310->40264 40311->40260 40312->40268 40313->40274 40314->40277 40315->40283 40316->40291 40317->40293 40318->40303 40319->40303 40320->40303 40322 7ffb0c4cd160 construct 40321->40322 40329 7ffb0c4cd860 40322->40329 40324 7ffb0c4cd184 Concurrency::scheduler_ptr::scheduler_ptr 40332 7ffb0c4df278 40324->40332 40328 7ffb0c4cd1fe 40328->39313 40330 7ffb0c4d3314 std::_Facet_Register 4 API calls 40329->40330 40331 7ffb0c4cd885 construct 40330->40331 40331->40324 40333 7ffb0c4df298 40332->40333 40334 7ffb0c4df2af 40332->40334 40358 7ffb0c4e01fc 11 API calls memcpy_s 40333->40358 40351 7ffb0c4df214 40334->40351 40337 7ffb0c4df29d 40359 7ffb0c4d9504 47 API calls _invalid_parameter_noinfo_noreturn 40337->40359 40340 7ffb0c4df2c2 CreateThread 40341 7ffb0c4cd1eb 40340->40341 40342 7ffb0c4df2f2 GetLastError 40340->40342 40341->40328 40350 7ffb0c4d29f4 57 API calls std::_Throw_Cpp_error 40341->40350 40360 7ffb0c4e0170 11 API calls 2 library calls 40342->40360 40344 7ffb0c4df2ff 40345 7ffb0c4df308 CloseHandle 40344->40345 40346 7ffb0c4df30e 40344->40346 40345->40346 40347 7ffb0c4df317 FreeLibrary 40346->40347 40348 7ffb0c4df31d 40346->40348 40347->40348 40349 7ffb0c4e4064 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 40348->40349 40349->40341 40352 7ffb0c4e3fec memcpy_s 11 API calls 40351->40352 40353 7ffb0c4df236 40352->40353 40354 7ffb0c4e4064 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 40353->40354 40355 7ffb0c4df240 40354->40355 40356 7ffb0c4df249 GetModuleHandleExW 40355->40356 40357 7ffb0c4df245 40355->40357 40356->40357 40357->40340 40357->40341 40358->40337 40359->40341 40360->40344 40361->39319 40365 7ffb0c496268 _Ptr_base Concurrency::details::_Scheduler::_Scheduler 40364->40365 40366 7ffb0c4d3314 std::_Facet_Register 4 API calls 40365->40366 40367 7ffb0c496283 _Ptr_base 40366->40367 40370 7ffb0c497360 40367->40370 40371 7ffb0c4962e1 40370->40371 40372 7ffb0c49737e 40370->40372 40371->38961 40374 7ffb0c497550 57 API calls 40372->40374 40374->40371 40375->38964 40377 7ffb0c4953e3 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::details::ResourceManager::SetTaskExecutionResources shared_ptr 40376->40377 40379 7ffb0c494b83 40377->40379 40380 7ffb0c495670 47 API calls strtoxl 40377->40380 40380->40379

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1038 7ffb0c498340-7ffb0c498370 LoadLibraryA 1039 7ffb0c498379-7ffb0c498396 GetProcAddress 1038->1039 1040 7ffb0c498372-7ffb0c498377 1038->1040 1042 7ffb0c498398-7ffb0c4983a8 FreeLibrary 1039->1042 1043 7ffb0c4983aa-7ffb0c4983c6 recv 1039->1043 1041 7ffb0c4983ca-7ffb0c4983ce 1040->1041 1042->1041 1043->1041
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: recv$ws2_32.dll
                        • API String ID: 145871493-734160684
                        • Opcode ID: 121e80b15e865c187d828cee44cba9d0fed0f36d3c849a73d0b7ed05107ab776
                        • Instruction ID: b01e4472bb399daf8db27c7505007a0d05d7d577187996450dc247d5e5fb95bc
                        • Opcode Fuzzy Hash: 121e80b15e865c187d828cee44cba9d0fed0f36d3c849a73d0b7ed05107ab776
                        • Instruction Fuzzy Hash: EF0100F2918B41C6D720CB25F848A1EB760FB897A8F401235EA8D42BA8CF3CD5558B00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProcchar_traits
                        • String ID: GetUserNameW$advapi32.dll
                        • API String ID: 1097116792-1952898584
                        • Opcode ID: e3ad7de3af675e2d48351877d4a6f92451a0b93c1d1049cf469835946958ddc5
                        • Instruction ID: 4ef6a751f32313a858a05273800235de822b8f3fdac1cc788db8e2dfb7771dff
                        • Opcode Fuzzy Hash: e3ad7de3af675e2d48351877d4a6f92451a0b93c1d1049cf469835946958ddc5
                        • Instruction Fuzzy Hash: FB41DDB6A1CA8592E660DB25E4897AEB370FFD4748F401132E68D87AA9DF3CD504CB00
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: 2e7f7ce14a646cd23a52460cbb4fb8c589ad3651e26fdf2cc546876d71a6ac30
                        • Instruction ID: d62d6ab84bf41c7a04c4cf6fc9b5b44f51181d3541431ab942f486bf2c64d34a
                        • Opcode Fuzzy Hash: 2e7f7ce14a646cd23a52460cbb4fb8c589ad3651e26fdf2cc546876d71a6ac30
                        • Instruction Fuzzy Hash: 40819FF2A04A1186FB609EB5D489BBD23A0FF44BA8F058636EE5E97795CF38D5458300

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 7ffb0c4c0370-7ffb0c4c039e call 7ffb0c4d3314 3 7ffb0c4c03c8 0->3 4 7ffb0c4c03a0-7ffb0c4c03c6 call 7ffb0c4c5720 0->4 5 7ffb0c4c03d4-7ffb0c4c0408 call 7ffb0c49f910 call 7ffb0c4d3314 3->5 4->5 12 7ffb0c4c040a-7ffb0c4c0430 call 7ffb0c4c5590 5->12 13 7ffb0c4c0432 5->13 15 7ffb0c4c043e-7ffb0c4c0476 call 7ffb0c49f910 call 7ffb0c4d3314 12->15 13->15 21 7ffb0c4c0478-7ffb0c4c049e call 7ffb0c4c56a0 15->21 22 7ffb0c4c04a0 15->22 24 7ffb0c4c04ac-7ffb0c4c04e4 call 7ffb0c49f910 call 7ffb0c4d3314 21->24 22->24 30 7ffb0c4c04e6-7ffb0c4c050c call 7ffb0c4c57c0 24->30 31 7ffb0c4c050e 24->31 33 7ffb0c4c051a-7ffb0c4c0dd5 call 7ffb0c49f910 call 7ffb0c4ac320 * 3 call 7ffb0c493dc0 call 7ffb0c4971c0 call 7ffb0c497210 call 7ffb0c493dc0 call 7ffb0c4971c0 call 7ffb0c497210 call 7ffb0c493dc0 call 7ffb0c4971c0 call 7ffb0c497210 call 7ffb0c493dc0 call 7ffb0c4971c0 call 7ffb0c497210 call 7ffb0c493dc0 call 7ffb0c4971c0 call 7ffb0c497210 call 7ffb0c493dc0 call 7ffb0c4971c0 call 7ffb0c497210 call 7ffb0c493dc0 call 7ffb0c4971c0 call 7ffb0c497210 call 7ffb0c493dc0 call 7ffb0c4971c0 call 7ffb0c497210 call 7ffb0c493dc0 call 7ffb0c4971c0 call 7ffb0c497210 call 7ffb0c493dc0 call 7ffb0c4971c0 call 7ffb0c497210 call 7ffb0c493dc0 call 7ffb0c4971c0 call 7ffb0c497210 call 7ffb0c493dc0 call 7ffb0c4971c0 call 7ffb0c4a2160 call 7ffb0c4d36fc call 7ffb0c4d3314 30->33 31->33 119 7ffb0c4c0dd7-7ffb0c4c0dfd call 7ffb0c4a21e0 33->119 120 7ffb0c4c0dff 33->120 122 7ffb0c4c0e0b-7ffb0c4c0ea2 call 7ffb0c49f910 call 7ffb0c4a3830 call 7ffb0c493f50 call 7ffb0c4cef30 call 7ffb0c49fd80 call 7ffb0c494b40 119->122 120->122 136 7ffb0c4c0f38-7ffb0c4c0fac call 7ffb0c4a3830 call 7ffb0c493f50 call 7ffb0c4cef30 call 7ffb0c49fd80 call 7ffb0c494b40 122->136 137 7ffb0c4c0ea8-7ffb0c4c0ec3 call 7ffb0c4d3314 122->137 161 7ffb0c4c103e-7ffb0c4c10af call 7ffb0c4a3830 call 7ffb0c493f50 call 7ffb0c4cef30 call 7ffb0c49fd80 call 7ffb0c494b40 136->161 162 7ffb0c4c0fb2-7ffb0c4c0fcd call 7ffb0c4d3314 136->162 143 7ffb0c4c0ec5-7ffb0c4c0eeb call 7ffb0c4c56a0 137->143 144 7ffb0c4c0eed 137->144 147 7ffb0c4c0ef9-7ffb0c4c0f33 call 7ffb0c4c5a10 call 7ffb0c4a3580 143->147 144->147 158 7ffb0c4c1690-7ffb0c4c16ba call 7ffb0c4a2e50 call 7ffb0c4a2f30 147->158 187 7ffb0c4c1145-7ffb0c4c11b9 call 7ffb0c4a3830 call 7ffb0c493f50 call 7ffb0c4cef30 call 7ffb0c49fd80 call 7ffb0c494b40 161->187 188 7ffb0c4c10b5-7ffb0c4c10d0 call 7ffb0c4d3314 161->188 171 7ffb0c4c0ff7 162->171 172 7ffb0c4c0fcf-7ffb0c4c0ff5 call 7ffb0c4c5720 162->172 173 7ffb0c4c1003-7ffb0c4c1039 call 7ffb0c4c5a60 call 7ffb0c4a3580 171->173 172->173 173->158 210 7ffb0c4c124f-7ffb0c4c12c3 call 7ffb0c4a3830 call 7ffb0c493f50 call 7ffb0c4cef30 call 7ffb0c49fd80 call 7ffb0c494b40 187->210 211 7ffb0c4c11bf-7ffb0c4c11c4 call 7ffb0c4d3314 187->211 193 7ffb0c4c10fa 188->193 194 7ffb0c4c10d2-7ffb0c4c10f8 call 7ffb0c4c5590 188->194 198 7ffb0c4c1106-7ffb0c4c1140 call 7ffb0c4c59c0 call 7ffb0c4a3580 193->198 194->198 198->158 233 7ffb0c4c12c5-7ffb0c4c12e2 call 7ffb0c4a3580 210->233 234 7ffb0c4c12e7-7ffb0c4c135b call 7ffb0c4a3830 call 7ffb0c493f50 call 7ffb0c4cef30 call 7ffb0c49fd80 call 7ffb0c494b40 210->234 215 7ffb0c4c11c9-7ffb0c4c11da 211->215 217 7ffb0c4c1204 215->217 218 7ffb0c4c11dc-7ffb0c4c1202 call 7ffb0c4c57c0 215->218 221 7ffb0c4c1210-7ffb0c4c124a call 7ffb0c4c5ab0 call 7ffb0c4a3580 217->221 218->221 221->158 233->158 247 7ffb0c4c135d-7ffb0c4c137a call 7ffb0c4a3580 234->247 248 7ffb0c4c137f-7ffb0c4c13f3 call 7ffb0c4a3830 call 7ffb0c493f50 call 7ffb0c4cef30 call 7ffb0c49fd80 call 7ffb0c494b40 234->248 247->158 261 7ffb0c4c13f5-7ffb0c4c1412 call 7ffb0c4a3580 248->261 262 7ffb0c4c1417-7ffb0c4c148b call 7ffb0c4a3830 call 7ffb0c493f50 call 7ffb0c4cef30 call 7ffb0c49fd80 call 7ffb0c494b40 248->262 261->158 275 7ffb0c4c148d-7ffb0c4c14aa call 7ffb0c4a3580 262->275 276 7ffb0c4c14af-7ffb0c4c1523 call 7ffb0c4a3830 call 7ffb0c493f50 call 7ffb0c4cef30 call 7ffb0c49fd80 call 7ffb0c494b40 262->276 275->158 289 7ffb0c4c1525-7ffb0c4c1542 call 7ffb0c4a3580 276->289 290 7ffb0c4c1547-7ffb0c4c15bb call 7ffb0c4a3830 call 7ffb0c493f50 call 7ffb0c4cef30 call 7ffb0c49fd80 call 7ffb0c494b40 276->290 289->158 303 7ffb0c4c15bd-7ffb0c4c15da call 7ffb0c4a3580 290->303 304 7ffb0c4c15df-7ffb0c4c1653 call 7ffb0c4a3830 call 7ffb0c493f50 call 7ffb0c4cef30 call 7ffb0c49fd80 call 7ffb0c494b40 290->304 303->158 317 7ffb0c4c1655-7ffb0c4c1672 call 7ffb0c4a3580 304->317 318 7ffb0c4c1674-7ffb0c4c168f call 7ffb0c4a3600 304->318 317->158 318->158
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Fac_nodeFac_node::_std::_$type_info::_name_internal_method$Name$Concurrency::cancel_current_taskNodeNode::$Decorator::getTableType
                        • String ID: -$-$-$1$1$2$3$3$3$3$3$4$4$5$5$6$7$7$8$A$A$B$C$D$D$D$D$DfC$E$EKPP$F$F$I$KPP$M$P$P$R$RgF$SsRgF$a$a$a$c$c$c$d$d$e$e$e$e$e$e$e$e$e$f$g$g$g$i$i$i$i$k$l$l$l$l$n$n$n$n$n$n$n$n$o$o$o$o$o$o$o$p$r$r$s$t$t$t$t$t$v$w${wSsRgFcDfC$}
                        • API String ID: 4012674335-2152747066
                        • Opcode ID: c3439c2540a1d2b6abad99987d04495378c7882d2e020ab65593bd49618d058b
                        • Instruction ID: ff5021938688938fd5cb8dd16aecb321becbd14493125059176e5a69089d51dc
                        • Opcode Fuzzy Hash: c3439c2540a1d2b6abad99987d04495378c7882d2e020ab65593bd49618d058b
                        • Instruction Fuzzy Hash: 8AA247A260DAC184EA71DB25E4987EFA7A1FBD5788F400036D6CD47BAADF6DC104CB50

                        Control-flow Graph

                        APIs
                        • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4CA10D
                        • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4CA275
                        • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4CA3C9
                          • Part of subcall function 00007FFB0C4CEF30: UnDecorator::getVbTableType.LIBCMTD ref: 00007FFB0C4CEF75
                          • Part of subcall function 00007FFB0C4CEE30: UnDecorator::getVbTableType.LIBCMTD ref: 00007FFB0C4CEE90
                          • Part of subcall function 00007FFB0C4A20D0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A20E3
                          • Part of subcall function 00007FFB0C4931C0: Concurrency::details::FreeThreadProxyFactory::Retire.LIBCMTD ref: 00007FFB0C4931F3
                          • Part of subcall function 00007FFB0C4931C0: Concurrency::details::FreeThreadProxyFactory::Retire.LIBCMTD ref: 00007FFB0C49320D
                          • Part of subcall function 00007FFB0C4931C0: Concurrency::details::FreeThreadProxyFactory::Retire.LIBCMTD ref: 00007FFB0C493239
                          • Part of subcall function 00007FFB0C4A18A0: char_traits.LIBCPMTD ref: 00007FFB0C4A18C6
                          • Part of subcall function 00007FFB0C4A17F0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A1803
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::$Fac_nodeFac_node::_Factory::FreeProxyRetireThreadstd::_$Decorator::getEmptyQueue::StructuredTableTypeWork$char_traits
                        • String ID: ,$/**/$0$0$0$1$1$2$2$2$3$3$4$5$5$6$6$6$7$9$=$=$A$B$D$D$E$E$F$H$I$I$J$J$J$L$M$N$N$N$N$N$N$O$Q$R$R$R$R$R$S$T$T$U$U$U$U$V$V$V$V$V$W$X$Z$Z$Z$Z$Z$Z$Z$Z$a$a$a$c$c$d$e$e$e$e$g$h$i$j$k$k$k$k$m$m$m$n$n$n$n$o$q$q$s$t$t$x$z
                        • API String ID: 1768506830-3784889792
                        • Opcode ID: f3f09bc8939e2e132ca3c8e600abae8a31de940a0454f34dad6bf4049b1e95d1
                        • Instruction ID: 09793c9095d3725f2cbf5506d830bb0d4206db3146871efa7a6fde6795a007f2
                        • Opcode Fuzzy Hash: f3f09bc8939e2e132ca3c8e600abae8a31de940a0454f34dad6bf4049b1e95d1
                        • Instruction Fuzzy Hash: 1312266210DBC184E772D724E4987DFABA0EBD2748F444066E7CC47AAADFADC548CB11

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CloseConcurrency::details::EmptyOpenQueue::StructuredWork$EnumFac_nodeFac_node::_QueryValuechar_traitsstd::_
                        • String ID: $A$A$C$E$F$M$O$P$R$S$S$T$W$\$\$\$\$c$c$d$displayName$e$e$e$e$f$i$i$i$n$o$o$o$r$r$r$r$r$s$t$t$t$u$v$v$y
                        • API String ID: 1441156695-1915070847
                        • Opcode ID: d5fad266576e8e706fe453af8111287011cb00653d0044a38ac5b51a51d79f30
                        • Instruction ID: 9cc73225b22de4aa9da23f62c5a2ecb4df862b5d552dfb163b77196f4349485b
                        • Opcode Fuzzy Hash: d5fad266576e8e706fe453af8111287011cb00653d0044a38ac5b51a51d79f30
                        • Instruction Fuzzy Hash: 23C117A250CAC195E721DB24E4487AFBBA1FBD6348F404125E3CC47AAADFBDD548CB50

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CloseConcurrency::details::EmptyQueryQueue::StructuredValueWork$Decorator::getFac_nodeFac_node::_OpenTableTypechar_traitsstd::_type_info::_name_internal_method
                        • String ID: $A$C$CurrentBuild$E$F$M$N$O$ProductName$R$S$T$T$V$W$W$\$\$\$c$d$e$e$f$i$i$i$n$n$n$o$o$o$o$r$r$r$r$s$s$s$t$t$u$w
                        • API String ID: 1239499685-786305380
                        • Opcode ID: 2560a41fb59bffd32ef2074c99bd0cb491d8c9cd17f9475c2a2378b4fb22643f
                        • Instruction ID: cf8a565b287796723fd070dc50c634e09893a689010ebec632c1d61b464996d5
                        • Opcode Fuzzy Hash: 2560a41fb59bffd32ef2074c99bd0cb491d8c9cd17f9475c2a2378b4fb22643f
                        • Instruction Fuzzy Hash: 30C13AA251C6C195E721DB64E4987AFBBA1FBD2748F400026E3CD47AAADF7DD508CB10

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 556 7ffb0c495c20-7ffb0c495dfb call 7ffb0c4971c0 call 7ffb0c493dc0 call 7ffb0c497210 call 7ffb0c493dc0 call 7ffb0c497cd0 call 7ffb0c497bf0 call 7ffb0c496170 call 7ffb0c497430 call 7ffb0c4973e0 call 7ffb0c497c40 CreateMutexExW 577 7ffb0c495e0a 556->577 578 7ffb0c495dfd-7ffb0c495e08 GetLastError 556->578 580 7ffb0c49607d-7ffb0c4960bb call 7ffb0c4960d0 call 7ffb0c494b70 577->580 578->577 579 7ffb0c495e0f-7ffb0c495e42 call 7ffb0c496150 call 7ffb0c496fb0 call 7ffb0c4c9d40 578->579 591 7ffb0c495e44-7ffb0c495e6d call 7ffb0c497300 call 7ffb0c4d4720 579->591 592 7ffb0c495e6e-7ffb0c495e9c call 7ffb0c4d3314 579->592 591->592 601 7ffb0c495e9e-7ffb0c495ea3 call 7ffb0c4ca7f0 592->601 602 7ffb0c495ebf 592->602 605 7ffb0c495ea8-7ffb0c495ebd 601->605 604 7ffb0c495ec8-7ffb0c495f0c call 7ffb0c496f30 call 7ffb0c496150 call 7ffb0c496fb0 602->604 612 7ffb0c495f0d-7ffb0c495f12 604->612 605->604 613 7ffb0c496036-7ffb0c496055 call 7ffb0c496390 612->613 614 7ffb0c495f18-7ffb0c495f2d call 7ffb0c496390 612->614 627 7ffb0c496057-7ffb0c49605d call 7ffb0c4c7140 613->627 628 7ffb0c49605f-7ffb0c496075 call 7ffb0c496390 613->628 620 7ffb0c495f33-7ffb0c495f81 call 7ffb0c496150 call 7ffb0c496f80 call 7ffb0c4c6f10 call 7ffb0c4d3314 614->620 621 7ffb0c495fd8-7ffb0c495fee call 7ffb0c496390 614->621 650 7ffb0c495f83-7ffb0c495f88 call 7ffb0c4ca7f0 620->650 651 7ffb0c495fa7 620->651 630 7ffb0c495ff0 621->630 631 7ffb0c495ff2-7ffb0c496008 call 7ffb0c496390 621->631 627->580 628->580 640 7ffb0c496077-7ffb0c49607c call 7ffb0c4c70f0 628->640 630->613 642 7ffb0c49600a 631->642 643 7ffb0c49600c-7ffb0c49602b call 7ffb0c496150 call 7ffb0c496f80 631->643 640->580 642->613 657 7ffb0c496030-7ffb0c496031 643->657 656 7ffb0c495f8d-7ffb0c495fa5 650->656 655 7ffb0c495fb3-7ffb0c495fd7 call 7ffb0c496f30 651->655 655->621 656->655 657->612
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::CreateEmptyErrorFac_nodeFac_node::_LastMutexQueue::StructuredWorkstd::_std::bad_exception::bad_exception
                        • String ID: -$-$-$-$0$0$1$2$2$2$3$4$5$6$6$6$6$6$7$7$7$7$9$9$9$A$A$B$B$C$C$D$D$E$E$F${$}
                        • API String ID: 1149196539-2202459216
                        • Opcode ID: 1cb044d6dd436b5baedc5cad21faea7dac805137bf37013cfbcf61d45246e203
                        • Instruction ID: 902bcf6d7d2b4aa9d97e8c44eb070a3bf6d7bd46b38fe263efd3e9a0be0f9d52
                        • Opcode Fuzzy Hash: 1cb044d6dd436b5baedc5cad21faea7dac805137bf37013cfbcf61d45246e203
                        • Instruction Fuzzy Hash: B1C180E251C6D184E761D734E498BEEABA0FF91388F400136E2CD46AEADF6DD548CB01

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Time$File$System$CloseConcurrency::details::CreateEmptyHandleLocalModuleNameQueue::SpecificStructuredWorkchar_traits
                        • String ID: a.m.$ p.m.
                        • API String ID: 4253720429-1173636248
                        • Opcode ID: eef5eeed258f390bce687ce97de88c7b92cac7f269bd28b1ddf22a9c5bb651ac
                        • Instruction ID: 59219f430cfb0f801ed7a0145c389e7e5b630406a0f93cdfe0fbe4e957c037c4
                        • Opcode Fuzzy Hash: eef5eeed258f390bce687ce97de88c7b92cac7f269bd28b1ddf22a9c5bb651ac
                        • Instruction Fuzzy Hash: 60514CE191C68286EA20DB61E459BFEA371FFC1748F504136EA8D476A9DF7CD409CB40

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Yarn$std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                        • String ID: bad locale name
                        • API String ID: 3904239083-1405518554
                        • Opcode ID: 21b6dde102e949537a358dabb7938f436e8824ef52250dd78e5f134c6afc748f
                        • Instruction ID: c592ea8abcfc962ecb6bc15ac1779c6a03f68809d93241a133bff73e87c4c7c6
                        • Opcode Fuzzy Hash: 21b6dde102e949537a358dabb7938f436e8824ef52250dd78e5f134c6afc748f
                        • Instruction Fuzzy Hash: B5112ED1E6A78682ED44EB7AE499A6E5350FFC2BC8F802436F94E13B56CF2CD0118704

                        Control-flow Graph

                        APIs
                          • Part of subcall function 00007FFB0C4E021C: _invalid_parameter_noinfo.LIBCMT ref: 00007FFB0C4E0230
                        • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,00007FFB0C4D05AE), ref: 00007FFB0C4D2F35
                        • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,00007FFB0C4D05AE), ref: 00007FFB0C4D2F48
                        • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,00007FFB0C4D05AE), ref: 00007FFB0C4D2F5F
                        • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,00007FFB0C4D05AE), ref: 00007FFB0C4D2F76
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: AddressProc$HandleModule_invalid_parameter_noinfo
                        • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$invalid random_device value$kernel32.dll
                        • API String ID: 2104222004-861830008
                        • Opcode ID: 8f2fb0ebf33b667bf0f8e4e7eb2d5b33542a65207773a0917a250cbff546c515
                        • Instruction ID: 46a623126744a481cb9ef74f459c5de3caeaa498b403187f151798c1140a33ef
                        • Opcode Fuzzy Hash: 8f2fb0ebf33b667bf0f8e4e7eb2d5b33542a65207773a0917a250cbff546c515
                        • Instruction Fuzzy Hash: 0701E8E8E19A03C1FA44EB72E89EC7D23A1BF58745F941035D80E83275EF6CE59A8710

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 740 7ffb0c4cb2c0-7ffb0c4cb2e3 741 7ffb0c4cb2f4-7ffb0c4cb36a call 7ffb0c4b2a70 call 7ffb0c4a2770 call 7ffb0c4d4720 call 7ffb0c494b40 740->741 742 7ffb0c4cb2e5-7ffb0c4cb2f2 740->742 743 7ffb0c4cb36b-7ffb0c4cb39e call 7ffb0c498340 741->743 742->741 742->743 747 7ffb0c4cb3a3-7ffb0c4cb3b6 743->747 751 7ffb0c4cb44f-7ffb0c4cb454 747->751 752 7ffb0c4cb3bc-7ffb0c4cb44a call 7ffb0c498160 call 7ffb0c4b2a70 call 7ffb0c4a2770 call 7ffb0c4d4720 call 7ffb0c494b40 747->752 754 7ffb0c4cb4e8-7ffb0c4cb4fb call 7ffb0c4dd07c 751->754 755 7ffb0c4cb45a-7ffb0c4cb4e7 call 7ffb0c498160 call 7ffb0c4b2a70 call 7ffb0c4a2770 call 7ffb0c4d4720 call 7ffb0c494b40 751->755 752->754 768 7ffb0c4cb501-7ffb0c4cb552 754->768 769 7ffb0c4cbb6d-7ffb0c4cbbfa call 7ffb0c498160 call 7ffb0c4b2a70 call 7ffb0c4a2770 call 7ffb0c4d4720 call 7ffb0c494b40 754->769 755->754 770 7ffb0c4cba18-7ffb0c4cba27 768->770 771 7ffb0c4cb558-7ffb0c4cb579 768->771 835 7ffb0c4cbbfb-7ffb0c4cbc09 769->835 777 7ffb0c4cbabb-7ffb0c4cbb68 call 7ffb0c4abbf0 call 7ffb0c4cd420 call 7ffb0c493dc0 call 7ffb0c4b26b0 call 7ffb0c4ad870 770->777 778 7ffb0c4cba2d-7ffb0c4cbaba call 7ffb0c498160 call 7ffb0c4b2a70 call 7ffb0c4a2770 call 7ffb0c4d4720 call 7ffb0c494b40 770->778 775 7ffb0c4cb57f-7ffb0c4cb5ba call 7ffb0c493dc0 call 7ffb0c4ac730 771->775 776 7ffb0c4cb98c-7ffb0c4cba09 call 7ffb0c4ac320 call 7ffb0c4a3500 call 7ffb0c494b40 call 7ffb0c4b2890 771->776 811 7ffb0c4cb5c2-7ffb0c4cb5de 775->811 834 7ffb0c4cba13 776->834 777->835 778->777 818 7ffb0c4cb71a-7ffb0c4cb987 call 7ffb0c493dc0 call 7ffb0c495a70 call 7ffb0c4ac730 call 7ffb0c495a70 call 7ffb0c497bf0 call 7ffb0c497cd0 call 7ffb0c4ae180 call 7ffb0c497bf0 call 7ffb0c4ab800 call 7ffb0c495650 call 7ffb0c4a18a0 call 7ffb0c4a3500 call 7ffb0c494b40 call 7ffb0c4abbf0 call 7ffb0c4cc180 call 7ffb0c4ce4a0 call 7ffb0c4ac320 call 7ffb0c4a3500 call 7ffb0c494b40 call 7ffb0c4b2890 call 7ffb0c4cdc80 call 7ffb0c494b70 * 2 811->818 819 7ffb0c4cb5e4-7ffb0c4cb661 call 7ffb0c495650 call 7ffb0c498340 811->819 818->834 846 7ffb0c4cb667-7ffb0c4cb6f4 call 7ffb0c498160 call 7ffb0c4b2a70 call 7ffb0c4a2770 call 7ffb0c4d4720 call 7ffb0c494b40 819->846 847 7ffb0c4cb6f5-7ffb0c4cb715 819->847 834->777 846->847 847->811
                        APIs
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4CB342
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4CB421
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4CB4BF
                        • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FFB0C4CB622
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4CB6CC
                          • Part of subcall function 00007FFB0C4AE180: UnDecorator::getVbTableType.LIBCMTD ref: 00007FFB0C4AE1AA
                          • Part of subcall function 00007FFB0C4AB800: _Byte_length.LIBCPMTD ref: 00007FFB0C4AB894
                        • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FFB0C4CB82A
                          • Part of subcall function 00007FFB0C4A18A0: char_traits.LIBCPMTD ref: 00007FFB0C4A18C6
                        • UnDecorator::getVbTableType.LIBCMTD ref: 00007FFB0C4CB897
                          • Part of subcall function 00007FFB0C4CE4A0: std::_Throw_Cpp_error.LIBCPMT ref: 00007FFB0C4CE4C1
                          • Part of subcall function 00007FFB0C4CE4A0: GetCurrentThreadId.KERNEL32 ref: 00007FFB0C4CE4C7
                          • Part of subcall function 00007FFB0C4CE4A0: std::_Throw_Cpp_error.LIBCPMT ref: 00007FFB0C4CE4DB
                          • Part of subcall function 00007FFB0C4CE4A0: std::_Throw_Cpp_error.LIBCPMT ref: 00007FFB0C4CE50A
                          • Part of subcall function 00007FFB0C4A3500: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A352B
                          • Part of subcall function 00007FFB0C4A3500: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A353A
                        • UnDecorator::getVbTableType.LIBCMTD ref: 00007FFB0C4CBAF1
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: std::runtime_error::runtime_error$Cpp_errorDecorator::getTableThrow_Typestd::_$Concurrency::details::Concurrency::details::_CriticalEmptyLock::_Queue::ReentrantScoped_lockScoped_lock::~_StructuredWork$Byte_lengthCurrentThreadchar_traits
                        • String ID:
                        • API String ID: 2867615695-0
                        • Opcode ID: 222ec7dac998aed24bab566b28fab3185b88ea9fe4149fa42db8a0b598877e72
                        • Instruction ID: d253d959fbe14a573ab6ff46eb787269af7e778a72746f9860086146897ecab0
                        • Opcode Fuzzy Hash: 222ec7dac998aed24bab566b28fab3185b88ea9fe4149fa42db8a0b598877e72
                        • Instruction Fuzzy Hash: 2732F4B2609AC585DA70DB25E4997EEB7A0FBC4788F404036DB8D43BAADF38D445CB04

                        Control-flow Graph

                        APIs
                        • FreeLibrary.KERNEL32(?,?,?,00007FFB0C4E499C,?,?,?,?,00007FFB0C4DF629,?,?,?,?,00007FFB0C4D0F10), ref: 00007FFB0C4E42D0
                        • GetProcAddressForCaller.KERNELBASE(?,?,?,00007FFB0C4E499C,?,?,?,?,00007FFB0C4DF629,?,?,?,?,00007FFB0C4D0F10), ref: 00007FFB0C4E42DC
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: AddressCallerFreeLibraryProc
                        • String ID: api-ms-$ext-ms-
                        • API String ID: 3520295827-537541572
                        • Opcode ID: 37ca3048070be1c70536f5ec53a0aedc04f3e76b26da52ce0f72c4a8bfec6647
                        • Instruction ID: 928eeef418409560f751fe9a682c75059ffad5609c17be5b37d0888fed45160b
                        • Opcode Fuzzy Hash: 37ca3048070be1c70536f5ec53a0aedc04f3e76b26da52ce0f72c4a8bfec6647
                        • Instruction Fuzzy Hash: 7E41D2E1B19A0281FA16CB76E91CD796391BF49BE8F0A5236DD0E47794EF3CE5058300

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressErrorFreeLastLoadProc
                        • String ID: getaddrinfo$ws2_32.dll
                        • API String ID: 2540614322-1292075177
                        • Opcode ID: 2e17c17b20e4e39118e914fa3b5e4c7575d2cbd19b87fa64c5de521b5d5e2b13
                        • Instruction ID: 8a1fed49339cb49d62938b9911de778c3204c0c0ad0e3c7523dbf6ef26a20552
                        • Opcode Fuzzy Hash: 2e17c17b20e4e39118e914fa3b5e4c7575d2cbd19b87fa64c5de521b5d5e2b13
                        • Instruction Fuzzy Hash: AA010CF691CB45C6E620DF25F488A2EB7A0FB89799F400535EA8D42A68CF3CD555CB00

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 932 7ffb0c4d3914-7ffb0c4d391a 933 7ffb0c4d3955-7ffb0c4d395f 932->933 934 7ffb0c4d391c-7ffb0c4d391f 932->934 937 7ffb0c4d3a7c-7ffb0c4d3a91 933->937 935 7ffb0c4d3949-7ffb0c4d3981 call 7ffb0c4d34f8 934->935 936 7ffb0c4d3921-7ffb0c4d3924 934->936 951 7ffb0c4d3986-7ffb0c4d3988 935->951 938 7ffb0c4d3926-7ffb0c4d3929 936->938 939 7ffb0c4d393c __scrt_dllmain_crt_thread_attach 936->939 940 7ffb0c4d3a93 937->940 941 7ffb0c4d3aa0-7ffb0c4d3aba call 7ffb0c4d338c 937->941 943 7ffb0c4d3935-7ffb0c4d393a call 7ffb0c4d343c 938->943 944 7ffb0c4d392b-7ffb0c4d3934 938->944 947 7ffb0c4d3941-7ffb0c4d3948 939->947 945 7ffb0c4d3a95-7ffb0c4d3a9f 940->945 953 7ffb0c4d3aef-7ffb0c4d3b20 call 7ffb0c4d40a0 941->953 954 7ffb0c4d3abc-7ffb0c4d3aed call 7ffb0c4d34b4 call 7ffb0c4d42a4 call 7ffb0c4d4318 call 7ffb0c4d3658 call 7ffb0c4d367c call 7ffb0c4d34e4 941->954 943->947 955 7ffb0c4d3a56 951->955 956 7ffb0c4d398e-7ffb0c4d39a3 call 7ffb0c4d338c 951->956 966 7ffb0c4d3b31-7ffb0c4d3b37 953->966 967 7ffb0c4d3b22-7ffb0c4d3b28 953->967 954->945 960 7ffb0c4d3a58-7ffb0c4d3a6d 955->960 964 7ffb0c4d39a9-7ffb0c4d39ba call 7ffb0c4d33fc 956->964 965 7ffb0c4d3a6e-7ffb0c4d3a7b call 7ffb0c4d40a0 956->965 982 7ffb0c4d3a0b-7ffb0c4d3a15 call 7ffb0c4d3658 964->982 983 7ffb0c4d39bc-7ffb0c4d39e0 call 7ffb0c4d42dc call 7ffb0c4d4294 call 7ffb0c4d42b8 call 7ffb0c4e1ee0 964->983 965->937 972 7ffb0c4d3b79-7ffb0c4d3b8f call 7ffb0c496120 966->972 973 7ffb0c4d3b39-7ffb0c4d3b43 966->973 967->966 971 7ffb0c4d3b2a-7ffb0c4d3b2c 967->971 978 7ffb0c4d3c16-7ffb0c4d3c23 971->978 993 7ffb0c4d3bc7-7ffb0c4d3bc9 972->993 994 7ffb0c4d3b91-7ffb0c4d3b93 972->994 979 7ffb0c4d3b4a-7ffb0c4d3b50 973->979 980 7ffb0c4d3b45-7ffb0c4d3b48 973->980 985 7ffb0c4d3b52-7ffb0c4d3b58 979->985 980->985 982->955 1006 7ffb0c4d3a17-7ffb0c4d3a23 call 7ffb0c4d42d4 982->1006 983->982 1034 7ffb0c4d39e2-7ffb0c4d39e9 __scrt_dllmain_after_initialize_c 983->1034 989 7ffb0c4d3c0c-7ffb0c4d3c14 985->989 990 7ffb0c4d3b5e-7ffb0c4d3b66 call 7ffb0c4d3914 985->990 989->978 1005 7ffb0c4d3b6b-7ffb0c4d3b73 990->1005 996 7ffb0c4d3bd0-7ffb0c4d3be5 call 7ffb0c4d3914 993->996 997 7ffb0c4d3bcb-7ffb0c4d3bce 993->997 994->993 1001 7ffb0c4d3b95-7ffb0c4d3bb7 call 7ffb0c496120 call 7ffb0c4d3a7c 994->1001 996->989 1015 7ffb0c4d3be7-7ffb0c4d3bf1 996->1015 997->989 997->996 1001->993 1029 7ffb0c4d3bb9-7ffb0c4d3bbe 1001->1029 1005->972 1005->989 1022 7ffb0c4d3a49-7ffb0c4d3a54 1006->1022 1023 7ffb0c4d3a25-7ffb0c4d3a2f call 7ffb0c4d35c0 1006->1023 1020 7ffb0c4d3bf8-7ffb0c4d3c06 1015->1020 1021 7ffb0c4d3bf3-7ffb0c4d3bf6 1015->1021 1026 7ffb0c4d3c08 1020->1026 1021->1026 1022->960 1023->1022 1033 7ffb0c4d3a31-7ffb0c4d3a3f 1023->1033 1026->989 1029->993 1033->1022 1034->982 1035 7ffb0c4d39eb-7ffb0c4d3a08 call 7ffb0c4e1e9c 1034->1035 1035->982
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                        • String ID:
                        • API String ID: 190073905-0
                        • Opcode ID: 379fb157a98799b01100bb80668918f310a9638619fe247a65667b2318d9597b
                        • Instruction ID: d64c70bc686872c606c0af001f502342429614c45746992faca1135d06fd698f
                        • Opcode Fuzzy Hash: 379fb157a98799b01100bb80668918f310a9638619fe247a65667b2318d9597b
                        • Instruction Fuzzy Hash: F4818DE1F0864346FA50BF76D44EA7D66A0BF85B88F449035DA0D877B6DF3CE8458602

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1044 7ffb0c4983e0-7ffb0c498410 LoadLibraryA 1045 7ffb0c498419-7ffb0c498436 GetProcAddress 1044->1045 1046 7ffb0c498412-7ffb0c498417 1044->1046 1048 7ffb0c498438-7ffb0c498448 FreeLibrary 1045->1048 1049 7ffb0c49844a-7ffb0c498466 send 1045->1049 1047 7ffb0c49846a-7ffb0c49846e 1046->1047 1048->1047 1049->1047
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: send$ws2_32.dll
                        • API String ID: 145871493-892776409
                        • Opcode ID: c72203c53a645444ab5a65247ba5a24b2c4a71c4cc6107fc3a1fdc2c7bd87a1a
                        • Instruction ID: 4adeca395b394e7610a874cb6b4828e7da859bdaccc525da9e64d6b7726fcadc
                        • Opcode Fuzzy Hash: c72203c53a645444ab5a65247ba5a24b2c4a71c4cc6107fc3a1fdc2c7bd87a1a
                        • Instruction Fuzzy Hash: 6B010CB2918B51C6D720CB25F488A1EB7A0FF857A8F400235EA8D42BA8DF3CD5558B00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: connect$ws2_32.dll
                        • API String ID: 145871493-3612281207
                        • Opcode ID: f5f71e3294bcdaee4bc318451acc9ebf704ca82ba944e65828b1c7f76f833850
                        • Instruction ID: 33a19949883058dddf76e1dcb2345d24059625295838e0e38793de0ad39496a8
                        • Opcode Fuzzy Hash: f5f71e3294bcdaee4bc318451acc9ebf704ca82ba944e65828b1c7f76f833850
                        • Instruction Fuzzy Hash: FD01E1F2918B51C6D620DF25E44871E7760FF857A8F501235E59D82BA4DF3CD5558B00

