Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Setup_v1.29.exe

Overview

General Information

Sample name:Setup_v1.29.exe
Analysis ID:1541475
MD5:e38b4faeaf253cd6652941a56d542487
SHA1:92611ecf179b54c5763b12ba4b2f582ee6016024
SHA256:3e3e1c5b65b0141c99f48942ea0090c89524dffe5ae9e24ae783c53500145ec0
Tags:exeuser-aachum
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file has nameless sections
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Setup_v1.29.exe (PID: 2792 cmdline: "C:\Users\user\Desktop\Setup_v1.29.exe" MD5: E38B4FAEAF253CD6652941A56D542487)
    • conhost.exe (PID: 5528 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • aspnet_regiis.exe (PID: 764 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe" MD5: 5D1D74198D75640E889F0A577BBF31FC)
      • WerFault.exe (PID: 1276 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 1280 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://95.217.125.57/2f571d994666c8cb.php", "Botnet": "36495972654"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
    00000003.00000002.2544451166.00000000035F7000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000003.00000002.2543941524.000000000319A000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          Process Memory Space: Setup_v1.29.exe PID: 2792JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            3.2.aspnet_regiis.exe.3100000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
              3.2.aspnet_regiis.exe.3100000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
                0.2.Setup_v1.29.exe.6cfc5000.6.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  0.2.Setup_v1.29.exe.6cfc5000.6.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    0.2.Setup_v1.29.exe.6cf80000.4.unpackJoeSecurity_StealcYara detected StealcJoe Security
                      No Sigma rule has matched
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://95.217.125.57/2f571d994666c8cb.php", "Botnet": "36495972654"}
                      Source: C:\Users\user\AppData\Roaming\msvcp110.dllReversingLabs: Detection: 79%
                      Source: Setup_v1.29.exeReversingLabs: Detection: 50%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Roaming\msvcp110.dllJoe Sandbox ML: detected
                      Source: Setup_v1.29.exeJoe Sandbox ML: detected
                      Source: Setup_v1.29.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Setup_v1.29.exe.logJump to behavior
                      Source: Setup_v1.29.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFB5DC4 FindFirstFileExW,0_2_6CFB5DC4

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: http://95.217.125.57/2f571d994666c8cb.php
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 95.217.125.57Connection: Keep-AliveCache-Control: no-cache
                      Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
                      Source: unknownDNS traffic detected: query: 15.164.165.52.in-addr.arpa replaycode: Name error (3)
                      Source: unknownDNS traffic detected: query: 200.163.202.172.in-addr.arpa replaycode: Name error (3)
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.217.125.57
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.217.125.57
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.217.125.57
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.217.125.57
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.217.125.57
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 95.217.125.57Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficDNS traffic detected: DNS query: 15.164.165.52.in-addr.arpa
                      Source: global trafficDNS traffic detected: DNS query: 200.163.202.172.in-addr.arpa
                      Source: aspnet_regiis.exe, 00000003.00000002.2544451166.00000000035F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://95.217.125.57
                      Source: aspnet_regiis.exe, 00000003.00000002.2544451166.000000000363C000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.2544451166.00000000035F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://95.217.125.57/
                      Source: aspnet_regiis.exe, 00000003.00000002.2544451166.000000000363C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://95.217.125.57/4Q
                      Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net

                      System Summary

                      barindex
                      Source: Setup_v1.29.exeStatic PE information: section name:
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF91870 GetModuleHandleW,NtQueryInformationProcess,0_2_6CF91870
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF95900 GetGameData,GetConsoleWindow,ShowWindow,VirtualAlloc,CreateProcessW,NtGetContextThread,NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtCreateThreadEx,NtSetContextThread,NtResumeThread,CloseHandle,CloseHandle,VirtualAlloc,CreateProcessW,NtGetContextThread,NtWriteVirtualMemory,NtWriteVirtualMemory,0_2_6CF95900
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF8F7B00_2_6CF8F7B0
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF918700_2_6CF91870
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF959000_2_6CF95900
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFAE4D00_2_6CFAE4D0
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF9ECB00_2_6CF9ECB0
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF9F4B00_2_6CF9F4B0
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFAA4700_2_6CFAA470
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFA84400_2_6CFA8440
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF9DC100_2_6CF9DC10
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFA44000_2_6CFA4400
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF9CD600_2_6CF9CD60
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFA1D500_2_6CFA1D50
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF90EC00_2_6CF90EC0
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF9BEC00_2_6CF9BEC0
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFA4EB00_2_6CFA4EB0
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFAEEB00_2_6CFAEEB0
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFA2E700_2_6CFA2E70
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFAAE400_2_6CFAAE40
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFA0E000_2_6CFA0E00
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF9B7E00_2_6CF9B7E0
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFA57D00_2_6CFA57D0
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF9E7B00_2_6CF9E7B0
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFA77B00_2_6CFA77B0
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFA7F700_2_6CFA7F70
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFAB7000_2_6CFAB700
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFAA0D00_2_6CFAA0D0
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF9E0700_2_6CF9E070
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFAD0500_2_6CFAD050
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFAD8500_2_6CFAD850
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFA00400_2_6CFA0040
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF9C8200_2_6CF9C820
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFA98200_2_6CFA9820
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF9D8000_2_6CF9D800
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFAD1F00_2_6CFAD1F0
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFA91800_2_6CFA9180
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFAB1500_2_6CFAB150
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF8E1300_2_6CF8E130
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF931300_2_6CF93130
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFA1AF00_2_6CFA1AF0
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF9D2B00_2_6CF9D2B0
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFADA700_2_6CFADA70
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF9EA500_2_6CF9EA50
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFA3A500_2_6CFA3A50
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFBC2350_2_6CFBC235
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF9FA100_2_6CF9FA10
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFA33E00_2_6CFA33E0
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFA63D00_2_6CFA63D0
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF93BA00_2_6CF93BA0
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFA2B800_2_6CFA2B80
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CF863500_2_6CF86350
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFAC3500_2_6CFAC350
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFAB3400_2_6CFAB340
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFA8B200_2_6CFA8B20
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: String function: 6CFAFF00 appears 34 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 1280
                      Source: Setup_v1.29.exe, 00000000.00000000.2059251717.0000000000EFC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUlyssesYvonne.cGdP vs Setup_v1.29.exe
                      Source: Setup_v1.29.exe, 00000000.00000002.2074903630.000000000164E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Setup_v1.29.exe
                      Source: Setup_v1.29.exeBinary or memory string: OriginalFilenameUlyssesYvonne.cGdP vs Setup_v1.29.exe
                      Source: Setup_v1.29.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: Setup_v1.29.exeStatic PE information: Section: w.Aif ZLIB complexity 1.0003296675955413
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@5/7@2/1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03118680 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,3_2_03118680
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeFile created: C:\Users\user\AppData\Roaming\msvcp110.dllJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5528:120:WilError_03
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess764
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\106ddd24-d855-4c70-8f42-8f94d4e2117dJump to behavior
                      Source: Setup_v1.29.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: Setup_v1.29.exeReversingLabs: Detection: 50%
                      Source: unknownProcess created: C:\Users\user\Desktop\Setup_v1.29.exe "C:\Users\user\Desktop\Setup_v1.29.exe"
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 1280
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: Setup_v1.29.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Setup_v1.29.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeUnpacked PE file: 0.2.Setup_v1.29.exe.ea0000.0.unpack w.Aif:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
                      Source: Setup_v1.29.exeStatic PE information: section name: w.Aif
                      Source: Setup_v1.29.exeStatic PE information: section name:
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFBC941 push ecx; ret 0_2_6CFBC954
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0311B035 push ecx; ret 3_2_0311B048
                      Source: Setup_v1.29.exeStatic PE information: section name: w.Aif entropy: 7.999509079649383
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeFile created: C:\Users\user\AppData\Roaming\msvcp110.dllJump to dropped file
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Setup_v1.29.exe.logJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: Setup_v1.29.exe PID: 2792, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeMemory allocated: 1850000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeMemory allocated: 31B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeMemory allocated: 51B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeMemory allocated: 5830000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeMemory allocated: 6830000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeMemory allocated: 6960000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeMemory allocated: 7960000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeMemory allocated: 7CF0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeMemory allocated: 8CF0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\msvcp110.dllJump to dropped file
                      Source: C:\Users\user\Desktop\Setup_v1.29.exe TID: 2472Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFB5DC4 FindFirstFileExW,0_2_6CFB5DC4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03117ED0 GetSystemInfo,3_2_03117ED0
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: Amcache.hve.7.drBinary or memory string: VMware
                      Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
                      Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
                      Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                      Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                      Source: aspnet_regiis.exe, 00000003.00000002.2544451166.0000000003652000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: aspnet_regiis.exe, 00000003.00000002.2544451166.0000000003625000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
                      Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                      Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.7.drBinary or memory string: vmci.sys
                      Source: Amcache.hve.7.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                      Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
                      Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
                      Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.7.drBinary or memory string: VMware20,1
                      Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: aspnet_regiis.exe, 00000003.00000002.2544451166.00000000035F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                      Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                      Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
                      Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
                      Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
                      Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFAFDD7 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CFAFDD7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_031045C0 VirtualProtect ?,00000004,00000100,000000003_2_031045C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03119750 mov eax, dword ptr fs:[00000030h]3_2_03119750
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFB74EA GetProcessHeap,0_2_6CFB74EA
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFAFDD7 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CFAFDD7
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFB3D1D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CFB3D1D
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFAFAD1 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6CFAFAD1
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: Setup_v1.29.exe PID: 2792, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 764, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3100000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3100000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3100000Jump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3101000Jump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 311E000Jump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 312B000Jump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 335C000Jump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2FB7008Jump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFAFBF3 cpuid 0_2_6CFAFBF3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: GetLocaleInfoA,3_2_03117B90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeQueries volume information: C:\Users\user\Desktop\Setup_v1.29.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Setup_v1.29.exeCode function: 0_2_6CFAFF9A GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_6CFAFF9A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03117850 GetUserNameA,3_2_03117850
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_03117A30 GetTimeZoneInformation,3_2_03117A30
                      Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                      Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
                      Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 3.2.aspnet_regiis.exe.3100000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.aspnet_regiis.exe.3100000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Setup_v1.29.exe.6cfc5000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Setup_v1.29.exe.6cfc5000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Setup_v1.29.exe.6cf80000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2544451166.00000000035F7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2543941524.000000000319A000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 764, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 3.2.aspnet_regiis.exe.3100000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.aspnet_regiis.exe.3100000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Setup_v1.29.exe.6cfc5000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Setup_v1.29.exe.6cfc5000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Setup_v1.29.exe.6cf80000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2544451166.00000000035F7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2543941524.000000000319A000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 764, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                      DLL Side-Loading
                      311
                      Process Injection
                      1
                      Masquerading
                      OS Credential Dumping2
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      11
                      Disable or Modify Tools
                      LSASS Memory141
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable Media1
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
                      Virtualization/Sandbox Evasion
                      Security Account Manager41
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
                      Process Injection
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput Capture12
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      Account Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      System Owner/User Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                      Software Packing
                      DCSync1
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc Filesystem43
                      System Information Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      Setup_v1.29.exe50%ReversingLabsWin32.Dropper.Jalapeno
                      Setup_v1.29.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\msvcp110.dll100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\msvcp110.dll79%ReversingLabsWin32.Trojan.Tedy
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://upx.sf.net0%URL Reputationsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      15.164.165.52.in-addr.arpa
                      unknown
                      unknownfalse
                        unknown
                        200.163.202.172.in-addr.arpa
                        unknown
                        unknownfalse
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          http://95.217.125.57/true
                            unknown
                            http://95.217.125.57/2f571d994666c8cb.phptrue
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://upx.sf.netAmcache.hve.7.drfalse
                              • URL Reputation: safe
                              unknown
                              http://95.217.125.57/4Qaspnet_regiis.exe, 00000003.00000002.2544451166.000000000363C000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://95.217.125.57aspnet_regiis.exe, 00000003.00000002.2544451166.00000000035F7000.00000004.00000020.00020000.00000000.sdmptrue
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  95.217.125.57
                                  unknownGermany
                                  24940HETZNER-ASDEtrue
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1541475
                                  Start date and time:2024-10-24 21:44:06 +02:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 5m 44s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:10
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:Setup_v1.29.exe
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@5/7@2/1
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 34
                                  • Number of non-executed functions: 70
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 104.208.16.94
                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • VT rate limit hit for: Setup_v1.29.exe
                                  TimeTypeDescription
                                  15:45:46API Interceptor1x Sleep call for process: WerFault.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  95.217.125.57L0ad3r.exeGet hashmaliciousStealc, VidarBrowse
                                  • 95.217.125.57/2f571d994666c8cb.php
                                  Loader.exeGet hashmaliciousStealc, VidarBrowse
                                  • 95.217.125.57/2f571d994666c8cb.php
                                  Installer.exeGet hashmaliciousStealc, VidarBrowse
                                  • 95.217.125.57/2f571d994666c8cb.php
                                  AVSicb6epR.exeGet hashmaliciousStealc, VidarBrowse
                                  • 95.217.125.57/2f571d994666c8cb.php
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  HETZNER-ASDEla.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                  • 94.130.253.79
                                  https://tronlkam8s2.z13.web.core.windows.netGet hashmaliciousTechSupportScamBrowse
                                  • 195.201.57.90
                                  http://tronlkam8s2.z13.web.core.windows.netGet hashmaliciousTechSupportScamBrowse
                                  • 195.201.57.90
                                  https://8jkfw9cqp7ep.z13.web.core.windows.net/?zpbid=78432_55610c1d-9229-11ef-824f-03718b6de7bb#Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
                                  • 195.201.57.90
                                  Payment for outstanding statements.pdfGet hashmaliciousHTMLPhisherBrowse
                                  • 144.76.38.184
                                  o2YUBeMZW6.elfGet hashmaliciousMiraiBrowse
                                  • 94.130.241.80
                                  ai3eCONS9Q.elfGet hashmaliciousMiraiBrowse
                                  • 95.217.66.133
                                  la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                  • 49.12.72.134
                                  la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                  • 95.217.66.190
                                  https://dca13.z4.web.core.windows.net/werrx01USAHTML/?bcda=1-877-883-8072#Get hashmaliciousTechSupportScamBrowse
                                  • 195.201.57.90
                                  No context
                                  No context
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):65536
                                  Entropy (8bit):0.9591812051537861
                                  Encrypted:false
                                  SSDEEP:192:0u4nP18C0BU/4ju0ZrVZSzuiFQZ24IO8CBHw:Z4d8JBU/4jP8zuiFQY4IO8CBH
                                  MD5:65789678E6A1B7FCEFBDF18F9538244D
                                  SHA1:95FB53B9BCF16BD3641A053D6BA4AD9A5E59747F
                                  SHA-256:EF9F0AB714AC446CA6F653A0D51A21F696C9BB522A9DB26D2BB5257B6D82C73E
                                  SHA-512:B229B32C2573B981611FF2F21C4950030EEC298AB5A8619BECB87CE183B9EE8E4B1A36D9DAC8F64E3007CCDCF385324C05214074AE06D52395ADA7568FE0B3A8
                                  Malicious:false
                                  Reputation:low
                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.2.7.2.7.2.1.4.7.2.6.8.1.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.2.7.2.7.2.2.3.4.7.6.6.3.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.9.f.1.d.5.0.1.-.7.0.d.8.-.4.9.5.0.-.b.8.6.1.-.5.5.9.3.f.5.f.b.2.d.0.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.c.1.8.7.8.2.8.-.5.0.f.6.-.4.6.8.5.-.9.b.b.e.-.6.6.0.8.9.3.2.1.f.8.1.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.a.s.p.n.e.t._.r.e.g.i.i.s...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.a.s.p.n.e.t._.r.e.g.i.i.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.2.f.c.-.0.0.0.1.-.0.0.1.4.-.9.a.3.f.-.a.d.3.5.4.d.2.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.c.5.5.8.f.0.e.8.4.2.c.4.3.e.6.b.3.b.c.0.6.6.9.1.6.b.2.
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:Mini DuMP crash report, 14 streams, Thu Oct 24 19:45:21 2024, 0x1205a4 type
                                  Category:dropped
                                  Size (bytes):109562
                                  Entropy (8bit):1.643177281890072
                                  Encrypted:false
                                  SSDEEP:384:egY2duSEuT/MTelTQQWenlVS/wRJbM4a/KuuKW:el2duSEuT/MT3iW/uMAT
                                  MD5:DB141114B3DE9AEF19B1E44ED6C2ED52
                                  SHA1:38EE4DF98CCA95AA4F477614913FF34F6E54C275
                                  SHA-256:B9513C20AEFDF613BBDF08829F80ECE61EE236BB48D965F33F4E179A0572C7D6
                                  SHA-512:96113A70318D1E1E7DEE71F82949EF5400B9A897F4126A14DF6EF3BF29FF410A6E2D40FC93FAE8AAD6AAB9F6DFB2E9B41C9760A80B64461409EFBF328EAC7202
                                  Malicious:false
                                  Reputation:low
                                  Preview:MDMP..a..... .........g.........................................>..........T.......8...........T........... 1...z..........<...........(...............................................................................eJ..............GenuineIntel............T..............g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):8318
                                  Entropy (8bit):3.6912024798533087
                                  Encrypted:false
                                  SSDEEP:192:R6l7wVeJtI6u6Ysr69gmfuHyrpr+89bAUsfpjgm:R6lXJS6u6YI69gmfuHyRAHfph
                                  MD5:673E948DF904198BB13B1CF3074C9BC2
                                  SHA1:41EB7A9595C97386C60B1D20AE70EF001FFC5A18
                                  SHA-256:D5F38D5E5943D3BA87D8F35BA86DFB5B6C9556A8F1ECD68CD33ECD12E0B028E3
                                  SHA-512:B7A19A4A625F858844B1D67FC12E48BA8F5DAE320C7FD249A06D03F7EFAEF66266677E847E0FB8DD4AA3F57707971DF3F130DF4422A58BA76F2DD839D79113BE
                                  Malicious:false
                                  Reputation:low
                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.6.4.<./.P.i.d.
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):4675
                                  Entropy (8bit):4.458444297796704
                                  Encrypted:false
                                  SSDEEP:48:cvIwWl8zsWJg77aI9rYWpW8VYXmYm8M4JhqeFN+q8b3Q0SaraiMd:uIjfsI7NR7VWPJh5gg0SaraiMd
                                  MD5:7CCF4BD67A318A0C49D1FE92AEF16298
                                  SHA1:21052A2BEEC43D4065FB23E1FB6B94DA5D56DBE0
                                  SHA-256:5543785BC377357CBE931C7709D3FEF760460847C04A329BA0CCB667F5381517
                                  SHA-512:5F9E150122B61E1FEC30E4567B81F6462057EF15B0AB7651F392C621CA6CE64882A1E6DC2D716AEA1E356DC424E2464D4034E6EE8CFDBB08059CAA9BCD439B08
                                  Malicious:false
                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="557928" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                  Process:C:\Users\user\Desktop\Setup_v1.29.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):42
                                  Entropy (8bit):4.0050635535766075
                                  Encrypted:false
                                  SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                                  MD5:84CFDB4B995B1DBF543B26B86C863ADC
                                  SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                                  SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                                  SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                                  Malicious:true
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                                  Process:C:\Users\user\Desktop\Setup_v1.29.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):601088
                                  Entropy (8bit):6.928739021633009
                                  Encrypted:false
                                  SSDEEP:12288:UVi4BszD+DZslByhHwrZz1vb2MW4hPuH5A5ItioxaNi2iU:aBsG2l06rrCwSig9
                                  MD5:740C3417929730C4AE20E0165AA94B7C
                                  SHA1:D03CEBC7B1172149F65B06F15B0FBB11512F5B88
                                  SHA-256:8E200E4ACA363CC2BE03121815EC03525F1D983F717F67B63241028C59CB0BDE
                                  SHA-512:4BCCF661986C98635319AE86C394022E9E4BF1A944A759176A69916B33E64EB910BEB027FAA55F66322754715A772D0EC693DDF6C3CB07A611F026F678390E7F
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 79%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4.vkp}.8p}.8p}.8;..9|}.8;..9.}.8;..9d}.8;..9v}.8W.c8s}.8p}.8.}.8v..9Q}.8v..9`}.8v..9d}.8p}.8q}.8...9q}.8...9q}.8Richp}.8........................PE..L......g...........!...&.....z...............................................p............@.........................@:..x....:..d............................@...!...-...............................-..@...............t............................text...c........................... ..`.rdata...s.......t..................@..@.data........P.......4..............@....reloc...!...@..."..................@..B................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:MS Windows registry file, NT/2000 or above
                                  Category:dropped
                                  Size (bytes):1835008
                                  Entropy (8bit):4.422377916498679
                                  Encrypted:false
                                  SSDEEP:6144:XSvfpi6ceLP/9skLmb0OTbWSPHaJG8nAgeMZMMhA2fX4WABlEnN60uhiTw:CvloTbW+EZMM6DFyU03w
                                  MD5:FF323492A0A32A8779F28E93B1F9FB7B
                                  SHA1:22CE6EC24D46FFE8D1F9B2343DCD09C6536839EE
                                  SHA-256:88CAC232982389308039DA0092DADD2ED5BEEF31991635FE63B7659A44755D38
                                  SHA-512:1EC9E23A94FA5B5EC65D2B9AD29FFC9CE21F4881A056F9C4AD7B52F9E90EC708A52CCE8FFB9436671A28D17609740FAD3D5DAF986C2065E8423A73B24D72DC5E
                                  Malicious:false
                                  Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.K.BM&..............................................................................................................................................................................................................................................................................................................................................Y..v........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):7.892073464210032
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                  • Win32 Executable (generic) a (10002005/4) 49.96%
                                  • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  • DOS Executable Generic (2002/1) 0.01%
                                  File name:Setup_v1.29.exe
                                  File size:362'496 bytes
                                  MD5:e38b4faeaf253cd6652941a56d542487
                                  SHA1:92611ecf179b54c5763b12ba4b2f582ee6016024
                                  SHA256:3e3e1c5b65b0141c99f48942ea0090c89524dffe5ae9e24ae783c53500145ec0
                                  SHA512:56f46256ffbf6418a349130302fee443b392d602110fdc6c5acde8208bac0f2ef146aecd5c531f9403d9e7d4b62c65c8793c1f24aae0bde003a8774fe3a1f899
                                  SSDEEP:6144:bUMP0Kv6quFmD9dsvV5Efry44cDtAhBtdfvMMgrr7mFE5XlxJm64Fgn4inC:bfP0Kv1imDvAV5ui9hdfEPrrEE5Nm2nK
                                  TLSH:7174CFAD726072DFC867D472DAA82CA8FB20387A531F4113A05715EDEA5C987DF184F2
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g................................. ... ....@.. ....................... ............@................................