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1050 7ffb0c497fb0-7ffb0c497fd9 LoadLibraryA 1051 7ffb0c497fe4-7ffb0c498001 GetProcAddress 1050->1051 1052 7ffb0c497fdb-7ffb0c497fe2 1050->1052 1054 7ffb0c498003-7ffb0c498015 FreeLibrary 1051->1054 1055 7ffb0c498017-7ffb0c49802d socket 1051->1055 1053 7ffb0c498032-7ffb0c498036 1052->1053 1054->1053 1055->1053
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: socket$ws2_32.dll
                        • API String ID: 145871493-3483875929
                        • Opcode ID: cb9d8312e756911d49cd4f51c7db7d5e4ea26f9f0e7ec16d753f30e905b98c22
                        • Instruction ID: a33abc46f5ac4e7068cd43c15bba3edbdd660a5d5b48d33928a6181ea5fa40e9
                        • Opcode Fuzzy Hash: cb9d8312e756911d49cd4f51c7db7d5e4ea26f9f0e7ec16d753f30e905b98c22
                        • Instruction Fuzzy Hash: 4401DEB2518B5186D620CB25E448B2DB760FB847B9F500335E5AD02BE8CF3CD545CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressErrorFreeLastLoadProc
                        • String ID: WSAStartup$ws2_32.dll
                        • API String ID: 2540614322-1976915905
                        • Opcode ID: b09a82c92f7f546557ada2d47e9566cf0baec7d7ecfa32dff5c5a9a1503d013e
                        • Instruction ID: f0c688bf5beef5f5f47320a37a9e707a3e10141d63aeb8033417284d94ef15ab
                        • Opcode Fuzzy Hash: b09a82c92f7f546557ada2d47e9566cf0baec7d7ecfa32dff5c5a9a1503d013e
                        • Instruction Fuzzy Hash: 2701DEF291CA51C6E6209B25F888B2D77B0FF847A9F501235E58E42AB8DF7CD585CB00
                        APIs
                        • std::bad_exception::bad_exception.LIBCMTD ref: 00007FFB0C4CACEE
                          • Part of subcall function 00007FFB0C4D4720: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFB0C4D407B), ref: 00007FFB0C4D4770
                          • Part of subcall function 00007FFB0C4D4720: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFB0C4D407B), ref: 00007FFB0C4D47B1
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4CAD60
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4CADB5
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4CAE2F
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4CAECD
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4CAF92
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: std::runtime_error::runtime_error$Concurrency::details::EmptyQueue::StructuredWork$ExceptionFileHeaderRaisestd::bad_exception::bad_exception
                        • String ID:
                        • API String ID: 3965443834-0
                        • Opcode ID: 0d4e2dfe6f9cec561199eb6ced0db4a94df36823f4d8a24ec355e669d2707ef8
                        • Instruction ID: 7e808ac7169e671211a300b976acba73fa9cc712d484c676c3c0172919dd7cc3
                        • Opcode Fuzzy Hash: 0d4e2dfe6f9cec561199eb6ced0db4a94df36823f4d8a24ec355e669d2707ef8
                        • Instruction Fuzzy Hash: 13912CB260D68286D760DB25E495BAEB7A0FFC5348F405131E68D83AA9DF3CD945CF40
                        APIs
                        • GetForegroundWindow.USER32 ref: 00007FFB0C4B9665
                        • GetWindowTextW.USER32 ref: 00007FFB0C4B96B7
                          • Part of subcall function 00007FFB0C4B61D0: _WChar_traits.LIBCPMTD ref: 00007FFB0C4B61F6
                          • Part of subcall function 00007FFB0C4B4410: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4B4448
                          • Part of subcall function 00007FFB0C4B4410: WideCharToMultiByte.KERNEL32 ref: 00007FFB0C4B4482
                          • Part of subcall function 00007FFB0C4B4410: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FFB0C4B44B5
                          • Part of subcall function 00007FFB0C4B4410: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4B44D9
                          • Part of subcall function 00007FFB0C4B4410: WideCharToMultiByte.KERNEL32 ref: 00007FFB0C4B4514
                        • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FFB0C4B9703
                          • Part of subcall function 00007FFB0C4A18A0: char_traits.LIBCPMTD ref: 00007FFB0C4A18C6
                        • GetLastError.KERNEL32 ref: 00007FFB0C4B9743
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ByteCharConcurrency::details::Concurrency::details::_CriticalEmptyLock::_MultiQueue::ReentrantScoped_lockScoped_lock::~_StructuredWideWindowWork$Char_traitsErrorForegroundLastTextchar_traits
                        • String ID: W e:
                        • API String ID: 3735979991-3170417794
                        • Opcode ID: aed723aec270daf7bafdddd476d0693f378a059f208205c87c30fff13e338595
                        • Instruction ID: 545e2b5d5f42f6eabe107a979d08a5cd242c55f7fd80617d869f945af918a9f3
                        • Opcode Fuzzy Hash: aed723aec270daf7bafdddd476d0693f378a059f208205c87c30fff13e338595
                        • Instruction Fuzzy Hash: 153138B2618A8196E7609B24F4887AEB7A1FBC4798F504132E6CD83B69DF3CD544CF40
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 2067211477-0
                        • Opcode ID: 48142ec23890b9d666768e3bec8b18f94dd262d1b6a98ec5d17004b6353bfdbe
                        • Instruction ID: dc57da971c59a5161c02432e7069bd80476172c25e6dcf0d2af0201c26f2f079
                        • Opcode Fuzzy Hash: 48142ec23890b9d666768e3bec8b18f94dd262d1b6a98ec5d17004b6353bfdbe
                        • Instruction Fuzzy Hash: AC214CF5A09B8285FE24EFB6E41887DA3A0BF84B98F494531EE4E47755DF3CE4058600
                        APIs
                          • Part of subcall function 00007FFB0C4D2AAC: GetModuleHandleExW.KERNEL32 ref: 00007FFB0C4D2ABA
                        • GetModuleHandleExW.KERNEL32 ref: 00007FFB0C4D2BF0
                        • FreeLibraryWhenCallbackReturns.KERNEL32 ref: 00007FFB0C4D2C07
                          • Part of subcall function 00007FFB0C4D246C: GetCurrentThreadId.KERNEL32 ref: 00007FFB0C4D24BD
                          • Part of subcall function 00007FFB0C4D246C: AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4B240B,?,?,?,?,00007FFB0C4AC458), ref: 00007FFB0C4D24DC
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00007FFB0C4D2C8A
                          • Part of subcall function 00007FFB0C4D2474: ReleaseSRWLockExclusive.KERNEL32(?,?,?,?,00007FFB0C4D26B0,?,?,?,?,?,?,?,00007FFB0C4D2A71), ref: 00007FFB0C4D2486
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00007FFB0C4D2C95
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Cpp_errorExclusiveHandleLockModuleThrow_std::_$AcquireCallbackCurrentFreeLibraryReleaseReturnsThreadWhen
                        • String ID:
                        • API String ID: 4220897459-0
                        • Opcode ID: 899a2104fc99e7ea73ffcfa4d0cec08579f2b6f11f734520203ddbd3caa353e8
                        • Instruction ID: d967f24801c1964d0f269660b1b52e07d9aac63c68ef79f3d2b754cb176a2efc
                        • Opcode Fuzzy Hash: 899a2104fc99e7ea73ffcfa4d0cec08579f2b6f11f734520203ddbd3caa353e8
                        • Instruction Fuzzy Hash: 242108E4A4850281FB24BB31E96D9BC2361BF41BA9F141531DD2D822F6EFADEC508610
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getfacetstd::locale::_
                        • String ID:
                        • API String ID: 228209623-0
                        • Opcode ID: 793ac7056e05846943ffed5844e50566047ceb616486e047a5a9b9241643f175
                        • Instruction ID: cdff995b9bb621794b64b119847fbd08e451a4fdd781a2315effbc3d4bc0c49c
                        • Opcode Fuzzy Hash: 793ac7056e05846943ffed5844e50566047ceb616486e047a5a9b9241643f175
                        • Instruction Fuzzy Hash: 3C21FEA691DA4581DA60DB25E48566EB7A0FFC47A8F501136FACE43BB9DF3CD540CB00
                        APIs
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4CB1F6
                          • Part of subcall function 00007FFB0C4C9EF0: std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4CA10D
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4CB21E
                          • Part of subcall function 00007FFB0C498620: LoadLibraryA.KERNEL32 ref: 00007FFB0C49863F
                          • Part of subcall function 00007FFB0C498620: GetLastError.KERNEL32 ref: 00007FFB0C498652
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::EmptyQueue::StructuredWork$ErrorFac_nodeFac_node::_LastLibraryLoadstd::_
                        • String ID: 22455
                        • API String ID: 4022255543-2416011016
                        • Opcode ID: c2bde750dbe24dd564ca1280736189b9fd03a811a2c50f8c17d6c0df40a7b48a
                        • Instruction ID: 4bdf72ca41ad9a5cf62f163923bab5b85bf8d56a1b512a63c102a5d9d12d61b3
                        • Opcode Fuzzy Hash: c2bde750dbe24dd564ca1280736189b9fd03a811a2c50f8c17d6c0df40a7b48a
                        • Instruction Fuzzy Hash: EF212CB251868182D660DB25E0897AFBBA0FBC9798F500231EA8D43BA9DF3DD544CF40
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::EmptyQueue::StructuredWorkchar_traits$Max_valueMin_value
                        • String ID:
                        • API String ID: 2926028262-0
                        • Opcode ID: 17e2cd2e0251ab1f187e0df63efbd345bb449eab21a0be867075e0c80a5d34be
                        • Instruction ID: 9dae40c6090ddea1f1690faa30b57bd8461e79159415775b2c5818f31b8c7ee3
                        • Opcode Fuzzy Hash: 17e2cd2e0251ab1f187e0df63efbd345bb449eab21a0be867075e0c80a5d34be
                        • Instruction Fuzzy Hash: 474130A651DB4182DA10DB66F09456EB7A1FBC9B98F101236FB8D43B7ADF3CD5008B40
                        APIs
                        • Concurrency::details::FreeThreadProxyFactory::Retire.LIBCMTD ref: 00007FFB0C4931F3
                          • Part of subcall function 00007FFB0C492580: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FFB0C492593
                        • Concurrency::details::FreeThreadProxyFactory::Retire.LIBCMTD ref: 00007FFB0C49320D
                        • Concurrency::details::FreeThreadProxyFactory::Retire.LIBCMTD ref: 00007FFB0C493239
                          • Part of subcall function 00007FFB0C494640: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4946C7
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::$Factory::FreeProxyRetireThread$Concurrency::details::_CriticalEmptyLock::_Queue::ReentrantScoped_lockScoped_lock::~_StructuredWork
                        • String ID:
                        • API String ID: 2389357887-0
                        • Opcode ID: d469c1bd9c8e918a1045feef43b272f102c988d15d29aaa34b35b5e1870fa3cc
                        • Instruction ID: 155aa770c7dfe3d2e3b78d3cb1aead4c44ea5a681a2f5570d8f47bfc7427f6ae
                        • Opcode Fuzzy Hash: d469c1bd9c8e918a1045feef43b272f102c988d15d29aaa34b35b5e1870fa3cc
                        • Instruction Fuzzy Hash: 1E31C5B261DAC185DA60EB22F4957AFB761FBC5784F005036EACD83B6ACF6CD4008B40
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Cpp_errorThrow_std::_$Thrd_detach
                        • String ID:
                        • API String ID: 153483061-0
                        • Opcode ID: 9e44f2d666096dc4b0d945d2197f576f5d3890ad197e73a1bc86f42265bef36c
                        • Instruction ID: c0be18ad4f99a1efadb3d0cf164e487497e8390cb2320cbc9e8bc2950cb0c9bf
                        • Opcode Fuzzy Hash: 9e44f2d666096dc4b0d945d2197f576f5d3890ad197e73a1bc86f42265bef36c
                        • Instruction Fuzzy Hash: 18F0A4A170878957E690A621E8447BE5291FFC83C4F845031EE8D83BEAEE6CE944D700
                        APIs
                          • Part of subcall function 00007FFB0C4E2580: GetLastError.KERNEL32(?,?,000054395CB08AAD,00007FFB0C4E0205,?,?,?,?,00007FFB0C4EB486,?,?,00000000,00007FFB0C4ECFC7,?,?,?), ref: 00007FFB0C4E258F
                          • Part of subcall function 00007FFB0C4E2580: SetLastError.KERNEL32(?,?,000054395CB08AAD,00007FFB0C4E0205,?,?,?,?,00007FFB0C4EB486,?,?,00000000,00007FFB0C4ECFC7,?,?,?), ref: 00007FFB0C4E262F
                        • CloseHandle.KERNEL32(?,?,?,00007FFB0C4DF35D,?,?,?,?,00007FFB0C4DF1A1), ref: 00007FFB0C4DF1EB
                        • FreeLibraryAndExitThread.KERNELBASE(?,?,?,00007FFB0C4DF35D,?,?,?,?,00007FFB0C4DF1A1), ref: 00007FFB0C4DF201
                        • ExitThread.KERNEL32 ref: 00007FFB0C4DF20A
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ErrorExitLastThread$CloseFreeHandleLibrary
                        • String ID:
                        • API String ID: 1991824761-0
                        • Opcode ID: 09b1d4bd7db79959d3af789c9c8e58b857d97d736ae0d808ac7d5a9df84c6071
                        • Instruction ID: 89b0ae3f4ddb4a26525b2ef843dd1792f986f204b0d449b85730306d5c4df18e
                        • Opcode Fuzzy Hash: 09b1d4bd7db79959d3af789c9c8e58b857d97d736ae0d808ac7d5a9df84c6071
                        • Instruction Fuzzy Hash: 99F04FE2B0868651FA286B70C04C97C23A5BF41B7DF184735DA3E022E5DF6DD84A8340
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: type_info::_name_internal_method
                        • String ID: 22455
                        • API String ID: 3713626258-2416011016
                        • Opcode ID: 4e6086639be923173ba46ee51e12ab597185e4b722a76a65a9159ff711ce8096
                        • Instruction ID: a01ab49f4b05dcbaf7f3f8d6f1b4ea097d35bc71bc5481a6801b213324ca0184
                        • Opcode Fuzzy Hash: 4e6086639be923173ba46ee51e12ab597185e4b722a76a65a9159ff711ce8096
                        • Instruction Fuzzy Hash: C93144E151C98691E660EB24F499BBEA761FFD5388F401031F28E83ABADF6DD544C740
                        APIs
                          • Part of subcall function 00007FFB0C4E2408: GetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2417
                          • Part of subcall function 00007FFB0C4E2408: FlsGetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E242C
                          • Part of subcall function 00007FFB0C4E2408: SetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E24B7
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FFB0C4CDC9F,?,?,?,?,00007FFB0C4CAA0F), ref: 00007FFB0C4DF14E
                        • ExitThread.KERNEL32 ref: 00007FFB0C4DF156
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ErrorLast$ExitThreadValue
                        • String ID:
                        • API String ID: 10640732-0
                        • Opcode ID: 986f50ef393e8ce6b6e0f67bf0234b438e86fcded19f924f326ab2c7b9a63be4
                        • Instruction ID: 3b03671f07331fef83987fef302c4ae78af1794b5ce744179656f876289cbaf2
                        • Opcode Fuzzy Hash: 986f50ef393e8ce6b6e0f67bf0234b438e86fcded19f924f326ab2c7b9a63be4
                        • Instruction Fuzzy Hash: 9501B1D1E0A64281FE287BF1D44DC7C23A0BF55B58F051430D94E473A2DF2CE9868311
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                        • String ID:
                        • API String ID: 1173176844-0
                        • Opcode ID: 52ddadb1b446995f5799ae549dc3a176c3fa882400001ed90fe328c1b2b26edd
                        • Instruction ID: 1167f934febd9e4eaeda95e1e371e6b6774b871a89e93adaf49589925597c9ce
                        • Opcode Fuzzy Hash: 52ddadb1b446995f5799ae549dc3a176c3fa882400001ed90fe328c1b2b26edd
                        • Instruction Fuzzy Hash: B5E012C1E0D10B41FDA83AB2D51E97C00506F4977CE5C1730D93E093E3AF1CB4554211
                        APIs
                          • Part of subcall function 00007FFB0C4CB1B0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4CB1F6
                          • Part of subcall function 00007FFB0C4CB1B0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4CB21E
                        • UnDecorator::getVbTableType.LIBCMTD ref: 00007FFB0C4CAA40
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::EmptyQueue::StructuredWork$Decorator::getTableType
                        • String ID:
                        • API String ID: 747108024-0
                        • Opcode ID: 403ac4fd401c3edff73cfd83f6dce4d8139f479a10ae124dc3706b44de80df93
                        • Instruction ID: ced8168f94d117475ecdd8ea5d861ca3a531f21bfd68871d5a754a5664f92fbb
                        • Opcode Fuzzy Hash: 403ac4fd401c3edff73cfd83f6dce4d8139f479a10ae124dc3706b44de80df93
                        • Instruction Fuzzy Hash: D181FBB260DBC581DA61DB26E4957EEA7A0FF85788F404036DB8D47B6ADF3CD0458B40
                        APIs
                          • Part of subcall function 00007FFB0C4A8CF0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A8D12
                          • Part of subcall function 00007FFB0C4DF278: _invalid_parameter_noinfo.LIBCMT ref: 00007FFB0C4DF2A3
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00007FFB0C4CD21C
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::Cpp_errorEmptyQueue::StructuredThrow_Work_invalid_parameter_noinfostd::_
                        • String ID:
                        • API String ID: 925599881-0
                        • Opcode ID: 0793f95561afb282f0299c176354126fa431f8d169e71d4c555a164cc6f3d67e
                        • Instruction ID: c34b6f1055e41374fa916a82f7816e285010b5a2f946d6c7bc217c074dc55b1a
                        • Opcode Fuzzy Hash: 0793f95561afb282f0299c176354126fa431f8d169e71d4c555a164cc6f3d67e
                        • Instruction Fuzzy Hash: 62213BB2918A8182D650DF65E4956AEA7A0FFC5B84F504035F68E83BBACF3CC401CB40
                        APIs
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A053D
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::EmptyQueue::StructuredWork
                        • String ID:
                        • API String ID: 1865873047-0
                        • Opcode ID: 6447cbae810f556aec6381991967a4f94e45f998855c6f923b2d8489afa25c47
                        • Instruction ID: 8b2319bfd561f7fa00dce56a7f5108403a5f8c191dbe509055f80b2640f40b64
                        • Opcode Fuzzy Hash: 6447cbae810f556aec6381991967a4f94e45f998855c6f923b2d8489afa25c47
                        • Instruction Fuzzy Hash: 6221F3B6518F8482DA10DB26F49466EB7A0FBC9B88F105126EACD83B79CF3CD550CB40
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: f6778a97db3e7d7cc00ddc368c5f4a02c47bb974696b7abc8e093fa4e358170f
                        • Instruction ID: a93488dda1db9e6cc03adb087a07c5aa1ea792d1cc35fd7fd00562565c33034c
                        • Opcode Fuzzy Hash: f6778a97db3e7d7cc00ddc368c5f4a02c47bb974696b7abc8e093fa4e358170f
                        • Instruction Fuzzy Hash: 2A118FF691C68282F3119B68E45993DB2A0FF40748F160434EA5E477A3DF3CF9148700
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: 2168fdc89c5d646d247c854f3cf2885cb6be60eaca35707c10a3b4e8cbbfff25
                        • Instruction ID: 5789d1e68269c6f2b936d6891e3013686fd87dd3f1cefefb17625922e2481fbd
                        • Opcode Fuzzy Hash: 2168fdc89c5d646d247c854f3cf2885cb6be60eaca35707c10a3b4e8cbbfff25
                        • Instruction Fuzzy Hash: 5C11E4B2A14B069DEB119FB0D4856EC37B8FB0835CF510636EA4E12B59EF74D295C390
                        APIs
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C494EF3
                          • Part of subcall function 00007FFB0C4939E0: allocator.LIBCONCRTD ref: 00007FFB0C4939FB
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::EmptyQueue::StructuredWorkallocator
                        • String ID:
                        • API String ID: 1755220593-0
                        • Opcode ID: 5cba3a3aef0a6370c0c1a8221ba0f31d010bbba87f1c378c498786def6f14bb3
                        • Instruction ID: d4b3ef5cb37ed71679146152b12da2702dee92a8208cd7f30c48c454413cb29e
                        • Opcode Fuzzy Hash: 5cba3a3aef0a6370c0c1a8221ba0f31d010bbba87f1c378c498786def6f14bb3
                        • Instruction Fuzzy Hash: 1D016076619F8482CA60DF1AF89111EB7A4F7C9B98F504225FACD83B29DF3CD1608B00
                        APIs
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A20E3
                          • Part of subcall function 00007FFB0C4A0520: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A053D
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::EmptyQueue::StructuredWork
                        • String ID:
                        • API String ID: 1865873047-0
                        • Opcode ID: ae624f9d638c7eb923ce7597db467f3cfac2a2aa287ee23f0eba4aaa37d98732
                        • Instruction ID: 5b34120690456dac4881ec9facd683e9d5d4b8c08c967d42c31f7afcad65d987
                        • Opcode Fuzzy Hash: ae624f9d638c7eb923ce7597db467f3cfac2a2aa287ee23f0eba4aaa37d98732
                        • Instruction Fuzzy Hash: 7701E1A661DB8081CA10DB66F49545EA7A0FBC9BE8F445125FE8D53B29DF6CC1508B00
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: MembershipTestTokenchar_traits
                        • String ID:
                        • API String ID: 1573570860-0
                        • Opcode ID: bc93fe16c99b7f2b4288f9b23436788932f4b6a41d62b0d90d8728a87a93c0d0
                        • Instruction ID: f113ce288ca4920e3f576e65e313044443afd22959ae1fe5e363fe767a23d944
                        • Opcode Fuzzy Hash: bc93fe16c99b7f2b4288f9b23436788932f4b6a41d62b0d90d8728a87a93c0d0
                        • Instruction Fuzzy Hash: 20F0A9F5A1C585C7D664DB25E44A56EA7A0FFC5788F900135EA8C87658CF3DD5048B00
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: 6bfc585f6fdbfbc829a17dd92a0183fd5855803228a2f8913b13a3e8f80eae15
                        • Instruction ID: 67526f07bc46d5cd488eb65d144d5b6c52fdf817d52a2b7ce2e2508afe57c5b7
                        • Opcode Fuzzy Hash: 6bfc585f6fdbfbc829a17dd92a0183fd5855803228a2f8913b13a3e8f80eae15
                        • Instruction Fuzzy Hash: BFE01AF1E4D14386FA117BB4D959BBD22907F5170CF524430E21F4A2C2CFAE7A027662
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: type_info::_name_internal_method
                        • String ID:
                        • API String ID: 3713626258-0
                        • Opcode ID: e8224f4864a82fca779006163f07ee9fb7dd01c7828996f5c753fe7fece6d9c5
                        • Instruction ID: 153d3127d75817c6199a9128cf1e377e6a815979f3f6c9282241578f380a7f72
                        • Opcode Fuzzy Hash: e8224f4864a82fca779006163f07ee9fb7dd01c7828996f5c753fe7fece6d9c5
                        • Instruction Fuzzy Hash: 2CF0D0B2A2854196E720FB60F4955DEA760FFD4384F905131F28D429AADF2CD7058B40
                        APIs
                        • char_traits.LIBCPMTD ref: 00007FFB0C4A18C6
                          • Part of subcall function 00007FFB0C4A0220: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A0259
                          • Part of subcall function 00007FFB0C4A0220: char_traits.LIBCPMTD ref: 00007FFB0C4A02DC
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: char_traits$Concurrency::details::EmptyQueue::StructuredWork
                        • String ID:
                        • API String ID: 3215207624-0
                        • Opcode ID: 03f654bbecb142294313059b869aaa330ae8dc2e4fc4680fc1b34f29dee3c9d9
                        • Instruction ID: 91f049a3946e53e81f0ec3dae62817fcebd4322e5fc63ac47550452063d8373b
                        • Opcode Fuzzy Hash: 03f654bbecb142294313059b869aaa330ae8dc2e4fc4680fc1b34f29dee3c9d9
                        • Instruction Fuzzy Hash: D7E032A2A09B8181DA00EB66F49546EA7A0FFC6B84F600431EB8C03B2ACF2CC4108A00
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Func_class
                        • String ID:
                        • API String ID: 1670654298-0
                        • Opcode ID: 5ec6d29b18ae36874b82b4c4c9f34488724a556ab8c77d8dd9361233123eedfa
                        • Instruction ID: 2c88582b2784b3cc77a97b87a2485a2670e77147e5908cfc5f0b3c08891be0e2
                        • Opcode Fuzzy Hash: 5ec6d29b18ae36874b82b4c4c9f34488724a556ab8c77d8dd9361233123eedfa
                        • Instruction Fuzzy Hash: 53E012A2518B4581D620AB32E45542E6360FFC5B49F904171EACD43765CF2CD5158A00
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Func_class
                        • String ID:
                        • API String ID: 1670654298-0
                        • Opcode ID: 0643c989bd7fa785ac6cdf475ff603446008301a1b6103f3c49910fc2f50256a
                        • Instruction ID: 1255511c6128b89dfc753264682ea64a849b205e8b42770e3886db06abc2820d
                        • Opcode Fuzzy Hash: 0643c989bd7fa785ac6cdf475ff603446008301a1b6103f3c49910fc2f50256a
                        • Instruction Fuzzy Hash: E2E04FE2A18A8582DA20AB32E44542EB370FFC5B88F900172FACD4376ACF2CD514CB00
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: allocator
                        • String ID:
                        • API String ID: 3447690668-0
                        • Opcode ID: 24584cc0b7fac6b141be2c5d4d5e1f570f47c93ddaa0bd17d7908180ebee517d
                        • Instruction ID: ee58fa10d61d53612f2fa9f7743f6aa5f7cd47a53f4affaf232af2fbb4ecb614
                        • Opcode Fuzzy Hash: 24584cc0b7fac6b141be2c5d4d5e1f570f47c93ddaa0bd17d7908180ebee517d
                        • Instruction Fuzzy Hash: B3C0C9A6A29B84C1CA04EB12F48500E7760FBC8BD0F909421EA8E03729DF28C0508B00
                        APIs
                        • HeapAlloc.KERNEL32(?,?,00000000,00007FFB0C4E25E2,?,?,000054395CB08AAD,00007FFB0C4E0205,?,?,?,?,00007FFB0C4EB486,?,?,00000000), ref: 00007FFB0C4E4041
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: AllocHeap
                        • String ID:
                        • API String ID: 4292702814-0
                        • Opcode ID: 028ec1a17c4525896974425366a4b0789cf69de5afe80bc1ba632b41a8e569a3
                        • Instruction ID: 32cef8744c4fd01eac6c3fa5da226489d3947163556e3b5b65a605023da60312
                        • Opcode Fuzzy Hash: 028ec1a17c4525896974425366a4b0789cf69de5afe80bc1ba632b41a8e569a3
                        • Instruction Fuzzy Hash: 5EF049D4B0920641FE655AB6D919ABD13A07F88B88F0A6434C90F863D2DF6CAA805220
                        APIs
                        • HeapAlloc.KERNEL32(?,?,?,00007FFB0C4EB46D,?,?,00000000,00007FFB0C4ECFC7,?,?,?,00007FFB0C4E1A0F,?,?,?,00007FFB0C4E1905), ref: 00007FFB0C4E4EEA
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: AllocHeap
                        • String ID:
                        • API String ID: 4292702814-0
                        • Opcode ID: 1c28e6b7caad3fedf85c8b812835a69ed4d576dd1950a3b81460c323c341eef0
                        • Instruction ID: 8c6659368621f3607d48574f278f9fcd20d4c17aa96208a3701419c81db9d79e
                        • Opcode Fuzzy Hash: 1c28e6b7caad3fedf85c8b812835a69ed4d576dd1950a3b81460c323c341eef0
                        • Instruction Fuzzy Hash: F2F05EC0F0924744FE5556BAD819E7C12807F84BA8F0A9230DD2F466C1DF6CA6419120
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Fac_nodeFac_node::_std::_$type_info::_name_internal_method$Name$Concurrency::cancel_current_taskNodeNode::$Decorator::getTableType
                        • String ID: -$-$-$-$0$0$1$1$2$2$3$3$3$3$3$4$4$4$5$5$6$7$7$7$8$>>//>>$A$A$B$C$D$D$D$D$DfC$E$EKPP$F$F$FcDfC$I$KPP$M$P$P$R$R$REKPP$SsR$a$a$a$c$c$c$d$d$e$e$e$e$e$e$e$e$e$e$e$f$g$g$g$i$i$i$i$k$k$l$l$l$l$m$n$n$n$n$n$n$n$n$o$o$o$o$o$o$o$p$r$r$s$t$t$t$t$t$v$w${wSsR$}
                        • API String ID: 4012674335-2829735596
                        • Opcode ID: 882c8f34b25abacaf75ca4359095b06a7e3794c3dee62e0d8051e003869e49ce
                        • Instruction ID: 2ad1e240b8c5230e30e539ae837cbdb58913b73b2460f94f639294030eaf8128
                        • Opcode Fuzzy Hash: 882c8f34b25abacaf75ca4359095b06a7e3794c3dee62e0d8051e003869e49ce
                        • Instruction Fuzzy Hash: 2B827BA260D6C184E671D625E4987EFABA1FBD1788F400036D6CD47AABDFADC108CB51
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Fac_nodeFac_node::_std::_$Drive$LogicalStringsTypechar_traits
                        • String ID: ==>$==>$F$R$a$b$d$e$e$e$i$l$m$o$v$x
                        • API String ID: 3293995294-766430890
                        • Opcode ID: e95a06ec06d7c31f861916fcb0f6de4a928d5f12ea7f975a06669467530cf528
                        • Instruction ID: 3f80458d0d7524b13b074c46a3e8da67b0f447ab7b2b1634302c1d976056ec2f
                        • Opcode Fuzzy Hash: e95a06ec06d7c31f861916fcb0f6de4a928d5f12ea7f975a06669467530cf528
                        • Instruction Fuzzy Hash: 2AD115B260DAC195DA70DB21E4947EFA760FBC9788F400136E68D43BAADF6CC549CB40
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                        • API String ID: 808467561-2761157908
                        • Opcode ID: c60366304dbfd6582ec4314764b349d07f6ebf7f1d7ddb16a27fda4fe375e29a
                        • Instruction ID: 905e1a25de23889198b1b4ccb054729f28d173fb460147acef7499a87413a758
                        • Opcode Fuzzy Hash: c60366304dbfd6582ec4314764b349d07f6ebf7f1d7ddb16a27fda4fe375e29a
                        • Instruction Fuzzy Hash: 23B2CEF2E182928BE7658E74D548BFD37A1FF9478CF405135DA0E57A85DB38AA02CB40
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                        • String ID:
                        • API String ID: 1617910340-0
                        • Opcode ID: 31f4d597e0a6cc1620dd34189c80ad889813dc24754eb01cce36e0114bd77507
                        • Instruction ID: 70f9f3c58b158737205c2884b067f2795ec99b2a4fc6033796a765a6409de3da
                        • Opcode Fuzzy Hash: 31f4d597e0a6cc1620dd34189c80ad889813dc24754eb01cce36e0114bd77507
                        • Instruction Fuzzy Hash: F0C1C1B6B24A4286EB20CFB5C494AAC3761FB49BA8B015225DE1E5B3A5CF78D556C300
                        APIs
                          • Part of subcall function 00007FFB0C4E2408: GetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2417
                          • Part of subcall function 00007FFB0C4E2408: FlsGetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E242C
                          • Part of subcall function 00007FFB0C4E2408: SetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E24B7
                        • TranslateName.LIBCMT ref: 00007FFB0C4EEEF2
                        • TranslateName.LIBCMT ref: 00007FFB0C4EEF2D
                        • GetACP.KERNEL32(?,?,?,00000000,00000092,00007FFB0C4E2F90), ref: 00007FFB0C4EEF74
                        • IsValidCodePage.KERNEL32(?,?,?,00000000,00000092,00007FFB0C4E2F90), ref: 00007FFB0C4EEFAC
                        • GetLocaleInfoW.KERNEL32 ref: 00007FFB0C4EF169
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ErrorLastNameTranslate$CodeInfoLocalePageValidValue
                        • String ID: utf8
                        • API String ID: 3069159798-905460609
                        • Opcode ID: 464451e8a7c017b7fe8d594a29d962222612a71da5a0740ad1618ad19dd93d6f
                        • Instruction ID: 498e69c9ff6075c94a78cde50af115d48e6e579ba027b5a866f6751b62b1971b
                        • Opcode Fuzzy Hash: 464451e8a7c017b7fe8d594a29d962222612a71da5a0740ad1618ad19dd93d6f
                        • Instruction Fuzzy Hash: 20917AF2A0874281FB249B71D549ABD23A4FF44B88F468531DA4E47796EF3CEA55C301
                        APIs
                          • Part of subcall function 00007FFB0C4E2408: GetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2417
                          • Part of subcall function 00007FFB0C4E2408: FlsGetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E242C
                          • Part of subcall function 00007FFB0C4E2408: SetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E24B7
                          • Part of subcall function 00007FFB0C4E2408: FlsSetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E244D
                        • GetUserDefaultLCID.KERNEL32(?,00000000,00000092,?), ref: 00007FFB0C4EFA40
                          • Part of subcall function 00007FFB0C4E2408: FlsSetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E247A
                          • Part of subcall function 00007FFB0C4E2408: FlsSetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E248B
                          • Part of subcall function 00007FFB0C4E2408: FlsSetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E249C
                        • EnumSystemLocalesW.KERNEL32(?,00000000,00000092,?,?,00000000,?,00007FFB0C4E2F89), ref: 00007FFB0C4EFA27
                        • ProcessCodePage.LIBCMT ref: 00007FFB0C4EFA6A
                        • IsValidCodePage.KERNEL32 ref: 00007FFB0C4EFA7C
                        • IsValidLocale.KERNEL32 ref: 00007FFB0C4EFA92
                        • GetLocaleInfoW.KERNEL32 ref: 00007FFB0C4EFAEE
                        • GetLocaleInfoW.KERNEL32 ref: 00007FFB0C4EFB0A
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Value$Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
                        • String ID:
                        • API String ID: 2591520935-0
                        • Opcode ID: cb360dc9d45414078bde5522cbfc95522dac8b1e4a20e370483c41cc382bafd5
                        • Instruction ID: 65cc533ef037ac8b0bdd148010601aed62f2dc650b3e36d361002b563d749a54
                        • Opcode Fuzzy Hash: cb360dc9d45414078bde5522cbfc95522dac8b1e4a20e370483c41cc382bafd5
                        • Instruction Fuzzy Hash: E6716AF2F086528AFB509BB0D459ABC37A4BF48748F464035CE4E57695EF7CAA4AC310
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Find$File$CloseConcurrency::details::Concurrency::details::_CriticalEmptyFirstLock::_NextQueue::ReentrantScoped_lockScoped_lock::~_StructuredWork
                        • String ID: /*.*
                        • API String ID: 669816757-1014195128
                        • Opcode ID: bfb0ff521af7ce41d863c1eec1bbb7bc41aa023931e85ca1a0b623fdd8d34d56
                        • Instruction ID: 87c92e802445d216502ac1734f339a69926183f4fc3c396ca9e184bd17f8d7d8
                        • Opcode Fuzzy Hash: bfb0ff521af7ce41d863c1eec1bbb7bc41aa023931e85ca1a0b623fdd8d34d56
                        • Instruction Fuzzy Hash: C4715FF291CA8291DA70DB25E4957EEA360FFD4798F405132D68D83BA9EF2CD545CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Find$Concurrency::details::EmptyFileQueue::StructuredWork$CloseConcurrency::details::_CriticalFirstLock::_NextReentrantScoped_lockScoped_lock::~_
                        • String ID: /*.*
                        • API String ID: 771618737-1014195128
                        • Opcode ID: b6ce5fcc579c055561d41d036026d2b6aff95d2bf006d07d86919a8f1896ee1f
                        • Instruction ID: 85ae7e287eb6283b917fcfea7a9d30bf423dc7f486f230d2765bd4a4a2957b50
                        • Opcode Fuzzy Hash: b6ce5fcc579c055561d41d036026d2b6aff95d2bf006d07d86919a8f1896ee1f
                        • Instruction Fuzzy Hash: 73611CB251CAC292D670DB21E4957EEA360FFC5788F405132E68D83AAADF3CD545CB00
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                        • String ID:
                        • API String ID: 3140674995-0
                        • Opcode ID: 1fdbbc56d82b575a71ab0e7532a7e43e535db65f2d0fd3c01a85fe32ae7de389
                        • Instruction ID: 50d83ac1657d2c75b6e5e86141ffcefd495633b1ae348eb6c82187dce852f563
                        • Opcode Fuzzy Hash: 1fdbbc56d82b575a71ab0e7532a7e43e535db65f2d0fd3c01a85fe32ae7de389
                        • Instruction Fuzzy Hash: A2312CF2609B8186EB609F70E848BED7365FB84748F44443ADA4E47B94DF78D649CB10
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                        • String ID:
                        • API String ID: 1239891234-0
                        • Opcode ID: 1300e7eb66910485c596afe65c521b45d2f063167b9c5b78a57fe06e37c487e2
                        • Instruction ID: 70b6f82a94b448f658c3d9ff4a0244678391e9ba02bcd45614eff5be11337e32
                        • Opcode Fuzzy Hash: 1300e7eb66910485c596afe65c521b45d2f063167b9c5b78a57fe06e37c487e2
                        • Instruction Fuzzy Hash: 253182B2618B8186EB20DF34E8486AE73A4FF89758F540135EA9D43BA4DF3CC146CB00
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: memcpy_s
                        • String ID:
                        • API String ID: 1502251526-0
                        • Opcode ID: a3a34dc7f104a5757306e0e4006adbba08ef9a00a3e13a0073f806107d450ba3
                        • Instruction ID: 3518074f147368ad3d17c44b84577014f9e13c68b05bd8742afda9f2091d10dc
                        • Opcode Fuzzy Hash: a3a34dc7f104a5757306e0e4006adbba08ef9a00a3e13a0073f806107d450ba3
                        • Instruction Fuzzy Hash: 10C1E6F2B1828687E724CF26E148A6EB791FB94788F468135DB5B43744DB7CE901CB40
                        APIs
                          • Part of subcall function 00007FFB0C4E2408: GetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2417
                          • Part of subcall function 00007FFB0C4E2408: FlsGetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E242C
                          • Part of subcall function 00007FFB0C4E2408: SetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E24B7
                          • Part of subcall function 00007FFB0C4E2408: FlsSetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E244D
                        • GetLocaleInfoW.KERNEL32 ref: 00007FFB0C4EF3B8
                          • Part of subcall function 00007FFB0C4EB690: _invalid_parameter_noinfo.LIBCMT ref: 00007FFB0C4EB6AD
                        • GetLocaleInfoW.KERNEL32 ref: 00007FFB0C4EF401
                          • Part of subcall function 00007FFB0C4EB690: _invalid_parameter_noinfo.LIBCMT ref: 00007FFB0C4EB706
                        • GetLocaleInfoW.KERNEL32 ref: 00007FFB0C4EF4C9
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: InfoLocale$ErrorLastValue_invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 1791019856-0
                        • Opcode ID: c48819b180904961f1f32d5462f44575ad073186aa2b6a60f47a47cf0137d1b3
                        • Instruction ID: 02088957f37978a41fb0cee272336e497706fe6cc542dc5e034f459b5505319a
                        • Opcode Fuzzy Hash: c48819b180904961f1f32d5462f44575ad073186aa2b6a60f47a47cf0137d1b3
                        • Instruction Fuzzy Hash: A9618CF2A0864286FB248F65E548A7D63A1FF94748F428135CB9E83691DF3CE659C700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: InfoLocale
                        • String ID: GetLocaleInfoEx
                        • API String ID: 2299586839-2904428671
                        • Opcode ID: a917a4d758084a6f6b8c8faf001e45550593df4950d72b9804e1111e9bf3a5b0
                        • Instruction ID: 543e6a5be72d149c6fa6e929dfba404935bc601108d16aba0c4e63455fc3f5d8
                        • Opcode Fuzzy Hash: a917a4d758084a6f6b8c8faf001e45550593df4950d72b9804e1111e9bf3a5b0
                        • Instruction Fuzzy Hash: 1101A7E4B0878185EB409BA6F4088AAA7A0FF98BD4FA45035DE4D43B65DF3CD545CB44
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ExceptionRaise_clrfp
                        • String ID:
                        • API String ID: 15204871-0
                        • Opcode ID: cb08b8b98451d329f1216890254e8639781e64dd0602fbbd80406a2a0687eaf2
                        • Instruction ID: 3aa29c0fa17485df25d5acd5b216722f5aa2913e56c172a00dfdc0c47e8d076c
                        • Opcode Fuzzy Hash: cb08b8b98451d329f1216890254e8639781e64dd0602fbbd80406a2a0687eaf2
                        • Instruction Fuzzy Hash: 8DB13AB3604B858BEB15CF29C88A7AC7BA0FB44B4CF158925DA5E837A8CB39D551C700
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID:
                        • String ID: e+000$gfff
                        • API String ID: 0-3030954782
                        • Opcode ID: ffd28e6c5c02c45a7b5b9001791b3dc5886d0b4c2c5e967d0dbd740f28f2cdbe
                        • Instruction ID: aa0bfbee864c570ff85c137570285fc2bb27962dcb876076f572339a6fa1b4d4
                        • Opcode Fuzzy Hash: ffd28e6c5c02c45a7b5b9001791b3dc5886d0b4c2c5e967d0dbd740f28f2cdbe
                        • Instruction Fuzzy Hash: 7E5178E2B182C146E7248E35E808B6D6B92FB44BACF499231CBAD4BAD5CF3DD545C700
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Info
                        • String ID:
                        • API String ID: 1807457897-0
                        • Opcode ID: 6bfd4f3a0bf9b5e35434d6109a361d930ff9e45c5dbcbe01b59c693bca66bdb6
                        • Instruction ID: 467c53ae1fed2546d008abc5b79258b881b082ec5c6c2764c570c2c8a88e7a8b
                        • Opcode Fuzzy Hash: 6bfd4f3a0bf9b5e35434d6109a361d930ff9e45c5dbcbe01b59c693bca66bdb6
                        • Instruction Fuzzy Hash: B0128EA2A08BC186E761DF79D4096FD73A4FF59748F059235EB8E42652DF39E185C300
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6b382c4507d1edf34b785a1e02c16715189adb29d69b0d4dba2ef1785cd887c3
                        • Instruction ID: 4f9096b8ff84b67c6ba9e8c88cb7e21973d8e8001aaabbad7c8596ba2bce1a27
                        • Opcode Fuzzy Hash: 6b382c4507d1edf34b785a1e02c16715189adb29d69b0d4dba2ef1785cd887c3
                        • Instruction Fuzzy Hash: 4FE141B2A08B8186E720DB61E4456EE67A4FB94B88F418535DF8E53B96EF7CD345C300
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 97ca2f4655ae134b892275c628d9e05cf2278bddbd9a89498a2624f6de7f2485
                        • Instruction ID: 08cc17a4eaaa2988aa30136a91725bd09b07aeae9c4c4d210854534d0e288e81