                                  Icon Hash:00928e8e8686b000
                                  Entrypoint:0x46000a
                                  Entrypoint Section:
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows cui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x671803AA [Tue Oct 22 19:57:30 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00460000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x5281c0x4f.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x5c0000x6f8.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x5e0000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x600000x8
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x520000x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  w.Aif0x20000x4e7340x4e80050fa1d51810a9a12612ad8076bcd24ceFalse1.0003296675955413data7.999509079649383IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .text0x520000x8eb80x90009a8fe18e805f6ed310530139b071d384False0.3885362413194444data4.726387246486074IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0x5c0000x6f80x800e5504b62cff4127ff34ead00cc072871False0.392578125data3.7582597045507127IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x5e0000xc0x2001e37c0bd08615c8250069f61ab34fa51False0.044921875data0.07763316234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  0x600000x100x2002d5d017719c4001c0fe740220e9b96c2False0.044921875data0.12227588125913882IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_VERSION0x5c0a00x46cdata0.4452296819787986
                                  RT_MANIFEST0x5c50c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampSource PortDest PortSource IPDest IP
                                  Oct 24, 2024 21:45:00.398514032 CEST4970480192.168.2.595.217.125.57
                                  Oct 24, 2024 21:45:00.404139996 CEST804970495.217.125.57192.168.2.5
                                  Oct 24, 2024 21:45:00.404215097 CEST4970480192.168.2.595.217.125.57
                                  Oct 24, 2024 21:45:00.404380083 CEST4970480192.168.2.595.217.125.57
                                  Oct 24, 2024 21:45:00.410526991 CEST804970495.217.125.57192.168.2.5
                                  Oct 24, 2024 21:45:08.962641954 CEST804970495.217.125.57192.168.2.5
                                  Oct 24, 2024 21:45:08.962724924 CEST4970480192.168.2.595.217.125.57
                                  Oct 24, 2024 21:45:08.963188887 CEST4970480192.168.2.595.217.125.57
                                  Oct 24, 2024 21:45:08.968537092 CEST804970495.217.125.57192.168.2.5
                                  TimestampSource PortDest PortSource IPDest IP
                                  Oct 24, 2024 21:45:33.325664997 CEST5364906162.159.36.2192.168.2.5
                                  Oct 24, 2024 21:45:33.950161934 CEST6084553192.168.2.51.1.1.1
                                  Oct 24, 2024 21:45:33.958476067 CEST53608451.1.1.1192.168.2.5
                                  Oct 24, 2024 21:45:35.843966961 CEST4928953192.168.2.51.1.1.1
                                  Oct 24, 2024 21:45:35.853511095 CEST53492891.1.1.1192.168.2.5
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Oct 24, 2024 21:45:33.950161934 CEST192.168.2.51.1.1.10x3aeStandard query (0)15.164.165.52.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                  Oct 24, 2024 21:45:35.843966961 CEST192.168.2.51.1.1.10x6c4dStandard query (0)200.163.202.172.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Oct 24, 2024 21:45:33.958476067 CEST1.1.1.1192.168.2.50x3aeName error (3)15.164.165.52.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                  Oct 24, 2024 21:45:35.853511095 CEST1.1.1.1192.168.2.50x6c4dName error (3)200.163.202.172.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                  • 95.217.125.57
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.54970495.217.125.5780764C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                  TimestampBytes transferredDirectionData
                                  Oct 24, 2024 21:45:00.404380083 CEST88OUTGET / HTTP/1.1
                                  Host: 95.217.125.57
                                  Connection: Keep-Alive
                                  Cache-Control: no-cache


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:15:44:58
                                  Start date:24/10/2024
                                  Path:C:\Users\user\Desktop\Setup_v1.29.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\Setup_v1.29.exe"
                                  Imagebase:0xea0000
                                  File size:362'496 bytes
                                  MD5 hash:E38B4FAEAF253CD6652941A56D542487
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:15:44:58
                                  Start date:24/10/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:3
                                  Start time:15:44:59
                                  Start date:24/10/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                                  Imagebase:0x6f0000
                                  File size:43'016 bytes
                                  MD5 hash:5D1D74198D75640E889F0A577BBF31FC
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000003.00000002.2544451166.00000000035F7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000003.00000002.2543941524.000000000319A000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:7
                                  Start time:15:45:21
                                  Start date:24/10/2024
                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 1280
                                  Imagebase:0x390000
                                  File size:483'680 bytes
                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:8%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:5.7%
                                    Total number of Nodes:976
                                    Total number of Limit Nodes:14
                                    execution_graph 13303 6cfaf76e 13304 6cfaf779 13303->13304 13305 6cfaf7ac 13303->13305 13307 6cfaf79e 13304->13307 13308 6cfaf77e 13304->13308 13306 6cfaf8c8 __DllMainCRTStartup@12 86 API calls 13305->13306 13311 6cfaf788 13306->13311 13315 6cfaf7c1 13307->13315 13309 6cfaf794 13308->13309 13312 6cfaf783 13308->13312 13334 6cfaf49d 13309->13334 13312->13311 13329 6cfaf4bc 13312->13329 13316 6cfaf7cd ___scrt_is_nonwritable_in_current_image 13315->13316 13342 6cfaf52d 13316->13342 13318 6cfaf7d4 __DllMainCRTStartup@12 13319 6cfaf7fb 13318->13319 13320 6cfaf8c0 13318->13320 13326 6cfaf837 ___scrt_is_nonwritable_in_current_image CallUnexpected 13318->13326 13353 6cfaf48f 13319->13353 13322 6cfafdd7 __DllMainCRTStartup@12 4 API calls 13320->13322 13323 6cfaf8c7 13322->13323 13324 6cfaf80a __RTC_Initialize 13324->13326 13356 6cfb0032 InitializeSListHead 13324->13356 13326->13311 13327 6cfaf818 13327->13326 13357 6cfaf464 13327->13357 13418 6cfb4e1f 13329->13418 13621 6cfb204f 13334->13621 13337 6cfaf4a6 13337->13311 13340 6cfaf4b9 13340->13311 13341 6cfb205a 21 API calls 13341->13337 13343 6cfaf536 13342->13343 13361 6cfafbf3 IsProcessorFeaturePresent 13343->13361 13347 6cfaf547 13352 6cfaf54b 13347->13352 13371 6cfb4e02 13347->13371 13350 6cfaf562 13350->13318 13351 6cfb2062 ___scrt_uninitialize_crt 7 API calls 13351->13352 13352->13318 13412 6cfaf566 13353->13412 13355 6cfaf496 13355->13324 13356->13327 13358 6cfaf469 ___scrt_release_startup_lock 13357->13358 13359 6cfafbf3 IsProcessorFeaturePresent 13358->13359 13360 6cfaf472 13358->13360 13359->13360 13360->13326 13362 6cfaf542 13361->13362 13363 6cfb2030 13362->13363 13374 6cfb256e 13363->13374 13366 6cfb2039 13366->13347 13368 6cfb2041 13369 6cfb204c 13368->13369 13370 6cfb25aa ___vcrt_uninitialize_locks DeleteCriticalSection 13368->13370 13369->13347 13370->13366 13403 6cfb76f7 13371->13403 13376 6cfb2577 13374->13376 13377 6cfb25a0 13376->13377 13379 6cfb2035 13376->13379 13388 6cfb2951 13376->13388 13378 6cfb25aa ___vcrt_uninitialize_locks DeleteCriticalSection 13377->13378 13378->13379 13379->13366 13380 6cfb2520 13379->13380 13393 6cfb2862 13380->13393 13383 6cfb2535 13383->13368 13386 6cfb2550 13386->13368 13387 6cfb2553 ___vcrt_uninitialize_ptd 6 API calls 13387->13383 13389 6cfb2777 ___vcrt_InitializeCriticalSectionEx 5 API calls 13388->13389 13390 6cfb296b 13389->13390 13391 6cfb2989 InitializeCriticalSectionAndSpinCount 13390->13391 13392 6cfb2974 13390->13392 13391->13392 13392->13376 13394 6cfb2777 ___vcrt_InitializeCriticalSectionEx 5 API calls 13393->13394 13395 6cfb287c 13394->13395 13396 6cfb2895 TlsAlloc 13395->13396 13397 6cfb252a 13395->13397 13397->13383 13398 6cfb2913 13397->13398 13399 6cfb2777 ___vcrt_InitializeCriticalSectionEx 5 API calls 13398->13399 13400 6cfb292d 13399->13400 13401 6cfb2948 TlsSetValue 13400->13401 13402 6cfb2543 13400->13402 13401->13402 13402->13386 13402->13387 13404 6cfb7707 13403->13404 13405 6cfaf554 13403->13405 13404->13405 13407 6cfb75bb 13404->13407 13405->13350 13405->13351 13408 6cfb75c2 13407->13408 13409 6cfb7605 GetStdHandle 13408->13409 13410 6cfb7667 13408->13410 13411 6cfb7618 GetFileType 13408->13411 13409->13408 13410->13404 13411->13408 13413 6cfaf572 13412->13413 13414 6cfaf576 13412->13414 13413->13355 13415 6cfafdd7 __DllMainCRTStartup@12 4 API calls 13414->13415 13417 6cfaf583 ___scrt_release_startup_lock 13414->13417 13416 6cfaf5ec 13415->13416 13417->13355 13424 6cfb54b0 13418->13424 13421 6cfb205a 13604 6cfb2455 13421->13604 13425 6cfaf4c1 13424->13425 13426 6cfb54ba 13424->13426 13425->13421 13427 6cfb7346 _unexpected 6 API calls 13426->13427 13428 6cfb54c1 13427->13428 13428->13425 13429 6cfb7385 _unexpected 6 API calls 13428->13429 13430 6cfb54d4 13429->13430 13432 6cfb5377 13430->13432 13433 6cfb5382 13432->13433 13437 6cfb5392 13432->13437 13438 6cfb5398 13433->13438 13436 6cfb5a60 ___free_lconv_mon 14 API calls 13436->13437 13437->13425 13439 6cfb53ad 13438->13439 13440 6cfb53b3 13438->13440 13441 6cfb5a60 ___free_lconv_mon 14 API calls 13439->13441 13442 6cfb5a60 ___free_lconv_mon 14 API calls 13440->13442 13441->13440 13443 6cfb53bf 13442->13443 13444 6cfb5a60 ___free_lconv_mon 14 API calls 13443->13444 13445 6cfb53ca 13444->13445 13446 6cfb5a60 ___free_lconv_mon 14 API calls 13445->13446 13447 6cfb53d5 13446->13447 13448 6cfb5a60 ___free_lconv_mon 14 API calls 13447->13448 13449 6cfb53e0 13448->13449 13450 6cfb5a60 ___free_lconv_mon 14 API calls 13449->13450 13451 6cfb53eb 13450->13451 13452 6cfb5a60 ___free_lconv_mon 14 API calls 13451->13452 13453 6cfb53f6 13452->13453 13454 6cfb5a60 ___free_lconv_mon 14 API calls 13453->13454 13455 6cfb5401 13454->13455 13456 6cfb5a60 ___free_lconv_mon 14 API calls 13455->13456 13457 6cfb540c 13456->13457 13458 6cfb5a60 ___free_lconv_mon 14 API calls 13457->13458 13459 6cfb541a 13458->13459 13464 6cfb51c4 13459->13464 13465 6cfb51d0 ___scrt_is_nonwritable_in_current_image 13464->13465 13480 6cfb58a8 EnterCriticalSection 13465->13480 13469 6cfb51da 13470 6cfb5a60 ___free_lconv_mon 14 API calls 13469->13470 13471 6cfb5204 13469->13471 13470->13471 13481 6cfb5223 13471->13481 13472 6cfb522f 13473 6cfb523b ___scrt_is_nonwritable_in_current_image 13472->13473 13485 6cfb58a8 EnterCriticalSection 13473->13485 13475 6cfb5245 13486 6cfb5465 13475->13486 13477 6cfb5258 13490 6cfb5278 13477->13490 13480->13469 13484 6cfb58f0 LeaveCriticalSection 13481->13484 13483 6cfb5211 13483->13472 13484->13483 13485->13475 13487 6cfb549b _unexpected 13486->13487 13488 6cfb5474 _unexpected 13486->13488 13487->13477 13488->13487 13493 6cfb81c8 13488->13493 13603 6cfb58f0 LeaveCriticalSection 13490->13603 13492 6cfb5266 13492->13436 13494 6cfb8248 13493->13494 13497 6cfb81de 13493->13497 13496 6cfb5a60 ___free_lconv_mon 14 API calls 13494->13496 13519 6cfb8296 13494->13519 13499 6cfb826a 13496->13499 13497->13494 13502 6cfb8211 13497->13502 13504 6cfb5a60 ___free_lconv_mon 14 API calls 13497->13504 13498 6cfb82a4 13508 6cfb8304 13498->13508 13517 6cfb5a60 14 API calls ___free_lconv_mon 13498->13517 13500 6cfb5a60 ___free_lconv_mon 14 API calls 13499->13500 13501 6cfb827d 13500->13501 13505 6cfb5a60 ___free_lconv_mon 14 API calls 13501->13505 13506 6cfb5a60 ___free_lconv_mon 14 API calls 13502->13506 13520 6cfb8233 13502->13520 13503 6cfb5a60 ___free_lconv_mon 14 API calls 13507 6cfb823d 13503->13507 13509 6cfb8206 13504->13509 13511 6cfb828b 13505->13511 13512 6cfb8228 13506->13512 13513 6cfb5a60 ___free_lconv_mon 14 API calls 13507->13513 13514 6cfb5a60 ___free_lconv_mon 14 API calls 13508->13514 13521 6cfb84e5 13509->13521 13515 6cfb5a60 ___free_lconv_mon 14 API calls 13511->13515 13549 6cfb85e3 13512->13549 13513->13494 13518 6cfb830a 13514->13518 13515->13519 13517->13498 13518->13487 13561 6cfb8339 13519->13561 13520->13503 13522 6cfb85df 13521->13522 13523 6cfb84f6 13521->13523 13522->13502 13524 6cfb8507 13523->13524 13525 6cfb5a60 ___free_lconv_mon 14 API calls 13523->13525 13526 6cfb8519 13524->13526 13528 6cfb5a60 ___free_lconv_mon 14 API calls 13524->13528 13525->13524 13527 6cfb852b 13526->13527 13529 6cfb5a60 ___free_lconv_mon 14 API calls 13526->13529 13530 6cfb853d 13527->13530 13531 6cfb5a60 ___free_lconv_mon 14 API calls 13527->13531 13528->13526 13529->13527 13532 6cfb854f 13530->13532 13533 6cfb5a60 ___free_lconv_mon 14 API calls 13530->13533 13531->13530 13534 6cfb8561 13532->13534 13536 6cfb5a60 ___free_lconv_mon 14 API calls 13532->13536 13533->13532 13535 6cfb8573 13534->13535 13537 6cfb5a60 ___free_lconv_mon 14 API calls 13534->13537 13538 6cfb8585 13535->13538 13539 6cfb5a60 ___free_lconv_mon 14 API calls 13535->13539 13536->13534 13537->13535 13540 6cfb8597 13538->13540 13541 6cfb5a60 ___free_lconv_mon 14 API calls 13538->13541 13539->13538 13542 6cfb85a9 13540->13542 13544 6cfb5a60 ___free_lconv_mon 14 API calls 13540->13544 13541->13540 13543 6cfb85bb 13542->13543 13545 6cfb5a60 ___free_lconv_mon 14 API calls 13542->13545 13546 6cfb85cd 13543->13546 13547 6cfb5a60 ___free_lconv_mon 14 API calls 13543->13547 13544->13542 13545->13543 13546->13522 13548 6cfb5a60 ___free_lconv_mon 14 API calls 13546->13548 13547->13546 13548->13522 13550 6cfb8648 13549->13550 13551 6cfb85f0 13549->13551 13550->13520 13552 6cfb8600 13551->13552 13553 6cfb5a60 ___free_lconv_mon 14 API calls 13551->13553 13554 6cfb8612 13552->13554 13555 6cfb5a60 ___free_lconv_mon 14 API calls 13552->13555 13553->13552 13556 6cfb8624 13554->13556 13557 6cfb5a60 ___free_lconv_mon 14 API calls 13554->13557 13555->13554 13558 6cfb8636 13556->13558 13559 6cfb5a60 ___free_lconv_mon 14 API calls 13556->13559 13557->13556 13558->13550 13560 6cfb5a60 ___free_lconv_mon 14 API calls 13558->13560 13559->13558 13560->13550 13562 6cfb8365 13561->13562 13563 6cfb8346 13561->13563 13562->13498 13563->13562 13567 6cfb8671 13563->13567 13566 6cfb5a60 ___free_lconv_mon 14 API calls 13566->13562 13568 6cfb835f 13567->13568 13569 6cfb8682 13567->13569 13568->13566 13570 6cfb864c _unexpected 14 API calls 13569->13570 13571 6cfb868a 13570->13571 13572 6cfb864c _unexpected 14 API calls 13571->13572 13573 6cfb8695 13572->13573 13574 6cfb864c _unexpected 14 API calls 13573->13574 13575 6cfb86a0 13574->13575 13576 6cfb864c _unexpected 14 API calls 13575->13576 13577 6cfb86ab 13576->13577 13578 6cfb864c _unexpected 14 API calls 13577->13578 13579 6cfb86b9 13578->13579 13580 6cfb5a60 ___free_lconv_mon 14 API calls 13579->13580 13581 6cfb86c4 13580->13581 13582 6cfb5a60 ___free_lconv_mon 14 API calls 13581->13582 13583 6cfb86cf 13582->13583 13584 6cfb5a60 ___free_lconv_mon 14 API calls 13583->13584 13585 6cfb86da 13584->13585 13586 6cfb864c _unexpected 14 API calls 13585->13586 13587 6cfb86e8 13586->13587 13588 6cfb864c _unexpected 14 API calls 13587->13588 13589 6cfb86f6 13588->13589 13590 6cfb864c _unexpected 14 API calls 13589->13590 13591 6cfb8707 13590->13591 13592 6cfb864c _unexpected 14 API calls 13591->13592 13593 6cfb8715 13592->13593 13594 6cfb864c _unexpected 14 API calls 13593->13594 13595 6cfb8723 13594->13595 13596 6cfb5a60 ___free_lconv_mon 14 API calls 13595->13596 13597 6cfb872e 13596->13597 13598 6cfb5a60 ___free_lconv_mon 14 API calls 13597->13598 13599 6cfb8739 13598->13599 13600 6cfb5a60 ___free_lconv_mon 14 API calls 13599->13600 13601 6cfb8744 13600->13601 13602 6cfb5a60 ___free_lconv_mon 14 API calls 13601->13602 13602->13568 13603->13492 13605 6cfaf4c6 13604->13605 13606 6cfb245f 13604->13606 13605->13311 13612 6cfb28d8 13606->13612 13609 6cfb2913 ___vcrt_FlsSetValue 6 API calls 13610 6cfb2475 13609->13610 13617 6cfb2439 13610->13617 13613 6cfb2777 ___vcrt_InitializeCriticalSectionEx 5 API calls 13612->13613 13614 6cfb28f2 13613->13614 13615 6cfb290a TlsGetValue 13614->13615 13616 6cfb2466 13614->13616 13615->13616 13616->13609 13618 6cfb2443 13617->13618 13619 6cfb2450 13617->13619 13618->13619 13620 6cfb4f06 ___std_exception_copy 14 API calls 13618->13620 13619->13605 13620->13619 13627 6cfb248e 13621->13627 13623 6cfaf4a2 13623->13337 13624 6cfb4e14 13623->13624 13625 6cfb562d __dosmaperr 14 API calls 13624->13625 13626 6cfaf4ae 13625->13626 13626->13340 13626->13341 13628 6cfb249a GetLastError 13627->13628 13629 6cfb2497 13627->13629 13630 6cfb28d8 ___vcrt_FlsGetValue 6 API calls 13628->13630 13629->13623 13631 6cfb24af 13630->13631 13632 6cfb2514 SetLastError 13631->13632 13633 6cfb2913 ___vcrt_FlsSetValue 6 API calls 13631->13633 13640 6cfb24ce 13631->13640 13632->13623 13634 6cfb24c8 CallUnexpected 13633->13634 13635 6cfb24f0 13634->13635 13636 6cfb2913 ___vcrt_FlsSetValue 6 API calls 13634->13636 13634->13640 13637 6cfb2913 ___vcrt_FlsSetValue 6 API calls 13635->13637 13638 6cfb2504 13635->13638 13636->13635 13637->13638 13639 6cfb4f06 ___std_exception_copy 14 API calls 13638->13639 13639->13640 13640->13632 12957 6cfafaae 12958 6cfafabc 12957->12958 12959 6cfafab7 12957->12959 12963 6cfaf978 12958->12963 12974 6cfaffe7 12959->12974 12966 6cfaf984 ___scrt_is_nonwritable_in_current_image 12963->12966 12964 6cfaf993 12965 6cfaf9ad dllmain_raw 12965->12964 12967 6cfaf9c7 dllmain_crt_dispatch 12965->12967 12966->12964 12966->12965 12968 6cfaf9a8 __DllMainCRTStartup@12 12966->12968 12967->12964 12967->12968 12969 6cfafa19 12968->12969 12978 6cfaf8c8 12968->12978 12969->12964 12970 6cfafa22 dllmain_crt_dispatch 12969->12970 12970->12964 12971 6cfafa35 dllmain_raw 12970->12971 12971->12964 12973 6cfafa0e dllmain_raw 12973->12969 12975 6cfafffd 12974->12975 12977 6cfb0006 12975->12977 13302 6cfaff9a GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 12975->13302 12977->12958 12980 6cfaf8d4 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 12978->12980 12979 6cfaf8dd 12979->12973 12980->12979 12981 6cfaf970 12980->12981 12982 6cfaf905 12980->12982 13022 6cfafdd7 IsProcessorFeaturePresent 12981->13022 13001 6cfaf4fd 12982->13001 12985 