                        • Opcode Fuzzy Hash: 97ca2f4655ae134b892275c628d9e05cf2278bddbd9a89498a2624f6de7f2485
                        • Instruction Fuzzy Hash: 6151F4A2B0878185FB109B72E848AAE7BA5FF40798F154234EE5E67B95CF3CD601C704
                        APIs
                          • Part of subcall function 00007FFB0C4E2408: GetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2417
                          • Part of subcall function 00007FFB0C4E2408: FlsGetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E242C
                          • Part of subcall function 00007FFB0C4E2408: SetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E24B7
                          • Part of subcall function 00007FFB0C4E2408: FlsSetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E244D
                        • GetLocaleInfoW.KERNEL32 ref: 00007FFB0C4EF5FC
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ErrorLastValue$InfoLocale
                        • String ID:
                        • API String ID: 673564084-0
                        • Opcode ID: 612a9204371c78f22ca7deba1f8129528e6bafacea7c20a8cc21ea31929da954
                        • Instruction ID: 5bed5fc1e89bf775fe7208950a2a500d8d04fc635d86a013cf1fbc182cb5857c
                        • Opcode Fuzzy Hash: 612a9204371c78f22ca7deba1f8129528e6bafacea7c20a8cc21ea31929da954
                        • Instruction Fuzzy Hash: 173193F1A0868247FB248B31D445BAE6391FF84748F458035DA4E836A5DF3CE6068700
                        APIs
                          • Part of subcall function 00007FFB0C4E2408: GetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2417
                          • Part of subcall function 00007FFB0C4E2408: FlsGetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E242C
                          • Part of subcall function 00007FFB0C4E2408: SetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E24B7
                        • EnumSystemLocalesW.KERNEL32(?,?,?,00007FFB0C4EF9D3,?,00000000,00000092,?,?,00000000,?,00007FFB0C4E2F89), ref: 00007FFB0C4EF282
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ErrorLast$EnumLocalesSystemValue
                        • String ID:
                        • API String ID: 3029459697-0
                        • Opcode ID: 7b55d7e7a37fe749f6c74a2d212c2c7cb41baea0870bc8e2bf6a4b600ee84061
                        • Instruction ID: 326ad35be82a05e37e6125fbadbe447d4a40d78976d382aed5174edfa68a12b2
                        • Opcode Fuzzy Hash: 7b55d7e7a37fe749f6c74a2d212c2c7cb41baea0870bc8e2bf6a4b600ee84061
                        • Instruction Fuzzy Hash: 5C11D2E7E086458AFB148FA5D044AAC7BA0FF90BA8F468135C66A433D0DB79D6D6C740
                        APIs
                          • Part of subcall function 00007FFB0C4E2408: GetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2417
                          • Part of subcall function 00007FFB0C4E2408: FlsGetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E242C
                          • Part of subcall function 00007FFB0C4E2408: SetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E24B7
                        • GetLocaleInfoW.KERNEL32(?,?,?,00007FFB0C4EF546), ref: 00007FFB0C4EF7D3
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ErrorLast$InfoLocaleValue
                        • String ID:
                        • API String ID: 3796814847-0
                        • Opcode ID: 90b648d9eea99e32473642e310b728a41b7a43989c6c3debb278290af27b6ee3
                        • Instruction ID: 77d444da7e581106bc0f19fc1cb8ec72fc340591e442434a664cc6a8912c5fdb
                        • Opcode Fuzzy Hash: 90b648d9eea99e32473642e310b728a41b7a43989c6c3debb278290af27b6ee3
                        • Instruction Fuzzy Hash: 261127B2F1855243F77897B5E048E7E6291FF40758F564231DA6E436C4EF29EA868700
                        APIs
                          • Part of subcall function 00007FFB0C4E2408: GetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2417
                          • Part of subcall function 00007FFB0C4E2408: FlsGetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E242C
                          • Part of subcall function 00007FFB0C4E2408: SetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E24B7
                        • EnumSystemLocalesW.KERNEL32(?,?,?,00007FFB0C4EF98F,?,00000000,00000092,?,?,00000000,?,00007FFB0C4E2F89), ref: 00007FFB0C4EF332
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ErrorLast$EnumLocalesSystemValue
                        • String ID:
                        • API String ID: 3029459697-0
                        • Opcode ID: 204dd6ae1cd5eee430f5dba8dfa2ed3c28fbfb011178cd42bd1cad3b11adec73
                        • Instruction ID: 7952ed2b1712ca930ceadab6e1e321ce778e3c2960085e37220cc78addd08ef4
                        • Opcode Fuzzy Hash: 204dd6ae1cd5eee430f5dba8dfa2ed3c28fbfb011178cd42bd1cad3b11adec73
                        • Instruction Fuzzy Hash: 6201F5F2E0828146F7145FB5E448FBD7691FF447A8F468331C22A476C5DF7999858700
                        APIs
                        • EnumSystemLocalesW.KERNEL32(?,?,00000000,00007FFB0C4E4493,?,?,?,?,?,?,?,?,00000000,00007FFB0C4EE834), ref: 00007FFB0C4E4127
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: EnumLocalesSystem
                        • String ID:
                        • API String ID: 2099609381-0
                        • Opcode ID: 4e1681deb3ae625eb10517da4b04623cc88c87d5d74a99c275469e2c03469948
                        • Instruction ID: 1b85aab88b97f5cae2a057d2bf941243e22b22564dedf138d28229f2afaee6e9
                        • Opcode Fuzzy Hash: 4e1681deb3ae625eb10517da4b04623cc88c87d5d74a99c275469e2c03469948
                        • Instruction Fuzzy Hash: C9F069F6B08B8186E604DB65E8A99A96361FF98B80F189035EA4D833A5DF3CD551C300
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID:
                        • String ID: gfffffff
                        • API String ID: 0-1523873471
                        • Opcode ID: 9eb11a5139b860ec689106c531227738ed5de37a15a15e703f0ba588c082e3c9
                        • Instruction ID: 3b6a68f833a057ab15b0f0a1c4f87d2fad713a194f31104e16b48416634b690f
                        • Opcode Fuzzy Hash: 9eb11a5139b860ec689106c531227738ed5de37a15a15e703f0ba588c082e3c9
                        • Instruction Fuzzy Hash: F5A104E2E0868A86EB21CB39E414BAE7791BF55B8CF068131DA8E47785DB3DD601C701
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID: 0-3916222277
                        • Opcode ID: 0d56e185a6f5c393efdfe29e65eb388ef1e3e89cc9312fdd40847f5c21c96711
                        • Instruction ID: 00236c557a4e5bfd946fcc46cd65732584f7fff1761ccebdbea30b193282330e
                        • Opcode Fuzzy Hash: 0d56e185a6f5c393efdfe29e65eb388ef1e3e89cc9312fdd40847f5c21c96711
                        • Instruction Fuzzy Hash: CFB179F2A0878185F764AF39C058A2D3BA1FB49B4CF194276DB8E47399CF29D841E711
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID: 0-3916222277
                        • Opcode ID: 6e1565131a72630e28cd35d5a7a422671125bf8fca0ecded1d184da54ae6dca5
                        • Instruction ID: b52771f8e0e287dd5861433ccbaeda8e54dfe6256f78e9626ce667ea9bc60e47
                        • Opcode Fuzzy Hash: 6e1565131a72630e28cd35d5a7a422671125bf8fca0ecded1d184da54ae6dca5
                        • Instruction Fuzzy Hash: ABB15AF2908A8686FB64AF39C09867C3BA1FB49F4CF284136CA4E47395DF29D441E705
                        APIs
                        • GetLastError.KERNEL32 ref: 00007FFB0C4EAD69
                          • Part of subcall function 00007FFB0C4E3FEC: HeapAlloc.KERNEL32(?,?,00000000,00007FFB0C4E25E2,?,?,000054395CB08AAD,00007FFB0C4E0205,?,?,?,?,00007FFB0C4EB486,?,?,00000000), ref: 00007FFB0C4E4041
                          • Part of subcall function 00007FFB0C4E4064: HeapFree.KERNEL32(?,?,00000000,00007FFB0C4EDF0E,?,?,?,00007FFB0C4EE28B,?,?,00000000,00007FFB0C4ED3BD,?,?,?,00007FFB0C4ED2EF), ref: 00007FFB0C4E407A
                          • Part of subcall function 00007FFB0C4E4064: GetLastError.KERNEL32(?,?,00000000,00007FFB0C4EDF0E,?,?,?,00007FFB0C4EE28B,?,?,00000000,00007FFB0C4ED3BD,?,?,?,00007FFB0C4ED2EF), ref: 00007FFB0C4E4084
                          • Part of subcall function 00007FFB0C4F2DD8: _invalid_parameter_noinfo.LIBCMT ref: 00007FFB0C4F2E0B
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ErrorHeapLast$AllocFree_invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 916656526-0
                        • Opcode ID: 8a0bdd42bc68836b7e2806b06650e954d8044ec99905b02417c7e17290acc1f9
                        • Instruction ID: d6dc043680b8f59c022048155e47a9bfada2798d3637e6815d5423d01ac3d1ef
                        • Opcode Fuzzy Hash: 8a0bdd42bc68836b7e2806b06650e954d8044ec99905b02417c7e17290acc1f9
                        • Instruction Fuzzy Hash: 6F41C2E1B0924341FA709E76A459FBEBA917F84B88F455535EE5E47782DF3CEA009200
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: HeapProcess
                        • String ID:
                        • API String ID: 54951025-0
                        • Opcode ID: 69adad11b75528e173244cf05b58ffaf7a7f9aff53e86366b35c1d5acc58023b
                        • Instruction ID: e5dc192c78f1807084f3cf072723c9b2ae1ddd2346adbcedc44d8fc9dd78f241
                        • Opcode Fuzzy Hash: 69adad11b75528e173244cf05b58ffaf7a7f9aff53e86366b35c1d5acc58023b
                        • Instruction Fuzzy Hash: DEB092A4E27A02C6EA092B32ED8AA1823A57F48B01F844038C84C41330DF2C20A64700
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ad28b59e3dbe68954b82f201316b4cdfd6c440b27104c11c395bfb58901ff097
                        • Instruction ID: 9c59f9f3a5f05c9d86cc44c76e1608f24454b574dfc5501098281ec889385aaf
                        • Opcode Fuzzy Hash: ad28b59e3dbe68954b82f201316b4cdfd6c440b27104c11c395bfb58901ff097
                        • Instruction Fuzzy Hash: 77E19CF2A0864287FB64AA39C15CB7D27A1FF45B9CF168235DE4D066D9CF29E841D700
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 391f715d3d191edc86a31a9a08a08798222532380929de8cf233e3c6661f7760
                        • Instruction ID: 5dce3d6a543f494bb831144f5dae56495444915139d86d19756ca86772791c83
                        • Opcode Fuzzy Hash: 391f715d3d191edc86a31a9a08a08798222532380929de8cf233e3c6661f7760
                        • Instruction Fuzzy Hash: 4ED17AE6E0864687FB68AA3AC458A7D27A0FF45B4CF265235DE0D07795CF39E841C740
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ErrorLastNameTranslate$CodePageValidValue_invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 4023145424-0
                        • Opcode ID: 2d5db40608cac14d07aa6be86f6764c6ac1bd3d2546c7d926e3632345e6a7bf5
                        • Instruction ID: 4dc691a25e34d03322de5b1f88ddc4214e0f69b1e50cb43845e851fdc8b829df
                        • Opcode Fuzzy Hash: 2d5db40608cac14d07aa6be86f6764c6ac1bd3d2546c7d926e3632345e6a7bf5
                        • Instruction Fuzzy Hash: C6C1C2E6A0869285EB609F72D814BBE67A4FF84B8CF414035DE8E87699DF7CD645C300
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ErrorLast$Value_invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 1500699246-0
                        • Opcode ID: 4e4624929bb0779aac866043fe9095ab607f6aa03735a5caac00b095881373a4
                        • Instruction ID: bee0207ae960d624dc5f95045976f3fd9967179330644b60fb9a17cdf31baf10
                        • Opcode Fuzzy Hash: 4e4624929bb0779aac866043fe9095ab607f6aa03735a5caac00b095881373a4
                        • Instruction Fuzzy Hash: 63B1BCE2A1865686EB64EF31D419ABD27A0FF84B8CF054235DA5B836C9DF3CE641C740
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f6d7210e4d54181cb0b2b73f2c9f49a88c8a056fd04e2009e77447b2d656a869
                        • Instruction ID: 1a3f8d85e2bb82f70aad23ac4590812ad455074f2b7b0fd5cabebe8107864585
                        • Opcode Fuzzy Hash: f6d7210e4d54181cb0b2b73f2c9f49a88c8a056fd04e2009e77447b2d656a869
                        • Instruction Fuzzy Hash: FE81D2F2A087814AEBB4CB29D448B6D7A91FF4579CF518235DA8E47B89DF3CD6408B00
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: aa3c348ed9be85e164c530600c7f89b58dd1911d92c2e2fc2ba9024f1b7ab6af
                        • Instruction ID: b0b4f54b3d81a1a0e17f911d51a096e34eaee9c7827d6cea58957c04186afce4
                        • Opcode Fuzzy Hash: aa3c348ed9be85e164c530600c7f89b58dd1911d92c2e2fc2ba9024f1b7ab6af
                        • Instruction Fuzzy Hash: 6B61E5E2E1828286FB788A38C458B7D6791BF40778F150239E71D826C1DF6DE902C700
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c9c3f90e6787dc6e65e60abd648d80575bcfa0207306300bab00d1ff848a11e7
                        • Instruction ID: ae5836fd794dc3120ab4e6265dfbee7a9def882faa479882bdc1c58163f31166
                        • Opcode Fuzzy Hash: c9c3f90e6787dc6e65e60abd648d80575bcfa0207306300bab00d1ff848a11e7
                        • Instruction Fuzzy Hash: E2516DF6A1865186FB249B39C048A2C37A1FF55B5CF244131CE4D57799CB3AE843E780
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ac8362b94cbf271fd23ce0d6965fdbbec26e6817efc2dd1af2fcdc0b4ee58872
                        • Instruction ID: 0016b382c4dd8445b688bfaded508e30d57f5e708912f535b1c7fbce9f8a944f
                        • Opcode Fuzzy Hash: ac8362b94cbf271fd23ce0d6965fdbbec26e6817efc2dd1af2fcdc0b4ee58872
                        • Instruction Fuzzy Hash: C1515DF6A1865286F7649F39C048A2C37A1FF69B5DF244131CA4D977A4CF3AE852C780
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 45278502b4de115ed76afef2690a2838d0b28876f14c66dd069eb4612fa83dd3
                        • Instruction ID: 29d707e2188c166501084c8d0717a44063e726094794e2fdf3f51fcca022d288
                        • Opcode Fuzzy Hash: 45278502b4de115ed76afef2690a2838d0b28876f14c66dd069eb4612fa83dd3
                        • Instruction Fuzzy Hash: C6518AF2A28A5286FB659F38C048B2C27A0FF59B5CF284135DA4D47794CF3AE852D740
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 485612231-0
                        • Opcode ID: bcadb0f65099c0efc5460ce4e314de804ec4df621e58b7dde1e8fb267b46e287
                        • Instruction ID: aa98101352a3109c93677ee793db9e113cefc4e9cbe5e68c7049b2b7d0c1a1a2
                        • Opcode Fuzzy Hash: bcadb0f65099c0efc5460ce4e314de804ec4df621e58b7dde1e8fb267b46e287
                        • Instruction Fuzzy Hash: C241B0B2714A5481EF04CF7AD96956DA3A1BB48FD4B49A036EE0E87B59DF3CD1428300
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fefa92ed17a17b3685cc36cac0f6a443215e38dbe71faa2ba466a38d0bc98af5
                        • Instruction ID: 3cf88ad4b90cd8ebbee1c7497342a4950f61e834c58345f558f5bb9c4aa038c3
                        • Opcode Fuzzy Hash: fefa92ed17a17b3685cc36cac0f6a443215e38dbe71faa2ba466a38d0bc98af5
                        • Instruction Fuzzy Hash: 32F0A4F1A192918AEB958F28E457A2937A0EB08380B509039E58C83A14C73D8050CF04
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6faef0993463efee478fef7dd403186479936965acddce0b5dc29c0ae85dc069
                        • Instruction ID: a6e5bbd2df1408afc8cb0b360e7086470e78fff2009693c092d1f390755b17fe
                        • Opcode Fuzzy Hash: 6faef0993463efee478fef7dd403186479936965acddce0b5dc29c0ae85dc069
                        • Instruction Fuzzy Hash: 9FC012D4F0A601C1E9181732D84E92813517F0A746F505C34C40C41370DF6C61974701
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Fac_nodeFac_node::_std::_$Concurrency::cancel_current_taskConcurrency::details::EmptyQueue::StructuredWorktype_info::_name_internal_method$Decorator::getTableTypechar_traits
                        • String ID: D$D$F$K$M$R$a$a$c$c$e$e$e$e$e$e$g$i$i$i$k$l$l$l$m$n$n$n$o$o$o$p$r$s$s$t$t$t
                        • API String ID: 2028585780-760767060
                        • Opcode ID: 6bd31a7b4a6dec1115f2241ae4669ae00e5687ebd5d8b69fd2da43176f30d982
                        • Instruction ID: 2e4bf7673fce2c6f13ad8ac4975e705c3f2445097cd70c7980420639db7365ee
                        • Opcode Fuzzy Hash: 6bd31a7b4a6dec1115f2241ae4669ae00e5687ebd5d8b69fd2da43176f30d982
                        • Instruction Fuzzy Hash: 102238A260DAC194E671DB21E4987EFA7A0FBD5788F400035E6CD47AAADF6CD508CB50
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Fac_nodeFac_node::_std::_$Concurrency::details::Concurrency::details::_CriticalEmptyHandleLock::_Queue::ReentrantScoped_lockScoped_lock::~_StructuredWorkchar_traits
                        • String ID: ==>$D$F$FrG$G$M$a$a$e$e$e$e$g$i$i$l$n$r$r$r$s$t$v
                        • API String ID: 420779418-205225161
                        • Opcode ID: 06b12158bd7739be400f80b54d36b999ed3d0a4c7cdec45e00b03fdf0f5cc72d
                        • Instruction ID: b25aa14c815a6c783a756f4484cf315336a9e4267f5e08080d7abe45e22a2f1b
                        • Opcode Fuzzy Hash: 06b12158bd7739be400f80b54d36b999ed3d0a4c7cdec45e00b03fdf0f5cc72d
                        • Instruction Fuzzy Hash: 4CE119B261DAC195EA70DB25E4997EEA7A0FBC5388F400035E6CD47BAADF6CD544CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CloseHandle$Concurrency::details::CreateEmptyProcessQueue::StructuredWork$Char_traitsFac_nodeFac_node::_std::_
                        • String ID: $ $ $.$.exe$/$a$c$c$d$e$e$h$m$r$s$t$t$x
                        • API String ID: 4010672392-1850887160
                        • Opcode ID: 6c958e876c8801456e1c78c72b2b096510d430e3db1f05a15e2e8fb7cbe02f52
                        • Instruction ID: 24f4b1f1df6c5aaa21f92fc8e668892613b2b4ccc42ab1a2a64853994b082b52
                        • Opcode Fuzzy Hash: 6c958e876c8801456e1c78c72b2b096510d430e3db1f05a15e2e8fb7cbe02f52
                        • Instruction Fuzzy Hash: 3CC128B251CAC195EA31DB60E4987EFB761FBD5348F404036E68D83AAADF6CD548CB40
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Fac_nodeFac_node::_std::_
                        • String ID: C$F$FtS$M$S$a$a$e$e$e$e$g$i$i$l$l$n$n$r$t$t
                        • API String ID: 1114552684-2189465758
                        • Opcode ID: 7038f46d0fb6016bfcabbbf7a56acb97ea06cd97676ba5ce0fd8f0f894ae483f
                        • Instruction ID: d376208f5508fdd988dd5c06278bb533cac4ad2d1d2ccc4e5a4838e178f50a0f
                        • Opcode Fuzzy Hash: 7038f46d0fb6016bfcabbbf7a56acb97ea06cd97676ba5ce0fd8f0f894ae483f
                        • Instruction Fuzzy Hash: 72B15CA260DAC191E660DB21E4947EFA7A1FFD5388F404135E6CD47BAADF6CD548CB00
                        APIs
                        • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4C65DA
                        • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4C6660
                          • Part of subcall function 00007FFB0C4A18A0: char_traits.LIBCPMTD ref: 00007FFB0C4A18C6
                        • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4C66B8
                          • Part of subcall function 00007FFB0C4C16D0: std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4C1756
                          • Part of subcall function 00007FFB0C4C16D0: std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4C1819
                          • Part of subcall function 00007FFB0C4C16D0: std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4C18A0
                          • Part of subcall function 00007FFB0C4A17F0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A1803
                          • Part of subcall function 00007FFB0C4CEF30: UnDecorator::getVbTableType.LIBCMTD ref: 00007FFB0C4CEF75
                        • type_info::_name_internal_method.LIBCMTD ref: 00007FFB0C4C67B4
                          • Part of subcall function 00007FFB0C4D3314: Concurrency::cancel_current_task.LIBCPMT ref: 00007FFB0C4D3344
                          • Part of subcall function 00007FFB0C4D3314: Concurrency::cancel_current_task.LIBCPMT ref: 00007FFB0C4D334A
                          • Part of subcall function 00007FFB0C498730: std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C498768
                          • Part of subcall function 00007FFB0C498730: std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4987CE
                          • Part of subcall function 00007FFB0C498730: std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C498834
                          • Part of subcall function 00007FFB0C498730: std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C49889F
                          • Part of subcall function 00007FFB0C498730: std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C49890A
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Fac_nodeFac_node::_std::_$Concurrency::cancel_current_task$Concurrency::details::Decorator::getEmptyQueue::StructuredTableTypeWorkchar_traitstype_info::_name_internal_method
                        • String ID: C$F$M$S$a$a$e$e$e$e$g$i$i$l$l$n$n$r$t$t
                        • API String ID: 924362910-1541419571
                        • Opcode ID: 77ad3dcacc819c8074549e8cb4fce2620618e45aee66834d860208e599b7cd46
                        • Instruction ID: 9d9962292ccc4fe13af75145a190dc7dde380ffde81b8293639ba1c2edec75a0
                        • Opcode Fuzzy Hash: 77ad3dcacc819c8074549e8cb4fce2620618e45aee66834d860208e599b7cd46
                        • Instruction Fuzzy Hash: 5EC149B260DAC191E670DB25E4987EFA7A0FBC5388F404135E6CD47AAADF6CC548CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Fac_nodeFac_node::_std::_$type_info::_name_internal_method
                        • String ID: F$F$M$R$U$a$a$e$e$e$e$error$g$i$i$l$l$n$p$r
                        • API String ID: 3843115320-2728630413
                        • Opcode ID: 81f103a8ec2d233551639a9b6812fc6fa32f33736e52a3f5ef578c4c71d8b52e
                        • Instruction ID: 3f441480f429af37ef28aee9613ba113e153102deb2f336af3f3257786fb15b8
                        • Opcode Fuzzy Hash: 81f103a8ec2d233551639a9b6812fc6fa32f33736e52a3f5ef578c4c71d8b52e
                        • Instruction Fuzzy Hash: 43A140A261DAC191E660DB65E4957EFA7A1FBD5388F400035E6CD43BAADF6CD508CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Fac_nodeFac_node::_std::_$Concurrency::cancel_current_task$Decorator::getTableType
                        • String ID: F$F$M$R$U$a$a$e$e$e$e$g$i$i$l$l$n$p$r
                        • API String ID: 3873182351-3194299963
                        • Opcode ID: cceb8069f4297fbc66c64de1921dbd579af9ecf0fe818de6894273c488657f6c
                        • Instruction ID: cd1b2cf50a00a827947b901aaeff44b8d7ab075c778280e54553717e998418e3
                        • Opcode Fuzzy Hash: cceb8069f4297fbc66c64de1921dbd579af9ecf0fe818de6894273c488657f6c
                        • Instruction Fuzzy Hash: B8C14CA261DAC190E670DB65E4987EFA7A0FBD5388F400035E6CD43BAADF6CD544CB00
                        APIs
                        • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C49E8AF
                          • Part of subcall function 00007FFB0C4D3314: Concurrency::cancel_current_task.LIBCPMT ref: 00007FFB0C4D3344
                          • Part of subcall function 00007FFB0C4D3314: Concurrency::cancel_current_task.LIBCPMT ref: 00007FFB0C4D334A
                        • type_info::_name_internal_method.LIBCMTD ref: 00007FFB0C49EB37
                        • Concurrency::cancellation_token::_FromImpl.LIBCPMTD ref: 00007FFB0C49EBA3
                          • Part of subcall function 00007FFB0C4CEF30: UnDecorator::getVbTableType.LIBCMTD ref: 00007FFB0C4CEF75
                        • type_info::_name_internal_method.LIBCMTD ref: 00007FFB0C49ED9B
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::cancel_current_tasktype_info::_name_internal_method$Concurrency::cancellation_token::_Decorator::getFac_nodeFac_node::_FromImplTableTypestd::_
                        • String ID: D$S$a$c$d$e$k$l$n$o$o$o$pre$save$t$w
                        • API String ID: 1666591369-2572745379
                        • Opcode ID: e1beb11f88c3f465767712ef40d00eab0c38a093fd37845a0287b88e9c036e01
                        • Instruction ID: acebe2a6e0bf66b2fb9581452c30edabf632ede496c9e1b3bd9910a4c10ae31b
                        • Opcode Fuzzy Hash: e1beb11f88c3f465767712ef40d00eab0c38a093fd37845a0287b88e9c036e01
                        • Instruction Fuzzy Hash: 240200B250DAC291DA60EB65F4997EEA3A0FFC6748F400035E68D47BAADF2CD544CB40
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Decorator::getDisplayEnumFac_nodeFac_node::_GdiplusMonitorsStartupTableTypestd::_
                        • String ID: D$R$e$e$e$jpg$k$m$o$o$p$s$t$t
                        • API String ID: 1258987360-2495397863
                        • Opcode ID: 0376868cded45940f74879cd6041a621dbbccedbde02714d0882a14ae9de4514
                        • Instruction ID: aedb2dd07ae0ff1fc216feb3818a262b2195cc3b54ef793d1278dbe66aa8c379
                        • Opcode Fuzzy Hash: 0376868cded45940f74879cd6041a621dbbccedbde02714d0882a14ae9de4514
                        • Instruction Fuzzy Hash: 3B914AB260CAC181EB60DB24E4957EEA7A0FBD5788F404136E68D43BAADF7CD505CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: type_info::_name_internal_method$GdiplusShutdownchar_traits
                        • String ID: .bmp$.gif$.ico$.jfif$.jpeg$.jpg$.png
                        • API String ID: 3499204208-3397763088
                        • Opcode ID: 0f246cb72e55f54a7b693d8fc228ba5af8b2ca5bc0172a7175d6b3f4dadf06c9
                        • Instruction ID: 9f6df285b487479f207571b5e43f6671e599c19d923cae0a47783f9e6c44d184
                        • Opcode Fuzzy Hash: 0f246cb72e55f54a7b693d8fc228ba5af8b2ca5bc0172a7175d6b3f4dadf06c9
                        • Instruction Fuzzy Hash: 55122FF251C6C286D6709B25E4957EEA760FF853A8F001332E6ED869EADF2CD505CB40
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: FromString$char_traits
                        • String ID: bmp$gif$jpg$png$tif${557cf400-1a04-11d3-9a73-0000f81ef32e}${557cf401-1a04-11d3-9a73-0000f81ef32e}${557cf402-1a04-11d3-9a73-0000f81ef32e}${557cf405-1a04-11d3-9a73-0000f81ef32e}${557cf406-1a04-11d3-9a73-0000f81ef32e}
                        • API String ID: 3612880244-2938333857
                        • Opcode ID: 27bbbdadbdfd53492e3170faa8fbfabf8b77fc76d5c273dd4bfb8bd4d69b80a3
                        • Instruction ID: bfd92ba618c3abdb280366876a9b714a5ef5ea4a6b90a5f2191c3e2b3fc85898
                        • Opcode Fuzzy Hash: 27bbbdadbdfd53492e3170faa8fbfabf8b77fc76d5c273dd4bfb8bd4d69b80a3
                        • Instruction Fuzzy Hash: BD319EF5A0CA4691EA90DB31E8999BE6361FFC43D8F805032D98D826B6FF6CE504C700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$DestroyIcon$Concurrency::details::Concurrency::task_continuation_context::task_continuation_contextCreateEmptyFileFromGlobalInfoQueue::StreamStringStructuredWorkchar_traits
                        • String ID: png
                        • API String ID: 2892423481-2199389072
                        • Opcode ID: 3f4d1903d060947872d62ea0832601307776e2177d9c20e6ab654d14b78093e7
                        • Instruction ID: 153618906a33e4676fcdcff104682e7792050aff3318ae2a0266c0b09a231cab
                        • Opcode Fuzzy Hash: 3f4d1903d060947872d62ea0832601307776e2177d9c20e6ab654d14b78093e7
                        • Instruction Fuzzy Hash: 4CD11EB2618A8191DA60DB25E4957EEA760FFC4788F405036EB8E83BB9DF3CD545CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: DisplayEnumMonitors
                        • String ID: $DISPLAY$h
                        • API String ID: 2950131505-1878358626
                        • Opcode ID: 672e0ac83053d01c40282062667c1306d9c30b7dde12ecaa6dd10ab88f712e8c
                        • Instruction ID: 34be85328bd24bdd5a916cbf6154b939c4f0a5a2227dfc09e792336a6ddef5c4
                        • Opcode Fuzzy Hash: 672e0ac83053d01c40282062667c1306d9c30b7dde12ecaa6dd10ab88f712e8c
                        • Instruction Fuzzy Hash: 2F51E9B2608A8186E760CB25F494BAEB3A1FBC4794F404136E68D83BA9DF7CD445CF00
                        APIs
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4A7AD7
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4A7BBA
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4A7C56
                        • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FFB0C4A7D92
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4A7E20
                          • Part of subcall function 00007FFB0C4AE180: UnDecorator::getVbTableType.LIBCMTD ref: 00007FFB0C4AE1AA
                          • Part of subcall function 00007FFB0C4AB800: _Byte_length.LIBCPMTD ref: 00007FFB0C4AB894
                        • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FFB0C4A7F72
                          • Part of subcall function 00007FFB0C4A18A0: char_traits.LIBCPMTD ref: 00007FFB0C4A18C6
                          • Part of subcall function 00007FFB0C4C6420: std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4C65DA
                          • Part of subcall function 00007FFB0C4A3500: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A352B
                          • Part of subcall function 00007FFB0C4A3500: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A353A
                        • UnDecorator::getVbTableType.LIBCMTD ref: 00007FFB0C4A81D1
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: std::runtime_error::runtime_error$Concurrency::details::Concurrency::details::_CriticalDecorator::getEmptyLock::_Queue::ReentrantScoped_lockScoped_lock::~_StructuredTableTypeWork$Byte_lengthFac_nodeFac_node::_char_traitsstd::_
                        • String ID:
                        • API String ID: 2648250531-0
                        • Opcode ID: 10e5aabb9e6fc4fdddd820bcfa3ebd73f5817d978fdd08d2721dca1ea0752213
                        • Instruction ID: 2c6ccca2a1a2d1014eb3cb9a5be560458a7e38c07fe36ed5b4ae9b1e45fcb374
                        • Opcode Fuzzy Hash: 10e5aabb9e6fc4fdddd820bcfa3ebd73f5817d978fdd08d2721dca1ea0752213
                        • Instruction Fuzzy Hash: B72207B2619AC685DA70DB25E4A47EEB760FBC5788F401126DB8D83BA9DF3CD504CB40
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID: f$p$p
                        • API String ID: 3215553584-1995029353
                        • Opcode ID: b0d905913f178a05850a904996d5be31d3cd629aea336fc8d1d384171e8fe448
                        • Instruction ID: 90ce7d4abbc8dc288db5e85f1da64ccfed19ad0079353285188793a5eea5577f
                        • Opcode Fuzzy Hash: b0d905913f178a05850a904996d5be31d3cd629aea336fc8d1d384171e8fe448
                        • Instruction Fuzzy Hash: 9B1250E1E0C25395FB246E35E098ABD7792FF40758F944136E69A466C8DF3CE980DB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Mpunct$ctypestd::ios_base::width
                        • String ID: @
                        • API String ID: 3075750325-2766056989
                        • Opcode ID: e67de69f98cff780475ac0c8084deb56d29bcf2359572f96fc364d3a03f4861c
                        • Instruction ID: b0993fca398109b01c5206cac192f44917fad60101ef0f166d334ff29078c7a0
                        • Opcode Fuzzy Hash: e67de69f98cff780475ac0c8084deb56d29bcf2359572f96fc364d3a03f4861c
                        • Instruction Fuzzy Hash: F712F9B260DAC585DA70DB65E4947EEA7A1FBC8784F404032EA8D83BA9DF7CD544CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchState
                        • String ID: csm$csm$csm
                        • API String ID: 1826822863-393685449
                        • Opcode ID: b7d4d4716e35da0fc0172e1e3833d4da2368a2d721fc2e596173c5bbb2df18cc
                        • Instruction ID: 3bdeae41bd1671ff7ed69708a71d53f60b41424c3a2009396a43c41bf0207373
                        • Opcode Fuzzy Hash: b7d4d4716e35da0fc0172e1e3833d4da2368a2d721fc2e596173c5bbb2df18cc
                        • Instruction Fuzzy Hash: 0BD159F2A086418AFB20AB75D448BAD67A0FF4579CF110536EE8D57B9ADF38E095C700
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: 1af2f397556159a40397c7a42c75fb3f25a92a611569733e463ee90238977ba7
                        • Instruction ID: 71cfc696228e56f44a792721c0175e85eb363bde18d4df01b58d84a5612094e9
                        • Opcode Fuzzy Hash: 1af2f397556159a40397c7a42c75fb3f25a92a611569733e463ee90238977ba7
                        • Instruction Fuzzy Hash: 82C1CFE2A0868691EA609B25D44CAFDB7A1FFA1B98F560131DA4F073D1DF7DEA458300
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: File$CloseConcurrency::details::CreateEmptyHandleQueue::SizeStructuredWork
                        • String ID:
                        • API String ID: 2285079412-0
                        • Opcode ID: e155523a2607a2c161b7ce0223fbcfffcf75895e662939dd0c3e66526e39bfe8
                        • Instruction ID: 43b1de89ad0db1f88262be5c26eeabc0366a9d2a26a8f6e9a73cc4cec9d60bd6
                        • Opcode Fuzzy Hash: e155523a2607a2c161b7ce0223fbcfffcf75895e662939dd0c3e66526e39bfe8
                        • Instruction Fuzzy Hash: 96411AB260C98186E720DB25E459BAEB7B0FFC1798F504135E6CD87AA9CF7DD8458B00
                        APIs
                        • LoadLibraryExW.KERNEL32(?,?,00000000,00007FFB0C4D8F13,?,?,?,00007FFB0C4D59DA,?,?,?,00007FFB0C4D5995), ref: 00007FFB0C4D8D91
                        • GetLastError.KERNEL32(?,?,00000000,00007FFB0C4D8F13,?,?,?,00007FFB0C4D59DA,?,?,?,00007FFB0C4D5995), ref: 00007FFB0C4D8D9F
                        • LoadLibraryExW.KERNEL32(?,?,00000000,00007FFB0C4D8F13,?,?,?,00007FFB0C4D59DA,?,?,?,00007FFB0C4D5995), ref: 00007FFB0C4D8DC9
                        • FreeLibrary.KERNEL32(?,?,00000000,00007FFB0C4D8F13,?,?,?,00007FFB0C4D59DA,?,?,?,00007FFB0C4D5995), ref: 00007FFB0C4D8E37
                        • GetProcAddress.KERNEL32(?,?,00000000,00007FFB0C4D8F13,?,?,?,00007FFB0C4D59DA,?,?,?,00007FFB0C4D5995), ref: 00007FFB0C4D8E43
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$Load$AddressErrorFreeLastProc
                        • String ID: api-ms-
                        • API String ID: 2559590344-2084034818
                        • Opcode ID: 492e68bbb1773d240888386dda676b62b4bbe1757f3f4df5f2fd3b7df8b2a67b
                        • Instruction ID: 628f7d7c5134f3b222a35383025689142068b3f4b42cd82ac00d78998914acc8
                        • Opcode Fuzzy Hash: 492e68bbb1773d240888386dda676b62b4bbe1757f3f4df5f2fd3b7df8b2a67b
                        • Instruction Fuzzy Hash: 6E31B0E1B1A74291FE12AB22E808D7D23A4FF48BA8F590535ED1D4A7D1EF3CE4418740
                        APIs
                        • GetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2417
                        • FlsGetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E242C
                        • FlsSetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E244D
                        • FlsSetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E247A
                        • FlsSetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E248B
                        • FlsSetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E249C
                        • SetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E24B7
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Value$ErrorLast
                        • String ID:
                        • API String ID: 2506987500-0
                        • Opcode ID: 59373f8d53b31bb45b24a81f44cc7f7f763d6d1bbe38ce609f55f8ea00006115
                        • Instruction ID: bd2ffef633b05a18021b2cbe6583ef3aeea8c67ab1510866612b7aa3257a83b1
                        • Opcode Fuzzy Hash: 59373f8d53b31bb45b24a81f44cc7f7f763d6d1bbe38ce609f55f8ea00006115
                        • Instruction Fuzzy Hash: C62150E0B0C64242FA68AB71D95DD3D53957F447B8F161738E93F467D6DF6CA6018200
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                        • String ID: CONOUT$
                        • API String ID: 3230265001-3130406586
                        • Opcode ID: aaa7478a30f227f436a7fdc7f67f6462c4936cde7976a00747b319838b7bad40
                        • Instruction ID: 82935e91267595b9fa4b0ea9af6f9efe455b8ff1d73bb699df700a33f42eb881
                        • Opcode Fuzzy Hash: aaa7478a30f227f436a7fdc7f67f6462c4936cde7976a00747b319838b7bad40
                        • Instruction Fuzzy Hash: 5A118EF1B18A4186E3508B62E859B2D67A4FF88FE9F041634EA6D877A4CF3CD4058740
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ErrorFileLast$CloseConcurrency::details::CreateEmptyHandleQueue::SizeStructuredWork
                        • String ID:
                        • API String ID: 1161490322-0
                        • Opcode ID: 1dea7533e81207ac8a784632e534d43140b698bbcad88c187d8879aa26368a2d
                        • Instruction ID: 0f057029788388ab6dd7afad3e3ecc16af049c73dda1cf96b6698a9e14760f16
                        • Opcode Fuzzy Hash: 1dea7533e81207ac8a784632e534d43140b698bbcad88c187d8879aa26368a2d
                        • Instruction Fuzzy Hash: B501CCB1908A5186E7109B35F85CB2E77B0FF81BA9F201634E6AD46AB4CF3DD4469B00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressErrorFreeLastLoadProc
                        • String ID: inet_pton$ws2_32.dll
                        • API String ID: 2540614322-1244057378
                        • Opcode ID: f72124b0816627394e4800e943be552c9ae965a8f5f9275f8fed54044a445383
                        • Instruction ID: bd7b1034d00265b96ad6cb522f33cead2fcd56c66f4e292b83da6e4cb4f5a435
                        • Opcode Fuzzy Hash: f72124b0816627394e4800e943be552c9ae965a8f5f9275f8fed54044a445383
                        • Instruction Fuzzy Hash: 9F01DBF291CB4186E620DF25E888B2EB770FF85799F501235E58D427A8CF3CD5458B00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressErrorFreeLastLoadProc
                        • String ID: shutdown$ws2_32.dll
                        • API String ID: 2540614322-1549006702
                        • Opcode ID: 04e719e17db4c40d27fc3eeb3ad78a178e066fcb23fb87a825b186b968d0ada3
                        • Instruction ID: 0935cd2f17deac14546844b6006e9f22a914bf92cdc39f8a8b2c1cad60165241
                        • Opcode Fuzzy Hash: 04e719e17db4c40d27fc3eeb3ad78a178e066fcb23fb87a825b186b968d0ada3
                        • Instruction Fuzzy Hash: 9C01E1F291CA41C6E620DF25F488B2EB7B0FF847A9F501231E58E42AA8CF3CD5558B00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressErrorFreeLastLoadProc
                        • String ID: closesocket$ws2_32.dll
                        • API String ID: 2540614322-181964208
                        • Opcode ID: 3fefd687c93cc16ac5c0f73265be1874ef04f7f879d6f0608bedc8a6b0f68dc9
                        • Instruction ID: 26535820a64410d0dea05c7bba23010e93b287a8b0392a60c2a6a240b3e06e81
                        • Opcode Fuzzy Hash: 3fefd687c93cc16ac5c0f73265be1874ef04f7f879d6f0608bedc8a6b0f68dc9
                        • Instruction Fuzzy Hash: 4C01BBF191CA51C6E6209B65F988B2D77A0FF84769F501231E58E42AA4CF3CD55A8B00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressErrorFreeLastLoadProc
                        • String ID: WSAGetLastError$ws2_32.dll
                        • API String ID: 2540614322-1955703101
                        • Opcode ID: fe3d982a96a16abdc97643669944ad9cefe5dc86cd7eec1d1c0fa1a680c5434b
                        • Instruction ID: 1237345418e1c0189ed4124f7b5f0427e589971eb706420e7209bd9a23f757b2
                        • Opcode Fuzzy Hash: fe3d982a96a16abdc97643669944ad9cefe5dc86cd7eec1d1c0fa1a680c5434b
                        • Instruction Fuzzy Hash: 28F0ECF191CA51C6E6209B24F889B2D77B0FF9476DF401235E58E42AA8CF3CD5568A00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressErrorFreeLastLoadProc
                        • String ID: WSACleanup$ws2_32.dll
                        • API String ID: 2540614322-2677834364
                        • Opcode ID: d4c9f652633523056b2cb113cf7c70b1b34af1ea84f87650ba350b30f5e514b2
                        • Instruction ID: 4311fc4b9cb26b1505b757916b1a009073e9f08ffd9411c25f2953adfabdf063
                        • Opcode Fuzzy Hash: d4c9f652633523056b2cb113cf7c70b1b34af1ea84f87650ba350b30f5e514b2
                        • Instruction Fuzzy Hash: 0BF0ECF1D1CA52C6F6209B28F88CB2D67B0FF857ADF501235E58E42AA4CF3CD5568A01
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ByteCharMultiStringWide
                        • String ID:
                        • API String ID: 2829165498-0
                        • Opcode ID: e599737eeba393ba2e7364258460f95dd52f47ec3c249f4a66a619b501052b22
                        • Instruction ID: 4ed73cae51c182775287e1c7e29c128328a11b7bd6af6dba720308e42a85a776
                        • Opcode Fuzzy Hash: e599737eeba393ba2e7364258460f95dd52f47ec3c249f4a66a619b501052b22
                        • Instruction Fuzzy Hash: E8818DF2A0874286FB209F65E848A6D73A5FF44BA8F144635EA5E47BE8DF7CD4018701
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Fgetc
                        • String ID:
                        • API String ID: 1720979605-0
                        • Opcode ID: 7474813165e588f6f20f2e4cb041319f60019012d1210d351f19dbeef243aec6
                        • Instruction ID: 162d4046f80b3f9e21dd500c0110bd0ef1431ccf008c0a14e402c8d31616d753
                        • Opcode Fuzzy Hash: 7474813165e588f6f20f2e4cb041319f60019012d1210d351f19dbeef243aec6
                        • Instruction Fuzzy Hash: 2681CAE290CA8186EA20DB75E4947BEB7A5FFC5788F505036E78D47A9ADF2CD404CB40
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::EmptyMpunctQueue::StructuredWorkshared_ptrstd::ios_base::width
                        • String ID:
                        • API String ID: 2515095778-0
                        • Opcode ID: cc37aa2f08600195c4d40083c9100ee5bb4f7a66da4c1f895df5384b038f517e
                        • Instruction ID: 160a4f56436cd4038e2ca8e4207b9954922420a78449f1242b5782e1e8c062b5
                        • Opcode Fuzzy Hash: cc37aa2f08600195c4d40083c9100ee5bb4f7a66da4c1f895df5384b038f517e
                        • Instruction Fuzzy Hash: 8981D3B261CAC591DA70AB21E4947EFA765FBC8784F804072EACD83B99DF2CD544CB40
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00007FFB0C4D24BD
                        • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4B240B,?,?,?,?,00007FFB0C4AC458), ref: 00007FFB0C4D24DC
                        • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4B240B,?,?,?,?,00007FFB0C4AC458), ref: 00007FFB0C4D24FE
                        • sys_get_time.LIBCPMT ref: 00007FFB0C4D2519
                        • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4B240B,?,?,?,?,00007FFB0C4AC458), ref: 00007FFB0C4D253F
                        • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4B240B,?,?,?,?,00007FFB0C4AC458), ref: 00007FFB0C4D2557
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: AcquireExclusiveLock$CurrentThreadsys_get_time
                        • String ID:
                        • API String ID: 184115430-0
                        • Opcode ID: 2419752cfd1b9c9900042bb42ff48b6b6b5b9f09afe652682e084dd5a96abbf7
                        • Instruction ID: 7a86f7679ed2456c09bf7c6d55f070e198fcf34d78fa2c63e92643d6d77124a2
                        • Opcode Fuzzy Hash: 2419752cfd1b9c9900042bb42ff48b6b6b5b9f09afe652682e084dd5a96abbf7
                        • Instruction Fuzzy Hash: C741F6F2A2864286FB74AF34D469A3D73A0FF54B69F404031DA4D42698DF78ED91C700
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Atomic_long::operator=CurrentListThreadatomic_compare_exchangestd::_
                        • String ID:
                        • API String ID: 2550250828-0
                        • Opcode ID: 932c88e282ccbfc92ed9550ae828c613280df863858bfd3a7e06f2706118e393
                        • Instruction ID: e1ac78fb7f5cf9b346fcea785570f983ea7e829a115abd642f540d7fe899bfe1
                        • Opcode Fuzzy Hash: 932c88e282ccbfc92ed9550ae828c613280df863858bfd3a7e06f2706118e393
                        • Instruction Fuzzy Hash: 6C3162F1A0C64292FA209B67E04967E67A0FF8578CF400475EA8D47A9ADF2CD505CB44
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Mpunct$ctypestd::ios_base::width
                        • String ID: @
                        • API String ID: 3075750325-2766056989
                        • Opcode ID: 79372846ecdc4f70b43a1b702baf31c287688e89bcffe4d267ae24acf13d0921
                        • Instruction ID: fdd100fcd16ed44eadf49224adb02513cc045a19f4abbcf2b75d1d587b1d5ff4
                        • Opcode Fuzzy Hash: 79372846ecdc4f70b43a1b702baf31c287688e89bcffe4d267ae24acf13d0921
                        • Instruction Fuzzy Hash: 34F1D7B260CAC985DA709B25E4947EFA761FBC8784F444032EACD83B6ADF6CD545CB40
                        APIs
                        • GetLastError.KERNEL32(?,?,000054395CB08AAD,00007FFB0C4E0205,?,?,?,?,00007FFB0C4EB486,?,?,00000000,00007FFB0C4ECFC7,?,?,?), ref: 00007FFB0C4E258F
                        • FlsSetValue.KERNEL32(?,?,000054395CB08AAD,00007FFB0C4E0205,?,?,?,?,00007FFB0C4EB486,?,?,00000000,00007FFB0C4ECFC7,?,?,?), ref: 00007FFB0C4E25C5
                        • FlsSetValue.KERNEL32(?,?,000054395CB08AAD,00007FFB0C4E0205,?,?,?,?,00007FFB0C4EB486,?,?,00000000,00007FFB0C4ECFC7,?,?,?), ref: 00007FFB0C4E25F2
                        • FlsSetValue.KERNEL32(?,?,000054395CB08AAD,00007FFB0C4E0205,?,?,?,?,00007FFB0C4EB486,?,?,00000000,00007FFB0C4ECFC7,?,?,?), ref: 00007FFB0C4E2603
                        • FlsSetValue.KERNEL32(?,?,000054395CB08AAD,00007FFB0C4E0205,?,?,?,?,00007FFB0C4EB486,?,?,00000000,00007FFB0C4ECFC7,?,?,?), ref: 00007FFB0C4E2614
                        • SetLastError.KERNEL32(?,?,000054395CB08AAD,00007FFB0C4E0205,?,?,?,?,00007FFB0C4EB486,?,?,00000000,00007FFB0C4ECFC7,?,?,?), ref: 00007FFB0C4E262F
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Value$ErrorLast
                        • String ID:
                        • API String ID: 2506987500-0
                        • Opcode ID: 99c4fb7652d9ce38ef6bb4778c86f62a3b987b83f4fa8d24ff062a7d41f119d4
                        • Instruction ID: 0a0984bda88c9414dc0fa477711c21482e25d439f8cb8b0ce9f0d46b431cc473
                        • Opcode Fuzzy Hash: 99c4fb7652d9ce38ef6bb4778c86f62a3b987b83f4fa8d24ff062a7d41f119d4
                        • Instruction Fuzzy Hash: D3118BE0B0824241FA646771DA6E83D22967F447B8F061738E92F066D7DFACA6018200
                        APIs
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4C853C
                        • CreateStreamOnHGlobal.OLE32(00000018,00000018), ref: 00007FFB0C4C86B9
                        • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FFB0C4C8848
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::Concurrency::details::_CreateCriticalEmptyGlobalLock::_Queue::ReentrantScoped_lockScoped_lock::~_StreamStructuredWork
                        • String ID: &$png
                        • API String ID: 937857008-590921033
                        • Opcode ID: a02a5915b169f93c8df62664061c238649ba4b1e9cf7918faaec1bf91d763e0c
                        • Instruction ID: 80ae4b78b53f608f17fe82664c6732fe77bd5d35570d6ad917f466b0292d16b5
                        • Opcode Fuzzy Hash: a02a5915b169f93c8df62664061c238649ba4b1e9cf7918faaec1bf91d763e0c
                        • Instruction Fuzzy Hash: D1B10CB2619A8196D7A0DB25E494BAFB360FFD5784F505022E68E83A69DF7CD444CF00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getfacetstd::locale::_
                        • String ID: h
                        • API String ID: 228209623-2369973550
                        • Opcode ID: 822cb25b02a99ae88a5306ef9a32b2b0c088c945457889bc584b9dc35bc811c1
                        • Instruction ID: e50683d561669a52dd130e25d0b181595bfeaaa2c8ab08eaa336bfa3fed8090e
                        • Opcode Fuzzy Hash: 822cb25b02a99ae88a5306ef9a32b2b0c088c945457889bc584b9dc35bc811c1
                        • Instruction Fuzzy Hash: AD21F0A691DA8581DA60EB25F48566EB7A0FFC57A4F501132FA8E43BB9DF3CD540CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CloseHandle$Concurrency::details::CreateEmptyProcessQueue::StructuredWork
                        • String ID: h
                        • API String ID: 4039953145-2439710439
                        • Opcode ID: 1fb3b1661452321f49f255d9558171575636aca6ab531ad18d52b59ca12d7b4b
                        • Instruction ID: f68f8b20af884b469e362680e374f547b0781731fd96dd32f7edf156e95fd958
                        • Opcode Fuzzy Hash: 1fb3b1661452321f49f255d9558171575636aca6ab531ad18d52b59ca12d7b4b
                        • Instruction Fuzzy Hash: 5D21FB72618AC595DB20DB20F4987AEB762FBC4784F504135E68D43AA9DF3CD158CB00
                        APIs
                        • std::make_error_code.LIBCPMTD ref: 00007FFB0C4A58F8
                        • std::ios_base::failure::failure.LIBCPMTD ref: 00007FFB0C4A590A
                          • Part of subcall function 00007FFB0C4D4720: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFB0C4D407B), ref: 00007FFB0C4D4770
                          • Part of subcall function 00007FFB0C4D4720: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFB0C4D407B), ref: 00007FFB0C4D47B1
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ExceptionFileHeaderRaisestd::ios_base::failure::failurestd::make_error_code
                        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                        • API String ID: 1846417002-1866435925
                        • Opcode ID: b43a7e3578587d706e7b548345c629502e0c54278e9975b3f49c218492a832f3
                        • Instruction ID: cd4f39962addebe6c0a3daf77a85ef6008c91915024d28eae03eefe1cfe7f211
                        • Opcode Fuzzy Hash: b43a7e3578587d706e7b548345c629502e0c54278e9975b3f49c218492a832f3
                        • Instruction Fuzzy Hash: B9215EF2A0CA8186E774CB25E44576E77A4FB88348F544035E68D83B59DF2CD554CB10
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: inet_ntop$ws2_32.dll
                        • API String ID: 145871493-102659834
                        • Opcode ID: c59f4af2208141b044d29c11331e9f013cc3aa828399f6e03293c1c1ef900ac2
                        • Instruction ID: 06e8d56e5aefd53ca37e887d4da61f45b37c14063e8416a29bfaa0d0c7d66855
                        • Opcode Fuzzy Hash: c59f4af2208141b044d29c11331e9f013cc3aa828399f6e03293c1c1ef900ac2
                        • Instruction Fuzzy Hash: 5801CCF291CB45C6D660CB25F44871EB7A0FB99798F500535EA8E42B68CF7CD5558B00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$mscoree.dll
                        • API String ID: 4061214504-1276376045
                        • Opcode ID: 90750d0abb37c8c35f7a0fe7af244b43ddc420886ae82852e0a1996fb812f520
                        • Instruction ID: 198b844818646f70ba775547850eb6210e9e6ce8646420a8d0b4ae0d9ab53744
                        • Opcode Fuzzy Hash: 90750d0abb37c8c35f7a0fe7af244b43ddc420886ae82852e0a1996fb812f520
                        • Instruction Fuzzy Hash: D4F062E1A1860681FB148B74E849B3D6370BF857A5F540735C6AE851F4DF3CD1458700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: htons$ws2_32.dll
                        • API String ID: 145871493-1975133265
                        • Opcode ID: 439baf8cef27b03b02ca0dfe2403df779e1052c0166b6725c54574d1b49bfcac
                        • Instruction ID: 5f7e95ed387b48a115e2bd3a367e46bcaeaced6e796b16e3bfbe2874409fb706
                        • Opcode Fuzzy Hash: 439baf8cef27b03b02ca0dfe2403df779e1052c0166b6725c54574d1b49bfcac
                        • Instruction Fuzzy Hash: C70112F191CA51C6E7209B25E48873D77A0FF847ADF501131E58E82AA4DF3CD54A9B00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: freeaddrinfo$ws2_32.dll
                        • API String ID: 145871493-447766333
                        • Opcode ID: 6b8569ae28fb1e528403060c51b49f1547483ef8ef8edf79f62fa932a7e04958
                        • Instruction ID: 07b610426540e4761464e5cfc52712ee8d63ab82fd5cee13dfa031216eb5bfc2
                        • Opcode Fuzzy Hash: 6b8569ae28fb1e528403060c51b49f1547483ef8ef8edf79f62fa932a7e04958
                        • Instruction Fuzzy Hash: 4FF0A4F691CA51C2E6209B61F89CB2D67B0FF9979DF500131D68E42AB4CF3CD55ACA00
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: AdjustPointer
                        • String ID:
                        • API String ID: 1740715915-0
                        • Opcode ID: 2c4cd24dc23d04e538900412c8b76dc8e884207eadeb2926ca5d18de86a86aa6
                        • Instruction ID: 1959eebd9da4d5a0f879b6a9f9bb7bf1b135d7149a41f98ed8bedb47e0a98bc3
                        • Opcode Fuzzy Hash: 2c4cd24dc23d04e538900412c8b76dc8e884207eadeb2926ca5d18de86a86aa6
                        • Instruction Fuzzy Hash: 3CB18FF2A0EA4281FA65FB75D448A7D66A0FF54B8CF098836DA4D0B795DF2CE4428341
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: fpos
                        • String ID:
                        • API String ID: 1083263101-0
                        • Opcode ID: f351de1dbd54376754315496ebcd0fc187e74d0cf5171b4e2e2ccbca7ab9123b
                        • Instruction ID: d1cd8f8c9b34ebd0e21ee81f2cd9b4653c65965f322f84d8968eeea41b5f6770
                        • Opcode Fuzzy Hash: f351de1dbd54376754315496ebcd0fc187e74d0cf5171b4e2e2ccbca7ab9123b
                        • Instruction Fuzzy Hash: 95A15EA260CB8585DA708B26E4447AEB7A4FB85798F194175FADE87B98CF3CD444CB00
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _set_statfp
                        • String ID:
                        • API String ID: 1156100317-0
                        • Opcode ID: c355139fb5d490f5a378c13f74b27d4e88c3ad045c11d9cfe0408108ad209acf
                        • Instruction ID: 6a2e62b9c157b4c90fb81bd881140bf7213ef9ccbccabcd1637d0dcfb17c9485
                        • Opcode Fuzzy Hash: c355139fb5d490f5a378c13f74b27d4e88c3ad045c11d9cfe0408108ad209acf
                        • Instruction Fuzzy Hash: 3E8116E2908A9645F2729B35E408BFF6650BF6535CF164331ED4F166E4DF3CEA818600
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 630393fca0c67851686c251f707a3871fec54fb42ba9ee963f6652eefca2e4fa
                        • Instruction ID: f6ff8cea6b09d029043698be042aa5899db2ed88a204e49f98b6b4e0462325dc
                        • Opcode Fuzzy Hash: 630393fca0c67851686c251f707a3871fec54fb42ba9ee963f6652eefca2e4fa
                        • Instruction Fuzzy Hash: EA610BB260D6828AD670DB25E494BAEB7A0FBC4748F404135E68D83AA9DF3CD945CF40
                        APIs
                        • Concurrency::details::_Task_impl_base::_IsCompleted.LIBCPMTD ref: 00007FFB0C4AF10A
                        • Concurrency::details::_Task_impl_base::_IsCanceled.LIBCPMTD ref: 00007FFB0C4AF11E
                        • Concurrency::details::_Task_impl_base::_IsPendingCancel.LIBCPMTD ref: 00007FFB0C4AF132
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::_Task_impl_base::_$CancelCanceledCompletedPending
                        • String ID:
                        • API String ID: 253852663-0
                        • Opcode ID: 26b5f8307980dc583c560a7f62313e8efdef9bb3a0fde214825c4634712e56a7
                        • Instruction ID: bdefba3bf2713b7d900feafcfd339a36209acf071176a241557984d8e2636f46
                        • Opcode Fuzzy Hash: 26b5f8307980dc583c560a7f62313e8efdef9bb3a0fde214825c4634712e56a7
                        • Instruction Fuzzy Hash: 7C514EE2A1D28285FA309776E4597BFA7A0FF81748F404075E6CD47B9ADF2CD9098B40
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: char_traits$Concurrency::details::EmptyQueue::StructuredWork$Max_valueMin_valuewmemset
                        • String ID:
                        • API String ID: 1140703174-0
                        • Opcode ID: 28118e790413db02ba06dbb63724687c31dc690438f373b7df5c7ec3ffc14a31
                        • Instruction ID: e73538da84c83c1682f0075a72082a29a2e6f81a2bfdb2f24c244ca6fbd12a78
                        • Opcode Fuzzy Hash: 28118e790413db02ba06dbb63724687c31dc690438f373b7df5c7ec3ffc14a31
                        • Instruction Fuzzy Hash: 01412CA6A2DB4582CA10EB25E09556EA7A0FFC9B98F101131FB8D43B79DF3CD540CB40
                        APIs
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4B4448
                        • WideCharToMultiByte.KERNEL32 ref: 00007FFB0C4B4482
                        • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FFB0C4B44B5
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4B44D9
                        • WideCharToMultiByte.KERNEL32 ref: 00007FFB0C4B4514
                          • Part of subcall function 00007FFB0C4B6340: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4B63C7
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::EmptyQueue::StructuredWork$ByteCharMultiWide$Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_
                        • String ID:
                        • API String ID: 3668445282-0
                        • Opcode ID: feb59e4277cd1bc07c5903275af858b3bdc952d6bc7b52214309763333dbf615
                        • Instruction ID: e532f6f0e0271be08d94c0916e80d251625699e44a49ea38e70d9e3bcebe3a84
                        • Opcode Fuzzy Hash: feb59e4277cd1bc07c5903275af858b3bdc952d6bc7b52214309763333dbf615
                        • Instruction Fuzzy Hash: 0731C2B2618B8085D720DB25F4947AFB7A1FBC5784F504029E68D87BA9DF3DD5448B80
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _set_statfp
                        • String ID:
                        • API String ID: 1156100317-0
                        • Opcode ID: e65ba792651367d839098e214d5891407b2dde01c0b567b7a4e043ebbfca8b6f
                        • Instruction ID: eb53a37755b9cf274e90a6366d6fefeb8f33f78f2303d0466cf985e6464f7c40
                        • Opcode Fuzzy Hash: e65ba792651367d839098e214d5891407b2dde01c0b567b7a4e043ebbfca8b6f
                        • Instruction Fuzzy Hash: 5311A3E2E5CA0301F7641138E45DB7F66417F9437CF09A634EA7F46BDA8F1CA9528110
                        APIs
                        • FlsGetValue.KERNEL32(?,?,?,00007FFB0C4D91C7,?,?,00000000,00007FFB0C4D9462,?,?,?,?,?,00007FFB0C4D93EE), ref: 00007FFB0C4E2667
                        • FlsSetValue.KERNEL32(?,?,?,00007FFB0C4D91C7,?,?,00000000,00007FFB0C4D9462,?,?,?,?,?,00007FFB0C4D93EE), ref: 00007FFB0C4E2686
                        • FlsSetValue.KERNEL32(?,?,?,00007FFB0C4D91C7,?,?,00000000,00007FFB0C4D9462,?,?,?,?,?,00007FFB0C4D93EE), ref: 00007FFB0C4E26AE
                        • FlsSetValue.KERNEL32(?,?,?,00007FFB0C4D91C7,?,?,00000000,00007FFB0C4D9462,?,?,?,?,?,00007FFB0C4D93EE), ref: 00007FFB0C4E26BF
                        • FlsSetValue.KERNEL32(?,?,?,00007FFB0C4D91C7,?,?,00000000,00007FFB0C4D9462,?,?,?,?,?,00007FFB0C4D93EE), ref: 00007FFB0C4E26D0
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Value
                        • String ID:
                        • API String ID: 3702945584-0
                        • Opcode ID: f392ead5c2402b695ac5974281e609e0a9cbbdca401f54ec29472a1a5a69b6c8
                        • Instruction ID: 020a509f0405b9d400069ad0a5cce016b2ed21816b27f5135e4d7b28039b0e43
                        • Opcode Fuzzy Hash: f392ead5c2402b695ac5974281e609e0a9cbbdca401f54ec29472a1a5a69b6c8
                        • Instruction Fuzzy Hash: AF115CE0B0824241FA685776E96997D62957F443B8F065338E83F467E7DF6CA6018200
                        APIs
                        • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E24ED
                        • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E250C
                        • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2534
                        • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2545
                        • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2556
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Value
                        • String ID:
                        • API String ID: 3702945584-0
                        • Opcode ID: ff79112a8bd8b32352bf264d34424e0eee8963a71d047e5be9749617a2376af7
                        • Instruction ID: 58867168d3efc42b8252e4e851e0f32d9e82de6ce7086c148c203ec1599289ae
                        • Opcode Fuzzy Hash: ff79112a8bd8b32352bf264d34424e0eee8963a71d047e5be9749617a2376af7
                        • Instruction Fuzzy Hash: 3A1118D0E0820641FA68A7B5D96ED7D12856F41778F0A2B38D93F4A2E3EF6CB6018200
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Is_bad_exception_allowed
                        • String ID: csm$csm$csm
                        • API String ID: 2758241748-393685449
                        • Opcode ID: fd96ba51c1fabf43fa8d60f8151a8dce269e8e425fae126efe85d46be9601272
                        • Instruction ID: 07fd7406c36a798d5b3ab0679e01cab3bd6880079c8b370c29dd356922be76fd
                        • Opcode Fuzzy Hash: fd96ba51c1fabf43fa8d60f8151a8dce269e8e425fae126efe85d46be9601272
                        • Instruction Fuzzy Hash: 1DE1ADF29086828AF720AF74D489AAC7BA0FF5575CF114536EA8D47696DF38E485CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID: UTF-16LEUNICODE$UTF-8$ccs
                        • API String ID: 3215553584-1196891531
                        • Opcode ID: 9c074e74fd5dc6cc1806d2faeca8c8f3fc210e7cbb7ac2085ce62ec2b0afb228
                        • Instruction ID: d1510d7e6cb2bf250754afb48b9ab6e49905795607360cd5f522895a5219efa6
                        • Opcode Fuzzy Hash: 9c074e74fd5dc6cc1806d2faeca8c8f3fc210e7cbb7ac2085ce62ec2b0afb228
                        • Instruction Fuzzy Hash: 908148F2E0820285FF658F3DC658A7D27A0FF11B5CF568035CA4BA66D5EB2DEA019701
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID: UTF-16LEUNICODE$UTF-8$ccs
                        • API String ID: 3215553584-1196891531
                        • Opcode ID: 74bdf59a1e8fe539b158b1a802dc5fae1fa075619af3bed7d04690940e11275d
                        • Instruction ID: 95847e2858f38b21a21e7310f3b48e6f0750fa3bb21c7442c0ec59f60d5edc2f
                        • Opcode Fuzzy Hash: 74bdf59a1e8fe539b158b1a802dc5fae1fa075619af3bed7d04690940e11275d
                        • Instruction Fuzzy Hash: 1F818DF1E0C64289FF654A3CC65CB7CABA0BF5174CF5B9035CA0B562D6DB2DAA029701
                        APIs
                        • ReadFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00008000), ref: 00007FFB0C4E8BDE
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00008000), ref: 00007FFB0C4E8D85
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ErrorFileLastRead
                        • String ID: RCR$SRCR
                        • API String ID: 1948546556-2591298178
                        • Opcode ID: 586b136ce8644c6ec137099a25725316719ca72ae6105a32eec3cfa5507b0a73
                        • Instruction ID: e7d8d171da6c1ab9a73b3886ee78e1b6ea5969db798f96189fd6cafbbcf654cd
                        • Opcode Fuzzy Hash: 586b136ce8644c6ec137099a25725316719ca72ae6105a32eec3cfa5507b0a73
                        • Instruction Fuzzy Hash: 9091E1D2A1D68689EF615B38D448BBC2B91BF53B98F5A4632D68B072D5CB3CE641C301
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CallEncodePointerTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3544855599-2084237596
                        • Opcode ID: de8e3d364744d435964d553d3b50f207885c7c714601dc3d06981bdd2fb9b181
                        • Instruction ID: ab095b19844d4367ffb7d70d73d4bb175eb8c0c8d65da637f1d412e3e3ca832f
                        • Opcode Fuzzy Hash: de8e3d364744d435964d553d3b50f207885c7c714601dc3d06981bdd2fb9b181
                        • Instruction Fuzzy Hash: 32919DF3A087918AE711DB74E8846AD7BA0FB4478CF10412AEE8D17B59DF38D195CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                        • String ID: csm
                        • API String ID: 2395640692-1018135373
                        • Opcode ID: 265ea48305644b817d5518f26b2426f1599f0e92365fc373ba274e768d46161f
                        • Instruction ID: 5adb50f09125de0e16484f968b85500ad433aca3205bea1ad95e99d49d630bc0
                        • Opcode Fuzzy Hash: 265ea48305644b817d5518f26b2426f1599f0e92365fc373ba274e768d46161f
                        • Instruction Fuzzy Hash: 545180F2A196028AEB54EB25E448E7C3791FF44B9CF244135EA4A47784DF7CE891C700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CallEncodePointerTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3544855599-2084237596
                        • Opcode ID: 5857cf24f1b6541e0db60816518d10e6407131af82c64cb5755d45eb63a1e946
                        • Instruction ID: 95c86a4ff8ac37a293a5c303ece4fbecc94a97f1352bf17da744331f9deb9c54
                        • Opcode Fuzzy Hash: 5857cf24f1b6541e0db60816518d10e6407131af82c64cb5755d45eb63a1e946
                        • Instruction Fuzzy Hash: 126193B2908BC585E7219B25E444BAEB7A0FF95B98F044635EB9C07B99CF7CD194CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 3896166516-3733052814
                        • Opcode ID: 48025d63aa6b6047f6d04173f3c05d04317f6c028d3daaca8f8c7585a31a2b89
                        • Instruction ID: dbdb2c6458a21fadebd68991b772396ee8afaac5a963df6891a4265b7bc4b5c1
                        • Opcode Fuzzy Hash: 48025d63aa6b6047f6d04173f3c05d04317f6c028d3daaca8f8c7585a31a2b89
                        • Instruction Fuzzy Hash: 6B5172F29082828AFB64AB35D148A6C7790FF55B98F144135EB5D47B99CF3CE491CB01
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID: 0-3916222277
                        • Opcode ID: 36a5356689fcb8d2607656b835cc6e0f026fc37f9764631d1787b7af226b8ab8
                        • Instruction ID: 231dd72f7b1f578abc2aad5cee782b08e78fccaadc1ff6121f4443e23127c975
                        • Opcode Fuzzy Hash: 36a5356689fcb8d2607656b835cc6e0f026fc37f9764631d1787b7af226b8ab8
                        • Instruction Fuzzy Hash: AF61EBF290CBC185E6609B25E048BBEB7A5FFC1784F504036E68D47A9ADF2CE844CB51
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::_CreateCriticalDeleteFromGlobalLock::_ObjectReentrantScoped_lockScoped_lock::~_StreamStringchar_traits
                        • String ID: jpg
                        • API String ID: 3472419032-1189616361
                        • Opcode ID: bfb5e944a95fe3a933bd3524b519a646d26b42dbd673c0c1b37dd945d12f939a
                        • Instruction ID: edc15a970fb836f72906bc36430670bf847822384241ef65400284f58fa68cbc
                        • Opcode Fuzzy Hash: bfb5e944a95fe3a933bd3524b519a646d26b42dbd673c0c1b37dd945d12f939a
                        • Instruction Fuzzy Hash: 4851FBB6618A8582DB60DB25E4947AEB7A0FBC5B88F505122EB8D43B69DF3CC544CF40
                        APIs
                          • Part of subcall function 00007FFB0C4D0E18: QueryPerformanceFrequency.KERNEL32(?,?,?,?,00007FFB0C497DB1), ref: 00007FFB0C4D0E2D
                          • Part of subcall function 00007FFB0C4D0DFC: QueryPerformanceCounter.KERNEL32(?,?,?,?,00007FFB0C497DBB), ref: 00007FFB0C4D0E05
                        • _Subatomic.LIBCONCRTD ref: 00007FFB0C497E0E
                        • _Subatomic.LIBCONCRTD ref: 00007FFB0C497EAA
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: PerformanceQuerySubatomic$CounterFrequency
                        • String ID: d
                        • API String ID: 3831891851-2564639436
                        • Opcode ID: f36356522a71dbb2b4534055f319af7a92a399f18409b5c24a9dfa018923f8ec
                        • Instruction ID: 4d2befd5ab373abb28a0e0f310abe0aec85568de33ee552313f1b8185675579f
                        • Opcode Fuzzy Hash: f36356522a71dbb2b4534055f319af7a92a399f18409b5c24a9dfa018923f8ec
                        • Instruction Fuzzy Hash: 45310862619B8582DA609B29F4957AFB7A1FBC4788F015126E6CE47B69DF3CD1108F00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Lockitstd::_$Lockit::_Lockit::~_Setgloballocalestd::locale::_
                        • String ID: g
                        • API String ID: 2016263034-3113042404
                        • Opcode ID: 4534e03734a97b4eb93a1703e2fe320e9d4271c72cf691909d05b615d2a8e7b1
                        • Instruction ID: 5e5f3d3f7037aff1b4d3ef6cb88793a7d64d16439adadf785aa9e451d06d3799
                        • Opcode Fuzzy Hash: 4534e03734a97b4eb93a1703e2fe320e9d4271c72cf691909d05b615d2a8e7b1
                        • Instruction Fuzzy Hash: C02157E5A08A4685FB14AF36E498A7C27A0BF48F98F185135DE0E43765DF3CE885C304
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: FileWrite$ConsoleErrorLastOutput
                        • String ID:
                        • API String ID: 2718003287-0
                        • Opcode ID: cf44275678ca85f22590a109bd29db2bd094186d180eb530ce0a86cdfa5a6ae4
                        • Instruction ID: bb07cc132d82537e94b96e2819af11677edcb8094310280d8826bd9f29b2748f
                        • Opcode Fuzzy Hash: cf44275678ca85f22590a109bd29db2bd094186d180eb530ce0a86cdfa5a6ae4
                        • Instruction Fuzzy Hash: 6ED1F0B2B18A8189E710CF79D444AAC37B2FB547ACB054236DE5E97B99DF38D606C300
                        APIs
                        • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FFB0C4E75F3), ref: 00007FFB0C4E7724
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FFB0C4E75F3), ref: 00007FFB0C4E77AF
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ConsoleErrorLastMode
                        • String ID:
                        • API String ID: 953036326-0
                        • Opcode ID: d60e568c1d2b5e99bc4a7faf59b4a2881a232000f395295781773a23d2a5c707
                        • Instruction ID: dcb6108d71439a5d4dc194ccec4a9dacbb0bd28199c92d69a32140bbea2aeae3
                        • Opcode Fuzzy Hash: d60e568c1d2b5e99bc4a7faf59b4a2881a232000f395295781773a23d2a5c707
                        • Instruction Fuzzy Hash: 5391C0F2E0865285F7548B79D488ABC2BA0BF14BACF554139DE0F67A94DF38E582C300
                        APIs
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A1962
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A1B0D
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A1B22
                          • Part of subcall function 00007FFB0C495970: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C49597E
                          • Part of subcall function 00007FFB0C495970: _Max_value.LIBCPMTD ref: 00007FFB0C4959A3
                          • Part of subcall function 00007FFB0C495970: _Min_value.LIBCPMTD ref: 00007FFB0C4959D1
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A1C57
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::EmptyQueue::StructuredWork$Max_valueMin_value
                        • String ID:
                        • API String ID: 348937374-0
                        • Opcode ID: 9f84a68244e8d41638f94a4cdbedc62e82daed3d618e4f6bfc3aedd44e4120fa
                        • Instruction ID: 2b8f75e7a1dd89a8c3b9c9d3b90f69972025068886d7a9cc2b4be338eff578e8
                        • Opcode Fuzzy Hash: 9f84a68244e8d41638f94a4cdbedc62e82daed3d618e4f6bfc3aedd44e4120fa
                        • Instruction Fuzzy Hash: 01A10BA260DBC585DA60DB66F49476FA7A0FBC9BC4F104136EACD87B69DF2CD4408B00
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: fpos
                        • String ID:
                        • API String ID: 1083263101-0
                        • Opcode ID: c457bf72074166e4b9cef871bf0dead07cf29958fd0af09302adcdb228af5cb4
                        • Instruction ID: 9d88c8e238f46cbbe7eadf87b8c69949517488fc0b89288df9e4e91a927486ea
                        • Opcode Fuzzy Hash: c457bf72074166e4b9cef871bf0dead07cf29958fd0af09302adcdb228af5cb4
                        • Instruction Fuzzy Hash: 256113A291CA8186E6609B2AE45576FB7A0FBC4798F150171FBDD87BA9CF6CD440CF00
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ByteCharConcurrency::details::EmptyMultiQueue::StructuredWideWork
                        • String ID:
                        • API String ID: 729679527-0
                        • Opcode ID: 4236cccfa5501a5c365e13e92fafc250830b1abf4ab8d273c8a49ddbe665ecc1
                        • Instruction ID: d21a834430e54bde1ae7fe3592cc8bafd9503c720175b18a796a2b7f598011ee
                        • Opcode Fuzzy Hash: 4236cccfa5501a5c365e13e92fafc250830b1abf4ab8d273c8a49ddbe665ecc1
                        • Instruction Fuzzy Hash: 2E411AB2A1CA8186D760DB25E485BAEB7A1FBC5784F405035FA8E87B5ACF3CD444CB40
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: type_info::_name_internal_method$Concurrency::details::_CriticalFolderLock::_PathReentrantScoped_lockScoped_lock::~_Special
                        • String ID:
                        • API String ID: 622896846-0
                        • Opcode ID: 7390c67fb896fc7fc0bb770cb4b74ab97b876e88ecabb701c514b737fa0fd6a1
                        • Instruction ID: 55c7d95a7eee71a86337fa650e4d875d43526fd99e09d437d9f772356cb3dd81
                        • Opcode Fuzzy Hash: 7390c67fb896fc7fc0bb770cb4b74ab97b876e88ecabb701c514b737fa0fd6a1
                        • Instruction Fuzzy Hash: 1941EEB261C68196E670DF25E4897AEB7A0FFC4788F401136E68D87AA9DF3CD544CB40
                        APIs
                        • Concurrency::details::_Task_impl_base::_IsCanceled.LIBCPMTD ref: 00007FFB0C4B1069
                        • Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 00007FFB0C4B1087
                          • Part of subcall function 00007FFB0C4B04D0: Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 00007FFB0C4B04E5
                        • Concurrency::details::_Task_impl_base::_CancelWithExceptionHolder.LIBCPMTD ref: 00007FFB0C4B10BA
                        • Concurrency::details::_Task_impl_base::_Cancel.LIBCPMTD ref: 00007FFB0C4B10D1
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::_Task_impl_base::_$CancelConcurrency::details::$Base::CanceledChoresExceptionGroupHolderProcessorProxyRoot::ScheduleSchedulerSegmentUnrealizedVirtualWith
                        • String ID:
                        • API String ID: 2137011280-0
                        • Opcode ID: a2aa80b478cab4208770f9a38a893281dc2bd3f109e1b87810c811e64ecfc72b
                        • Instruction ID: e45efc24f9ef716ea205d9bbd69a5ee7f29bd660b543adf3a03b19888279c864
                        • Opcode Fuzzy Hash: a2aa80b478cab4208770f9a38a893281dc2bd3f109e1b87810c811e64ecfc72b
                        • Instruction Fuzzy Hash: A6214FF261CB4681DA10EB22E49867E6764FFC57C8F401431FA8E47BAADF2CE4059B00
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getfacetstd::locale::_
                        • String ID:
                        • API String ID: 228209623-0
                        • Opcode ID: bf104d3b9130944ff705ff286039ef5e45dc00399c4ecc11af451a56ddf4ff63
                        • Instruction ID: 5dd2ed978f2674da53f344a246675a2b824bb3c8432e2b6dd51f5544d0461e2c
                        • Opcode Fuzzy Hash: bf104d3b9130944ff705ff286039ef5e45dc00399c4ecc11af451a56ddf4ff63
                        • Instruction Fuzzy Hash: 5A21F1A251DA4581DA50EB25E4896AEB7B4FFC47A4F501231FA8E43BB9DF3CD540CB00
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getfacetstd::locale::_
                        • String ID:
                        • API String ID: 228209623-0
                        • Opcode ID: 18fd428ba416f35e6fa1d95c6dec4eb2c0224e670d38428d6e6994fa79728931
                        • Instruction ID: 22799c35ba2711c111efae3e35dbade6487c8a65d84b8bdf5282e128e920f6b7
                        • Opcode Fuzzy Hash: 18fd428ba416f35e6fa1d95c6dec4eb2c0224e670d38428d6e6994fa79728931
                        • Instruction Fuzzy Hash: 1F2101E692DA4581DA50EB25E48566EB7A0FFC47A8F501136FA8E43BB9DF3CD540CB00
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Cpp_errorThrow_std::_$CurrentThread
                        • String ID:
                        • API String ID: 2261580123-0
                        • Opcode ID: 27d73551e55d5d03b2179b481ebe71ff2a700cb18187dbb0179742bbf1b013cb
                        • Instruction ID: 24f19c8f4bd1c60a995e3b78f96e17c84b1302a1d1845ff969ca28c81bc997ed
                        • Opcode Fuzzy Hash: 27d73551e55d5d03b2179b481ebe71ff2a700cb18187dbb0179742bbf1b013cb
                        • Instruction Fuzzy Hash: 3E0192A270868957F690A632E4546BE5292FFC43C4F444435EB4D837E6EF2CEC41D700
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                        • String ID:
                        • API String ID: 2933794660-0
                        • Opcode ID: 9ec5600b05cd82a8e10f8fc1781d40101dc96b0f7a75fb69ad6eecb34d5e0eaa
                        • Instruction ID: 207541a49ba188b2054af47a945696def94483153f53e955e0677a69f5e4df2c
                        • Opcode Fuzzy Hash: 9ec5600b05cd82a8e10f8fc1781d40101dc96b0f7a75fb69ad6eecb34d5e0eaa
                        • Instruction Fuzzy Hash: F41118B6B14B018AEB008B70E8596AC33A4FB19758F481E35EA6D467A4DF78D155C340
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Process$CloseCurrentHandleOpenTerminate
                        • String ID:
                        • API String ID: 983841585-0
                        • Opcode ID: 597751426ef9b9c2102fe0f833c27338a46b029254865beae2c2f583087e8297
                        • Instruction ID: 87c2204aacbe88dd909feac85d03516f8df3c0ea736b024d8b4fbf139a584319
                        • Opcode Fuzzy Hash: 597751426ef9b9c2102fe0f833c27338a46b029254865beae2c2f583087e8297
                        • Instruction Fuzzy Hash: 55E0BFB6A0894186E320DB36E90841D77B2FFCCB5AF444134DA8D42738DF3CD6478A00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: __except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 1467352782-3733052814
                        • Opcode ID: f0672875b56e3e91f7387c99e9e7c8de2a70e4d1654d6aa75e53c9bd2162311b
                        • Instruction ID: 8b8d661c287e92879533f36dd99a16f41297bb456ffc6a0f227c8d9ef00a7af2
                        • Opcode Fuzzy Hash: f0672875b56e3e91f7387c99e9e7c8de2a70e4d1654d6aa75e53c9bd2162311b
                        • Instruction Fuzzy Hash: F9719EF2A0869186EB60AB35D448B7D7BA0FF44B88F548176EE8C47B89DB2CD591C740
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CreateFrameInfo__except_validate_context_record
                        • String ID: csm
                        • API String ID: 2558813199-1018135373
                        • Opcode ID: 282392f99d6e77ef37ce42974d51c97e4bfb6ed4fbcb944e2b06f756c8105506
                        • Instruction ID: a6e02f48be494fb02c8cca668ca89bfb3dcd4411f55c6b9778abe65bf47b95c2
                        • Opcode Fuzzy Hash: 282392f99d6e77ef37ce42974d51c97e4bfb6ed4fbcb944e2b06f756c8105506
                        • Instruction Fuzzy Hash: C8514DF261974186E620BB26E04467EBBB4FB89BA8F140135EB8D0BB55CF39E451CB40
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ErrorFileLastWrite
                        • String ID: U
                        • API String ID: 442123175-4171548499
                        • Opcode ID: c00cc46764e3aacfe03c88eaead441a28a811676fc4d65fc1849a78bc9b4c519
                        • Instruction ID: a97321c8cf6bb1131951907171722e81f4638768166f064c4bf41c10c9fb99ee
                        • Opcode Fuzzy Hash: c00cc46764e3aacfe03c88eaead441a28a811676fc4d65fc1849a78bc9b4c519
                        • Instruction Fuzzy Hash: 9641B4B2B18A8182EB509F35E4587AD6760FF84798F454131EE4E87798EF3CD541C740
                        APIs
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A8686
                          • Part of subcall function 00007FFB0C4C9EF0: std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4CA10D
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A86AE
                          • Part of subcall function 00007FFB0C498620: LoadLibraryA.KERNEL32 ref: 00007FFB0C49863F
                          • Part of subcall function 00007FFB0C498620: GetLastError.KERNEL32 ref: 00007FFB0C498652
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::EmptyQueue::StructuredWork$ErrorFac_nodeFac_node::_LastLibraryLoadstd::_
                        • String ID: 22455
                        • API String ID: 4022255543-2416011016
                        • Opcode ID: f603c9ffa40781b8072f22a88bfd239c7516554109bc9782c54aade9c68d519f
                        • Instruction ID: 5ee7e2feeff1f1aec641e486e8950ab4039ba2ac22dbdc6dd88a8d7736d2968c
                        • Opcode Fuzzy Hash: f603c9ffa40781b8072f22a88bfd239c7516554109bc9782c54aade9c68d519f
                        • Instruction Fuzzy Hash: 06212CB651868182D6209F25E4847AEB7A0FB89798F500231EA8D47BA9DF3DC544CF40
                        APIs
                        • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFB0C4D407B), ref: 00007FFB0C4D4770
                        • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFB0C4D407B), ref: 00007FFB0C4D47B1
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ExceptionFileHeaderRaise
                        • String ID: csm
                        • API String ID: 2573137834-1018135373
                        • Opcode ID: dba6bd1a0ac2c8d099696e94e8611ae08bcb42e179612d15905ba0ed57ddee6c
                        • Instruction ID: bc16ff140e85289c02844e4a3f493a9480398ab19e8fa9f2835fbd7c80244844
                        • Opcode Fuzzy Hash: dba6bd1a0ac2c8d099696e94e8611ae08bcb42e179612d15905ba0ed57ddee6c
                        • Instruction Fuzzy Hash: C8112BB2A18B4182EB218F25E44866D77E5FF88B98F585230DE8C07768EF3CD5518B00
                        APIs
                        • Concurrency::details::_Schedule_chore.LIBCPMT ref: 00007FFB0C4B12C1
                          • Part of subcall function 00007FFB0C4D2B48: GetModuleHandleExW.KERNEL32 ref: 00007FFB0C4D2B30
                          • Part of subcall function 00007FFB0C4D2B48: SubmitThreadpoolWork.KERNEL32 ref: 00007FFB0C4D2B39
                          • Part of subcall function 00007FFB0C4D2B48: CreateThreadpoolWork.KERNEL32 ref: 00007FFB0C4D2B5E
                        • std::bad_exception::bad_exception.LIBCMTD ref: 00007FFB0C4B1307
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.3179771165.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000008.00000002.3179732876.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179878320.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179945829.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179969769.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3179985866.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000008.00000002.3180007968.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ThreadpoolWork$Concurrency::details::_CreateHandleModuleSchedule_choreSubmitstd::bad_exception::bad_exception
                        • String ID: Fail to schedule the chore!
                        • API String ID: 2088802962-3313369819
                        • Opcode ID: 67acc1bff8d18671174b847d0d84192052f8b113a35ee0c6946b2bbfbef70b53
                        • Instruction ID: 928e2ce497c7cd387d8494d8e1a4921548bff84db09c89c5c6df46a1cc9ccd4f
                        • Opcode Fuzzy Hash: 67acc1bff8d18671174b847d0d84192052f8b113a35ee0c6946b2bbfbef70b53
                        • Instruction Fuzzy Hash: 27F03CE1A18F8681EA20AB25E49976E7364FF85788F501130EA8D46AA9DF3CD155CB00