6cfaf90a 13010 6cfb003e 12985->13010 12987 6cfaf977 ___scrt_is_nonwritable_in_current_image 12988 6cfaf9ad dllmain_raw 12987->12988 12996 6cfaf9a8 __DllMainCRTStartup@12 12987->12996 12998 6cfaf993 12987->12998 12990 6cfaf9c7 dllmain_crt_dispatch 12988->12990 12988->12998 12989 6cfaf90f __RTC_Initialize __DllMainCRTStartup@12 13013 6cfaf69e 12989->13013 12990->12996 12990->12998 12994 6cfafa19 12995 6cfafa22 dllmain_crt_dispatch 12994->12995 12994->12998 12997 6cfafa35 dllmain_raw 12995->12997 12995->12998 12996->12994 12999 6cfaf8c8 __DllMainCRTStartup@12 81 API calls 12996->12999 12997->12998 12998->12973 13000 6cfafa0e dllmain_raw 12999->13000 13000->12994 13002 6cfaf502 ___scrt_release_startup_lock 13001->13002 13003 6cfaf506 13002->13003 13005 6cfaf512 __DllMainCRTStartup@12 13002->13005 13026 6cfb4c6a 13003->13026 13007 6cfaf51f 13005->13007 13030 6cfb42c1 13005->13030 13006 6cfaf510 13006->12985 13007->12985 13167 6cfb2416 InterlockedFlushSList 13010->13167 13014 6cfaf6aa 13013->13014 13015 6cfaf6c0 13014->13015 13174 6cfb4e27 13014->13174 13019 6cfaf96a 13015->13019 13017 6cfaf6b8 13179 6cfb2062 13017->13179 13285 6cfaf520 13019->13285 13023 6cfafded CallUnexpected std::bad_exception::bad_exception 13022->13023 13024 6cfafe98 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 13023->13024 13025 6cfafedc CallUnexpected 13024->13025 13025->12987 13027 6cfb4c76 __EH_prolog3 13026->13027 13041 6cfb49a3 13027->13041 13029 6cfb4c9d __DllMainCRTStartup@12 13029->13006 13031 6cfb42ee 13030->13031 13032 6cfb42ff 13030->13032 13112 6cfb4389 GetModuleHandleW 13031->13112 13119 6cfb4171 13032->13119 13037 6cfb433d 13037->12985 13042 6cfb49af ___scrt_is_nonwritable_in_current_image 13041->13042 13049 6cfb58a8 EnterCriticalSection 13042->13049 13044 6cfb49bd 13050 6cfb4b7a 13044->13050 13049->13044 13051 6cfb49ca 13050->13051 13052 6cfb4b99 13050->13052 13054 6cfb49f2 13051->13054 13052->13051 13057 6cfb5a60 13052->13057 13111 6cfb58f0 LeaveCriticalSection 13054->13111 13056 6cfb49db 13056->13029 13058 6cfb5a6b HeapFree 13057->13058 13059 6cfb5a95 13057->13059 13058->13059 13060 6cfb5a80 GetLastError 13058->13060 13059->13051 13061 6cfb5a8d __dosmaperr 13060->13061 13063 6cfb59f0 13061->13063 13066 6cfb562d GetLastError 13063->13066 13065 6cfb59f5 13065->13059 13067 6cfb5649 13066->13067 13068 6cfb5643 13066->13068 13072 6cfb564d SetLastError 13067->13072 13094 6cfb7385 13067->13094 13089 6cfb7346 13068->13089 13072->13065 13076 6cfb5693 13079 6cfb7385 _unexpected 6 API calls 13076->13079 13077 6cfb5682 13078 6cfb7385 _unexpected 6 API calls 13077->13078 13081 6cfb5690 13078->13081 13080 6cfb569f 13079->13080 13082 6cfb56ba 13080->13082 13083 6cfb56a3 13080->13083 13085 6cfb5a60 ___free_lconv_mon 12 API calls 13081->13085 13106 6cfb52de 13082->13106 13084 6cfb7385 _unexpected 6 API calls 13083->13084 13084->13081 13085->13072 13088 6cfb5a60 ___free_lconv_mon 12 API calls 13088->13072 13090 6cfb71e4 _unexpected 5 API calls 13089->13090 13091 6cfb7362 13090->13091 13092 6cfb736b 13091->13092 13093 6cfb737d TlsGetValue 13091->13093 13092->13067 13095 6cfb71e4 _unexpected 5 API calls 13094->13095 13096 6cfb73a1 13095->13096 13097 6cfb5665 13096->13097 13098 6cfb73bf TlsSetValue 13096->13098 13097->13072 13099 6cfb5a03 13097->13099 13104 6cfb5a10 _unexpected 13099->13104 13100 6cfb5a50 13103 6cfb59f0 __dosmaperr 13 API calls 13100->13103 13101 6cfb5a3b HeapAlloc 13102 6cfb567a 13101->13102 13101->13104 13102->13076 13102->13077 13103->13102 13104->13100 13104->13101 13105 6cfb4e78 _unexpected EnterCriticalSection LeaveCriticalSection 13104->13105 13105->13104 13107 6cfb5172 _unexpected EnterCriticalSection LeaveCriticalSection 13106->13107 13108 6cfb534c 13107->13108 13109 6cfb5284 _unexpected 14 API calls 13108->13109 13110 6cfb5375 13109->13110 13110->13088 13111->13056 13113 6cfb42f3 13112->13113 13113->13032 13114 6cfb43e4 GetModuleHandleExW 13113->13114 13115 6cfb4423 GetProcAddress 13114->13115 13116 6cfb4437 13114->13116 13115->13116 13117 6cfb444a FreeLibrary 13116->13117 13118 6cfb4453 13116->13118 13117->13118 13118->13032 13120 6cfb417d ___scrt_is_nonwritable_in_current_image 13119->13120 13134 6cfb58a8 EnterCriticalSection 13120->13134 13122 6cfb4187 13135 6cfb41d9 13122->13135 13124 6cfb4194 13139 6cfb41b2 13124->13139 13127 6cfb4358 13143 6cfb43cb 13127->13143 13129 6cfb4362 13130 6cfb4376 13129->13130 13131 6cfb4366 GetCurrentProcess TerminateProcess 13129->13131 13132 6cfb43e4 CallUnexpected 3 API calls 13130->13132 13131->13130 13133 6cfb437e ExitProcess 13132->13133 13134->13122 13138 6cfb41e5 ___scrt_is_nonwritable_in_current_image CallUnexpected 13135->13138 13136 6cfb4249 CallUnexpected 13136->13124 13137 6cfb4c6a __DllMainCRTStartup@12 14 API calls 13137->13136 13138->13136 13138->13137 13142 6cfb58f0 LeaveCriticalSection 13139->13142 13141 6cfb41a0 13141->13037 13141->13127 13142->13141 13146 6cfb592c 13143->13146 13145 6cfb43d0 CallUnexpected 13145->13129 13147 6cfb593b CallUnexpected 13146->13147 13148 6cfb5948 13147->13148 13150 6cfb7269 13147->13150 13148->13145 13153 6cfb71e4 13150->13153 13152 6cfb7285 13152->13148 13154 6cfb7214 13153->13154 13158 6cfb7210 _unexpected 13153->13158 13154->13158 13159 6cfb7119 13154->13159 13157 6cfb722e GetProcAddress 13157->13158 13158->13152 13165 6cfb712a ___vcrt_InitializeCriticalSectionEx 13159->13165 13160 6cfb71c0 13160->13157 13160->13158 13161 6cfb7148 LoadLibraryExW 13162 6cfb7163 GetLastError 13161->13162 13163 6cfb71c7 13161->13163 13162->13165 13163->13160 13164 6cfb71d9 FreeLibrary 13163->13164 13164->13160 13165->13160 13165->13161 13166 6cfb7196 LoadLibraryExW 13165->13166 13166->13163 13166->13165 13168 6cfb0048 13167->13168 13169 6cfb2426 13167->13169 13168->12989 13169->13168 13171 6cfb4f06 13169->13171 13172 6cfb5a60 ___free_lconv_mon 14 API calls 13171->13172 13173 6cfb4f1e 13172->13173 13173->13169 13175 6cfb4e32 13174->13175 13176 6cfb4e44 ___scrt_uninitialize_crt 13174->13176 13177 6cfb4e40 13175->13177 13185 6cfb7da2 13175->13185 13176->13017 13177->13017 13180 6cfb206b 13179->13180 13181 6cfb2075 13179->13181 13260 6cfb2553 13180->13260 13181->13015 13188 6cfb7c33 13185->13188 13191 6cfb7b87 13188->13191 13192 6cfb7b93 ___scrt_is_nonwritable_in_current_image 13191->13192 13199 6cfb58a8 EnterCriticalSection 13192->13199 13194 6cfb7b9d ___scrt_uninitialize_crt 13195 6cfb7c09 13194->13195 13200 6cfb7afb 13194->13200 13208 6cfb7c27 13195->13208 13199->13194 13201 6cfb7b07 ___scrt_is_nonwritable_in_current_image 13200->13201 13211 6cfb7ebf EnterCriticalSection 13201->13211 13203 6cfb7b11 ___scrt_uninitialize_crt 13204 6cfb7b4a 13203->13204 13212 6cfb7d3d 13203->13212 13225 6cfb7b7b 13204->13225 13259 6cfb58f0 LeaveCriticalSection 13208->13259 13210 6cfb7c15 13210->13177 13211->13203 13213 6cfb7d52 ___std_exception_copy 13212->13213 13214 6cfb7d59 13213->13214 13215 6cfb7d64 13213->13215 13216 6cfb7c33 ___scrt_uninitialize_crt 68 API calls 13214->13216 13228 6cfb7cd4 13215->13228 13224 6cfb7d5f 13216->13224 13222 6cfb7d85 13241 6cfb95a4 13222->13241 13252 6cfb3c55 13224->13252 13258 6cfb7ed3 LeaveCriticalSection 13225->13258 13227 6cfb7b69 13227->13194 13229 6cfb7ced 13228->13229 13233 6cfb7d14 13228->13233 13230 6cfb8124 ___scrt_uninitialize_crt 39 API calls 13229->13230 13229->13233 13231 6cfb7d09 13230->13231 13232 6cfb9dc3 ___scrt_uninitialize_crt 64 API calls 13231->13232 13232->13233 13233->13224 13234 6cfb8124 13233->13234 13235 6cfb8130 13234->13235 13236 6cfb8145 13234->13236 13237 6cfb59f0 __dosmaperr 14 API calls 13235->13237 13236->13222 13238 6cfb8135 13237->13238 13239 6cfb3f19 ___std_exception_copy 39 API calls 13238->13239 13240 6cfb8140 13239->13240 13240->13222 13242 6cfb95c2 13241->13242 13243 6cfb95b5 13241->13243 13244 6cfb960b 13242->13244 13247 6cfb95e9 13242->13247 13245 6cfb59f0 __dosmaperr 14 API calls 13243->13245 13246 6cfb59f0 __dosmaperr 14 API calls 13244->13246 13251 6cfb95ba 13245->13251 13248 6cfb9610 13246->13248 13249 6cfb9502 ___scrt_uninitialize_crt 43 API calls 13247->13249 13250 6cfb3f19 ___std_exception_copy 39 API calls 13248->13250 13249->13251 13250->13251 13251->13224 13253 6cfb3c61 13252->13253 13254 6cfb3c78 13253->13254 13256 6cfb3d00 ___std_exception_copy 39 API calls 13253->13256 13255 6cfb3c8b 13254->13255 13257 6cfb3d00 ___std_exception_copy 39 API calls 13254->13257 13255->13204 13256->13254 13257->13255 13258->13227 13259->13210 13261 6cfb2070 13260->13261 13262 6cfb255d 13260->13262 13264 6cfb25aa 13261->13264 13268 6cfb289d 13262->13268 13265 6cfb25d4 13264->13265 13266 6cfb25b5 13264->13266 13265->13181 13267 6cfb25bf DeleteCriticalSection 13266->13267 13267->13265 13267->13267 13273 6cfb2777 13268->13273 13271 6cfb28cf TlsFree 13272 6cfb28c3 13271->13272 13272->13261 13274 6cfb2798 13273->13274 13275 6cfb2794 13273->13275 13274->13275 13276 6cfb2800 GetProcAddress 13274->13276 13278 6cfb27f1 13274->13278 13280 6cfb2817 LoadLibraryExW 13274->13280 13275->13271 13275->13272 13276->13275 13278->13276 13279 6cfb27f9 FreeLibrary 13278->13279 13279->13276 13281 6cfb282e GetLastError 13280->13281 13282 6cfb285e 13280->13282 13281->13282 13283 6cfb2839 ___vcrt_InitializeCriticalSectionEx 13281->13283 13282->13274 13283->13282 13284 6cfb284f LoadLibraryExW 13283->13284 13284->13274 13290 6cfb4e57 13285->13290 13288 6cfb2553 ___vcrt_uninitialize_ptd 6 API calls 13289 6cfaf96f 13288->13289 13289->12979 13293 6cfb57ad 13290->13293 13294 6cfb57b7 