                        Execution Graph

                        Execution Coverage:0.8%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:0%
                        Total number of Nodes:63
                        Total number of Limit Nodes:1
                        execution_graph 38582 7ffb0c495be0 38585 7ffb0c495c20 38582->38585 38586 7ffb0c495d02 std::runtime_error::runtime_error std::_Fac_node::_Fac_node 38585->38586 38628 7ffb0c497210 38586->38628 38588 7ffb0c495d39 std::runtime_error::runtime_error 38632 7ffb0c496170 38588->38632 38590 7ffb0c495da4 38636 7ffb0c497430 38590->38636 38592 7ffb0c495dc0 38640 7ffb0c4973e0 38592->38640 38594 7ffb0c495dcd Concurrency::details::WorkQueue::IsStructuredEmpty 38595 7ffb0c495dda CreateMutexExW 38594->38595 38596 7ffb0c495dfd GetLastError 38595->38596 38623 7ffb0c495e0a Concurrency::details::WorkQueue::IsStructuredEmpty 38595->38623 38597 7ffb0c495e0f 38596->38597 38596->38623 38644 7ffb0c496fb0 QueryPerformanceCounter QueryPerformanceFrequency 38597->38644 38599 7ffb0c496098 38657 7ffb0c494b70 47 API calls std::locale::_Locimp::_Makexloc 38599->38657 38602 7ffb0c495be9 38603 7ffb0c495e31 38645 7ffb0c4c9d40 58 API calls 5 library calls 38603->38645 38605 7ffb0c495e37 38606 7ffb0c495e6d 38605->38606 38646 7ffb0c497300 47 API calls std::runtime_error::runtime_error 38605->38646 38648 7ffb0c4d3314 4 API calls 2 library calls 38606->38648 38608 7ffb0c495e58 38647 7ffb0c4d4720 RtlPcToFileHeader RaiseException 38608->38647 38611 7ffb0c495e81 38612 7ffb0c495ea8 38611->38612 38649 7ffb0c4ca7f0 169 API calls 6 library calls 38611->38649 38650 7ffb0c496f30 57 API calls Concurrency::details::ResourceManager::CreateNodeTopology 38612->38650 38615 7ffb0c495ee9 38651 7ffb0c496fb0 QueryPerformanceCounter QueryPerformanceFrequency 38615->38651 38617 7ffb0c495ff0 Concurrency::details::WorkQueue::IsStructuredEmpty 38618 7ffb0c496057 38617->38618 38617->38623 38656 7ffb0c4c7140 GetCurrentProcessId OpenProcess TerminateProcess CloseHandle 38618->38656 38619 7ffb0c496f80 QueryPerformanceCounter QueryPerformanceFrequency 38625 7ffb0c495f0c Concurrency::details::WorkQueue::IsStructuredEmpty 38619->38625 38621 7ffb0c49605c 38621->38623 38643 7ffb0c4960d0 GetCurrentProcessId OpenProcess TerminateProcess 38623->38643 38625->38617 38625->38619 38652 7ffb0c4c6f10 57 API calls 38625->38652 38653 7ffb0c4d3314 4 API calls 2 library calls 38625->38653 38654 7ffb0c4ca7f0 169 API calls 6 library calls 38625->38654 38655 7ffb0c496f30 57 API calls Concurrency::details::ResourceManager::CreateNodeTopology 38625->38655 38629 7ffb0c49723a Concurrency::scheduler_ptr::scheduler_ptr std::runtime_error::runtime_error std::error_condition::operator== 38628->38629 38658 7ffb0c496a40 38629->38658 38631 7ffb0c497282 38631->38588 38633 7ffb0c49619f Concurrency::cancellation_token::_FromImpl _Byte_length Concurrency::details::_TaskCreationCallstack::_TaskCreationCallstack std::runtime_error::runtime_error 38632->38633 38634 7ffb0c4961d9 38633->38634 38666 7ffb0c4968e0 49 API calls 5 library calls 38633->38666 38634->38590 38637 7ffb0c497448 Concurrency::details::WorkQueue::IsStructuredEmpty std::runtime_error::runtime_error 38636->38637 38639 7ffb0c49744f shared_ptr 38637->38639 38667 7ffb0c497af0 38637->38667 38639->38592 38641 7ffb0c497af0 wcstoxq 47 API calls 38640->38641 38642 7ffb0c4973f3 Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext 38641->38642 38642->38594 38643->38599 38644->38603 38645->38605 38646->38608 38647->38606 38648->38611 38649->38612 38650->38615 38651->38625 38652->38625 38653->38625 38654->38625 38655->38625 38656->38621 38657->38602 38659 7ffb0c496a62 Concurrency::details::WorkQueue::IsStructuredEmpty std::_Throw_Cpp_error 38658->38659 38661 7ffb0c496b05 strtoxl 38659->38661 38664 7ffb0c494e70 49 API calls Concurrency::details::_TaskCreationCallstack::_TaskCreationCallstack 38659->38664 38661->38631 38662 7ffb0c496aa9 std::runtime_error::runtime_error 38665 7ffb0c494ae0 47 API calls std::locale::_Locimp::_Makexloc 38662->38665 38664->38662 38665->38661 38666->38634 38669 7ffb0c497b0d Concurrency::details::WorkQueue::IsStructuredEmpty strtoxl 38667->38669 38668 7ffb0c497b49 Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext char_traits 38668->38639 38669->38668 38671 7ffb0c4976f0 47 API calls wcstoxq 38669->38671 38671->38668

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 7ffb0c495c20-7ffb0c495dfb call 7ffb0c4971c0 call 7ffb0c493dc0 call 7ffb0c497210 call 7ffb0c493dc0 call 7ffb0c497cd0 call 7ffb0c497bf0 call 7ffb0c496170 call 7ffb0c497430 call 7ffb0c4973e0 call 7ffb0c497c40 CreateMutexExW 21 7ffb0c495e0a 0->21 22 7ffb0c495dfd-7ffb0c495e08 GetLastError 0->22 24 7ffb0c49607d-7ffb0c496093 call 7ffb0c4960d0 21->24 22->21 23 7ffb0c495e0f-7ffb0c495e42 call 7ffb0c496150 call 7ffb0c496fb0 call 7ffb0c4c9d40 22->23 35 7ffb0c495e44-7ffb0c495e6d call 7ffb0c497300 call 7ffb0c4d4720 23->35 36 7ffb0c495e6e-7ffb0c495e9c call 7ffb0c4d3314 23->36 28 7ffb0c496098-7ffb0c4960bb call 7ffb0c494b70 24->28 35->36 45 7ffb0c495e9e-7ffb0c495ebd call 7ffb0c4ca7f0 36->45 46 7ffb0c495ebf 36->46 47 7ffb0c495ec8-7ffb0c495f0c call 7ffb0c496f30 call 7ffb0c496150 call 7ffb0c496fb0 45->47 46->47 56 7ffb0c495f0d-7ffb0c495f12 47->56 57 7ffb0c496036-7ffb0c496055 call 7ffb0c496390 56->57 58 7ffb0c495f18-7ffb0c495f2d call 7ffb0c496390 56->58 71 7ffb0c496057-7ffb0c49605d call 7ffb0c4c7140 57->71 72 7ffb0c49605f-7ffb0c496075 call 7ffb0c496390 57->72 63 7ffb0c495f33-7ffb0c495f81 call 7ffb0c496150 call 7ffb0c496f80 call 7ffb0c4c6f10 call 7ffb0c4d3314 58->63 64 7ffb0c495fd8-7ffb0c495fee call 7ffb0c496390 58->64 94 7ffb0c495f83-7ffb0c495fa5 call 7ffb0c4ca7f0 63->94 95 7ffb0c495fa7 63->95 75 7ffb0c495ff0 64->75 76 7ffb0c495ff2-7ffb0c496008 call 7ffb0c496390 64->76 71->24 72->24 84 7ffb0c496077-7ffb0c49607c call 7ffb0c4c70f0 72->84 75->57 86 7ffb0c49600a 76->86 87 7ffb0c49600c-7ffb0c496031 call 7ffb0c496150 call 7ffb0c496f80 76->87 84->24 86->57 87->56 99 7ffb0c495fb3-7ffb0c495fd7 call 7ffb0c496f30 94->99 95->99 99->64
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::CreateEmptyErrorFac_nodeFac_node::_LastMutexQueue::StructuredWorkstd::_std::bad_exception::bad_exception
                        • String ID: -$-$-$-$0$0$1$2$2$2$3$4$5$6$6$6$6$6$7$7$7$7$9$9$9$A$A$B$B$C$C$D$D$E$E$F${$}
                        • API String ID: 1149196539-2202459216
                        • Opcode ID: c23fd9ccd435e09b8d6fabbe867b38cfc7cb505c9ffd75c4aa2e92c9946ef1c7
                        • Instruction ID: 902bcf6d7d2b4aa9d97e8c44eb070a3bf6d7bd46b38fe263efd3e9a0be0f9d52
                        • Opcode Fuzzy Hash: c23fd9ccd435e09b8d6fabbe867b38cfc7cb505c9ffd75c4aa2e92c9946ef1c7
                        • Instruction Fuzzy Hash: B1C180E251C6D184E761D734E498BEEABA0FF91388F400136E2CD46AEADF6DD548CB01

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 104 7ffb0c4d3914-7ffb0c4d391a 105 7ffb0c4d3955-7ffb0c4d395f 104->105 106 7ffb0c4d391c-7ffb0c4d391f 104->106 107 7ffb0c4d3a7c-7ffb0c4d3a91 105->107 108 7ffb0c4d3949-7ffb0c4d3981 call 7ffb0c4d34f8 106->108 109 7ffb0c4d3921-7ffb0c4d3924 106->109 110 7ffb0c4d3a93 107->110 111 7ffb0c4d3aa0-7ffb0c4d3aba call 7ffb0c4d338c 107->111 123 7ffb0c4d3986-7ffb0c4d3988 108->123 113 7ffb0c4d3926-7ffb0c4d3929 109->113 114 7ffb0c4d393c __scrt_dllmain_crt_thread_attach 109->114 117 7ffb0c4d3a95-7ffb0c4d3a9f 110->117 125 7ffb0c4d3aef-7ffb0c4d3b20 call 7ffb0c4d40a0 111->125 126 7ffb0c4d3abc-7ffb0c4d3aed call 7ffb0c4d34b4 call 7ffb0c4d42a4 call 7ffb0c4d4318 call 7ffb0c4d3658 call 7ffb0c4d367c call 7ffb0c4d34e4 111->126 115 7ffb0c4d3935-7ffb0c4d393a call 7ffb0c4d343c 113->115 116 7ffb0c4d392b-7ffb0c4d3934 113->116 119 7ffb0c4d3941-7ffb0c4d3948 114->119 115->119 127 7ffb0c4d3a56 123->127 128 7ffb0c4d398e-7ffb0c4d39a3 call 7ffb0c4d338c 123->128 136 7ffb0c4d3b31-7ffb0c4d3b37 125->136 137 7ffb0c4d3b22-7ffb0c4d3b28 125->137 126->117 131 7ffb0c4d3a58-7ffb0c4d3a6d 127->131 139 7ffb0c4d39a9-7ffb0c4d39ba call 7ffb0c4d33fc 128->139 140 7ffb0c4d3a6e-7ffb0c4d3a7b call 7ffb0c4d40a0 128->140 142 7ffb0c4d3b79-7ffb0c4d3b8f call 7ffb0c496120 136->142 143 7ffb0c4d3b39-7ffb0c4d3b43 136->143 137->136 141 7ffb0c4d3b2a-7ffb0c4d3b2c 137->141 154 7ffb0c4d3a0b-7ffb0c4d3a15 call 7ffb0c4d3658 139->154 155 7ffb0c4d39bc-7ffb0c4d39e0 call 7ffb0c4d42dc call 7ffb0c4d4294 call 7ffb0c4d42b8 call 7ffb0c4e1ee0 139->155 140->107 149 7ffb0c4d3c16-7ffb0c4d3c23 141->149 160 7ffb0c4d3bc7-7ffb0c4d3bc9 142->160 161 7ffb0c4d3b91-7ffb0c4d3b93 142->161 150 7ffb0c4d3b4a-7ffb0c4d3b50 143->150 151 7ffb0c4d3b45-7ffb0c4d3b48 143->151 157 7ffb0c4d3b52-7ffb0c4d3b58 150->157 151->157 154->127 176 7ffb0c4d3a17-7ffb0c4d3a23 call 7ffb0c4d42d4 154->176 155->154 206 7ffb0c4d39e2-7ffb0c4d39e9 __scrt_dllmain_after_initialize_c 155->206 164 7ffb0c4d3c0c-7ffb0c4d3c14 157->164 165 7ffb0c4d3b5e-7ffb0c4d3b66 call 7ffb0c4d3914 157->165 171 7ffb0c4d3bd0-7ffb0c4d3be5 call 7ffb0c4d3914 160->171 172 7ffb0c4d3bcb-7ffb0c4d3bce 160->172 161->160 169 7ffb0c4d3b95-7ffb0c4d3bb7 call 7ffb0c496120 call 7ffb0c4d3a7c 161->169 164->149 175 7ffb0c4d3b6b-7ffb0c4d3b73 165->175 169->160 201 7ffb0c4d3bb9-7ffb0c4d3bbe 169->201 171->164 187 7ffb0c4d3be7-7ffb0c4d3bf1 171->187 172->164 172->171 175->142 175->164 194 7ffb0c4d3a49-7ffb0c4d3a54 176->194 195 7ffb0c4d3a25-7ffb0c4d3a2f call 7ffb0c4d35c0 176->195 192 7ffb0c4d3bf8-7ffb0c4d3c06 187->192 193 7ffb0c4d3bf3-7ffb0c4d3bf6 187->193 198 7ffb0c4d3c08 192->198 193->198 194->131 195->194 205 7ffb0c4d3a31-7ffb0c4d3a3f 195->205 198->164 201->160 205->194 206->154 207 7ffb0c4d39eb-7ffb0c4d3a08 call 7ffb0c4e1e9c 206->207 207->154
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                        • String ID:
                        • API String ID: 190073905-0
                        • Opcode ID: 379fb157a98799b01100bb80668918f310a9638619fe247a65667b2318d9597b
                        • Instruction ID: d64c70bc686872c606c0af001f502342429614c45746992faca1135d06fd698f
                        • Opcode Fuzzy Hash: 379fb157a98799b01100bb80668918f310a9638619fe247a65667b2318d9597b
                        • Instruction Fuzzy Hash: F4818DE1F0864346FA50BF76D44EA7D66A0BF85B88F449035DA0D877B6DF3CE8458602

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Process$CurrentOpenTerminate
                        • String ID:
                        • API String ID: 1665377759-0
                        • Opcode ID: f438164aa293f679cc8d685dac6f048bff96706690f7a88d4d1aeed23efbc951
                        • Instruction ID: 7117a447c19763f53eb05bc44ee0fa4b6bd9c86f357e825e5b4d60a29fe3c28c
                        • Opcode Fuzzy Hash: f438164aa293f679cc8d685dac6f048bff96706690f7a88d4d1aeed23efbc951
                        • Instruction Fuzzy Hash: B5E0E6B2A08A4186D320DB76E90841D77A2FFCC749F548134D6CD42638DF3CD1578A00

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: f6778a97db3e7d7cc00ddc368c5f4a02c47bb974696b7abc8e093fa4e358170f
                        • Instruction ID: a93488dda1db9e6cc03adb087a07c5aa1ea792d1cc35fd7fd00562565c33034c
                        • Opcode Fuzzy Hash: f6778a97db3e7d7cc00ddc368c5f4a02c47bb974696b7abc8e093fa4e358170f
                        • Instruction Fuzzy Hash: 2A118FF691C68282F3119B68E45993DB2A0FF40748F160434EA5E477A3DF3CF9148700