13293->13294 13296 6cfaf527 13293->13296 13297 6cfb7307 13294->13297 13296->13288 13298 6cfb71e4 _unexpected 5 API calls 13297->13298 13299 6cfb7323 13298->13299 13300 6cfb733e TlsFree 13299->13300 13301 6cfb732c 13299->13301 13301->13296 13302->12977 13641 6cfb47ad 13656 6cfb6a64 13641->13656 13646 6cfb47c9 13648 6cfb5a60 ___free_lconv_mon 14 API calls 13646->13648 13647 6cfb47d5 13683 6cfb4806 13647->13683 13650 6cfb47cf 13648->13650 13652 6cfb5a60 ___free_lconv_mon 14 API calls 13653 6cfb47f9 13652->13653 13654 6cfb5a60 ___free_lconv_mon 14 API calls 13653->13654 13655 6cfb47ff 13654->13655 13657 6cfb47be 13656->13657 13658 6cfb6a6d 13656->13658 13662 6cfb6fbe GetEnvironmentStringsW 13657->13662 13705 6cfb5597 13658->13705 13663 6cfb47c3 13662->13663 13664 6cfb6fd6 13662->13664 13663->13646 13663->13647 13665 6cfb6f18 ___scrt_uninitialize_crt WideCharToMultiByte 13664->13665 13666 6cfb6ff3 13665->13666 13667 6cfb7008 13666->13667 13668 6cfb6ffd FreeEnvironmentStringsW 13666->13668 13669 6cfb7ee7 15 API calls 13667->13669 13668->13663 13670 6cfb700f 13669->13670 13671 6cfb7028 13670->13671 13672 6cfb7017 13670->13672 13674 6cfb6f18 ___scrt_uninitialize_crt WideCharToMultiByte 13671->13674 13673 6cfb5a60 ___free_lconv_mon 14 API calls 13672->13673 13675 6cfb701c FreeEnvironmentStringsW 13673->13675 13676 6cfb7038 13674->13676 13675->13663 13677 6cfb703f 13676->13677 13678 6cfb7047 13676->13678 13680 6cfb5a60 ___free_lconv_mon 14 API calls 13677->13680 13679 6cfb5a60 ___free_lconv_mon 14 API calls 13678->13679 13681 6cfb7045 FreeEnvironmentStringsW 13679->13681 13680->13681 13681->13663 13684 6cfb481b 13683->13684 13685 6cfb5a03 _unexpected 14 API calls 13684->13685 13686 6cfb4842 13685->13686 13687 6cfb484a 13686->13687 13693 6cfb4854 13686->13693 13688 6cfb5a60 ___free_lconv_mon 14 API calls 13687->13688 13689 6cfb47dc 13688->13689 13689->13652 13690 6cfb48b1 13691 6cfb5a60 ___free_lconv_mon 14 API calls 13690->13691 13691->13689 13692 6cfb5a03 _unexpected 14 API calls 13692->13693 13693->13690 13693->13692 13694 6cfb48c0 13693->13694 13699 6cfb48db 13693->13699 13701 6cfb5a60 ___free_lconv_mon 14 API calls 13693->13701 14127 6cfb4fb6 13693->14127 14136 6cfb48e8 13694->14136 13698 6cfb5a60 ___free_lconv_mon 14 API calls 13700 6cfb48cd 13698->13700 13702 6cfb3f46 ___std_exception_copy 11 API calls 13699->13702 13703 6cfb5a60 ___free_lconv_mon 14 API calls 13700->13703 13701->13693 13704 6cfb48e7 13702->13704 13703->13689 13706 6cfb55a8 13705->13706 13707 6cfb55a2 13705->13707 13709 6cfb7385 _unexpected 6 API calls 13706->13709 13726 6cfb55ae 13706->13726 13708 6cfb7346 _unexpected 6 API calls 13707->13708 13708->13706 13710 6cfb55c2 13709->13710 13712 6cfb5a03 _unexpected 14 API calls 13710->13712 13710->13726 13713 6cfb55d2 13712->13713 13715 6cfb55da 13713->13715 13716 6cfb55ef 13713->13716 13717 6cfb7385 _unexpected 6 API calls 13715->13717 13718 6cfb7385 _unexpected 6 API calls 13716->13718 13720 6cfb55e6 13717->13720 13719 6cfb55fb 13718->13719 13721 6cfb55ff 13719->13721 13722 6cfb560e 13719->13722 13723 6cfb5a60 ___free_lconv_mon 14 API calls 13720->13723 13724 6cfb7385 _unexpected 6 API calls 13721->13724 13725 6cfb52de _unexpected 14 API calls 13722->13725 13723->13726 13724->13720 13727 6cfb5619 13725->13727 13729 6cfb55b3 13726->13729 13753 6cfb5010 13726->13753 13728 6cfb5a60 ___free_lconv_mon 14 API calls 13727->13728 13728->13729 13730 6cfb686f 13729->13730 13909 6cfb69c4 13730->13909 13735 6cfb68b2 13735->13657 13738 6cfb68cb 13740 6cfb5a60 ___free_lconv_mon 14 API calls 13738->13740 13739 6cfb68d9 13934 6cfb6abf 13739->13934 13740->13735 13743 6cfb692c 13749 6cfb5a60 ___free_lconv_mon 14 API calls 13743->13749 13752 6cfb6958 13743->13752 13744 6cfb6911 13745 6cfb59f0 __dosmaperr 14 API calls 13744->13745 13746 6cfb6916 13745->13746 13748 6cfb5a60 ___free_lconv_mon 14 API calls 13746->13748 13747 6cfb69a1 13751 6cfb5a60 ___free_lconv_mon 14 API calls 13747->13751 13748->13735 13749->13752 13751->13735 13752->13747 13945 6cfb64e8 13752->13945 13764 6cfb7862 13753->13764 13756 6cfb5020 13758 6cfb502a IsProcessorFeaturePresent 13756->13758 13759 6cfb5049 13756->13759 13760 6cfb5036 13758->13760 13800 6cfb4484 13759->13800 13794 6cfb3d1d 13760->13794 13803 6cfb7790 13764->13803 13767 6cfb78a7 13770 6cfb78b3 ___scrt_is_nonwritable_in_current_image 13767->13770 13768 6cfb562d __dosmaperr 14 API calls 13778 6cfb78e4 CallUnexpected 13768->13778 13769 6cfb7903 13773 6cfb59f0 __dosmaperr 14 API calls 13769->13773 13770->13768 13770->13769 13772 6cfb7915 CallUnexpected 13770->13772 13770->13778 13771 6cfb78ed 13771->13756 13775 6cfb794b CallUnexpected 13772->13775 13817 6cfb58a8 EnterCriticalSection 13772->13817 13774 6cfb7908 13773->13774 13814 6cfb3f19 13774->13814 13780 6cfb7988 13775->13780 13781 6cfb7a85 13775->13781 13792 6cfb79b6 13775->13792 13778->13769 13778->13771 13778->13772 13780->13792 13818 6cfb54dc GetLastError 13780->13818 13783 6cfb7a90 13781->13783 13849 6cfb58f0 LeaveCriticalSection 13781->13849 13785 6cfb4484 CallUnexpected 21 API calls 13783->13785 13786 6cfb7a98 13785->13786 13787 6cfb7a0b 13787->13771 13793 6cfb54dc _unexpected 39 API calls 13787->13793 13789 6cfb54dc _unexpected 39 API calls 13789->13787 13791 6cfb54dc _unexpected 39 API calls 13791->13792 13845 6cfb7a31 13792->13845 13793->13771 13795 6cfb3d39 CallUnexpected std::bad_exception::bad_exception 13794->13795 13796 6cfb3d65 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 13795->13796 13797 6cfb3e36 CallUnexpected 13796->13797 13901 6cfaf3e0 13797->13901 13799 6cfb3e54 13799->13759 13801 6cfb42c1 CallUnexpected 21 API calls 13800->13801 13802 6cfb4495 13801->13802 13804 6cfb779c ___scrt_is_nonwritable_in_current_image 13803->13804 13809 6cfb58a8 EnterCriticalSection 13804->13809 13806 6cfb77aa 13810 6cfb77ec 13806->13810 13809->13806 13813 6cfb58f0 LeaveCriticalSection 13810->13813 13812 6cfb5015 13812->13756 13812->13767 13813->13812 13850 6cfb3e65 13814->13850 13817->13775 13819 6cfb54f8 13818->13819 13820 6cfb54f2 13818->13820 13821 6cfb7385 _unexpected 6 API calls 13819->13821 13824 6cfb54fc SetLastError 13819->13824 13822 6cfb7346 _unexpected 6 API calls 13820->13822 13823 6cfb5514 13821->13823 13822->13819 13823->13824 13826 6cfb5a03 _unexpected 14 API calls 13823->13826 13828 6cfb558c 13824->13828 13829 6cfb5591 13824->13829 13827 6cfb5529 13826->13827 13830 6cfb5542 13827->13830 13831 6cfb5531 13827->13831 13828->13791 13832 6cfb5010 CallUnexpected 37 API calls 13829->13832 13835 6cfb7385 _unexpected 6 API calls 13830->13835 13834 6cfb7385 _unexpected 6 API calls 13831->13834 13833 6cfb5596 13832->13833 13836 6cfb553f 13834->13836 13837 6cfb554e 13835->13837 13841 6cfb5a60 ___free_lconv_mon 14 API calls 13836->13841 13838 6cfb5569 13837->13838 13839 6cfb5552 13837->13839 13842 6cfb52de _unexpected 14 API calls 13838->13842 13840 6cfb7385 _unexpected 6 API calls 13839->13840 13840->13836 13841->13824 13843 6cfb5574 13842->13843 13844 6cfb5a60 ___free_lconv_mon 14 API calls 13843->13844 13844->13824 13846 6cfb7a35 13845->13846 13848 6cfb79fd 13845->13848 13900 6cfb58f0 LeaveCriticalSection 13846->13900 13848->13771 13848->13787 13848->13789 13849->13783 13851 6cfb3e77 ___std_exception_copy 13850->13851 13856 6cfb3e9c 13851->13856 13853 6cfb3e8f 13854 6cfb3c55 ___std_exception_copy 39 API calls 13853->13854 13855 6cfb3e9a 13854->13855 13855->13771 13857 6cfb3eac 13856->13857 13858 6cfb3eb3 13856->13858 13867 6cfb3cba GetLastError 13857->13867 13860 6cfb3ec1 13858->13860 13871 6cfb3c91 13858->13871 13860->13853 13862 6cfb3ee8 13862->13860 13874 6cfb3f46 IsProcessorFeaturePresent 13862->13874 13864 6cfb3f18 13865 6cfb3e65 ___std_exception_copy 39 API calls 13864->13865 13866 6cfb3f25 13865->13866 13866->13853 13868 6cfb3cd3 13867->13868 13878 6cfb56de 13868->13878 13872 6cfb3c9c GetLastError SetLastError 13871->13872 13873 6cfb3cb5 13871->13873 13872->13862 13873->13862 13875 6cfb3f52 13874->13875 13876 6cfb3d1d CallUnexpected 8 API calls 13875->13876 13877 6cfb3f67 GetCurrentProcess TerminateProcess 13876->13877 13877->13864 13879 6cfb56f7 13878->13879 13880 6cfb56f1 13878->13880 13882 6cfb7385 _unexpected 6 API calls 13879->13882 13884 6cfb3ceb SetLastError 13879->13884 13881 6cfb7346 _unexpected 6 API calls 13880->13881 13881->13879 13883 6cfb5711 13882->13883 13883->13884 13885 6cfb5a03 _unexpected 14 API calls 13883->13885 13884->13858 13886 6cfb5721 13885->13886 13887 6cfb5729 13886->13887 13888 6cfb573e 13886->13888 13890 6cfb7385 _unexpected 6 API calls 13887->13890 13889 6cfb7385 _unexpected 6 API calls 13888->13889 13891 6cfb574a 13889->13891 13892 6cfb5735 13890->13892 13893 6cfb574e 13891->13893 13894 6cfb575d 13891->13894 13895 6cfb5a60 ___free_lconv_mon 14 API calls 13892->13895 13896 6cfb7385 _unexpected 6 API calls 13893->13896 13897 6cfb52de _unexpected 14 API calls 13894->13897 13895->13884 13896->13892 13898 6cfb5768 13897->13898 13899 6cfb5a60 ___free_lconv_mon 14 API calls 13898->13899 13899->13884 13900->13848 13902 6cfaf3e8 13901->13902 13903 6cfaf3e9 IsProcessorFeaturePresent 13901->13903 13902->13799 13905 6cfafb0e 13903->13905 13908 6cfafad1 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 13905->13908 13907 6cfafbf1 13907->13799 13908->13907 13910 6cfb69d0 ___scrt_is_nonwritable_in_current_image 13909->13910 13917 6cfb69ea 13910->13917 13953 6cfb58a8 EnterCriticalSection 13910->13953 13912 6cfb6a26 13954 6cfb6a43 13912->13954 13914 6cfb5010 CallUnexpected 39 API calls 13918 6cfb6a63 13914->13918 13915 6cfb6899 13920 6cfb65f6 13915->13920 13916 6cfb69fa 13916->13912 13919 6cfb5a60 ___free_lconv_mon 14 API calls 13916->13919 13917->13914 13917->13915 13919->13912 13958 6cfb60fa 13920->13958 13923 6cfb6629 13925 6cfb6640 13923->13925 13926 6cfb662e GetACP 13923->13926 13924 6cfb6617 GetOEMCP 13924->13925 13925->13735 13927 6cfb7ee7 13925->13927 13926->13925 13928 6cfb7f25 13927->13928 13932 6cfb7ef5 _unexpected 13927->13932 13929 6cfb59f0 __dosmaperr 14 API calls 13928->13929 13931 6cfb68c3 13929->13931 13930 6cfb7f10 RtlAllocateHeap 13930->13931 13930->13932 13931->13738 13931->13739 13932->13928 13932->13930 14001 6cfb4e78 13932->14001 13935 6cfb65f6 41 API calls 13934->13935 13937 6cfb6adf 13935->13937 13936 6cfb6be4 13938 6cfaf3e0 CatchGuardHandler 5 API calls 13936->13938 13937->13936 13939 6cfb6b1c IsValidCodePage 13937->13939 13944 6cfb6b37 std::bad_exception::bad_exception 13937->13944 13940 6cfb6906 13938->13940 13939->13936 13941 6cfb6b2e 13939->13941 13940->13743 13940->13744 13942 6cfb6b57 GetCPInfo 13941->13942 13941->13944 13942->13936 13942->13944 14015 6cfb66ca 13944->14015 13946 6cfb64f4 ___scrt_is_nonwritable_in_current_image 13945->13946 14101 6cfb58a8 EnterCriticalSection 13946->14101 13948 6cfb64fe 14102 6cfb6535 13948->14102 13953->13916 13957 6cfb58f0 LeaveCriticalSection 13954->13957 13956 6cfb6a4a 13956->13917 13957->13956 13959 6cfb6118 13958->13959 13965 6cfb6111 13958->13965 13960 6cfb54dc _unexpected 39 API calls 13959->13960 13959->13965 13961 6cfb6139 13960->13961 13966 6cfb7f35 13961->13966 13965->13923 13965->13924 13967 6cfb7f48 13966->13967 13968 6cfb614f 13966->13968 13967->13968 13974 6cfb8414 13967->13974 13970 6cfb7f93 13968->13970 13971 6cfb7fbb 13970->13971 13972 6cfb7fa6 13970->13972 13971->13965 13972->13971 13996 6cfb6aac 13972->13996 13975 6cfb8420 ___scrt_is_nonwritable_in_current_image 13974->13975 13976 6cfb54dc _unexpected 39 API calls 13975->13976 13977 6cfb8429 13976->13977 13978 6cfb846f 13977->13978 13987 6cfb58a8 EnterCriticalSection 13977->13987 13978->13968 13980 6cfb8447 13988 6cfb8495 13980->13988 13985 6cfb5010 CallUnexpected 39 API calls 13986 6cfb8494 13985->13986 13987->13980 13989 6cfb8458 13988->13989 13990 6cfb84a3 _unexpected 13988->13990 13992 6cfb8474 13989->13992 13990->13989 13991 6cfb81c8 _unexpected 14 API calls 13990->13991 13991->13989 13995 6cfb58f0 LeaveCriticalSection 13992->13995 13994 6cfb846b 13994->13978 13994->13985 13995->13994 13997 6cfb54dc _unexpected 39 API calls 13996->13997 13998 6cfb6ab1 13997->13998 13999 6cfb69c4 ___scrt_uninitialize_crt 39 API calls 13998->13999 14000 6cfb6abc 13999->14000 14000->13971 14004 6cfb4ea4 14001->14004 14005 6cfb4eb0 ___scrt_is_nonwritable_in_current_image 14004->14005 14010 6cfb58a8 EnterCriticalSection 14005->14010 14007 6cfb4ebb CallUnexpected 14011 6cfb4ef2 14007->14011 14010->14007 14014 6cfb58f0 LeaveCriticalSection 14011->14014 14013 6cfb4e83 14013->13932 14014->14013 14016 6cfb66f2 GetCPInfo 14015->14016 14025 6cfb67bb 14015->14025 14021 6cfb670a 14016->14021 14016->14025 14017 6cfaf3e0 CatchGuardHandler 5 API calls 14019 6cfb686d 14017->14019 14019->13936 14026 6cfb8755 14021->14026 14024 6cfb9103 43 API calls 14024->14025 14025->14017 14027 6cfb60fa 39 API calls 14026->14027 14028 6cfb8775 14027->14028 14046 6cfb6e5e 14028->14046 14030 6cfb8831 14033 6cfaf3e0 CatchGuardHandler 5 API calls 14030->14033 14031 6cfb8829 14049 6cfb8856 14031->14049 14032 6cfb87a2 14032->14030 14032->14031 14035 6cfb7ee7 15 API calls 14032->14035 14037 6cfb87c7 std::bad_exception::bad_exception 14032->14037 14036 6cfb6772 14033->14036 14035->14037 14041 6cfb9103 14036->14041 14037->14031 14038 6cfb6e5e ___scrt_uninitialize_crt MultiByteToWideChar 14037->14038 14039 6cfb8810 14038->14039 14039->14031 14040 6cfb8817 GetStringTypeW 14039->14040 14040->14031 14042 6cfb60fa 39 API calls 14041->14042 14043 6cfb9116 14042->14043 14055 6cfb8f14 14043->14055 14053 6cfb6dc6 14046->14053 14050 6cfb8862 14049->14050 14051 6cfb8873 14049->14051 14050->14051 14052 6cfb5a60 ___free_lconv_mon 14 API calls 14050->14052 14051->14030 14052->14051 14054 6cfb6dd7 MultiByteToWideChar 14053->14054 14054->14032 14056 6cfb8f2f 14055->14056 14057 6cfb6e5e ___scrt_uninitialize_crt MultiByteToWideChar 14056->14057 14061 6cfb8f73 14057->14061 14058 6cfb90ee 14060 6cfaf3e0 CatchGuardHandler 5 API calls 14058->14060 14059 6cfb9041 14064 6cfb8856 __freea 14 API calls 14059->14064 14062 6cfb6793 14060->14062 14061->14058 14061->14059 14063 6cfb7ee7 15 API calls 14061->14063 14065 6cfb8f99 14061->14065 14062->14024 14063->14065 14064->14058 14065->14059 14066 6cfb6e5e ___scrt_uninitialize_crt MultiByteToWideChar 14065->14066 14067 6cfb8fe2 14066->14067 14067->14059 14083 6cfb7412 14067->14083 14070 6cfb9018 14070->14059 14074 6cfb7412 6 API calls 14070->14074 14071 6cfb9050 14072 6cfb90d9 14071->14072 14075 6cfb7ee7 15 API calls 14071->14075 14076 6cfb9062 14071->14076 14073 6cfb8856 __freea 14 API calls 14072->14073 14073->14059 14074->14059 14075->14076 14076->14072 14077 6cfb7412 6 API calls 14076->14077 14078 6cfb90a5 14077->14078 14078->14072 14089 6cfb6f18 14078->14089 14080 6cfb90bf 14080->14072 14081 6cfb90c8 14080->14081 14082 6cfb8856 __freea 14 API calls 14081->14082 14082->14059 14092 6cfb70e5 14083->14092 14087 6cfb7463 LCMapStringW 14088 6cfb7423 14087->14088 14088->14059 14088->14070 14088->14071 14091 6cfb6f2b ___scrt_uninitialize_crt 14089->14091 14090 6cfb6f69 WideCharToMultiByte 14090->14080 14091->14090 14093 6cfb71e4 _unexpected 5 API calls 14092->14093 14094 6cfb70fb 14093->14094 14094->14088 14095 6cfb746f 14094->14095 14098 6cfb70ff 14095->14098 14097 6cfb747a 14097->14087 14099 6cfb71e4 _unexpected 5 API calls 14098->14099 14100 6cfb7115 14099->14100 14100->14097 14101->13948 14112 6cfb6cc4 14102->14112 14104 6cfb6557 14105 6cfb6cc4 39 API calls 14104->14105 14106 6cfb6576 14105->14106 14107 6cfb650b 14106->14107 14108 6cfb5a60 ___free_lconv_mon 14 API calls 14106->14108 14109 6cfb6529 14107->14109 14108->14107 14126 6cfb58f0 LeaveCriticalSection 14109->14126 14111 6cfb6517 14111->13747 14113 6cfb6cd5 14112->14113 14117 6cfb6cd1 __InternalCxxFrameHandler 14112->14117 14114 6cfb6cdc 14113->14114 14118 6cfb6cef std::bad_exception::bad_exception 14113->14118 14115 6cfb59f0 __dosmaperr 14 API calls 14114->14115 14116 6cfb6ce1 14115->14116 14119 6cfb3f19 ___std_exception_copy 39 API calls 14116->14119 14117->14104 14118->14117 14120 6cfb6d1d 14118->14120 14121 6cfb6d26 14118->14121 14119->14117 14122 6cfb59f0 __dosmaperr 14 API calls 14120->14122 14121->14117 14124 6cfb59f0 __dosmaperr 14 API calls 14121->14124 14123 6cfb6d22 14122->14123 14125 6cfb3f19 ___std_exception_copy 39 API calls 14123->14125 14124->14123 14125->14117 14126->14111 14128 6cfb4fd2 14127->14128 14129 6cfb4fc4 14127->14129 14130 6cfb59f0 __dosmaperr 14 API calls 14128->14130 14129->14128 14134 6cfb4fea 14129->14134 14131 6cfb4fda 14130->14131 14132 6cfb3f19 ___std_exception_copy 39 API calls 14131->14132 14133 6cfb4fe4 14132->14133 14133->13693 14134->14133 14135 6cfb59f0 __dosmaperr 14 API calls 14134->14135 14135->14131 14137 6cfb48f5 14136->14137 14138 6cfb48c6 14136->14138 14139 6cfb490c 14137->14139 14140 6cfb5a60 ___free_lconv_mon 14 API calls 14137->14140 14138->13698 14141 6cfb5a60 ___free_lconv_mon 14 API calls 14139->14141 14140->14137 14141->14138 14142 6cf95900 14169 6cf95920 std::bad_exception::bad_exception 14142->14169 14143 6cf9ad41 NtWriteVirtualMemory 14143->14169 14144 6cf9b228 CloseHandle 14144->14169 14145 6cf9a699 NtGetContextThread 14145->14169 14146 6cf9a2e5 VirtualAlloc 14146->14169 14147 6cf9b61d CreateProcessW 14147->14169 14148 6cf9b257 14149 6cfaf3e0 CatchGuardHandler 5 API calls 14148->14149 14150 6cf9b261 14149->14150 14151 6cf9a9e7 NtAllocateVirtualMemory 14151->14169 14152 6cf9aa9e NtWriteVirtualMemory 14152->14169 14153 6cf91870 7 API calls 14153->14169 14154 6cf9ac13 NtWriteVirtualMemory 14154->14169 14155 6cf9b686 NtGetContextThread 14155->14169 14156 6cf9a176 GetConsoleWindow ShowWindow 14170 6cf8f7b0 GetCurrentProcess 14156->14170 14158 6cf8f7b0 19 API calls 14158->14169 14160 6cf9b76e NtWriteVirtualMemory 14160->14169 14161 6cf9b57d VirtualAlloc 14162 6cf9b5d9 std::bad_exception::bad_exception 14161->14162 14162->14169 14163 6cf9b204 CloseHandle 14163->14169 14164 6cf9afd1 NtCreateThreadEx 14164->14169 14165 6cf9a551 CreateProcessW 14165->14169 14166 6cf9a885 NtAllocateVirtualMemory 14166->14169 14167 6cf9b6f2 NtWriteVirtualMemory 14167->14169 14168 6cf9b193 NtSetContextThread NtResumeThread 14168->14169 14169->14143 14169->14144 14169->14145 14169->14146 14169->14147 14169->14148 14169->14151 14169->14152 14169->14153 14169->14154 14169->14155 14169->14156 14169->14158 14169->14160 14169->14161 14169->14163 14169->14164 14169->14165 14169->14166 14169->14167 14169->14168 14187 6cf8f5b0 14169->14187 14173 6cf8f7de __InternalCxxFrameHandler 14170->14173 14171 6cf90c4f CloseHandle CloseHandle 14171->14173 14172 6cf90b71 CloseHandle 14172->14173 14173->14171 14173->14172 14174 6cf90886 VirtualProtect 14173->14174 14175 6cf90337 MapViewOfFile 14173->14175 14176 6cf8ff06 K32GetModuleInformation 14173->14176 14177 6cf90c82 14173->14177 14180 6cf90223 CloseHandle 14173->14180 14181 6cf90df3 VirtualProtect 14173->14181 14182 6cf8ff5a GetModuleFileNameA CreateFileA 14173->14182 14183 6cf909ba VirtualProtect 14173->14183 14184 6cf900d4 CreateFileMappingA 14173->14184 14185 6cf8fd95 std::bad_exception::bad_exception 14173->14185 14174->14173 14175->14173 14176->14173 14178 6cfaf3e0 CatchGuardHandler 5 API calls 14177->14178 14179 6cf90c8c 14178->14179 14179->14169 14180->14173 14181->14173 14182->14173 14183->14173 14184->14173 14186 6cf8fdb5 GetModuleHandleA 14185->14186 14186->14173 14188 6cf8f60f 14187->14188 14189 6cfaf3e0 CatchGuardHandler 5 API calls 14188->14189 14190 6cf8f78d 14189->14190 14190->14169