                        Control-flow Graph

                        APIs
                        • HeapAlloc.KERNEL32(?,?,00000000,00007FFB0C4E25E2,?,?,0000640E61F42234,00007FFB0C4E0205,?,?,?,?,00007FFB0C4EB486,?,?,00000000), ref: 00007FFB0C4E4041
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: AllocHeap
                        • String ID:
                        • API String ID: 4292702814-0
                        • Opcode ID: b865d5f5eb091f35a37736941d99cb0038ee27259a523f223bb2da8cdd44aaf9
                        • Instruction ID: 32cef8744c4fd01eac6c3fa5da226489d3947163556e3b5b65a605023da60312
                        • Opcode Fuzzy Hash: b865d5f5eb091f35a37736941d99cb0038ee27259a523f223bb2da8cdd44aaf9
                        • Instruction Fuzzy Hash: 5EF049D4B0920641FE655AB6D919ABD13A07F88B88F0A6434C90F863D2DF6CAA805220
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                        • String ID:
                        • API String ID: 1617910340-0
                        • Opcode ID: 31f4d597e0a6cc1620dd34189c80ad889813dc24754eb01cce36e0114bd77507
                        • Instruction ID: 70f9f3c58b158737205c2884b067f2795ec99b2a4fc6033796a765a6409de3da
                        • Opcode Fuzzy Hash: 31f4d597e0a6cc1620dd34189c80ad889813dc24754eb01cce36e0114bd77507
                        • Instruction Fuzzy Hash: F0C1C1B6B24A4286EB20CFB5C494AAC3761FB49BA8B015225DE1E5B3A5CF78D556C300
                        APIs
                          • Part of subcall function 00007FFB0C4E2408: GetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2417
                          • Part of subcall function 00007FFB0C4E2408: FlsGetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E242C
                          • Part of subcall function 00007FFB0C4E2408: SetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E24B7
                        • TranslateName.LIBCMT ref: 00007FFB0C4EEEF2
                        • TranslateName.LIBCMT ref: 00007FFB0C4EEF2D
                        • GetACP.KERNEL32(?,?,?,00000000,00000092,00007FFB0C4E2F90), ref: 00007FFB0C4EEF74
                        • IsValidCodePage.KERNEL32(?,?,?,00000000,00000092,00007FFB0C4E2F90), ref: 00007FFB0C4EEFAC
                        • GetLocaleInfoW.KERNEL32 ref: 00007FFB0C4EF169
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ErrorLastNameTranslate$CodeInfoLocalePageValidValue
                        • String ID: utf8
                        • API String ID: 3069159798-905460609
                        • Opcode ID: 464451e8a7c017b7fe8d594a29d962222612a71da5a0740ad1618ad19dd93d6f
                        • Instruction ID: 498e69c9ff6075c94a78cde50af115d48e6e579ba027b5a866f6751b62b1971b
                        • Opcode Fuzzy Hash: 464451e8a7c017b7fe8d594a29d962222612a71da5a0740ad1618ad19dd93d6f
                        • Instruction Fuzzy Hash: 20917AF2A0874281FB249B71D549ABD23A4FF44B88F468531DA4E47796EF3CEA55C301
                        APIs
                          • Part of subcall function 00007FFB0C4E2408: GetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2417
                          • Part of subcall function 00007FFB0C4E2408: FlsGetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E242C
                          • Part of subcall function 00007FFB0C4E2408: SetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E24B7
                          • Part of subcall function 00007FFB0C4E2408: FlsSetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E244D
                        • GetUserDefaultLCID.KERNEL32(?,00000000,00000092,?), ref: 00007FFB0C4EFA40
                          • Part of subcall function 00007FFB0C4E2408: FlsSetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E247A
                          • Part of subcall function 00007FFB0C4E2408: FlsSetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E248B
                          • Part of subcall function 00007FFB0C4E2408: FlsSetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E249C
                        • EnumSystemLocalesW.KERNEL32(?,00000000,00000092,?,?,00000000,?,00007FFB0C4E2F89), ref: 00007FFB0C4EFA27
                        • ProcessCodePage.LIBCMT ref: 00007FFB0C4EFA6A
                        • IsValidCodePage.KERNEL32 ref: 00007FFB0C4EFA7C
                        • IsValidLocale.KERNEL32 ref: 00007FFB0C4EFA92
                        • GetLocaleInfoW.KERNEL32 ref: 00007FFB0C4EFAEE
                        • GetLocaleInfoW.KERNEL32 ref: 00007FFB0C4EFB0A
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Value$Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
                        • String ID:
                        • API String ID: 2591520935-0
                        • Opcode ID: 6e470d9f2d7b73803100a9a2eb3339135561f8c11b01556d55fef5b7594b0bfb
                        • Instruction ID: 65cc533ef037ac8b0bdd148010601aed62f2dc650b3e36d361002b563d749a54
                        • Opcode Fuzzy Hash: 6e470d9f2d7b73803100a9a2eb3339135561f8c11b01556d55fef5b7594b0bfb
                        • Instruction Fuzzy Hash: E6716AF2F086528AFB509BB0D459ABC37A4BF48748F464035CE4E57695EF7CAA4AC310
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Find$File$CloseConcurrency::details::Concurrency::details::_CriticalEmptyFirstLock::_NextQueue::ReentrantScoped_lockScoped_lock::~_StructuredWork
                        • String ID: /*.*
                        • API String ID: 669816757-1014195128
                        • Opcode ID: cce196c4780de0ee261d72a6a8be92af0337c90a253831200769ab8a909ca2ff
                        • Instruction ID: 87c92e802445d216502ac1734f339a69926183f4fc3c396ca9e184bd17f8d7d8
                        • Opcode Fuzzy Hash: cce196c4780de0ee261d72a6a8be92af0337c90a253831200769ab8a909ca2ff
                        • Instruction Fuzzy Hash: C4715FF291CA8291DA70DB25E4957EEA360FFD4798F405132D68D83BA9EF2CD545CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Find$Concurrency::details::EmptyFileQueue::StructuredWork$CloseConcurrency::details::_CriticalFirstLock::_NextReentrantScoped_lockScoped_lock::~_
                        • String ID: /*.*
                        • API String ID: 771618737-1014195128
                        • Opcode ID: 417e3439b01502627f2c3f68e797be1636a0383c23f555452f6b9c8aeea56bb4
                        • Instruction ID: 85ae7e287eb6283b917fcfea7a9d30bf423dc7f486f230d2765bd4a4a2957b50
                        • Opcode Fuzzy Hash: 417e3439b01502627f2c3f68e797be1636a0383c23f555452f6b9c8aeea56bb4
                        • Instruction Fuzzy Hash: 73611CB251CAC292D670DB21E4957EEA360FFC5788F405132E68D83AAADF3CD545CB00
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                        • String ID:
                        • API String ID: 3140674995-0
                        • Opcode ID: 1fdbbc56d82b575a71ab0e7532a7e43e535db65f2d0fd3c01a85fe32ae7de389
                        • Instruction ID: 50d83ac1657d2c75b6e5e86141ffcefd495633b1ae348eb6c82187dce852f563
                        • Opcode Fuzzy Hash: 1fdbbc56d82b575a71ab0e7532a7e43e535db65f2d0fd3c01a85fe32ae7de389
                        • Instruction Fuzzy Hash: A2312CF2609B8186EB609F70E848BED7365FB84748F44443ADA4E47B94DF78D649CB10
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                        • String ID:
                        • API String ID: 1239891234-0
                        • Opcode ID: 1300e7eb66910485c596afe65c521b45d2f063167b9c5b78a57fe06e37c487e2
                        • Instruction ID: 70b6f82a94b448f658c3d9ff4a0244678391e9ba02bcd45614eff5be11337e32
                        • Opcode Fuzzy Hash: 1300e7eb66910485c596afe65c521b45d2f063167b9c5b78a57fe06e37c487e2
                        • Instruction Fuzzy Hash: 253182B2618B8186EB20DF34E8486AE73A4FF89758F540135EA9D43BA4DF3CC146CB00
                        APIs
                        • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4CA10D
                        • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4CA275
                        • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4CA3C9
                          • Part of subcall function 00007FFB0C4CEF30: UnDecorator::getVbTableType.LIBCMTD ref: 00007FFB0C4CEF75
                          • Part of subcall function 00007FFB0C4CEE30: UnDecorator::getVbTableType.LIBCMTD ref: 00007FFB0C4CEE90
                          • Part of subcall function 00007FFB0C4A20D0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A20E3
                          • Part of subcall function 00007FFB0C4931C0: Concurrency::details::FreeThreadProxyFactory::Retire.LIBCMTD ref: 00007FFB0C4931F3
                          • Part of subcall function 00007FFB0C4931C0: Concurrency::details::FreeThreadProxyFactory::Retire.LIBCMTD ref: 00007FFB0C49320D
                          • Part of subcall function 00007FFB0C4931C0: Concurrency::details::FreeThreadProxyFactory::Retire.LIBCMTD ref: 00007FFB0C493239
                          • Part of subcall function 00007FFB0C4A18A0: char_traits.LIBCPMTD ref: 00007FFB0C4A18C6
                          • Part of subcall function 00007FFB0C4A17F0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A1803
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::$Fac_nodeFac_node::_Factory::FreeProxyRetireThreadstd::_$Decorator::getEmptyQueue::StructuredTableTypeWork$char_traits
                        • String ID: ,$/**/$0$0$0$1$1$2$2$2$3$3$4$5$5$6$6$6$7$9$=$=$A$B$D$D$E$E$F$H$I$I$J$J$J$L$M$N$N$N$N$N$N$O$Q$R$R$R$R$R$S$T$T$U$U$U$U$V$V$V$V$V$W$X$Z$Z$Z$Z$Z$Z$Z$Z$a$a$a$c$c$d$e$e$e$e$g$h$i$j$k$k$k$k$m$m$m$n$n$n$n$o$q$q$s$t$t$x$z
                        • API String ID: 1768506830-3784889792
                        • Opcode ID: ed4ddddc12d98e72ae5fe04b24863b89c5ffce575c5e63bf3c35c8c8b54d9598
                        • Instruction ID: 09793c9095d3725f2cbf5506d830bb0d4206db3146871efa7a6fde6795a007f2
                        • Opcode Fuzzy Hash: ed4ddddc12d98e72ae5fe04b24863b89c5ffce575c5e63bf3c35c8c8b54d9598
                        • Instruction Fuzzy Hash: 1312266210DBC184E772D724E4987DFABA0EBD2748F444066E7CC47AAADFADC548CB11
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CloseConcurrency::details::EmptyOpenQueue::StructuredWork$EnumFac_nodeFac_node::_QueryValuechar_traitsstd::_
                        • String ID: $A$A$C$E$F$M$O$P$R$S$S$T$W$\$\$\$\$c$c$d$displayName$e$e$e$e$f$i$i$i$n$o$o$o$r$r$r$r$r$s$t$t$t$u$v$v$y
                        • API String ID: 1441156695-1915070847
                        • Opcode ID: e4361326d0e3c8bc700f733f902279f19f363e10ede73ef7b9bac91b2170a774
                        • Instruction ID: 9cc73225b22de4aa9da23f62c5a2ecb4df862b5d552dfb163b77196f4349485b
                        • Opcode Fuzzy Hash: e4361326d0e3c8bc700f733f902279f19f363e10ede73ef7b9bac91b2170a774
                        • Instruction Fuzzy Hash: 23C117A250CAC195E721DB24E4487AFBBA1FBD6348F404125E3CC47AAADFBDD548CB50
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CloseConcurrency::details::EmptyQueryQueue::StructuredValueWork$Decorator::getFac_nodeFac_node::_OpenTableTypechar_traitsstd::_type_info::_name_internal_method
                        • String ID: $A$C$CurrentBuild$E$F$M$N$O$ProductName$R$S$T$T$V$W$W$\$\$\$c$d$e$e$f$i$i$i$n$n$n$o$o$o$o$r$r$r$r$s$s$s$t$t$u$w
                        • API String ID: 1239499685-786305380
                        • Opcode ID: 13569eeb28de908d15b91c27bdb5b0d39f4d3520f413788c1801af54ad5c7272
                        • Instruction ID: cf8a565b287796723fd070dc50c634e09893a689010ebec632c1d61b464996d5
                        • Opcode Fuzzy Hash: 13569eeb28de908d15b91c27bdb5b0d39f4d3520f413788c1801af54ad5c7272
                        • Instruction Fuzzy Hash: 30C13AA251C6C195E721DB64E4987AFBBA1FBD2748F400026E3CD47AAADF7DD508CB10
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Fac_nodeFac_node::_std::_$Concurrency::cancel_current_taskConcurrency::details::EmptyQueue::StructuredWorktype_info::_name_internal_method$Decorator::getTableTypechar_traits
                        • String ID: D$D$F$K$M$R$a$a$c$c$e$e$e$e$e$e$g$i$i$i$k$l$l$l$m$n$n$n$o$o$o$p$r$s$s$t$t$t
                        • API String ID: 2028585780-760767060
                        • Opcode ID: 59bd2d8ec4de32a4ecc2802f7587c4c348fb0e6e645ba743dd23d46785d07151
                        • Instruction ID: 2e4bf7673fce2c6f13ad8ac4975e705c3f2445097cd70c7980420639db7365ee
                        • Opcode Fuzzy Hash: 59bd2d8ec4de32a4ecc2802f7587c4c348fb0e6e645ba743dd23d46785d07151
                        • Instruction Fuzzy Hash: 102238A260DAC194E671DB21E4987EFA7A0FBD5788F400035E6CD47AAADF6CD508CB50
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Fac_nodeFac_node::_std::_$Concurrency::details::Concurrency::details::_CriticalEmptyHandleLock::_Queue::ReentrantScoped_lockScoped_lock::~_StructuredWorkchar_traits
                        • String ID: ==>$D$F$FrG$G$M$a$a$e$e$e$e$g$i$i$l$n$r$r$r$s$t$v
                        • API String ID: 420779418-205225161
                        • Opcode ID: 5f69955f3368b046341811d0c46d426a07e9c4799963500704bcf638db78bb77
                        • Instruction ID: b25aa14c815a6c783a756f4484cf315336a9e4267f5e08080d7abe45e22a2f1b
                        • Opcode Fuzzy Hash: 5f69955f3368b046341811d0c46d426a07e9c4799963500704bcf638db78bb77
                        • Instruction Fuzzy Hash: 4CE119B261DAC195EA70DB25E4997EEA7A0FBC5388F400035E6CD47BAADF6CD544CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CloseHandle$Concurrency::details::CreateEmptyProcessQueue::StructuredWork$Char_traitsFac_nodeFac_node::_std::_
                        • String ID: $ $ $.$.exe$/$a$c$c$d$e$e$h$m$r$s$t$t$x
                        • API String ID: 4010672392-1850887160
                        • Opcode ID: d31621a2d32b0a3b1949a119d43f2289199d1e78f584f337a88e1aafb8d2bd3e
                        • Instruction ID: 24f4b1f1df6c5aaa21f92fc8e668892613b2b4ccc42ab1a2a64853994b082b52
                        • Opcode Fuzzy Hash: d31621a2d32b0a3b1949a119d43f2289199d1e78f584f337a88e1aafb8d2bd3e
                        • Instruction Fuzzy Hash: 3CC128B251CAC195EA31DB60E4987EFB761FBD5348F404036E68D83AAADF6CD548CB40
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Fac_nodeFac_node::_std::_
                        • String ID: C$F$FtS$M$S$a$a$e$e$e$e$g$i$i$l$l$n$n$r$t$t
                        • API String ID: 1114552684-2189465758
                        • Opcode ID: 50ee1b1b17ded2a8e62f603e76cff047e39b5a6fc7cd7a71ca88179335fa07c3
                        • Instruction ID: d376208f5508fdd988dd5c06278bb533cac4ad2d1d2ccc4e5a4838e178f50a0f
                        • Opcode Fuzzy Hash: 50ee1b1b17ded2a8e62f603e76cff047e39b5a6fc7cd7a71ca88179335fa07c3
                        • Instruction Fuzzy Hash: 72B15CA260DAC191E660DB21E4947EFA7A1FFD5388F404135E6CD47BAADF6CD548CB00
                        APIs
                        • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4C65DA
                        • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4C6660
                          • Part of subcall function 00007FFB0C4A18A0: char_traits.LIBCPMTD ref: 00007FFB0C4A18C6
                        • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4C66B8
                          • Part of subcall function 00007FFB0C4C16D0: std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4C1756
                          • Part of subcall function 00007FFB0C4C16D0: std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4C1819
                          • Part of subcall function 00007FFB0C4C16D0: std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4C18A0
                          • Part of subcall function 00007FFB0C4A17F0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A1803
                          • Part of subcall function 00007FFB0C4CEF30: UnDecorator::getVbTableType.LIBCMTD ref: 00007FFB0C4CEF75
                        • type_info::_name_internal_method.LIBCMTD ref: 00007FFB0C4C67B4
                          • Part of subcall function 00007FFB0C4D3314: Concurrency::cancel_current_task.LIBCPMT ref: 00007FFB0C4D3344
                          • Part of subcall function 00007FFB0C4D3314: Concurrency::cancel_current_task.LIBCPMT ref: 00007FFB0C4D334A
                          • Part of subcall function 00007FFB0C498730: std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C498768
                          • Part of subcall function 00007FFB0C498730: std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4987CE
                          • Part of subcall function 00007FFB0C498730: std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C498834
                          • Part of subcall function 00007FFB0C498730: std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C49889F
                          • Part of subcall function 00007FFB0C498730: std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C49890A
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Fac_nodeFac_node::_std::_$Concurrency::cancel_current_task$Concurrency::details::Decorator::getEmptyQueue::StructuredTableTypeWorkchar_traitstype_info::_name_internal_method
                        • String ID: C$F$M$S$a$a$e$e$e$e$g$i$i$l$l$n$n$r$t$t
                        • API String ID: 924362910-1541419571
                        • Opcode ID: 668c1e3e51d0e2fc71ca83dd5b96e6bb9e73db51f41fd73b4946feff3da2304a
                        • Instruction ID: 9d9962292ccc4fe13af75145a190dc7dde380ffde81b8293639ba1c2edec75a0
                        • Opcode Fuzzy Hash: 668c1e3e51d0e2fc71ca83dd5b96e6bb9e73db51f41fd73b4946feff3da2304a
                        • Instruction Fuzzy Hash: 5EC149B260DAC191E670DB25E4987EFA7A0FBC5388F404135E6CD47AAADF6CC548CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Fac_nodeFac_node::_std::_$type_info::_name_internal_method
                        • String ID: F$F$M$R$U$a$a$e$e$e$e$error$g$i$i$l$l$n$p$r
                        • API String ID: 3843115320-2728630413
                        • Opcode ID: 208c863bfba058f04b787a8e2d474442b0a7e4e4432c1749738c198f21529a3d
                        • Instruction ID: 3f441480f429af37ef28aee9613ba113e153102deb2f336af3f3257786fb15b8
                        • Opcode Fuzzy Hash: 208c863bfba058f04b787a8e2d474442b0a7e4e4432c1749738c198f21529a3d
                        • Instruction Fuzzy Hash: 43A140A261DAC191E660DB65E4957EFA7A1FBD5388F400035E6CD43BAADF6CD508CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Fac_nodeFac_node::_std::_$Concurrency::cancel_current_task$Decorator::getTableType
                        • String ID: F$F$M$R$U$a$a$e$e$e$e$g$i$i$l$l$n$p$r
                        • API String ID: 3873182351-3194299963
                        • Opcode ID: 5b2bb602d22b333214d04523e346fc123c1330c8c3198e5e6a9d8e78296e0be3
                        • Instruction ID: cd1b2cf50a00a827947b901aaeff44b8d7ab075c778280e54553717e998418e3
                        • Opcode Fuzzy Hash: 5b2bb602d22b333214d04523e346fc123c1330c8c3198e5e6a9d8e78296e0be3
                        • Instruction Fuzzy Hash: B8C14CA261DAC190E670DB65E4987EFA7A0FBD5388F400035E6CD43BAADF6CD544CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Fac_nodeFac_node::_std::_$Drive$LogicalStringsTypechar_traits
                        • String ID: ==>$==>$F$R$a$b$d$e$e$e$i$l$m$o$v$x
                        • API String ID: 3293995294-766430890
                        • Opcode ID: 490619949d2f79f6bcc13f69530309b5a26baaa1be1e3715154f21850153d81e
                        • Instruction ID: 3f80458d0d7524b13b074c46a3e8da67b0f447ab7b2b1634302c1d976056ec2f
                        • Opcode Fuzzy Hash: 490619949d2f79f6bcc13f69530309b5a26baaa1be1e3715154f21850153d81e
                        • Instruction Fuzzy Hash: 2AD115B260DAC195DA70DB21E4947EFA760FBC9788F400136E68D43BAADF6CC549CB40
                        APIs
                        • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C49E8AF
                          • Part of subcall function 00007FFB0C4D3314: Concurrency::cancel_current_task.LIBCPMT ref: 00007FFB0C4D3344
                          • Part of subcall function 00007FFB0C4D3314: Concurrency::cancel_current_task.LIBCPMT ref: 00007FFB0C4D334A
                        • type_info::_name_internal_method.LIBCMTD ref: 00007FFB0C49EB37
                        • Concurrency::cancellation_token::_FromImpl.LIBCPMTD ref: 00007FFB0C49EBA3
                          • Part of subcall function 00007FFB0C4CEF30: UnDecorator::getVbTableType.LIBCMTD ref: 00007FFB0C4CEF75
                        • type_info::_name_internal_method.LIBCMTD ref: 00007FFB0C49ED9B
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::cancel_current_tasktype_info::_name_internal_method$Concurrency::cancellation_token::_Decorator::getFac_nodeFac_node::_FromImplTableTypestd::_
                        • String ID: D$S$a$c$d$e$k$l$n$o$o$o$pre$save$t$w
                        • API String ID: 1666591369-2572745379
                        • Opcode ID: 7e0b7a93bf49bcff58548c04f9da16580aed8d903afd20bd23106dfcea5c502d
                        • Instruction ID: acebe2a6e0bf66b2fb9581452c30edabf632ede496c9e1b3bd9910a4c10ae31b
                        • Opcode Fuzzy Hash: 7e0b7a93bf49bcff58548c04f9da16580aed8d903afd20bd23106dfcea5c502d
                        • Instruction Fuzzy Hash: 240200B250DAC291DA60EB65F4997EEA3A0FFC6748F400035E68D47BAADF2CD544CB40
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Decorator::getDisplayEnumFac_nodeFac_node::_GdiplusMonitorsStartupTableTypestd::_
                        • String ID: D$R$e$e$e$jpg$k$m$o$o$p$s$t$t
                        • API String ID: 1258987360-2495397863
                        • Opcode ID: 76332751ae7abdf6e6b080960cc59d2a6e1d6b7111230b08185894483d4d3adf
                        • Instruction ID: aedb2dd07ae0ff1fc216feb3818a262b2195cc3b54ef793d1278dbe66aa8c379
                        • Opcode Fuzzy Hash: 76332751ae7abdf6e6b080960cc59d2a6e1d6b7111230b08185894483d4d3adf
                        • Instruction Fuzzy Hash: 3B914AB260CAC181EB60DB24E4957EEA7A0FBD5788F404136E68D43BAADF7CD505CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: type_info::_name_internal_method$GdiplusShutdownchar_traits
                        • String ID: .bmp$.gif$.ico$.jfif$.jpeg$.jpg$.png
                        • API String ID: 3499204208-3397763088
                        • Opcode ID: 0f246cb72e55f54a7b693d8fc228ba5af8b2ca5bc0172a7175d6b3f4dadf06c9
                        • Instruction ID: 9f6df285b487479f207571b5e43f6671e599c19d923cae0a47783f9e6c44d184
                        • Opcode Fuzzy Hash: 0f246cb72e55f54a7b693d8fc228ba5af8b2ca5bc0172a7175d6b3f4dadf06c9
                        • Instruction Fuzzy Hash: 55122FF251C6C286D6709B25E4957EEA760FF853A8F001332E6ED869EADF2CD505CB40
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: FromString$char_traits
                        • String ID: bmp$gif$jpg$png$tif${557cf400-1a04-11d3-9a73-0000f81ef32e}${557cf401-1a04-11d3-9a73-0000f81ef32e}${557cf402-1a04-11d3-9a73-0000f81ef32e}${557cf405-1a04-11d3-9a73-0000f81ef32e}${557cf406-1a04-11d3-9a73-0000f81ef32e}
                        • API String ID: 3612880244-2938333857
                        • Opcode ID: 27bbbdadbdfd53492e3170faa8fbfabf8b77fc76d5c273dd4bfb8bd4d69b80a3
                        • Instruction ID: bfd92ba618c3abdb280366876a9b714a5ef5ea4a6b90a5f2191c3e2b3fc85898
                        • Opcode Fuzzy Hash: 27bbbdadbdfd53492e3170faa8fbfabf8b77fc76d5c273dd4bfb8bd4d69b80a3
                        • Instruction Fuzzy Hash: BD319EF5A0CA4691EA90DB31E8999BE6361FFC43D8F805032D98D826B6FF6CE504C700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$DestroyIcon$Concurrency::details::Concurrency::task_continuation_context::task_continuation_contextCreateEmptyFileFromGlobalInfoQueue::StreamStringStructuredWorkchar_traits
                        • String ID: png
                        • API String ID: 2892423481-2199389072
                        • Opcode ID: fae29a7a72ba1a9e499f6e2f45cbe4b808135d9687a933d283217be40005f67f
                        • Instruction ID: 153618906a33e4676fcdcff104682e7792050aff3318ae2a0266c0b09a231cab
                        • Opcode Fuzzy Hash: fae29a7a72ba1a9e499f6e2f45cbe4b808135d9687a933d283217be40005f67f
                        • Instruction Fuzzy Hash: 4CD11EB2618A8191DA60DB25E4957EEA760FFC4788F405036EB8E83BB9DF3CD545CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: DisplayEnumMonitors
                        • String ID: $DISPLAY$h
                        • API String ID: 2950131505-1878358626
                        • Opcode ID: 672e0ac83053d01c40282062667c1306d9c30b7dde12ecaa6dd10ab88f712e8c
                        • Instruction ID: 34be85328bd24bdd5a916cbf6154b939c4f0a5a2227dfc09e792336a6ddef5c4
                        • Opcode Fuzzy Hash: 672e0ac83053d01c40282062667c1306d9c30b7dde12ecaa6dd10ab88f712e8c
                        • Instruction Fuzzy Hash: 2F51E9B2608A8186E760CB25F494BAEB3A1FBC4794F404136E68D83BA9DF7CD445CF00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Time$File$System$CloseConcurrency::details::CreateEmptyHandleLocalModuleNameQueue::SpecificStructuredWorkchar_traits
                        • String ID: a.m.$ p.m.
                        • API String ID: 4253720429-1173636248
                        • Opcode ID: f9f23eb8ed0bd049b82b5f7093e0345eed192e55972dcacb3ddd51adc77cf471
                        • Instruction ID: 59219f430cfb0f801ed7a0145c389e7e5b630406a0f93cdfe0fbe4e957c037c4
                        • Opcode Fuzzy Hash: f9f23eb8ed0bd049b82b5f7093e0345eed192e55972dcacb3ddd51adc77cf471
                        • Instruction Fuzzy Hash: 60514CE191C68286EA20DB61E459BFEA371FFC1748F504136EA8D476A9DF7CD409CB40
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Yarn$std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                        • String ID: bad locale name
                        • API String ID: 3904239083-1405518554
                        • Opcode ID: 21b6dde102e949537a358dabb7938f436e8824ef52250dd78e5f134c6afc748f
                        • Instruction ID: c592ea8abcfc962ecb6bc15ac1779c6a03f68809d93241a133bff73e87c4c7c6
                        • Opcode Fuzzy Hash: 21b6dde102e949537a358dabb7938f436e8824ef52250dd78e5f134c6afc748f
                        • Instruction Fuzzy Hash: B5112ED1E6A78682ED44EB7AE499A6E5350FFC2BC8F802436F94E13B56CF2CD0118704
                        APIs
                          • Part of subcall function 00007FFB0C4E021C: _invalid_parameter_noinfo.LIBCMT ref: 00007FFB0C4E0230
                        • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,00007FFB0C4D05AE), ref: 00007FFB0C4D2F35
                        • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,00007FFB0C4D05AE), ref: 00007FFB0C4D2F48
                        • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,00007FFB0C4D05AE), ref: 00007FFB0C4D2F5F
                        • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,00007FFB0C4D05AE), ref: 00007FFB0C4D2F76
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: AddressProc$HandleModule_invalid_parameter_noinfo
                        • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$invalid random_device value$kernel32.dll
                        • API String ID: 2104222004-861830008
                        • Opcode ID: c7c081bedf470f973e2b56519931470c3a7a7f8b38c7d7fbc461ff9d9a2692fe
                        • Instruction ID: 46a623126744a481cb9ef74f459c5de3caeaa498b403187f151798c1140a33ef
                        • Opcode Fuzzy Hash: c7c081bedf470f973e2b56519931470c3a7a7f8b38c7d7fbc461ff9d9a2692fe
                        • Instruction Fuzzy Hash: 0701E8E8E19A03C1FA44EB72E89EC7D23A1BF58745F941035D80E83275EF6CE59A8710
                        APIs
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4CB342
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4CB421
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4CB4BF
                        • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FFB0C4CB622
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4CB6CC
                          • Part of subcall function 00007FFB0C4AE180: UnDecorator::getVbTableType.LIBCMTD ref: 00007FFB0C4AE1AA
                          • Part of subcall function 00007FFB0C4AB800: _Byte_length.LIBCPMTD ref: 00007FFB0C4AB894
                        • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FFB0C4CB82A
                          • Part of subcall function 00007FFB0C4A18A0: char_traits.LIBCPMTD ref: 00007FFB0C4A18C6
                        • UnDecorator::getVbTableType.LIBCMTD ref: 00007FFB0C4CB897
                          • Part of subcall function 00007FFB0C4CE4A0: std::_Throw_Cpp_error.LIBCPMT ref: 00007FFB0C4CE4C1
                          • Part of subcall function 00007FFB0C4CE4A0: GetCurrentThreadId.KERNEL32 ref: 00007FFB0C4CE4C7
                          • Part of subcall function 00007FFB0C4CE4A0: std::_Throw_Cpp_error.LIBCPMT ref: 00007FFB0C4CE4DB
                          • Part of subcall function 00007FFB0C4CE4A0: std::_Throw_Cpp_error.LIBCPMT ref: 00007FFB0C4CE50A
                          • Part of subcall function 00007FFB0C4A3500: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A352B
                          • Part of subcall function 00007FFB0C4A3500: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A353A
                        • UnDecorator::getVbTableType.LIBCMTD ref: 00007FFB0C4CBAF1
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: std::runtime_error::runtime_error$Cpp_errorDecorator::getTableThrow_Typestd::_$Concurrency::details::Concurrency::details::_CriticalEmptyLock::_Queue::ReentrantScoped_lockScoped_lock::~_StructuredWork$Byte_lengthCurrentThreadchar_traits
                        • String ID:
                        • API String ID: 2867615695-0
                        • Opcode ID: cd33df9d3d40b1a4144104433d8dc30451c8ce45da51524e28e90d1d2dbb93f0
                        • Instruction ID: d253d959fbe14a573ab6ff46eb787269af7e778a72746f9860086146897ecab0
                        • Opcode Fuzzy Hash: cd33df9d3d40b1a4144104433d8dc30451c8ce45da51524e28e90d1d2dbb93f0
                        • Instruction Fuzzy Hash: 2732F4B2609AC585DA70DB25E4997EEB7A0FBC4788F404036DB8D43BAADF38D445CB04
                        APIs
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4A7AD7
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4A7BBA
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4A7C56
                        • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FFB0C4A7D92
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4A7E20
                          • Part of subcall function 00007FFB0C4AE180: UnDecorator::getVbTableType.LIBCMTD ref: 00007FFB0C4AE1AA
                          • Part of subcall function 00007FFB0C4AB800: _Byte_length.LIBCPMTD ref: 00007FFB0C4AB894
                        • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FFB0C4A7F72
                          • Part of subcall function 00007FFB0C4A18A0: char_traits.LIBCPMTD ref: 00007FFB0C4A18C6
                          • Part of subcall function 00007FFB0C4C6420: std::_Fac_node::_Fac_node.LIBCPMTD ref: 00007FFB0C4C65DA
                          • Part of subcall function 00007FFB0C4A3500: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A352B
                          • Part of subcall function 00007FFB0C4A3500: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A353A
                        • UnDecorator::getVbTableType.LIBCMTD ref: 00007FFB0C4A81D1
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: std::runtime_error::runtime_error$Concurrency::details::Concurrency::details::_CriticalDecorator::getEmptyLock::_Queue::ReentrantScoped_lockScoped_lock::~_StructuredTableTypeWork$Byte_lengthFac_nodeFac_node::_char_traitsstd::_
                        • String ID:
                        • API String ID: 2648250531-0
                        • Opcode ID: a9944911c49198297e702856b03420b9597a7d3ae06585ae7b6ef4a972edc2d1
                        • Instruction ID: 2c6ccca2a1a2d1014eb3cb9a5be560458a7e38c07fe36ed5b4ae9b1e45fcb374
                        • Opcode Fuzzy Hash: a9944911c49198297e702856b03420b9597a7d3ae06585ae7b6ef4a972edc2d1
                        • Instruction Fuzzy Hash: B72207B2619AC685DA70DB25E4A47EEB760FBC5788F401126DB8D83BA9DF3CD504CB40
                        APIs
                        • FreeLibrary.KERNEL32(?,?,?,00007FFB0C4E499C,?,?,?,?,00007FFB0C4DF629,?,?,?,?,00007FFB0C4D0F10), ref: 00007FFB0C4E42D0
                        • GetProcAddress.KERNEL32(?,?,?,00007FFB0C4E499C,?,?,?,?,00007FFB0C4DF629,?,?,?,?,00007FFB0C4D0F10), ref: 00007FFB0C4E42DC
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: AddressFreeLibraryProc
                        • String ID: api-ms-$ext-ms-
                        • API String ID: 3013587201-537541572
                        • Opcode ID: 37ca3048070be1c70536f5ec53a0aedc04f3e76b26da52ce0f72c4a8bfec6647
                        • Instruction ID: 928eeef418409560f751fe9a682c75059ffad5609c17be5b37d0888fed45160b
                        • Opcode Fuzzy Hash: 37ca3048070be1c70536f5ec53a0aedc04f3e76b26da52ce0f72c4a8bfec6647
                        • Instruction Fuzzy Hash: 7E41D2E1B19A0281FA16CB76E91CD796391BF49BE8F0A5236DD0E47794EF3CE5058300
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID: f$p$p
                        • API String ID: 3215553584-1995029353
                        • Opcode ID: b0d905913f178a05850a904996d5be31d3cd629aea336fc8d1d384171e8fe448
                        • Instruction ID: 90ce7d4abbc8dc288db5e85f1da64ccfed19ad0079353285188793a5eea5577f
                        • Opcode Fuzzy Hash: b0d905913f178a05850a904996d5be31d3cd629aea336fc8d1d384171e8fe448
                        • Instruction Fuzzy Hash: 9B1250E1E0C25395FB246E35E098ABD7792FF40758F944136E69A466C8DF3CE980DB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Mpunct$ctypestd::ios_base::width
                        • String ID: @
                        • API String ID: 3075750325-2766056989
                        • Opcode ID: e67de69f98cff780475ac0c8084deb56d29bcf2359572f96fc364d3a03f4861c
                        • Instruction ID: b0993fca398109b01c5206cac192f44917fad60101ef0f166d334ff29078c7a0
                        • Opcode Fuzzy Hash: e67de69f98cff780475ac0c8084deb56d29bcf2359572f96fc364d3a03f4861c
                        • Instruction Fuzzy Hash: F712F9B260DAC585DA70DB65E4947EEA7A1FBC8784F404032EA8D83BA9DF7CD544CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchState
                        • String ID: csm$csm$csm
                        • API String ID: 1826822863-393685449
                        • Opcode ID: 18fba9449cf909bf85d974a39e9706e64e3fa71afd28f0598ebf155c87009170
                        • Instruction ID: 3bdeae41bd1671ff7ed69708a71d53f60b41424c3a2009396a43c41bf0207373
                        • Opcode Fuzzy Hash: 18fba9449cf909bf85d974a39e9706e64e3fa71afd28f0598ebf155c87009170
                        • Instruction Fuzzy Hash: 0BD159F2A086418AFB20AB75D448BAD67A0FF4579CF110536EE8D57B9ADF38E095C700
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: b2c7bc130197246b40956ba66cd1257bddcb4cdd4c992c93ddc331ef8c3a997e
                        • Instruction ID: 71cfc696228e56f44a792721c0175e85eb363bde18d4df01b58d84a5612094e9
                        • Opcode Fuzzy Hash: b2c7bc130197246b40956ba66cd1257bddcb4cdd4c992c93ddc331ef8c3a997e
                        • Instruction Fuzzy Hash: 82C1CFE2A0868691EA609B25D44CAFDB7A1FFA1B98F560131DA4F073D1DF7DEA458300
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: File$CloseConcurrency::details::CreateEmptyHandleQueue::SizeStructuredWork
                        • String ID:
                        • API String ID: 2285079412-0
                        • Opcode ID: e155523a2607a2c161b7ce0223fbcfffcf75895e662939dd0c3e66526e39bfe8
                        • Instruction ID: 43b1de89ad0db1f88262be5c26eeabc0366a9d2a26a8f6e9a73cc4cec9d60bd6
                        • Opcode Fuzzy Hash: e155523a2607a2c161b7ce0223fbcfffcf75895e662939dd0c3e66526e39bfe8
                        • Instruction Fuzzy Hash: 96411AB260C98186E720DB25E459BAEB7B0FFC1798F504135E6CD87AA9CF7DD8458B00
                        APIs
                        • LoadLibraryExW.KERNEL32(?,?,00000000,00007FFB0C4D8F13,?,?,?,00007FFB0C4D59DA,?,?,?,00007FFB0C4D5995), ref: 00007FFB0C4D8D91
                        • GetLastError.KERNEL32(?,?,00000000,00007FFB0C4D8F13,?,?,?,00007FFB0C4D59DA,?,?,?,00007FFB0C4D5995), ref: 00007FFB0C4D8D9F
                        • LoadLibraryExW.KERNEL32(?,?,00000000,00007FFB0C4D8F13,?,?,?,00007FFB0C4D59DA,?,?,?,00007FFB0C4D5995), ref: 00007FFB0C4D8DC9
                        • FreeLibrary.KERNEL32(?,?,00000000,00007FFB0C4D8F13,?,?,?,00007FFB0C4D59DA,?,?,?,00007FFB0C4D5995), ref: 00007FFB0C4D8E37
                        • GetProcAddress.KERNEL32(?,?,00000000,00007FFB0C4D8F13,?,?,?,00007FFB0C4D59DA,?,?,?,00007FFB0C4D5995), ref: 00007FFB0C4D8E43
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$Load$AddressErrorFreeLastProc
                        • String ID: api-ms-
                        • API String ID: 2559590344-2084034818
                        • Opcode ID: 492e68bbb1773d240888386dda676b62b4bbe1757f3f4df5f2fd3b7df8b2a67b
                        • Instruction ID: 628f7d7c5134f3b222a35383025689142068b3f4b42cd82ac00d78998914acc8
                        • Opcode Fuzzy Hash: 492e68bbb1773d240888386dda676b62b4bbe1757f3f4df5f2fd3b7df8b2a67b
                        • Instruction Fuzzy Hash: 6E31B0E1B1A74291FE12AB22E808D7D23A4FF48BA8F590535ED1D4A7D1EF3CE4418740
                        APIs
                        • GetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2417
                        • FlsGetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E242C
                        • FlsSetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E244D
                        • FlsSetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E247A
                        • FlsSetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E248B
                        • FlsSetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E249C
                        • SetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E24B7
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Value$ErrorLast
                        • String ID:
                        • API String ID: 2506987500-0
                        • Opcode ID: 59373f8d53b31bb45b24a81f44cc7f7f763d6d1bbe38ce609f55f8ea00006115
                        • Instruction ID: bd2ffef633b05a18021b2cbe6583ef3aeea8c67ab1510866612b7aa3257a83b1
                        • Opcode Fuzzy Hash: 59373f8d53b31bb45b24a81f44cc7f7f763d6d1bbe38ce609f55f8ea00006115
                        • Instruction Fuzzy Hash: C62150E0B0C64242FA68AB71D95DD3D53957F447B8F161738E93F467D6DF6CA6018200
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                        • String ID: CONOUT$
                        • API String ID: 3230265001-3130406586
                        • Opcode ID: aaa7478a30f227f436a7fdc7f67f6462c4936cde7976a00747b319838b7bad40
                        • Instruction ID: 82935e91267595b9fa4b0ea9af6f9efe455b8ff1d73bb699df700a33f42eb881
                        • Opcode Fuzzy Hash: aaa7478a30f227f436a7fdc7f67f6462c4936cde7976a00747b319838b7bad40
                        • Instruction Fuzzy Hash: 5A118EF1B18A4186E3508B62E859B2D67A4FF88FE9F041634EA6D877A4CF3CD4058740
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ErrorFileLast$CloseConcurrency::details::CreateEmptyHandleQueue::SizeStructuredWork
                        • String ID:
                        • API String ID: 1161490322-0
                        • Opcode ID: 1dea7533e81207ac8a784632e534d43140b698bbcad88c187d8879aa26368a2d
                        • Instruction ID: 0f057029788388ab6dd7afad3e3ecc16af049c73dda1cf96b6698a9e14760f16
                        • Opcode Fuzzy Hash: 1dea7533e81207ac8a784632e534d43140b698bbcad88c187d8879aa26368a2d
                        • Instruction Fuzzy Hash: B501CCB1908A5186E7109B35F85CB2E77B0FF81BA9F201634E6AD46AB4CF3DD4469B00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressErrorFreeLastLoadProc
                        • String ID: getaddrinfo$ws2_32.dll
                        • API String ID: 2540614322-1292075177
                        • Opcode ID: 2e17c17b20e4e39118e914fa3b5e4c7575d2cbd19b87fa64c5de521b5d5e2b13
                        • Instruction ID: 8a1fed49339cb49d62938b9911de778c3204c0c0ad0e3c7523dbf6ef26a20552
                        • Opcode Fuzzy Hash: 2e17c17b20e4e39118e914fa3b5e4c7575d2cbd19b87fa64c5de521b5d5e2b13
                        • Instruction Fuzzy Hash: AA010CF691CB45C6E620DF25F488A2EB7A0FB89799F400535EA8D42A68CF3CD555CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressErrorFreeLastLoadProc
                        • String ID: inet_pton$ws2_32.dll
                        • API String ID: 2540614322-1244057378
                        • Opcode ID: f72124b0816627394e4800e943be552c9ae965a8f5f9275f8fed54044a445383
                        • Instruction ID: bd7b1034d00265b96ad6cb522f33cead2fcd56c66f4e292b83da6e4cb4f5a435
                        • Opcode Fuzzy Hash: f72124b0816627394e4800e943be552c9ae965a8f5f9275f8fed54044a445383
                        • Instruction Fuzzy Hash: 9F01DBF291CB4186E620DF25E888B2EB770FF85799F501235E58D427A8CF3CD5458B00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressErrorFreeLastLoadProc
                        • String ID: shutdown$ws2_32.dll
                        • API String ID: 2540614322-1549006702
                        • Opcode ID: 04e719e17db4c40d27fc3eeb3ad78a178e066fcb23fb87a825b186b968d0ada3
                        • Instruction ID: 0935cd2f17deac14546844b6006e9f22a914bf92cdc39f8a8b2c1cad60165241
                        • Opcode Fuzzy Hash: 04e719e17db4c40d27fc3eeb3ad78a178e066fcb23fb87a825b186b968d0ada3
                        • Instruction Fuzzy Hash: 9C01E1F291CA41C6E620DF25F488B2EB7B0FF847A9F501231E58E42AA8CF3CD5558B00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressErrorFreeLastLoadProc
                        • String ID: WSAStartup$ws2_32.dll
                        • API String ID: 2540614322-1976915905
                        • Opcode ID: b09a82c92f7f546557ada2d47e9566cf0baec7d7ecfa32dff5c5a9a1503d013e
                        • Instruction ID: f0c688bf5beef5f5f47320a37a9e707a3e10141d63aeb8033417284d94ef15ab
                        • Opcode Fuzzy Hash: b09a82c92f7f546557ada2d47e9566cf0baec7d7ecfa32dff5c5a9a1503d013e
                        • Instruction Fuzzy Hash: 2701DEF291CA51C6E6209B25F888B2D77B0FF847A9F501235E58E42AB8DF7CD585CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressErrorFreeLastLoadProc
                        • String ID: closesocket$ws2_32.dll
                        • API String ID: 2540614322-181964208
                        • Opcode ID: 3fefd687c93cc16ac5c0f73265be1874ef04f7f879d6f0608bedc8a6b0f68dc9
                        • Instruction ID: 26535820a64410d0dea05c7bba23010e93b287a8b0392a60c2a6a240b3e06e81
                        • Opcode Fuzzy Hash: 3fefd687c93cc16ac5c0f73265be1874ef04f7f879d6f0608bedc8a6b0f68dc9
                        • Instruction Fuzzy Hash: 4C01BBF191CA51C6E6209B65F988B2D77A0FF84769F501231E58E42AA4CF3CD55A8B00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressErrorFreeLastLoadProc
                        • String ID: WSAGetLastError$ws2_32.dll
                        • API String ID: 2540614322-1955703101
                        • Opcode ID: fe3d982a96a16abdc97643669944ad9cefe5dc86cd7eec1d1c0fa1a680c5434b
                        • Instruction ID: 1237345418e1c0189ed4124f7b5f0427e589971eb706420e7209bd9a23f757b2
                        • Opcode Fuzzy Hash: fe3d982a96a16abdc97643669944ad9cefe5dc86cd7eec1d1c0fa1a680c5434b
                        • Instruction Fuzzy Hash: 28F0ECF191CA51C6E6209B24F889B2D77B0FF9476DF401235E58E42AA8CF3CD5568A00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressErrorFreeLastLoadProc
                        • String ID: WSACleanup$ws2_32.dll
                        • API String ID: 2540614322-2677834364
                        • Opcode ID: d4c9f652633523056b2cb113cf7c70b1b34af1ea84f87650ba350b30f5e514b2
                        • Instruction ID: 4311fc4b9cb26b1505b757916b1a009073e9f08ffd9411c25f2953adfabdf063
                        • Opcode Fuzzy Hash: d4c9f652633523056b2cb113cf7c70b1b34af1ea84f87650ba350b30f5e514b2
                        • Instruction Fuzzy Hash: 0BF0ECF1D1CA52C6F6209B28F88CB2D67B0FF857ADF501235E58E42AA4CF3CD5568A01
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ByteCharMultiStringWide
                        • String ID:
                        • API String ID: 2829165498-0
                        • Opcode ID: e599737eeba393ba2e7364258460f95dd52f47ec3c249f4a66a619b501052b22
                        • Instruction ID: 4ed73cae51c182775287e1c7e29c128328a11b7bd6af6dba720308e42a85a776
                        • Opcode Fuzzy Hash: e599737eeba393ba2e7364258460f95dd52f47ec3c249f4a66a619b501052b22
                        • Instruction Fuzzy Hash: E8818DF2A0874286FB209F65E848A6D73A5FF44BA8F144635EA5E47BE8DF7CD4018701
                        APIs
                        • std::bad_exception::bad_exception.LIBCMTD ref: 00007FFB0C4CACEE
                          • Part of subcall function 00007FFB0C4D4720: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFB0C4D407B), ref: 00007FFB0C4D4770
                          • Part of subcall function 00007FFB0C4D4720: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFB0C4D407B), ref: 00007FFB0C4D47B1
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4CAD60
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4CADB5
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4CAE2F
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4CAECD
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4CAF92
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: std::runtime_error::runtime_error$Concurrency::details::EmptyQueue::StructuredWork$ExceptionFileHeaderRaisestd::bad_exception::bad_exception
                        • String ID:
                        • API String ID: 3965443834-0
                        • Opcode ID: 0d4e2dfe6f9cec561199eb6ced0db4a94df36823f4d8a24ec355e669d2707ef8
                        • Instruction ID: 7e808ac7169e671211a300b976acba73fa9cc712d484c676c3c0172919dd7cc3
                        • Opcode Fuzzy Hash: 0d4e2dfe6f9cec561199eb6ced0db4a94df36823f4d8a24ec355e669d2707ef8
                        • Instruction Fuzzy Hash: 13912CB260D68286D760DB25E495BAEB7A0FFC5348F405131E68D83AA9DF3CD945CF40
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Fgetc
                        • String ID:
                        • API String ID: 1720979605-0
                        • Opcode ID: 7474813165e588f6f20f2e4cb041319f60019012d1210d351f19dbeef243aec6
                        • Instruction ID: 162d4046f80b3f9e21dd500c0110bd0ef1431ccf008c0a14e402c8d31616d753
                        • Opcode Fuzzy Hash: 7474813165e588f6f20f2e4cb041319f60019012d1210d351f19dbeef243aec6
                        • Instruction Fuzzy Hash: 2681CAE290CA8186EA20DB75E4947BEB7A5FFC5788F505036E78D47A9ADF2CD404CB40
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::EmptyMpunctQueue::StructuredWorkshared_ptrstd::ios_base::width
                        • String ID:
                        • API String ID: 2515095778-0
                        • Opcode ID: cc37aa2f08600195c4d40083c9100ee5bb4f7a66da4c1f895df5384b038f517e
                        • Instruction ID: 160a4f56436cd4038e2ca8e4207b9954922420a78449f1242b5782e1e8c062b5
                        • Opcode Fuzzy Hash: cc37aa2f08600195c4d40083c9100ee5bb4f7a66da4c1f895df5384b038f517e
                        • Instruction Fuzzy Hash: 8981D3B261CAC591DA70AB21E4947EFA765FBC8784F804072EACD83B99DF2CD544CB40
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00007FFB0C4D24BD
                        • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4B240B,?,?,?,?,00007FFB0C4AC458), ref: 00007FFB0C4D24DC
                        • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4B240B,?,?,?,?,00007FFB0C4AC458), ref: 00007FFB0C4D24FE
                        • sys_get_time.LIBCPMT ref: 00007FFB0C4D2519
                        • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4B240B,?,?,?,?,00007FFB0C4AC458), ref: 00007FFB0C4D253F
                        • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4B240B,?,?,?,?,00007FFB0C4AC458), ref: 00007FFB0C4D2557
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: AcquireExclusiveLock$CurrentThreadsys_get_time
                        • String ID:
                        • API String ID: 184115430-0
                        • Opcode ID: 2419752cfd1b9c9900042bb42ff48b6b6b5b9f09afe652682e084dd5a96abbf7
                        • Instruction ID: 7a86f7679ed2456c09bf7c6d55f070e198fcf34d78fa2c63e92643d6d77124a2
                        • Opcode Fuzzy Hash: 2419752cfd1b9c9900042bb42ff48b6b6b5b9f09afe652682e084dd5a96abbf7
                        • Instruction Fuzzy Hash: C741F6F2A2864286FB74AF34D469A3D73A0FF54B69F404031DA4D42698DF78ED91C700
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Atomic_long::operator=CurrentListThreadatomic_compare_exchangestd::_
                        • String ID:
                        • API String ID: 2550250828-0
                        • Opcode ID: 932c88e282ccbfc92ed9550ae828c613280df863858bfd3a7e06f2706118e393
                        • Instruction ID: e1ac78fb7f5cf9b346fcea785570f983ea7e829a115abd642f540d7fe899bfe1
                        • Opcode Fuzzy Hash: 932c88e282ccbfc92ed9550ae828c613280df863858bfd3a7e06f2706118e393
                        • Instruction Fuzzy Hash: 6C3162F1A0C64292FA209B67E04967E67A0FF8578CF400475EA8D47A9ADF2CD505CB44
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Mpunct$ctypestd::ios_base::width
                        • String ID: @
                        • API String ID: 3075750325-2766056989
                        • Opcode ID: 79372846ecdc4f70b43a1b702baf31c287688e89bcffe4d267ae24acf13d0921
                        • Instruction ID: fdd100fcd16ed44eadf49224adb02513cc045a19f4abbcf2b75d1d587b1d5ff4
                        • Opcode Fuzzy Hash: 79372846ecdc4f70b43a1b702baf31c287688e89bcffe4d267ae24acf13d0921
                        • Instruction Fuzzy Hash: 34F1D7B260CAC985DA709B25E4947EFA761FBC8784F444032EACD83B6ADF6CD545CB40
                        APIs
                        • GetLastError.KERNEL32(?,?,0000640E61F42234,00007FFB0C4E0205,?,?,?,?,00007FFB0C4EB486,?,?,00000000,00007FFB0C4ECFC7,?,?,?), ref: 00007FFB0C4E258F
                        • FlsSetValue.KERNEL32(?,?,0000640E61F42234,00007FFB0C4E0205,?,?,?,?,00007FFB0C4EB486,?,?,00000000,00007FFB0C4ECFC7,?,?,?), ref: 00007FFB0C4E25C5
                        • FlsSetValue.KERNEL32(?,?,0000640E61F42234,00007FFB0C4E0205,?,?,?,?,00007FFB0C4EB486,?,?,00000000,00007FFB0C4ECFC7,?,?,?), ref: 00007FFB0C4E25F2
                        • FlsSetValue.KERNEL32(?,?,0000640E61F42234,00007FFB0C4E0205,?,?,?,?,00007FFB0C4EB486,?,?,00000000,00007FFB0C4ECFC7,?,?,?), ref: 00007FFB0C4E2603
                        • FlsSetValue.KERNEL32(?,?,0000640E61F42234,00007FFB0C4E0205,?,?,?,?,00007FFB0C4EB486,?,?,00000000,00007FFB0C4ECFC7,?,?,?), ref: 00007FFB0C4E2614
                        • SetLastError.KERNEL32(?,?,0000640E61F42234,00007FFB0C4E0205,?,?,?,?,00007FFB0C4EB486,?,?,00000000,00007FFB0C4ECFC7,?,?,?), ref: 00007FFB0C4E262F
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Value$ErrorLast
                        • String ID:
                        • API String ID: 2506987500-0
                        • Opcode ID: 99c4fb7652d9ce38ef6bb4778c86f62a3b987b83f4fa8d24ff062a7d41f119d4
                        • Instruction ID: 0a0984bda88c9414dc0fa477711c21482e25d439f8cb8b0ce9f0d46b431cc473
                        • Opcode Fuzzy Hash: 99c4fb7652d9ce38ef6bb4778c86f62a3b987b83f4fa8d24ff062a7d41f119d4
                        • Instruction Fuzzy Hash: D3118BE0B0824241FA646771DA6E83D22967F447B8F061738E92F066D7DFACA6018200
                        APIs
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4C853C
                        • CreateStreamOnHGlobal.OLE32(00000018,00000018), ref: 00007FFB0C4C86B9
                        • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FFB0C4C8848
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::Concurrency::details::_CreateCriticalEmptyGlobalLock::_Queue::ReentrantScoped_lockScoped_lock::~_StreamStructuredWork
                        • String ID: &$png
                        • API String ID: 937857008-590921033
                        • Opcode ID: 469256df4940998a6b6a9f97b8e87e3b9809380934d3a3bbe8bc8221eaec6767
                        • Instruction ID: 80ae4b78b53f608f17fe82664c6732fe77bd5d35570d6ad917f466b0292d16b5
                        • Opcode Fuzzy Hash: 469256df4940998a6b6a9f97b8e87e3b9809380934d3a3bbe8bc8221eaec6767
                        • Instruction Fuzzy Hash: D1B10CB2619A8196D7A0DB25E494BAFB360FFD5784F505022E68E83A69DF7CD444CF00
                        APIs
                        • GetForegroundWindow.USER32 ref: 00007FFB0C4B9665
                        • GetWindowTextW.USER32 ref: 00007FFB0C4B96B7
                          • Part of subcall function 00007FFB0C4B61D0: _WChar_traits.LIBCPMTD ref: 00007FFB0C4B61F6
                          • Part of subcall function 00007FFB0C4B4410: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4B4448
                          • Part of subcall function 00007FFB0C4B4410: WideCharToMultiByte.KERNEL32 ref: 00007FFB0C4B4482
                          • Part of subcall function 00007FFB0C4B4410: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FFB0C4B44B5
                          • Part of subcall function 00007FFB0C4B4410: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4B44D9
                          • Part of subcall function 00007FFB0C4B4410: WideCharToMultiByte.KERNEL32 ref: 00007FFB0C4B4514
                        • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FFB0C4B9703
                          • Part of subcall function 00007FFB0C4A18A0: char_traits.LIBCPMTD ref: 00007FFB0C4A18C6
                        • GetLastError.KERNEL32 ref: 00007FFB0C4B9743
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ByteCharConcurrency::details::Concurrency::details::_CriticalEmptyLock::_MultiQueue::ReentrantScoped_lockScoped_lock::~_StructuredWideWindowWork$Char_traitsErrorForegroundLastTextchar_traits
                        • String ID: W e:
                        • API String ID: 3735979991-3170417794
                        • Opcode ID: f1407232e072fda95da15e61cd8e4a8da2bd02a319f69da54a8653bc12c24653
                        • Instruction ID: 545e2b5d5f42f6eabe107a979d08a5cd242c55f7fd80617d869f945af918a9f3
                        • Opcode Fuzzy Hash: f1407232e072fda95da15e61cd8e4a8da2bd02a319f69da54a8653bc12c24653
                        • Instruction Fuzzy Hash: 153138B2618A8196E7609B24F4887AEB7A1FBC4798F504132E6CD83B69DF3CD544CF40
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CloseHandle$Concurrency::details::CreateEmptyProcessQueue::StructuredWork
                        • String ID: h
                        • API String ID: 4039953145-2439710439
                        • Opcode ID: 1fb3b1661452321f49f255d9558171575636aca6ab531ad18d52b59ca12d7b4b
                        • Instruction ID: f68f8b20af884b469e362680e374f547b0781731fd96dd32f7edf156e95fd958
                        • Opcode Fuzzy Hash: 1fb3b1661452321f49f255d9558171575636aca6ab531ad18d52b59ca12d7b4b
                        • Instruction Fuzzy Hash: 5D21FB72618AC595DB20DB20F4987AEB762FBC4784F504135E68D43AA9DF3CD158CB00
                        APIs
                        • std::make_error_code.LIBCPMTD ref: 00007FFB0C4A58F8
                        • std::ios_base::failure::failure.LIBCPMTD ref: 00007FFB0C4A590A
                          • Part of subcall function 00007FFB0C4D4720: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFB0C4D407B), ref: 00007FFB0C4D4770
                          • Part of subcall function 00007FFB0C4D4720: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFB0C4D407B), ref: 00007FFB0C4D47B1
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ExceptionFileHeaderRaisestd::ios_base::failure::failurestd::make_error_code
                        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                        • API String ID: 1846417002-1866435925
                        • Opcode ID: b43a7e3578587d706e7b548345c629502e0c54278e9975b3f49c218492a832f3
                        • Instruction ID: cd4f39962addebe6c0a3daf77a85ef6008c91915024d28eae03eefe1cfe7f211
                        • Opcode Fuzzy Hash: b43a7e3578587d706e7b548345c629502e0c54278e9975b3f49c218492a832f3
                        • Instruction Fuzzy Hash: B9215EF2A0CA8186E774CB25E44576E77A4FB88348F544035E68D83B59DF2CD554CB10
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: inet_ntop$ws2_32.dll
                        • API String ID: 145871493-102659834
                        • Opcode ID: c59f4af2208141b044d29c11331e9f013cc3aa828399f6e03293c1c1ef900ac2
                        • Instruction ID: 06e8d56e5aefd53ca37e887d4da61f45b37c14063e8416a29bfaa0d0c7d66855
                        • Opcode Fuzzy Hash: c59f4af2208141b044d29c11331e9f013cc3aa828399f6e03293c1c1ef900ac2
                        • Instruction Fuzzy Hash: 5801CCF291CB45C6D660CB25F44871EB7A0FB99798F500535EA8E42B68CF7CD5558B00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: recv$ws2_32.dll
                        • API String ID: 145871493-734160684
                        • Opcode ID: 121e80b15e865c187d828cee44cba9d0fed0f36d3c849a73d0b7ed05107ab776
                        • Instruction ID: b01e4472bb399daf8db27c7505007a0d05d7d577187996450dc247d5e5fb95bc
                        • Opcode Fuzzy Hash: 121e80b15e865c187d828cee44cba9d0fed0f36d3c849a73d0b7ed05107ab776
                        • Instruction Fuzzy Hash: EF0100F2918B41C6D720CB25F848A1EB760FB897A8F401235EA8D42BA8CF3CD5558B00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: send$ws2_32.dll
                        • API String ID: 145871493-892776409
                        • Opcode ID: c72203c53a645444ab5a65247ba5a24b2c4a71c4cc6107fc3a1fdc2c7bd87a1a
                        • Instruction ID: 4adeca395b394e7610a874cb6b4828e7da859bdaccc525da9e64d6b7726fcadc
                        • Opcode Fuzzy Hash: c72203c53a645444ab5a65247ba5a24b2c4a71c4cc6107fc3a1fdc2c7bd87a1a
                        • Instruction Fuzzy Hash: 6B010CB2918B51C6D720CB25F488A1EB7A0FF857A8F400235EA8D42BA8DF3CD5558B00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: connect$ws2_32.dll
                        • API String ID: 145871493-3612281207
                        • Opcode ID: f5f71e3294bcdaee4bc318451acc9ebf704ca82ba944e65828b1c7f76f833850
                        • Instruction ID: 33a19949883058dddf76e1dcb2345d24059625295838e0e38793de0ad39496a8
                        • Opcode Fuzzy Hash: f5f71e3294bcdaee4bc318451acc9ebf704ca82ba944e65828b1c7f76f833850
                        • Instruction Fuzzy Hash: FD01E1F2918B51C6D620DF25E44871E7760FF857A8F501235E59D82BA4DF3CD5558B00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: socket$ws2_32.dll
                        • API String ID: 145871493-3483875929
                        • Opcode ID: cb9d8312e756911d49cd4f51c7db7d5e4ea26f9f0e7ec16d753f30e905b98c22
                        • Instruction ID: a33abc46f5ac4e7068cd43c15bba3edbdd660a5d5b48d33928a6181ea5fa40e9
                        • Opcode Fuzzy Hash: cb9d8312e756911d49cd4f51c7db7d5e4ea26f9f0e7ec16d753f30e905b98c22
                        • Instruction Fuzzy Hash: 4401DEB2518B5186D620CB25E448B2DB760FB847B9F500335E5AD02BE8CF3CD545CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$mscoree.dll
                        • API String ID: 4061214504-1276376045
                        • Opcode ID: 72ebaf5c356ca3ee2904821ff4c5dd1cd3c14096ca2d9aba3ba6fdd35b476235
                        • Instruction ID: 198b844818646f70ba775547850eb6210e9e6ce8646420a8d0b4ae0d9ab53744
                        • Opcode Fuzzy Hash: 72ebaf5c356ca3ee2904821ff4c5dd1cd3c14096ca2d9aba3ba6fdd35b476235
                        • Instruction Fuzzy Hash: D4F062E1A1860681FB148B74E849B3D6370BF857A5F540735C6AE851F4DF3CD1458700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: htons$ws2_32.dll
                        • API String ID: 145871493-1975133265
                        • Opcode ID: 439baf8cef27b03b02ca0dfe2403df779e1052c0166b6725c54574d1b49bfcac
                        • Instruction ID: 5f7e95ed387b48a115e2bd3a367e46bcaeaced6e796b16e3bfbe2874409fb706
                        • Opcode Fuzzy Hash: 439baf8cef27b03b02ca0dfe2403df779e1052c0166b6725c54574d1b49bfcac
                        • Instruction Fuzzy Hash: C70112F191CA51C6E7209B25E48873D77A0FF847ADF501131E58E82AA4DF3CD54A9B00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: freeaddrinfo$ws2_32.dll
                        • API String ID: 145871493-447766333
                        • Opcode ID: 6b8569ae28fb1e528403060c51b49f1547483ef8ef8edf79f62fa932a7e04958
                        • Instruction ID: 07b610426540e4761464e5cfc52712ee8d63ab82fd5cee13dfa031216eb5bfc2
                        • Opcode Fuzzy Hash: 6b8569ae28fb1e528403060c51b49f1547483ef8ef8edf79f62fa932a7e04958
                        • Instruction Fuzzy Hash: 4FF0A4F691CA51C2E6209B61F89CB2D67B0FF9979DF500131D68E42AB4CF3CD55ACA00
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: AdjustPointer
                        • String ID:
                        • API String ID: 1740715915-0
                        • Opcode ID: 2c4cd24dc23d04e538900412c8b76dc8e884207eadeb2926ca5d18de86a86aa6
                        • Instruction ID: 1959eebd9da4d5a0f879b6a9f9bb7bf1b135d7149a41f98ed8bedb47e0a98bc3
                        • Opcode Fuzzy Hash: 2c4cd24dc23d04e538900412c8b76dc8e884207eadeb2926ca5d18de86a86aa6
                        • Instruction Fuzzy Hash: 3CB18FF2A0EA4281FA65FB75D448A7D66A0FF54B8CF098836DA4D0B795DF2CE4428341
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: fpos
                        • String ID:
                        • API String ID: 1083263101-0
                        • Opcode ID: f351de1dbd54376754315496ebcd0fc187e74d0cf5171b4e2e2ccbca7ab9123b
                        • Instruction ID: d1cd8f8c9b34ebd0e21ee81f2cd9b4653c65965f322f84d8968eeea41b5f6770
                        • Opcode Fuzzy Hash: f351de1dbd54376754315496ebcd0fc187e74d0cf5171b4e2e2ccbca7ab9123b
                        • Instruction Fuzzy Hash: 95A15EA260CB8585DA708B26E4447AEB7A4FB85798F194175FADE87B98CF3CD444CB00
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _set_statfp
                        • String ID:
                        • API String ID: 1156100317-0
                        • Opcode ID: c355139fb5d490f5a378c13f74b27d4e88c3ad045c11d9cfe0408108ad209acf
                        • Instruction ID: 6a2e62b9c157b4c90fb81bd881140bf7213ef9ccbccabcd1637d0dcfb17c9485
                        • Opcode Fuzzy Hash: c355139fb5d490f5a378c13f74b27d4e88c3ad045c11d9cfe0408108ad209acf
                        • Instruction Fuzzy Hash: 3E8116E2908A9645F2729B35E408BFF6650BF6535CF164331ED4F166E4DF3CEA818600
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 630393fca0c67851686c251f707a3871fec54fb42ba9ee963f6652eefca2e4fa
                        • Instruction ID: f6ff8cea6b09d029043698be042aa5899db2ed88a204e49f98b6b4e0462325dc
                        • Opcode Fuzzy Hash: 630393fca0c67851686c251f707a3871fec54fb42ba9ee963f6652eefca2e4fa
                        • Instruction Fuzzy Hash: EA610BB260D6828AD670DB25E494BAEB7A0FBC4748F404135E68D83AA9DF3CD945CF40
                        APIs
                        • Concurrency::details::_Task_impl_base::_IsCompleted.LIBCPMTD ref: 00007FFB0C4AF10A
                        • Concurrency::details::_Task_impl_base::_IsCanceled.LIBCPMTD ref: 00007FFB0C4AF11E
                        • Concurrency::details::_Task_impl_base::_IsPendingCancel.LIBCPMTD ref: 00007FFB0C4AF132
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::_Task_impl_base::_$CancelCanceledCompletedPending
                        • String ID:
                        • API String ID: 253852663-0
                        • Opcode ID: 96f5ec8156682c59687e470b00a6f89af41b73d4884fafaf8d6d2f3c44f2daaa
                        • Instruction ID: bdefba3bf2713b7d900feafcfd339a36209acf071176a241557984d8e2636f46
                        • Opcode Fuzzy Hash: 96f5ec8156682c59687e470b00a6f89af41b73d4884fafaf8d6d2f3c44f2daaa
                        • Instruction Fuzzy Hash: 7C514EE2A1D28285FA309776E4597BFA7A0FF81748F404075E6CD47B9ADF2CD9098B40
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: char_traits$Concurrency::details::EmptyQueue::StructuredWork$Max_valueMin_valuewmemset
                        • String ID:
                        • API String ID: 1140703174-0
                        • Opcode ID: 28118e790413db02ba06dbb63724687c31dc690438f373b7df5c7ec3ffc14a31
                        • Instruction ID: e73538da84c83c1682f0075a72082a29a2e6f81a2bfdb2f24c244ca6fbd12a78
                        • Opcode Fuzzy Hash: 28118e790413db02ba06dbb63724687c31dc690438f373b7df5c7ec3ffc14a31
                        • Instruction Fuzzy Hash: 01412CA6A2DB4582CA10EB25E09556EA7A0FFC9B98F101131FB8D43B79DF3CD540CB40
                        APIs
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4B4448
                        • WideCharToMultiByte.KERNEL32 ref: 00007FFB0C4B4482
                        • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FFB0C4B44B5
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4B44D9
                        • WideCharToMultiByte.KERNEL32 ref: 00007FFB0C4B4514
                          • Part of subcall function 00007FFB0C4B6340: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4B63C7
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::EmptyQueue::StructuredWork$ByteCharMultiWide$Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_
                        • String ID:
                        • API String ID: 3668445282-0
                        • Opcode ID: feb59e4277cd1bc07c5903275af858b3bdc952d6bc7b52214309763333dbf615
                        • Instruction ID: e532f6f0e0271be08d94c0916e80d251625699e44a49ea38e70d9e3bcebe3a84
                        • Opcode Fuzzy Hash: feb59e4277cd1bc07c5903275af858b3bdc952d6bc7b52214309763333dbf615
                        • Instruction Fuzzy Hash: 0731C2B2618B8085D720DB25F4947AFB7A1FBC5784F504029E68D87BA9DF3DD5448B80
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 2067211477-0
                        • Opcode ID: 48142ec23890b9d666768e3bec8b18f94dd262d1b6a98ec5d17004b6353bfdbe
                        • Instruction ID: dc57da971c59a5161c02432e7069bd80476172c25e6dcf0d2af0201c26f2f079
                        • Opcode Fuzzy Hash: 48142ec23890b9d666768e3bec8b18f94dd262d1b6a98ec5d17004b6353bfdbe
                        • Instruction Fuzzy Hash: AC214CF5A09B8285FE24EFB6E41887DA3A0BF84B98F494531EE4E47755DF3CE4058600
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _set_statfp
                        • String ID:
                        • API String ID: 1156100317-0
                        • Opcode ID: e65ba792651367d839098e214d5891407b2dde01c0b567b7a4e043ebbfca8b6f
                        • Instruction ID: eb53a37755b9cf274e90a6366d6fefeb8f33f78f2303d0466cf985e6464f7c40
                        • Opcode Fuzzy Hash: e65ba792651367d839098e214d5891407b2dde01c0b567b7a4e043ebbfca8b6f
                        • Instruction Fuzzy Hash: 5311A3E2E5CA0301F7641138E45DB7F66417F9437CF09A634EA7F46BDA8F1CA9528110
                        APIs
                        • FlsGetValue.KERNEL32(?,?,?,00007FFB0C4D91C7,?,?,00000000,00007FFB0C4D9462,?,?,?,?,?,00007FFB0C4D93EE), ref: 00007FFB0C4E2667
                        • FlsSetValue.KERNEL32(?,?,?,00007FFB0C4D91C7,?,?,00000000,00007FFB0C4D9462,?,?,?,?,?,00007FFB0C4D93EE), ref: 00007FFB0C4E2686
                        • FlsSetValue.KERNEL32(?,?,?,00007FFB0C4D91C7,?,?,00000000,00007FFB0C4D9462,?,?,?,?,?,00007FFB0C4D93EE), ref: 00007FFB0C4E26AE
                        • FlsSetValue.KERNEL32(?,?,?,00007FFB0C4D91C7,?,?,00000000,00007FFB0C4D9462,?,?,?,?,?,00007FFB0C4D93EE), ref: 00007FFB0C4E26BF
                        • FlsSetValue.KERNEL32(?,?,?,00007FFB0C4D91C7,?,?,00000000,00007FFB0C4D9462,?,?,?,?,?,00007FFB0C4D93EE), ref: 00007FFB0C4E26D0
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Value
                        • String ID:
                        • API String ID: 3702945584-0
                        • Opcode ID: f392ead5c2402b695ac5974281e609e0a9cbbdca401f54ec29472a1a5a69b6c8
                        • Instruction ID: 020a509f0405b9d400069ad0a5cce016b2ed21816b27f5135e4d7b28039b0e43
                        • Opcode Fuzzy Hash: f392ead5c2402b695ac5974281e609e0a9cbbdca401f54ec29472a1a5a69b6c8
                        • Instruction Fuzzy Hash: AF115CE0B0824241FA685776E96997D62957F443B8F065338E83F467E7DF6CA6018200
                        APIs
                        • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E24ED
                        • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E250C
                        • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2534
                        • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2545
                        • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2556
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Value
                        • String ID:
                        • API String ID: 3702945584-0
                        • Opcode ID: 8179554ecb27d0102576b7f0af1687fec2ab00c2ce3b392d2b49e69ec44a7df3
                        • Instruction ID: 58867168d3efc42b8252e4e851e0f32d9e82de6ce7086c148c203ec1599289ae
                        • Opcode Fuzzy Hash: 8179554ecb27d0102576b7f0af1687fec2ab00c2ce3b392d2b49e69ec44a7df3
                        • Instruction Fuzzy Hash: 3A1118D0E0820641FA68A7B5D96ED7D12856F41778F0A2B38D93F4A2E3EF6CB6018200
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Is_bad_exception_allowed
                        • String ID: csm$csm$csm
                        • API String ID: 2758241748-393685449
                        • Opcode ID: 13a2de92f2e39b7531bb161bb28b9f9a2f294045cf3d54dfe874a6e248b54c91
                        • Instruction ID: 07fd7406c36a798d5b3ab0679e01cab3bd6880079c8b370c29dd356922be76fd
                        • Opcode Fuzzy Hash: 13a2de92f2e39b7531bb161bb28b9f9a2f294045cf3d54dfe874a6e248b54c91
                        • Instruction Fuzzy Hash: 1DE1ADF29086828AF720AF74D489AAC7BA0FF5575CF114536EA8D47696DF38E485CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID: UTF-16LEUNICODE$UTF-8$ccs
                        • API String ID: 3215553584-1196891531
                        • Opcode ID: 68af55e2dee7aa88f8a662d6324b7d7729190ee39c0489d8eb327fd976cebb93
                        • Instruction ID: d1510d7e6cb2bf250754afb48b9ab6e49905795607360cd5f522895a5219efa6
                        • Opcode Fuzzy Hash: 68af55e2dee7aa88f8a662d6324b7d7729190ee39c0489d8eb327fd976cebb93
                        • Instruction Fuzzy Hash: 908148F2E0820285FF658F3DC658A7D27A0FF11B5CF568035CA4BA66D5EB2DEA019701
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID: UTF-16LEUNICODE$UTF-8$ccs
                        • API String ID: 3215553584-1196891531
                        • Opcode ID: 9ca26269acad0683e8ef55a6b9071003c8b65fc42e814e871ea6335cb571c350
                        • Instruction ID: e5f420c1267dbc443a758d8b77dfa363043ccedfe1e9a9f256bd5f11c6762b10
                        • Opcode Fuzzy Hash: 9ca26269acad0683e8ef55a6b9071003c8b65fc42e814e871ea6335cb571c350
                        • Instruction Fuzzy Hash: E3817CF1E0C64289FE654A3CC65CB7C6BA0BF5174CF5B9035CA0B562D6DB2DAA029701
                        APIs
                        • ReadFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00008000), ref: 00007FFB0C4E8BDE
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00008000), ref: 00007FFB0C4E8D85
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ErrorFileLastRead
                        • String ID: RCR$SRCR
                        • API String ID: 1948546556-2591298178
                        • Opcode ID: 586b136ce8644c6ec137099a25725316719ca72ae6105a32eec3cfa5507b0a73
                        • Instruction ID: e7d8d171da6c1ab9a73b3886ee78e1b6ea5969db798f96189fd6cafbbcf654cd
                        • Opcode Fuzzy Hash: 586b136ce8644c6ec137099a25725316719ca72ae6105a32eec3cfa5507b0a73
                        • Instruction Fuzzy Hash: 9091E1D2A1D68689EF615B38D448BBC2B91BF53B98F5A4632D68B072D5CB3CE641C301
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CallEncodePointerTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3544855599-2084237596
                        • Opcode ID: 8cd02e8cba5055ee867d26c7a08f41aabd6380dba5d3ecf13f2aaed9126bfb2d
                        • Instruction ID: ab095b19844d4367ffb7d70d73d4bb175eb8c0c8d65da637f1d412e3e3ca832f
                        • Opcode Fuzzy Hash: 8cd02e8cba5055ee867d26c7a08f41aabd6380dba5d3ecf13f2aaed9126bfb2d
                        • Instruction Fuzzy Hash: 32919DF3A087918AE711DB74E8846AD7BA0FB4478CF10412AEE8D17B59DF38D195CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                        • String ID: csm
                        • API String ID: 2395640692-1018135373
                        • Opcode ID: 265ea48305644b817d5518f26b2426f1599f0e92365fc373ba274e768d46161f
                        • Instruction ID: 5adb50f09125de0e16484f968b85500ad433aca3205bea1ad95e99d49d630bc0
                        • Opcode Fuzzy Hash: 265ea48305644b817d5518f26b2426f1599f0e92365fc373ba274e768d46161f
                        • Instruction Fuzzy Hash: 545180F2A196028AEB54EB25E448E7C3791FF44B9CF244135EA4A47784DF7CE891C700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CallEncodePointerTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3544855599-2084237596
                        • Opcode ID: 5857cf24f1b6541e0db60816518d10e6407131af82c64cb5755d45eb63a1e946
                        • Instruction ID: 95c86a4ff8ac37a293a5c303ece4fbecc94a97f1352bf17da744331f9deb9c54
                        • Opcode Fuzzy Hash: 5857cf24f1b6541e0db60816518d10e6407131af82c64cb5755d45eb63a1e946
                        • Instruction Fuzzy Hash: 126193B2908BC585E7219B25E444BAEB7A0FF95B98F044635EB9C07B99CF7CD194CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 3896166516-3733052814
                        • Opcode ID: 48025d63aa6b6047f6d04173f3c05d04317f6c028d3daaca8f8c7585a31a2b89
                        • Instruction ID: dbdb2c6458a21fadebd68991b772396ee8afaac5a963df6891a4265b7bc4b5c1
                        • Opcode Fuzzy Hash: 48025d63aa6b6047f6d04173f3c05d04317f6c028d3daaca8f8c7585a31a2b89
                        • Instruction Fuzzy Hash: 6B5172F29082828AFB64AB35D148A6C7790FF55B98F144135EB5D47B99CF3CE491CB01
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID: 0-3916222277
                        • Opcode ID: 36a5356689fcb8d2607656b835cc6e0f026fc37f9764631d1787b7af226b8ab8
                        • Instruction ID: 231dd72f7b1f578abc2aad5cee782b08e78fccaadc1ff6121f4443e23127c975
                        • Opcode Fuzzy Hash: 36a5356689fcb8d2607656b835cc6e0f026fc37f9764631d1787b7af226b8ab8
                        • Instruction Fuzzy Hash: AF61EBF290CBC185E6609B25E048BBEB7A5FFC1784F504036E68D47A9ADF2CE844CB51
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::_CreateCriticalDeleteFromGlobalLock::_ObjectReentrantScoped_lockScoped_lock::~_StreamStringchar_traits
                        • String ID: jpg
                        • API String ID: 3472419032-1189616361
                        • Opcode ID: 86eb31eb1de19e8a03d488835b784c104c0a7202ed47adf5df59e174cf309532
                        • Instruction ID: edc15a970fb836f72906bc36430670bf847822384241ef65400284f58fa68cbc
                        • Opcode Fuzzy Hash: 86eb31eb1de19e8a03d488835b784c104c0a7202ed47adf5df59e174cf309532
                        • Instruction Fuzzy Hash: 4851FBB6618A8582DB60DB25E4947AEB7A0FBC5B88F505122EB8D43B69DF3CC544CF40
                        APIs
                          • Part of subcall function 00007FFB0C4D0E18: QueryPerformanceFrequency.KERNEL32(?,?,?,?,00007FFB0C497DB1), ref: 00007FFB0C4D0E2D
                          • Part of subcall function 00007FFB0C4D0DFC: QueryPerformanceCounter.KERNEL32(?,?,?,?,00007FFB0C497DBB), ref: 00007FFB0C4D0E05
                        • _Subatomic.LIBCONCRTD ref: 00007FFB0C497E0E
                        • _Subatomic.LIBCONCRTD ref: 00007FFB0C497EAA
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: PerformanceQuerySubatomic$CounterFrequency
                        • String ID: d
                        • API String ID: 3831891851-2564639436
                        • Opcode ID: f36356522a71dbb2b4534055f319af7a92a399f18409b5c24a9dfa018923f8ec
                        • Instruction ID: 4d2befd5ab373abb28a0e0f310abe0aec85568de33ee552313f1b8185675579f
                        • Opcode Fuzzy Hash: f36356522a71dbb2b4534055f319af7a92a399f18409b5c24a9dfa018923f8ec
                        • Instruction Fuzzy Hash: 45310862619B8582DA609B29F4957AFB7A1FBC4788F015126E6CE47B69DF3CD1108F00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProcchar_traits
                        • String ID: GetUserNameW$advapi32.dll
                        • API String ID: 1097116792-1952898584
                        • Opcode ID: 80e5af94b1a02d1872650a55446e3730342baa81daa6dd7ec9b8264fd25396e9
                        • Instruction ID: 4ef6a751f32313a858a05273800235de822b8f3fdac1cc788db8e2dfb7771dff
                        • Opcode Fuzzy Hash: 80e5af94b1a02d1872650a55446e3730342baa81daa6dd7ec9b8264fd25396e9
                        • Instruction Fuzzy Hash: FB41DDB6A1CA8592E660DB25E4897AEB370FFD4748F401132E68D87AA9DF3CD504CB00
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: FileWrite$ConsoleErrorLastOutput
                        • String ID:
                        • API String ID: 2718003287-0
                        • Opcode ID: cf44275678ca85f22590a109bd29db2bd094186d180eb530ce0a86cdfa5a6ae4
                        • Instruction ID: bb07cc132d82537e94b96e2819af11677edcb8094310280d8826bd9f29b2748f
                        • Opcode Fuzzy Hash: cf44275678ca85f22590a109bd29db2bd094186d180eb530ce0a86cdfa5a6ae4
                        • Instruction Fuzzy Hash: 6ED1F0B2B18A8189E710CF79D444AAC37B2FB547ACB054236DE5E97B99DF38D606C300
                        APIs
                        • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FFB0C4E75F3), ref: 00007FFB0C4E7724
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FFB0C4E75F3), ref: 00007FFB0C4E77AF
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ConsoleErrorLastMode
                        • String ID:
                        • API String ID: 953036326-0
                        • Opcode ID: c7cbed1778484a4bb857a9e1385c60b8b35516ef06df28283499c270390ff4ad
                        • Instruction ID: dcb6108d71439a5d4dc194ccec4a9dacbb0bd28199c92d69a32140bbea2aeae3
                        • Opcode Fuzzy Hash: c7cbed1778484a4bb857a9e1385c60b8b35516ef06df28283499c270390ff4ad
                        • Instruction Fuzzy Hash: 5391C0F2E0865285F7548B79D488ABC2BA0BF14BACF554139DE0F67A94DF38E582C300
                        APIs
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A1962
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A1B0D
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A1B22
                          • Part of subcall function 00007FFB0C495970: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C49597E
                          • Part of subcall function 00007FFB0C495970: _Max_value.LIBCPMTD ref: 00007FFB0C4959A3
                          • Part of subcall function 00007FFB0C495970: _Min_value.LIBCPMTD ref: 00007FFB0C4959D1
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4A1C57
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::EmptyQueue::StructuredWork$Max_valueMin_value
                        • String ID:
                        • API String ID: 348937374-0
                        • Opcode ID: 9f84a68244e8d41638f94a4cdbedc62e82daed3d618e4f6bfc3aedd44e4120fa
                        • Instruction ID: 2b8f75e7a1dd89a8c3b9c9d3b90f69972025068886d7a9cc2b4be338eff578e8
                        • Opcode Fuzzy Hash: 9f84a68244e8d41638f94a4cdbedc62e82daed3d618e4f6bfc3aedd44e4120fa
                        • Instruction Fuzzy Hash: 01A10BA260DBC585DA60DB66F49476FA7A0FBC9BC4F104136EACD87B69DF2CD4408B00
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: fpos
                        • String ID:
                        • API String ID: 1083263101-0
                        • Opcode ID: c457bf72074166e4b9cef871bf0dead07cf29958fd0af09302adcdb228af5cb4
                        • Instruction ID: 9d88c8e238f46cbbe7eadf87b8c69949517488fc0b89288df9e4e91a927486ea
                        • Opcode Fuzzy Hash: c457bf72074166e4b9cef871bf0dead07cf29958fd0af09302adcdb228af5cb4
                        • Instruction Fuzzy Hash: 256113A291CA8186E6609B2AE45576FB7A0FBC4798F150171FBDD87BA9CF6CD440CF00
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ByteCharConcurrency::details::EmptyMultiQueue::StructuredWideWork
                        • String ID:
                        • API String ID: 729679527-0
                        • Opcode ID: 4236cccfa5501a5c365e13e92fafc250830b1abf4ab8d273c8a49ddbe665ecc1
                        • Instruction ID: d21a834430e54bde1ae7fe3592cc8bafd9503c720175b18a796a2b7f598011ee
                        • Opcode Fuzzy Hash: 4236cccfa5501a5c365e13e92fafc250830b1abf4ab8d273c8a49ddbe665ecc1
                        • Instruction Fuzzy Hash: 2E411AB2A1CA8186D760DB25E485BAEB7A1FBC5784F405035FA8E87B5ACF3CD444CB40
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: type_info::_name_internal_method$Concurrency::details::_CriticalFolderLock::_PathReentrantScoped_lockScoped_lock::~_Special
                        • String ID:
                        • API String ID: 622896846-0
                        • Opcode ID: dc0c5afa361903b5724841c68451c963996150cd95b8e63c5463ebf210f231a9
                        • Instruction ID: 55c7d95a7eee71a86337fa650e4d875d43526fd99e09d437d9f772356cb3dd81
                        • Opcode Fuzzy Hash: dc0c5afa361903b5724841c68451c963996150cd95b8e63c5463ebf210f231a9
                        • Instruction Fuzzy Hash: 1941EEB261C68196E670DF25E4897AEB7A0FFC4788F401136E68D87AA9DF3CD544CB40
                        APIs
                        • Concurrency::details::_Task_impl_base::_IsCanceled.LIBCPMTD ref: 00007FFB0C4B1069
                        • Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 00007FFB0C4B1087
                          • Part of subcall function 00007FFB0C4B04D0: Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 00007FFB0C4B04E5
                        • Concurrency::details::_Task_impl_base::_CancelWithExceptionHolder.LIBCPMTD ref: 00007FFB0C4B10BA
                        • Concurrency::details::_Task_impl_base::_Cancel.LIBCPMTD ref: 00007FFB0C4B10D1
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::_Task_impl_base::_$CancelConcurrency::details::$Base::CanceledChoresExceptionGroupHolderProcessorProxyRoot::ScheduleSchedulerSegmentUnrealizedVirtualWith
                        • String ID:
                        • API String ID: 2137011280-0
                        • Opcode ID: a2aa80b478cab4208770f9a38a893281dc2bd3f109e1b87810c811e64ecfc72b
                        • Instruction ID: e45efc24f9ef716ea205d9bbd69a5ee7f29bd660b543adf3a03b19888279c864
                        • Opcode Fuzzy Hash: a2aa80b478cab4208770f9a38a893281dc2bd3f109e1b87810c811e64ecfc72b
                        • Instruction Fuzzy Hash: A6214FF261CB4681DA10EB22E49867E6764FFC57C8F401431FA8E47BAADF2CE4059B00
                        APIs
                          • Part of subcall function 00007FFB0C4D2AAC: GetModuleHandleExW.KERNEL32 ref: 00007FFB0C4D2ABA
                        • GetModuleHandleExW.KERNEL32 ref: 00007FFB0C4D2BF0
                        • FreeLibraryWhenCallbackReturns.KERNEL32 ref: 00007FFB0C4D2C07
                          • Part of subcall function 00007FFB0C4D246C: GetCurrentThreadId.KERNEL32 ref: 00007FFB0C4D24BD
                          • Part of subcall function 00007FFB0C4D246C: AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4B240B,?,?,?,?,00007FFB0C4AC458), ref: 00007FFB0C4D24DC
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00007FFB0C4D2C8A
                          • Part of subcall function 00007FFB0C4D2474: ReleaseSRWLockExclusive.KERNEL32(?,?,?,?,00007FFB0C4D26B0,?,?,?,?,?,?,?,00007FFB0C4D2A71), ref: 00007FFB0C4D2486
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00007FFB0C4D2C95
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Cpp_errorExclusiveHandleLockModuleThrow_std::_$AcquireCallbackCurrentFreeLibraryReleaseReturnsThreadWhen
                        • String ID:
                        • API String ID: 4220897459-0
                        • Opcode ID: 553434353efcc6843571242b5b56ed9f1eb399787c4b19caa6d2ccb4c657e4b2
                        • Instruction ID: d967f24801c1964d0f269660b1b52e07d9aac63c68ef79f3d2b754cb176a2efc
                        • Opcode Fuzzy Hash: 553434353efcc6843571242b5b56ed9f1eb399787c4b19caa6d2ccb4c657e4b2
                        • Instruction Fuzzy Hash: 242108E4A4850281FB24BB31E96D9BC2361BF41BA9F141531DD2D822F6EFADEC508610
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getfacetstd::locale::_
                        • String ID:
                        • API String ID: 228209623-0
                        • Opcode ID: bf104d3b9130944ff705ff286039ef5e45dc00399c4ecc11af451a56ddf4ff63
                        • Instruction ID: 5dd2ed978f2674da53f344a246675a2b824bb3c8432e2b6dd51f5544d0461e2c
                        • Opcode Fuzzy Hash: bf104d3b9130944ff705ff286039ef5e45dc00399c4ecc11af451a56ddf4ff63
                        • Instruction Fuzzy Hash: 5A21F1A251DA4581DA50EB25E4896AEB7B4FFC47A4F501231FA8E43BB9DF3CD540CB00
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getfacetstd::locale::_
                        • String ID:
                        • API String ID: 228209623-0
                        • Opcode ID: 793ac7056e05846943ffed5844e50566047ceb616486e047a5a9b9241643f175
                        • Instruction ID: cdff995b9bb621794b64b119847fbd08e451a4fdd781a2315effbc3d4bc0c49c
                        • Opcode Fuzzy Hash: 793ac7056e05846943ffed5844e50566047ceb616486e047a5a9b9241643f175
                        • Instruction Fuzzy Hash: 3C21FEA691DA4581DA60DB25E48566EB7A0FFC47A8F501136FACE43BB9DF3CD540CB00
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getfacetstd::locale::_
                        • String ID:
                        • API String ID: 228209623-0
                        • Opcode ID: 18fd428ba416f35e6fa1d95c6dec4eb2c0224e670d38428d6e6994fa79728931
                        • Instruction ID: 22799c35ba2711c111efae3e35dbade6487c8a65d84b8bdf5282e128e920f6b7
                        • Opcode Fuzzy Hash: 18fd428ba416f35e6fa1d95c6dec4eb2c0224e670d38428d6e6994fa79728931
                        • Instruction Fuzzy Hash: 1F2101E692DA4581DA50EB25E48566EB7A0FFC47A8F501136FA8E43BB9DF3CD540CB00
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getfacetstd::locale::_
                        • String ID:
                        • API String ID: 228209623-0
                        • Opcode ID: 822cb25b02a99ae88a5306ef9a32b2b0c088c945457889bc584b9dc35bc811c1
                        • Instruction ID: e50683d561669a52dd130e25d0b181595bfeaaa2c8ab08eaa336bfa3fed8090e
                        • Opcode Fuzzy Hash: 822cb25b02a99ae88a5306ef9a32b2b0c088c945457889bc584b9dc35bc811c1
                        • Instruction Fuzzy Hash: AD21F0A691DA8581DA60EB25F48566EB7A0FFC57A4F501132FA8E43BB9DF3CD540CB00
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Cpp_errorThrow_std::_$CurrentThread
                        • String ID:
                        • API String ID: 2261580123-0
                        • Opcode ID: 27d73551e55d5d03b2179b481ebe71ff2a700cb18187dbb0179742bbf1b013cb
                        • Instruction ID: 24f19c8f4bd1c60a995e3b78f96e17c84b1302a1d1845ff969ca28c81bc997ed
                        • Opcode Fuzzy Hash: 27d73551e55d5d03b2179b481ebe71ff2a700cb18187dbb0179742bbf1b013cb
                        • Instruction Fuzzy Hash: 3E0192A270868957F690A632E4546BE5292FFC43C4F444435EB4D837E6EF2CEC41D700
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                        • String ID:
                        • API String ID: 2933794660-0
                        • Opcode ID: 9ec5600b05cd82a8e10f8fc1781d40101dc96b0f7a75fb69ad6eecb34d5e0eaa
                        • Instruction ID: 207541a49ba188b2054af47a945696def94483153f53e955e0677a69f5e4df2c
                        • Opcode Fuzzy Hash: 9ec5600b05cd82a8e10f8fc1781d40101dc96b0f7a75fb69ad6eecb34d5e0eaa
                        • Instruction Fuzzy Hash: F41118B6B14B018AEB008B70E8596AC33A4FB19758F481E35EA6D467A4DF78D155C340
                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Process$CloseCurrentHandleOpenTerminate
                        • String ID:
                        • API String ID: 983841585-0
                        • Opcode ID: 597751426ef9b9c2102fe0f833c27338a46b029254865beae2c2f583087e8297
                        • Instruction ID: 87c2204aacbe88dd909feac85d03516f8df3c0ea736b024d8b4fbf139a584319
                        • Opcode Fuzzy Hash: 597751426ef9b9c2102fe0f833c27338a46b029254865beae2c2f583087e8297
                        • Instruction Fuzzy Hash: 55E0BFB6A0894186E320DB36E90841D77B2FFCCB5AF444134DA8D42738DF3CD6478A00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: __except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 1467352782-3733052814
                        • Opcode ID: f0672875b56e3e91f7387c99e9e7c8de2a70e4d1654d6aa75e53c9bd2162311b
                        • Instruction ID: 8b8d661c287e92879533f36dd99a16f41297bb456ffc6a0f227c8d9ef00a7af2
                        • Opcode Fuzzy Hash: f0672875b56e3e91f7387c99e9e7c8de2a70e4d1654d6aa75e53c9bd2162311b
                        • Instruction Fuzzy Hash: F9719EF2A0869186EB60AB35D448B7D7BA0FF44B88F548176EE8C47B89DB2CD591C740
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CreateFrameInfo__except_validate_context_record
                        • String ID: csm
                        • API String ID: 2558813199-1018135373
                        • Opcode ID: 241ff751386006dba430cfcaa452f65ea43404882c006d28022b8e43daf6fe6c
                        • Instruction ID: a6e02f48be494fb02c8cca668ca89bfb3dcd4411f55c6b9778abe65bf47b95c2
                        • Opcode Fuzzy Hash: 241ff751386006dba430cfcaa452f65ea43404882c006d28022b8e43daf6fe6c
                        • Instruction Fuzzy Hash: C8514DF261974186E620BB26E04467EBBB4FB89BA8F140135EB8D0BB55CF39E451CB40
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ErrorFileLastWrite
                        • String ID: U
                        • API String ID: 442123175-4171548499
                        • Opcode ID: c00cc46764e3aacfe03c88eaead441a28a811676fc4d65fc1849a78bc9b4c519
                        • Instruction ID: a97321c8cf6bb1131951907171722e81f4638768166f064c4bf41c10c9fb99ee
                        • Opcode Fuzzy Hash: c00cc46764e3aacfe03c88eaead441a28a811676fc4d65fc1849a78bc9b4c519
                        • Instruction Fuzzy Hash: 9641B4B2B18A8182EB509F35E4587AD6760FF84798F454131EE4E87798EF3CD541C740
                        APIs
                        • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFB0C4D407B), ref: 00007FFB0C4D4770
                        • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFB0C4D407B), ref: 00007FFB0C4D47B1
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ExceptionFileHeaderRaise
                        • String ID: csm
                        • API String ID: 2573137834-1018135373
                        • Opcode ID: dba6bd1a0ac2c8d099696e94e8611ae08bcb42e179612d15905ba0ed57ddee6c
                        • Instruction ID: bc16ff140e85289c02844e4a3f493a9480398ab19e8fa9f2835fbd7c80244844
                        • Opcode Fuzzy Hash: dba6bd1a0ac2c8d099696e94e8611ae08bcb42e179612d15905ba0ed57ddee6c
                        • Instruction Fuzzy Hash: C8112BB2A18B4182EB218F25E44866D77E5FF88B98F585230DE8C07768EF3CD5518B00
                        APIs
                        • Concurrency::details::_Schedule_chore.LIBCPMT ref: 00007FFB0C4B12C1
                          • Part of subcall function 00007FFB0C4D2B48: GetModuleHandleExW.KERNEL32 ref: 00007FFB0C4D2B30
                          • Part of subcall function 00007FFB0C4D2B48: SubmitThreadpoolWork.KERNEL32 ref: 00007FFB0C4D2B39
                          • Part of subcall function 00007FFB0C4D2B48: CreateThreadpoolWork.KERNEL32 ref: 00007FFB0C4D2B5E
                        • std::bad_exception::bad_exception.LIBCMTD ref: 00007FFB0C4B1307
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.1409222401.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 0000000C.00000002.1409201510.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409290906.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409426294.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409467380.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409544177.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.1409571530.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ThreadpoolWork$Concurrency::details::_CreateHandleModuleSchedule_choreSubmitstd::bad_exception::bad_exception
                        • String ID: Fail to schedule the chore!
                        • API String ID: 2088802962-3313369819
                        • Opcode ID: 67acc1bff8d18671174b847d0d84192052f8b113a35ee0c6946b2bbfbef70b53
                        • Instruction ID: 928e2ce497c7cd387d8494d8e1a4921548bff84db09c89c5c6df46a1cc9ccd4f
                        • Opcode Fuzzy Hash: 67acc1bff8d18671174b847d0d84192052f8b113a35ee0c6946b2bbfbef70b53
                        • Instruction Fuzzy Hash: 27F03CE1A18F8681EA20AB25E49976E7364FF85788F501130EA8D46AA9DF3CD155CB00

                        Execution Graph

                        Execution Coverage:0.8%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:0%
                        Total number of Nodes:63
                        Total number of Limit Nodes:1
                        execution_graph 38582 7ffb0c495be0 38585 7ffb0c495c20 38582->38585 38586 7ffb0c495d02 Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot std::_Fac_node::_Fac_node 38585->38586 38628 7ffb0c497210 38586->38628 38588 7ffb0c495d39 Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot 38632 7ffb0c496170 38588->38632 38590 7ffb0c495da4 38636 7ffb0c497430 38590->38636 38592 7ffb0c495dc0 38640 7ffb0c4973e0 38592->38640 38594 7ffb0c495dcd Concurrency::details::WorkQueue::IsStructuredEmpty 38595 7ffb0c495dda CreateMutexExW 38594->38595 38596 7ffb0c495dfd GetLastError 38595->38596 38623 7ffb0c495e0a Concurrency::details::WorkQueue::IsStructuredEmpty 38595->38623 38597 7ffb0c495e0f 38596->38597 38596->38623 38644 7ffb0c496fb0 QueryPerformanceCounter QueryPerformanceFrequency 38597->38644 38599 7ffb0c496098 38657 7ffb0c494b70 47 API calls std::locale::_Locimp::_Makeushloc 38599->38657 38602 7ffb0c495be9 38603 7ffb0c495e31 38645 7ffb0c4c9d40 58 API calls 5 library calls 38603->38645 38605 7ffb0c495e37 38606 7ffb0c495e6d 38605->38606 38646 7ffb0c497300 47 API calls std::bad_exception::bad_exception 38605->38646 38648 7ffb0c4d3314 4 API calls 2 library calls 38606->38648 38608 7ffb0c495e58 38647 7ffb0c4d4720 RtlPcToFileHeader RaiseException 38608->38647 38611 7ffb0c495e81 38612 7ffb0c495ea8 38611->38612 38649 7ffb0c4ca7f0 169 API calls 7 library calls 38611->38649 38650 7ffb0c496f30 57 API calls Concurrency::details::VirtualProcessor::Initialize 38612->38650 38615 7ffb0c495ee9 38651 7ffb0c496fb0 QueryPerformanceCounter QueryPerformanceFrequency 38615->38651 38617 7ffb0c495ff0 Concurrency::details::WorkQueue::IsStructuredEmpty 38618 7ffb0c496057 38617->38618 38617->38623 38656 7ffb0c4c7140 GetCurrentProcessId OpenProcess TerminateProcess CloseHandle 38618->38656 38619 7ffb0c496f80 QueryPerformanceCounter QueryPerformanceFrequency 38625 7ffb0c495f0c Concurrency::details::WorkQueue::IsStructuredEmpty 38619->38625 38621 7ffb0c49605c 38621->38623 38643 7ffb0c4960d0 GetCurrentProcessId OpenProcess TerminateProcess 38623->38643 38625->38617 38625->38619 38652 7ffb0c4c6f10 57 API calls 38625->38652 38653 7ffb0c4d3314 4 API calls 2 library calls 38625->38653 38654 7ffb0c4ca7f0 169 API calls 7 library calls 38625->38654 38655 7ffb0c496f30 57 API calls Concurrency::details::VirtualProcessor::Initialize 38625->38655 38629 7ffb0c49723a std::error_category::equivalent Concurrency::scheduler_ptr::scheduler_ptr Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot 38628->38629 38658 7ffb0c496a40 38629->38658 38631 7ffb0c497282 38631->38588 38633 7ffb0c49619f Concurrency::cancellation_token::_FromImpl _Byte_length Concurrency::details::_TaskCreationCallstack::_TaskCreationCallstack Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot 38632->38633 38634 7ffb0c4961d9 38633->38634 38666 7ffb0c4968e0 49 API calls 5 library calls 38633->38666 38634->38590 38637 7ffb0c497448 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot 38636->38637 38639 7ffb0c49744f shared_ptr 38637->38639 38667 7ffb0c497af0 38637->38667 38639->38592 38641 7ffb0c497af0 Concurrency::agent::wait_for_all 47 API calls 38640->38641 38642 7ffb0c4973f3 Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext 38641->38642 38642->38594 38643->38599 38644->38603 38645->38605 38646->38608 38647->38606 38648->38611 38649->38612 38650->38615 38651->38625 38652->38625 38653->38625 38654->38625 38655->38625 38656->38621 38657->38602 38659 7ffb0c496a62 Concurrency::details::WorkQueue::IsStructuredEmpty _Mpunct 38658->38659 38661 7ffb0c496b05 strtoxl 38659->38661 38664 7ffb0c494e70 49 API calls Concurrency::details::_TaskCreationCallstack::_TaskCreationCallstack 38659->38664 38661->38631 38662 7ffb0c496aa9 Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot 38665 7ffb0c494ae0 47 API calls std::locale::_Locimp::_Makeushloc 38662->38665 38664->38662 38665->38661 38666->38634 38669 7ffb0c497b0d Concurrency::details::WorkQueue::IsStructuredEmpty strtoxl 38667->38669 38668 7ffb0c497b49 Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext char_traits 38668->38639 38669->38668 38671 7ffb0c4976f0 47 API calls Concurrency::agent::wait_for_all 38669->38671 38671->38668

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 7ffb0c495c20-7ffb0c495dfb call 7ffb0c4971c0 call 7ffb0c493dc0 call 7ffb0c497210 call 7ffb0c493dc0 call 7ffb0c497cd0 call 7ffb0c497bf0 call 7ffb0c496170 call 7ffb0c497430 call 7ffb0c4973e0 call 7ffb0c497c40 CreateMutexExW 21 7ffb0c495e0a 0->21 22 7ffb0c495dfd-7ffb0c495e08 GetLastError 0->22 24 7ffb0c49607d-7ffb0c496093 call 7ffb0c4960d0 21->24 22->21 23 7ffb0c495e0f-7ffb0c495e42 call 7ffb0c496150 call 7ffb0c496fb0 call 7ffb0c4c9d40 22->23 35 7ffb0c495e44-7ffb0c495e6d call 7ffb0c497300 call 7ffb0c4d4720 23->35 36 7ffb0c495e6e-7ffb0c495e9c call 7ffb0c4d3314 23->36 28 7ffb0c496098-7ffb0c4960bb call 7ffb0c494b70 24->28 35->36 45 7ffb0c495e9e-7ffb0c495ebd call 7ffb0c4ca7f0 36->45 46 7ffb0c495ebf 36->46 47 7ffb0c495ec8-7ffb0c495f0c call 7ffb0c496f30 call 7ffb0c496150 call 7ffb0c496fb0 45->47 46->47 56 7ffb0c495f0d-7ffb0c495f12 47->56 57 7ffb0c496036-7ffb0c496055 call 7ffb0c496390 56->57 58 7ffb0c495f18-7ffb0c495f2d call 7ffb0c496390 56->58 71 7ffb0c496057-7ffb0c49605d call 7ffb0c4c7140 57->71 72 7ffb0c49605f-7ffb0c496075 call 7ffb0c496390 57->72 63 7ffb0c495f33-7ffb0c495f81 call 7ffb0c496150 call 7ffb0c496f80 call 7ffb0c4c6f10 call 7ffb0c4d3314 58->63 64 7ffb0c495fd8-7ffb0c495fee call 7ffb0c496390 58->64 94 7ffb0c495f83-7ffb0c495fa5 call 7ffb0c4ca7f0 63->94 95 7ffb0c495fa7 63->95 75 7ffb0c495ff0 64->75 76 7ffb0c495ff2-7ffb0c496008 call 7ffb0c496390 64->76 71->24 72->24 84 7ffb0c496077-7ffb0c49607c call 7ffb0c4c70f0 72->84 75->57 86 7ffb0c49600a 76->86 87 7ffb0c49600c-7ffb0c496031 call 7ffb0c496150 call 7ffb0c496f80 76->87 84->24 86->57 87->56 99 7ffb0c495fb3-7ffb0c495fd7 call 7ffb0c496f30 94->99 95->99 99->64
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::CreateEmptyErrorFac_nodeFac_node::_LastMutexQueue::StructuredWorkstd::_std::bad_exception::bad_exception
                        • String ID: -$-$-$-$0$0$1$2$2$2$3$4$5$6$6$6$6$6$7$7$7$7$9$9$9$A$A$B$B$C$C$D$D$E$E$F${$}
                        • API String ID: 1149196539-2202459216
                        • Opcode ID: c23fd9ccd435e09b8d6fabbe867b38cfc7cb505c9ffd75c4aa2e92c9946ef1c7
                        • Instruction ID: 902bcf6d7d2b4aa9d97e8c44eb070a3bf6d7bd46b38fe263efd3e9a0be0f9d52
                        • Opcode Fuzzy Hash: c23fd9ccd435e09b8d6fabbe867b38cfc7cb505c9ffd75c4aa2e92c9946ef1c7
                        • Instruction Fuzzy Hash: B1C180E251C6D184E761D734E498BEEABA0FF91388F400136E2CD46AEADF6DD548CB01

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 104 7ffb0c4d3914-7ffb0c4d391a 105 7ffb0c4d3955-7ffb0c4d395f 104->105 106 7ffb0c4d391c-7ffb0c4d391f 104->106 107 7ffb0c4d3a7c-7ffb0c4d3a91 105->107 108 7ffb0c4d3949-7ffb0c4d3981 call 7ffb0c4d34f8 106->108 109 7ffb0c4d3921-7ffb0c4d3924 106->109 110 7ffb0c4d3a93 107->110 111 7ffb0c4d3aa0-7ffb0c4d3aba call 7ffb0c4d338c 107->111 123 7ffb0c4d3986-7ffb0c4d3988 108->123 113 7ffb0c4d3926-7ffb0c4d3929 109->113 114 7ffb0c4d393c __scrt_dllmain_crt_thread_attach 109->114 117 7ffb0c4d3a95-7ffb0c4d3a9f 110->117 125 7ffb0c4d3aef-7ffb0c4d3b20 call 7ffb0c4d40a0 111->125 126 7ffb0c4d3abc-7ffb0c4d3aed call 7ffb0c4d34b4 call 7ffb0c4d42a4 call 7ffb0c4d4318 call 7ffb0c4d3658 call 7ffb0c4d367c call 7ffb0c4d34e4 111->126 115 7ffb0c4d3935-7ffb0c4d393a call 7ffb0c4d343c 113->115 116 7ffb0c4d392b-7ffb0c4d3934 113->116 119 7ffb0c4d3941-7ffb0c4d3948 114->119 115->119 127 7ffb0c4d3a56 123->127 128 7ffb0c4d398e-7ffb0c4d39a3 call 7ffb0c4d338c 123->128 136 7ffb0c4d3b31-7ffb0c4d3b37 125->136 137 7ffb0c4d3b22-7ffb0c4d3b28 125->137 126->117 131 7ffb0c4d3a58-7ffb0c4d3a6d 127->131 139 7ffb0c4d39a9-7ffb0c4d39ba call 7ffb0c4d33fc 128->139 140 7ffb0c4d3a6e-7ffb0c4d3a7b call 7ffb0c4d40a0 128->140 142 7ffb0c4d3b79-7ffb0c4d3b8f call 7ffb0c496120 136->142 143 7ffb0c4d3b39-7ffb0c4d3b43 136->143 137->136 141 7ffb0c4d3b2a-7ffb0c4d3b2c 137->141 154 7ffb0c4d3a0b-7ffb0c4d3a15 call 7ffb0c4d3658 139->154 155 7ffb0c4d39bc-7ffb0c4d39e0 call 7ffb0c4d42dc call 7ffb0c4d4294 call 7ffb0c4d42b8 call 7ffb0c4e1ee0 139->155 140->107 149 7ffb0c4d3c16-7ffb0c4d3c23 141->149 160 7ffb0c4d3bc7-7ffb0c4d3bc9 142->160 161 7ffb0c4d3b91-7ffb0c4d3b93 142->161 150 7ffb0c4d3b4a-7ffb0c4d3b50 143->150 151 7ffb0c4d3b45-7ffb0c4d3b48 143->151 157 7ffb0c4d3b52-7ffb0c4d3b58 150->157 151->157 154->127 176 7ffb0c4d3a17-7ffb0c4d3a23 call 7ffb0c4d42d4 154->176 155->154 206 7ffb0c4d39e2-7ffb0c4d39e9 __scrt_dllmain_after_initialize_c 155->206 164 7ffb0c4d3c0c-7ffb0c4d3c14 157->164 165 7ffb0c4d3b5e-7ffb0c4d3b66 call 7ffb0c4d3914 157->165 171 7ffb0c4d3bd0-7ffb0c4d3be5 call 7ffb0c4d3914 160->171 172 7ffb0c4d3bcb-7ffb0c4d3bce 160->172 161->160 169 7ffb0c4d3b95-7ffb0c4d3bb7 call 7ffb0c496120 call 7ffb0c4d3a7c 161->169 164->149 175 7ffb0c4d3b6b-7ffb0c4d3b73 165->175 169->160 201 7ffb0c4d3bb9-7ffb0c4d3bbe 169->201 171->164 187 7ffb0c4d3be7-7ffb0c4d3bf1 171->187 172->164 172->171 175->142 175->164 194 7ffb0c4d3a49-7ffb0c4d3a54 176->194 195 7ffb0c4d3a25-7ffb0c4d3a2f call 7ffb0c4d35c0 176->195 192 7ffb0c4d3bf8-7ffb0c4d3c06 187->192 193 7ffb0c4d3bf3-7ffb0c4d3bf6 187->193 198 7ffb0c4d3c08 192->198 193->198 194->131 195->194 205 7ffb0c4d3a31-7ffb0c4d3a3f 195->205 198->164 201->160 205->194 206->154 207 7ffb0c4d39eb-7ffb0c4d3a08 call 7ffb0c4e1e9c 206->207 207->154
                        APIs
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                        • String ID:
                        • API String ID: 190073905-0
                        • Opcode ID: 379fb157a98799b01100bb80668918f310a9638619fe247a65667b2318d9597b
                        • Instruction ID: d64c70bc686872c606c0af001f502342429614c45746992faca1135d06fd698f
                        • Opcode Fuzzy Hash: 379fb157a98799b01100bb80668918f310a9638619fe247a65667b2318d9597b
                        • Instruction Fuzzy Hash: F4818DE1F0864346FA50BF76D44EA7D66A0BF85B88F449035DA0D877B6DF3CE8458602

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Process$CurrentOpenTerminate
                        • String ID:
                        • API String ID: 1665377759-0
                        • Opcode ID: f438164aa293f679cc8d685dac6f048bff96706690f7a88d4d1aeed23efbc951
                        • Instruction ID: 7117a447c19763f53eb05bc44ee0fa4b6bd9c86f357e825e5b4d60a29fe3c28c
                        • Opcode Fuzzy Hash: f438164aa293f679cc8d685dac6f048bff96706690f7a88d4d1aeed23efbc951
                        • Instruction Fuzzy Hash: B5E0E6B2A08A4186D320DB76E90841D77A2FFCC749F548134D6CD42638DF3CD1578A00

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: f6778a97db3e7d7cc00ddc368c5f4a02c47bb974696b7abc8e093fa4e358170f
                        • Instruction ID: a93488dda1db9e6cc03adb087a07c5aa1ea792d1cc35fd7fd00562565c33034c
                        • Opcode Fuzzy Hash: f6778a97db3e7d7cc00ddc368c5f4a02c47bb974696b7abc8e093fa4e358170f
                        • Instruction Fuzzy Hash: 2A118FF691C68282F3119B68E45993DB2A0FF40748F160434EA5E477A3DF3CF9148700

                        Control-flow Graph

                        APIs
                        • HeapAlloc.KERNEL32(?,?,00000000,00007FFB0C4E25E2,?,?,0000A34D8DDC3A49,00007FFB0C4E0205,?,?,?,?,00007FFB0C4EB486,?,?,00000000), ref: 00007FFB0C4E4041
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: AllocHeap
                        • String ID:
                        • API String ID: 4292702814-0
                        • Opcode ID: b865d5f5eb091f35a37736941d99cb0038ee27259a523f223bb2da8cdd44aaf9
                        • Instruction ID: 32cef8744c4fd01eac6c3fa5da226489d3947163556e3b5b65a605023da60312
                        • Opcode Fuzzy Hash: b865d5f5eb091f35a37736941d99cb0038ee27259a523f223bb2da8cdd44aaf9
                        • Instruction Fuzzy Hash: 5EF049D4B0920641FE655AB6D919ABD13A07F88B88F0A6434C90F863D2DF6CAA805220
                        APIs
                          • Part of subcall function 00007FFB0C4E2408: GetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2417
                          • Part of subcall function 00007FFB0C4E2408: FlsGetValue.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E242C
                          • Part of subcall function 00007FFB0C4E2408: SetLastError.KERNEL32(?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E24B7
                        • TranslateName.LIBCMT ref: 00007FFB0C4EEEF2
                        • TranslateName.LIBCMT ref: 00007FFB0C4EEF2D
                        • GetACP.KERNEL32(?,?,?,00000000,00000092,00007FFB0C4E2F90), ref: 00007FFB0C4EEF74
                        • IsValidCodePage.KERNEL32(?,?,?,00000000,00000092,00007FFB0C4E2F90), ref: 00007FFB0C4EEFAC
                        • GetLocaleInfoW.KERNEL32 ref: 00007FFB0C4EF169
                        Strings
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ErrorLastNameTranslate$CodeInfoLocalePageValidValue
                        • String ID: utf8
                        • API String ID: 3069159798-905460609
                        • Opcode ID: 464451e8a7c017b7fe8d594a29d962222612a71da5a0740ad1618ad19dd93d6f
                        • Instruction ID: 498e69c9ff6075c94a78cde50af115d48e6e579ba027b5a866f6751b62b1971b
                        • Opcode Fuzzy Hash: 464451e8a7c017b7fe8d594a29d962222612a71da5a0740ad1618ad19dd93d6f
                        • Instruction Fuzzy Hash: 20917AF2A0874281FB249B71D549ABD23A4FF44B88F468531DA4E47796EF3CEA55C301
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CloseHandle$Concurrency::details::CreateEmptyProcessQueue::StructuredWork$Char_traitsFac_nodeFac_node::_std::_
                        • String ID: $ $ $.$.exe$/$a$c$c$d$e$e$h$m$r$s$t$t$x
                        • API String ID: 4010672392-1850887160
                        • Opcode ID: d31621a2d32b0a3b1949a119d43f2289199d1e78f584f337a88e1aafb8d2bd3e
                        • Instruction ID: 24f4b1f1df6c5aaa21f92fc8e668892613b2b4ccc42ab1a2a64853994b082b52
                        • Opcode Fuzzy Hash: d31621a2d32b0a3b1949a119d43f2289199d1e78f584f337a88e1aafb8d2bd3e
                        • Instruction Fuzzy Hash: 3CC128B251CAC195EA31DB60E4987EFB761FBD5348F404036E68D83AAADF6CD548CB40
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Fac_nodeFac_node::_std::_
                        • String ID: C$F$FtS$M$S$a$a$e$e$e$e$g$i$i$l$l$n$n$r$t$t
                        • API String ID: 1114552684-2189465758
                        • Opcode ID: 50ee1b1b17ded2a8e62f603e76cff047e39b5a6fc7cd7a71ca88179335fa07c3
                        • Instruction ID: d376208f5508fdd988dd5c06278bb533cac4ad2d1d2ccc4e5a4838e178f50a0f
                        • Opcode Fuzzy Hash: 50ee1b1b17ded2a8e62f603e76cff047e39b5a6fc7cd7a71ca88179335fa07c3
                        • Instruction Fuzzy Hash: 72B15CA260DAC191E660DB21E4947EFA7A1FFD5388F404135E6CD47BAADF6CD548CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Fac_nodeFac_node::_std::_$Concurrency::cancel_current_task$Decorator::getTableType
                        • String ID: F$F$M$R$U$a$a$e$e$e$e$g$i$i$l$l$n$p$r
                        • API String ID: 3873182351-3194299963
                        • Opcode ID: 5b2bb602d22b333214d04523e346fc123c1330c8c3198e5e6a9d8e78296e0be3
                        • Instruction ID: cd1b2cf50a00a827947b901aaeff44b8d7ab075c778280e54553717e998418e3
                        • Opcode Fuzzy Hash: 5b2bb602d22b333214d04523e346fc123c1330c8c3198e5e6a9d8e78296e0be3
                        • Instruction Fuzzy Hash: B8C14CA261DAC190E670DB65E4987EFA7A0FBD5388F400035E6CD43BAADF6CD544CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$DestroyIcon$Concurrency::details::Concurrency::task_continuation_context::task_continuation_contextCreateEmptyFileFromGlobalInfoQueue::StreamStringStructuredWorkchar_traits
                        • String ID: png
                        • API String ID: 2892423481-2199389072
                        • Opcode ID: fae29a7a72ba1a9e499f6e2f45cbe4b808135d9687a933d283217be40005f67f
                        • Instruction ID: 153618906a33e4676fcdcff104682e7792050aff3318ae2a0266c0b09a231cab
                        • Opcode Fuzzy Hash: fae29a7a72ba1a9e499f6e2f45cbe4b808135d9687a933d283217be40005f67f
                        • Instruction Fuzzy Hash: 4CD11EB2618A8191DA60DB25E4957EEA760FFC4788F405036EB8E83BB9DF3CD545CB00
                        APIs
                          • Part of subcall function 00007FFB0C4E021C: _invalid_parameter_noinfo.LIBCMT ref: 00007FFB0C4E0230
                        • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,00007FFB0C4D05AE), ref: 00007FFB0C4D2F35
                        • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,00007FFB0C4D05AE), ref: 00007FFB0C4D2F48
                        • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,00007FFB0C4D05AE), ref: 00007FFB0C4D2F5F
                        • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,00007FFB0C4D05AE), ref: 00007FFB0C4D2F76
                        Strings
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: AddressProc$HandleModule_invalid_parameter_noinfo
                        • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$invalid random_device value$kernel32.dll
                        • API String ID: 2104222004-861830008
                        • Opcode ID: c7c081bedf470f973e2b56519931470c3a7a7f8b38c7d7fbc461ff9d9a2692fe
                        • Instruction ID: 46a623126744a481cb9ef74f459c5de3caeaa498b403187f151798c1140a33ef
                        • Opcode Fuzzy Hash: c7c081bedf470f973e2b56519931470c3a7a7f8b38c7d7fbc461ff9d9a2692fe
                        • Instruction Fuzzy Hash: 0701E8E8E19A03C1FA44EB72E89EC7D23A1BF58745F941035D80E83275EF6CE59A8710
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Mpunct$ctypestd::ios_base::width
                        • String ID: @
                        • API String ID: 3075750325-2766056989
                        • Opcode ID: e67de69f98cff780475ac0c8084deb56d29bcf2359572f96fc364d3a03f4861c
                        • Instruction ID: b0993fca398109b01c5206cac192f44917fad60101ef0f166d334ff29078c7a0
                        • Opcode Fuzzy Hash: e67de69f98cff780475ac0c8084deb56d29bcf2359572f96fc364d3a03f4861c
                        • Instruction Fuzzy Hash: F712F9B260DAC585DA70DB65E4947EEA7A1FBC8784F404032EA8D83BA9DF7CD544CB00
                        APIs
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: b2c7bc130197246b40956ba66cd1257bddcb4cdd4c992c93ddc331ef8c3a997e
                        • Instruction ID: 71cfc696228e56f44a792721c0175e85eb363bde18d4df01b58d84a5612094e9
                        • Opcode Fuzzy Hash: b2c7bc130197246b40956ba66cd1257bddcb4cdd4c992c93ddc331ef8c3a997e
                        • Instruction Fuzzy Hash: 82C1CFE2A0868691EA609B25D44CAFDB7A1FFA1B98F560131DA4F073D1DF7DEA458300
                        APIs
                        • LoadLibraryExW.KERNEL32(?,?,00000000,00007FFB0C4D8F13,?,?,?,00007FFB0C4D59DA,?,?,?,00007FFB0C4D5995), ref: 00007FFB0C4D8D91
                        • GetLastError.KERNEL32(?,?,00000000,00007FFB0C4D8F13,?,?,?,00007FFB0C4D59DA,?,?,?,00007FFB0C4D5995), ref: 00007FFB0C4D8D9F
                        • LoadLibraryExW.KERNEL32(?,?,00000000,00007FFB0C4D8F13,?,?,?,00007FFB0C4D59DA,?,?,?,00007FFB0C4D5995), ref: 00007FFB0C4D8DC9
                        • FreeLibrary.KERNEL32(?,?,00000000,00007FFB0C4D8F13,?,?,?,00007FFB0C4D59DA,?,?,?,00007FFB0C4D5995), ref: 00007FFB0C4D8E37
                        • GetProcAddress.KERNEL32(?,?,00000000,00007FFB0C4D8F13,?,?,?,00007FFB0C4D59DA,?,?,?,00007FFB0C4D5995), ref: 00007FFB0C4D8E43
                        Strings
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Library$Load$AddressErrorFreeLastProc
                        • String ID: api-ms-
                        • API String ID: 2559590344-2084034818
                        • Opcode ID: 492e68bbb1773d240888386dda676b62b4bbe1757f3f4df5f2fd3b7df8b2a67b
                        • Instruction ID: 628f7d7c5134f3b222a35383025689142068b3f4b42cd82ac00d78998914acc8
                        • Opcode Fuzzy Hash: 492e68bbb1773d240888386dda676b62b4bbe1757f3f4df5f2fd3b7df8b2a67b
                        • Instruction Fuzzy Hash: 6E31B0E1B1A74291FE12AB22E808D7D23A4FF48BA8F590535ED1D4A7D1EF3CE4418740
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                        • String ID: CONOUT$
                        • API String ID: 3230265001-3130406586
                        • Opcode ID: aaa7478a30f227f436a7fdc7f67f6462c4936cde7976a00747b319838b7bad40
                        • Instruction ID: 82935e91267595b9fa4b0ea9af6f9efe455b8ff1d73bb699df700a33f42eb881
                        • Opcode Fuzzy Hash: aaa7478a30f227f436a7fdc7f67f6462c4936cde7976a00747b319838b7bad40
                        • Instruction Fuzzy Hash: 5A118EF1B18A4186E3508B62E859B2D67A4FF88FE9F041634EA6D877A4CF3CD4058740
                        APIs
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ByteCharMultiStringWide
                        • String ID:
                        • API String ID: 2829165498-0
                        • Opcode ID: e599737eeba393ba2e7364258460f95dd52f47ec3c249f4a66a619b501052b22
                        • Instruction ID: 4ed73cae51c182775287e1c7e29c128328a11b7bd6af6dba720308e42a85a776
                        • Opcode Fuzzy Hash: e599737eeba393ba2e7364258460f95dd52f47ec3c249f4a66a619b501052b22
                        • Instruction Fuzzy Hash: E8818DF2A0874286FB209F65E848A6D73A5FF44BA8F144635EA5E47BE8DF7CD4018701
                        APIs
                        • std::bad_exception::bad_exception.LIBCMTD ref: 00007FFB0C4CACEE
                          • Part of subcall function 00007FFB0C4D4720: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFB0C4D407B), ref: 00007FFB0C4D4770
                          • Part of subcall function 00007FFB0C4D4720: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFB0C4D407B), ref: 00007FFB0C4D47B1
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4CAD60
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4CADB5
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4CAE2F
                        • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FFB0C4CAECD
                        • std::runtime_error::runtime_error.LIBCPMTD ref: 00007FFB0C4CAF92
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: std::runtime_error::runtime_error$Concurrency::details::EmptyQueue::StructuredWork$ExceptionFileHeaderRaisestd::bad_exception::bad_exception
                        • String ID:
                        • API String ID: 3965443834-0
                        • Opcode ID: 0d4e2dfe6f9cec561199eb6ced0db4a94df36823f4d8a24ec355e669d2707ef8
                        • Instruction ID: 7e808ac7169e671211a300b976acba73fa9cc712d484c676c3c0172919dd7cc3
                        • Opcode Fuzzy Hash: 0d4e2dfe6f9cec561199eb6ced0db4a94df36823f4d8a24ec355e669d2707ef8
                        • Instruction Fuzzy Hash: 13912CB260D68286D760DB25E495BAEB7A0FFC5348F405131E68D83AA9DF3CD945CF40
                        APIs
                        • Concurrency::details::_Task_impl_base::_IsCompleted.LIBCPMTD ref: 00007FFB0C4AF10A
                        • Concurrency::details::_Task_impl_base::_IsCanceled.LIBCPMTD ref: 00007FFB0C4AF11E
                        • Concurrency::details::_Task_impl_base::_IsPendingCancel.LIBCPMTD ref: 00007FFB0C4AF132
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::_Task_impl_base::_$CancelCanceledCompletedPending
                        • String ID:
                        • API String ID: 253852663-0
                        • Opcode ID: 96f5ec8156682c59687e470b00a6f89af41b73d4884fafaf8d6d2f3c44f2daaa
                        • Instruction ID: bdefba3bf2713b7d900feafcfd339a36209acf071176a241557984d8e2636f46
                        • Opcode Fuzzy Hash: 96f5ec8156682c59687e470b00a6f89af41b73d4884fafaf8d6d2f3c44f2daaa
                        • Instruction Fuzzy Hash: 7C514EE2A1D28285FA309776E4597BFA7A0FF81748F404075E6CD47B9ADF2CD9098B40
                        APIs
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: char_traits$Concurrency::details::EmptyQueue::StructuredWork$Max_valueMin_valuewmemset
                        • String ID:
                        • API String ID: 1140703174-0
                        • Opcode ID: 28118e790413db02ba06dbb63724687c31dc690438f373b7df5c7ec3ffc14a31
                        • Instruction ID: e73538da84c83c1682f0075a72082a29a2e6f81a2bfdb2f24c244ca6fbd12a78
                        • Opcode Fuzzy Hash: 28118e790413db02ba06dbb63724687c31dc690438f373b7df5c7ec3ffc14a31
                        • Instruction Fuzzy Hash: 01412CA6A2DB4582CA10EB25E09556EA7A0FFC9B98F101131FB8D43B79DF3CD540CB40
                        APIs
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: _set_statfp
                        • String ID:
                        • API String ID: 1156100317-0
                        • Opcode ID: e65ba792651367d839098e214d5891407b2dde01c0b567b7a4e043ebbfca8b6f
                        • Instruction ID: eb53a37755b9cf274e90a6366d6fefeb8f33f78f2303d0466cf985e6464f7c40
                        • Opcode Fuzzy Hash: e65ba792651367d839098e214d5891407b2dde01c0b567b7a4e043ebbfca8b6f
                        • Instruction Fuzzy Hash: 5311A3E2E5CA0301F7641138E45DB7F66417F9437CF09A634EA7F46BDA8F1CA9528110
                        APIs
                        • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E24ED
                        • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E250C
                        • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2534
                        • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2545
                        • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4E02A7,?,?,00000000,00007FFB0C4E6655), ref: 00007FFB0C4E2556
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Value
                        • String ID:
                        • API String ID: 3702945584-0
                        • Opcode ID: 8179554ecb27d0102576b7f0af1687fec2ab00c2ce3b392d2b49e69ec44a7df3
                        • Instruction ID: 58867168d3efc42b8252e4e851e0f32d9e82de6ce7086c148c203ec1599289ae
                        • Opcode Fuzzy Hash: 8179554ecb27d0102576b7f0af1687fec2ab00c2ce3b392d2b49e69ec44a7df3
                        • Instruction Fuzzy Hash: 3A1118D0E0820641FA68A7B5D96ED7D12856F41778F0A2B38D93F4A2E3EF6CB6018200
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Is_bad_exception_allowed
                        • String ID: csm$csm$csm
                        • API String ID: 2758241748-393685449
                        • Opcode ID: 13a2de92f2e39b7531bb161bb28b9f9a2f294045cf3d54dfe874a6e248b54c91
                        • Instruction ID: 07fd7406c36a798d5b3ab0679e01cab3bd6880079c8b370c29dd356922be76fd
                        • Opcode Fuzzy Hash: 13a2de92f2e39b7531bb161bb28b9f9a2f294045cf3d54dfe874a6e248b54c91
                        • Instruction Fuzzy Hash: 1DE1ADF29086828AF720AF74D489AAC7BA0FF5575CF114536EA8D47696DF38E485CB00
                        APIs
                        • ReadFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00008000), ref: 00007FFB0C4E8BDE
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00008000), ref: 00007FFB0C4E8D85
                        Strings
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: ErrorFileLastRead
                        • String ID: RCR$SRCR
                        • API String ID: 1948546556-2591298178
                        • Opcode ID: 586b136ce8644c6ec137099a25725316719ca72ae6105a32eec3cfa5507b0a73
                        • Instruction ID: e7d8d171da6c1ab9a73b3886ee78e1b6ea5969db798f96189fd6cafbbcf654cd
                        • Opcode Fuzzy Hash: 586b136ce8644c6ec137099a25725316719ca72ae6105a32eec3cfa5507b0a73
                        • Instruction Fuzzy Hash: 9091E1D2A1D68689EF615B38D448BBC2B91BF53B98F5A4632D68B072D5CB3CE641C301
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: CallEncodePointerTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3544855599-2084237596
                        • Opcode ID: 5857cf24f1b6541e0db60816518d10e6407131af82c64cb5755d45eb63a1e946
                        • Instruction ID: 95c86a4ff8ac37a293a5c303ece4fbecc94a97f1352bf17da744331f9deb9c54
                        • Opcode Fuzzy Hash: 5857cf24f1b6541e0db60816518d10e6407131af82c64cb5755d45eb63a1e946
                        • Instruction Fuzzy Hash: 126193B2908BC585E7219B25E444BAEB7A0FF95B98F044635EB9C07B99CF7CD194CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProcchar_traits
                        • String ID: GetUserNameW$advapi32.dll
                        • API String ID: 1097116792-1952898584
                        • Opcode ID: 80e5af94b1a02d1872650a55446e3730342baa81daa6dd7ec9b8264fd25396e9
                        • Instruction ID: 4ef6a751f32313a858a05273800235de822b8f3fdac1cc788db8e2dfb7771dff
                        • Opcode Fuzzy Hash: 80e5af94b1a02d1872650a55446e3730342baa81daa6dd7ec9b8264fd25396e9
                        • Instruction Fuzzy Hash: FB41DDB6A1CA8592E660DB25E4897AEB370FFD4748F401132E68D87AA9DF3CD504CB00
                        APIs
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: FileWrite$ConsoleErrorLastOutput
                        • String ID:
                        • API String ID: 2718003287-0
                        • Opcode ID: cf44275678ca85f22590a109bd29db2bd094186d180eb530ce0a86cdfa5a6ae4
                        • Instruction ID: bb07cc132d82537e94b96e2819af11677edcb8094310280d8826bd9f29b2748f
                        • Opcode Fuzzy Hash: cf44275678ca85f22590a109bd29db2bd094186d180eb530ce0a86cdfa5a6ae4
                        • Instruction Fuzzy Hash: 6ED1F0B2B18A8189E710CF79D444AAC37B2FB547ACB054236DE5E97B99DF38D606C300
                        APIs
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: fpos
                        • String ID:
                        • API String ID: 1083263101-0
                        • Opcode ID: c457bf72074166e4b9cef871bf0dead07cf29958fd0af09302adcdb228af5cb4
                        • Instruction ID: 9d88c8e238f46cbbe7eadf87b8c69949517488fc0b89288df9e4e91a927486ea
                        • Opcode Fuzzy Hash: c457bf72074166e4b9cef871bf0dead07cf29958fd0af09302adcdb228af5cb4
                        • Instruction Fuzzy Hash: 256113A291CA8186E6609B2AE45576FB7A0FBC4798F150171FBDD87BA9CF6CD440CF00
                        APIs
                        • Concurrency::details::_Task_impl_base::_IsCanceled.LIBCPMTD ref: 00007FFB0C4B1069
                        • Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 00007FFB0C4B1087
                          • Part of subcall function 00007FFB0C4B04D0: Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 00007FFB0C4B04E5
                        • Concurrency::details::_Task_impl_base::_CancelWithExceptionHolder.LIBCPMTD ref: 00007FFB0C4B10BA
                        • Concurrency::details::_Task_impl_base::_Cancel.LIBCPMTD ref: 00007FFB0C4B10D1
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Concurrency::details::_Task_impl_base::_$CancelConcurrency::details::$Base::CanceledChoresExceptionGroupHolderProcessorProxyRoot::ScheduleSchedulerSegmentUnrealizedVirtualWith
                        • String ID:
                        • API String ID: 2137011280-0
                        • Opcode ID: a2aa80b478cab4208770f9a38a893281dc2bd3f109e1b87810c811e64ecfc72b
                        • Instruction ID: e45efc24f9ef716ea205d9bbd69a5ee7f29bd660b543adf3a03b19888279c864
                        • Opcode Fuzzy Hash: a2aa80b478cab4208770f9a38a893281dc2bd3f109e1b87810c811e64ecfc72b
                        • Instruction Fuzzy Hash: A6214FF261CB4681DA10EB22E49867E6764FFC57C8F401431FA8E47BAADF2CE4059B00
                        APIs
                          • Part of subcall function 00007FFB0C4D2AAC: GetModuleHandleExW.KERNEL32 ref: 00007FFB0C4D2ABA
                        • GetModuleHandleExW.KERNEL32 ref: 00007FFB0C4D2BF0
                        • FreeLibraryWhenCallbackReturns.KERNEL32 ref: 00007FFB0C4D2C07
                          • Part of subcall function 00007FFB0C4D246C: GetCurrentThreadId.KERNEL32 ref: 00007FFB0C4D24BD
                          • Part of subcall function 00007FFB0C4D246C: AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,00007FFB0C4B240B,?,?,?,?,00007FFB0C4AC458), ref: 00007FFB0C4D24DC
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00007FFB0C4D2C8A
                          • Part of subcall function 00007FFB0C4D2474: ReleaseSRWLockExclusive.KERNEL32(?,?,?,?,00007FFB0C4D26B0,?,?,?,?,?,?,?,00007FFB0C4D2A71), ref: 00007FFB0C4D2486
                        • std::_Throw_Cpp_error.LIBCPMT ref: 00007FFB0C4D2C95
                        Memory Dump Source
                        • Source File: 00000014.00000002.2834875863.00007FFB0C491000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFB0C490000, based on PE: true
                        • Associated: 00000014.00000002.2834856435.00007FFB0C490000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834929057.00007FFB0C4FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834958351.00007FFB0C519000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2834980172.00007FFB0C51A000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835000328.00007FFB0C51B000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 00000014.00000002.2835022998.00007FFB0C51E000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_20_2_7ffb0c490000_regsvr32.jbxd
                        Similarity
                        • API ID: Cpp_errorExclusiveHandleLockModuleThrow_std::_$AcquireCallbackCurrentFreeLibraryReleaseReturnsThreadWhen
                        • String ID:
                        • API String ID: 4220897459-0
                        • Opcode ID: 553434353efcc6843571242b5b56ed9f1eb399787c4b19caa6d2ccb4c657e4b2
                        • Instruction ID: d967f24801c1964d0f269660b1b52e07d9aac63c68ef79f3d2b754cb176a2efc
                        • Opcode Fuzzy Hash: 553434353efcc6843571242b5b56ed9f1eb399787c4b19caa6d2ccb4c657e4b2
                        • Instruction Fuzzy Hash: 242108E4A4850281FB24BB31E96D9BC2361BF41BA9F141531DD2D822F6EFADEC508610