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Virtual$Memory$Thread$Write$ContextCreate$AllocAllocateProcessWindow$CloseConsoleHandleResumeShow
                                    • String ID: #jx$#jx$'jb$+!eH$4NWV$4NWV$@$@Cq$@Cq$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe$D$D[$GSS$K@}$K@}$R"P$V!"$Zr^X$^+F$^+F$kernel32.dll$ntdll.dll$ou0T$ou0T$>6Q
                                    • API String ID: 2165972277-1034515867
                                    • Opcode ID: 02f2da9070bf3b23cb80ff8901c844fa622866cdb4a1d92c94c3fd367c06f623
                                    • Instruction ID: 0f97b4ed70c4f4a43fb6fc5ce4fc764f0561d0610033e62975bfb5c82849af9a
                                    • Opcode Fuzzy Hash: 02f2da9070bf3b23cb80ff8901c844fa622866cdb4a1d92c94c3fd367c06f623
                                    • Instruction Fuzzy Hash: D3A33436A44614CFEF14CE7CCD993CA7BF2AB86355F105699D418DBB94C33A8A888F41
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CreateHandleModuleProtectVirtual$CloseCurrentMappingNameProcess
                                    • String ID: i$ i$@$YO>S
                                    • API String ID: 3382675095-2381544164
                                    • Opcode ID: 2b05203464e846fd63a3311ec0fe625d67506fe08e1e36ebc7eee997f5a08693
                                    • Instruction ID: 6afe4cebec5df3a2778f39870beb06a24bf059e29918e96a0a3ca585bb3d032d
                                    • Opcode Fuzzy Hash: 2b05203464e846fd63a3311ec0fe625d67506fe08e1e36ebc7eee997f5a08693
                                    • Instruction Fuzzy Hash: 6BB2F032A062158FEF18CF6CC9953DEBBF1AF4A310F10819AD458EB755C6758E898F42

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1194 6cf91870-6cf91903 GetModuleHandleW call 6cf90ec0 call 6cfb01f0 NtQueryInformationProcess 1199 6cf9190a-6cf91915 1194->1199 1200 6cf9191b-6cf91928 1199->1200 1201 6cf91cfe-6cf91d6c 1199->1201 1204 6cf9192e-6cf9193b 1200->1204 1205 6cf91d71-6cf91dc0 1200->1205 1203 6cf91e5c 1201->1203 1203->1199 1207 6cf91941-6cf9194e 1204->1207 1208 6cf91e43-6cf91e4a 1204->1208 1205->1203 1210 6cf91c10-6cf91c26 1207->1210 1211 6cf91954-6cf91961 1207->1211 1208->1203 1210->1203 1213 6cf91c9e-6cf91ced 1211->1213 1214 6cf91967-6cf91974 1211->1214 1213->1203 1216 6cf9197a-6cf91987 1214->1216 1217 6cf91e4f-6cf91e55 1214->1217 1219 6cf9198d-6cf9199a 1216->1219 1220 6cf91b70-6cf91b77 1216->1220 1217->1203 1222 6cf91dd1-6cf91dd8 1219->1222 1223 6cf919a0-6cf919ad 1219->1223 1220->1203 1222->1203 1225 6cf919b3-6cf919c0 1223->1225 1226 6cf91cf2-6cf91cf9 1223->1226 1228 6cf91aa1-6cf91aea 1225->1228 1229 6cf919c6-6cf919d3 1225->1229 1226->1203 1228->1203 1231 6cf919d9-6cf919e6 1229->1231 1232 6cf91aef-6cf91b6b 1229->1232 1234 6cf91dfc-6cf91e09 1231->1234 1235 6cf919ec-6cf919f9 1231->1235 1232->1203 1234->1203 1237 6cf91b7c-6cf91bc5 1235->1237 1238 6cf919ff-6cf91a0c 1235->1238 1237->1203 1240 6cf91bca-6cf91c0b 1238->1240 1241 6cf91a12-6cf91a1f 1238->1241 1240->1203 1243 6cf91a25-6cf91a32 1241->1243 1244 6cf91e37-6cf91e3e 1241->1244 1246 6cf91a38-6cf91a45 1243->1246 1247 6cf91df0-6cf91df7 1243->1247 1244->1203 1249 6cf91e28-6cf91e32 1246->1249 1250 6cf91a4b-6cf91a58 1246->1250 1247->1203 1249->1203 1252 6cf91a5e-6cf91a6b 1250->1252 1253 6cf91dc5-6cf91dcc 1250->1253 1255 6cf91c2b-6cf91c99 1252->1255 1256 6cf91a71-6cf91a7e 1252->1256 1253->1203 1255->1203 1258 6cf91ddd-6cf91deb 1256->1258 1259 6cf91a84-6cf91a91 1256->1259 1258->1203 1261 6cf91e0e-6cf91e27 call 6cfaf3e0 1259->1261 1262 6cf91a97-6cf91a9c 1259->1262 1262->1203
                                    APIs
                                    • GetModuleHandleW.KERNEL32 ref: 6CF9188E
                                    • NtQueryInformationProcess.NTDLL ref: 6CF918FB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: HandleInformationModuleProcessQuery
                                    • String ID: NtQueryInformationProcess$Z)k$ntdll.dll$p:{L$uBH^
                                    • API String ID: 2776635927-1553518823
                                    • Opcode ID: 620459e1f1d8ad4d4f14930bd6be44247de63a7e9c109f32b99fab55fa4ab1ff
                                    • Instruction ID: d44514d76591c2c0237a99d29a421a4d9a8452f1d92ce10cdd9dc30fdb4c1ef3
                                    • Opcode Fuzzy Hash: 620459e1f1d8ad4d4f14930bd6be44247de63a7e9c109f32b99fab55fa4ab1ff
                                    • Instruction Fuzzy Hash: A3E10336A452058FEF08DFBCC5913CEBBFAAF46354F208129D425E7B54C63AD94A8B41

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1266 6cfaf8c8-6cfaf8db call 6cfaff00 1269 6cfaf8dd-6cfaf8df 1266->1269 1270 6cfaf8e1-6cfaf903 call 6cfaf432 1266->1270 1271 6cfaf94a-6cfaf959 1269->1271 1274 6cfaf970-6cfaf989 call 6cfafdd7 call 6cfaff00 1270->1274 1275 6cfaf905-6cfaf948 call 6cfaf4fd call 6cfb003e call 6cfb00a5 call 6cfaf95d call 6cfaf69e call 6cfaf96a 1270->1275 1286 6cfaf99a-6cfaf9a1 1274->1286 1287 6cfaf98b-6cfaf991 1274->1287 1275->1271 1290 6cfaf9ad-6cfaf9c1 dllmain_raw 1286->1290 1291 6cfaf9a3-6cfaf9a6 1286->1291 1287->1286 1289 6cfaf993-6cfaf995 1287->1289 1293 6cfafa73-6cfafa82 1289->1293 1296 6cfafa6a-6cfafa71 1290->1296 1297 6cfaf9c7-6cfaf9d8 dllmain_crt_dispatch 1290->1297 1291->1290 1294 6cfaf9a8-6cfaf9ab 1291->1294 1298 6cfaf9de-6cfaf9f0 call 6cf9b7e0 1294->1298 1296->1293 1297->1296 1297->1298 1305 6cfafa19-6cfafa1b 1298->1305 1306 6cfaf9f2-6cfaf9f4 1298->1306 1308 6cfafa1d-6cfafa20 1305->1308 1309 6cfafa22-6cfafa33 dllmain_crt_dispatch 1305->1309 1306->1305 1307 6cfaf9f6-6cfafa14 call 6cf9b7e0 call 6cfaf8c8 dllmain_raw 1306->1307 1307->1305 1308->1296 1308->1309 1309->1296 1311 6cfafa35-6cfafa67 dllmain_raw 1309->1311 1311->1296
                                    APIs
                                    • __RTC_Initialize.LIBCMT ref: 6CFAF90F
                                    • ___scrt_uninitialize_crt.LIBCMT ref: 6CFAF929
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Initialize___scrt_uninitialize_crt
                                    • String ID:
                                    • API String ID: 2442719207-0
                                    • Opcode ID: df09fe234e42a3971a6e36264e626ea210ef5c5f8eff8f5a0023555861ef27ae
                                    • Instruction ID: cae993bb429e09dc916befa03a99ae8d15f6894633be82aced5ed232108bb3a8
                                    • Opcode Fuzzy Hash: df09fe234e42a3971a6e36264e626ea210ef5c5f8eff8f5a0023555861ef27ae
                                    • Instruction Fuzzy Hash: D941E272E01214EFDBA18FE9CC41BDEBAB4EF45BA8F114119E8146FA50D77049079BA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1316 6cfaf978-6cfaf989 call 6cfaff00 1319 6cfaf99a-6cfaf9a1 1316->1319 1320 6cfaf98b-6cfaf991 1316->1320 1322 6cfaf9ad-6cfaf9c1 dllmain_raw 1319->1322 1323 6cfaf9a3-6cfaf9a6 1319->1323 1320->1319 1321 6cfaf993-6cfaf995 1320->1321 1324 6cfafa73-6cfafa82 1321->1324 1326 6cfafa6a-6cfafa71 1322->1326 1327 6cfaf9c7-6cfaf9d8 dllmain_crt_dispatch 1322->1327 1323->1322 1325 6cfaf9a8-6cfaf9ab 1323->1325 1328 6cfaf9de-6cfaf9f0 call 6cf9b7e0 1325->1328 1326->1324 1327->1326 1327->1328 1331 6cfafa19-6cfafa1b 1328->1331 1332 6cfaf9f2-6cfaf9f4 1328->1332 1334 6cfafa1d-6cfafa20 1331->1334 1335 6cfafa22-6cfafa33 dllmain_crt_dispatch 1331->1335 1332->1331 1333 6cfaf9f6-6cfafa14 call 6cf9b7e0 call 6cfaf8c8 dllmain_raw 1332->1333 1333->1331 1334->1326 1334->1335 1335->1326 1337 6cfafa35-6cfafa67 dllmain_raw 1335->1337 1337->1326
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: dllmain_raw$dllmain_crt_dispatch
                                    • String ID:
                                    • API String ID: 3136044242-0
                                    • Opcode ID: c68349687f8d83fb2d125a57d45bfa15f7067214bfc320533343faf40f97c13e
                                    • Instruction ID: bf3029db8a7c8f9e0ba4394b48ef5a22ca32c3adaebf33f9618c5bda28bc53b5
                                    • Opcode Fuzzy Hash: c68349687f8d83fb2d125a57d45bfa15f7067214bfc320533343faf40f97c13e
                                    • Instruction Fuzzy Hash: AC216B72E01219EEDBA58E99CC40BEFBA79EB85B98F114115F8146EA10D3308D039BE0

                                    Control-flow Graph

                                    APIs
                                    • GetEnvironmentStringsW.KERNEL32 ref: 6CFB6FC6
                                      • Part of subcall function 6CFB6F18: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CFB90BF,?,00000000,-00000008), ref: 6CFB6F79
                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CFB6FFE
                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CFB701E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                    • String ID:
                                    • API String ID: 158306478-0
                                    • Opcode ID: 958f70fc8d6652e3dde188284a0dc305a5c5137616a985ce52c5111a28a81ed0
                                    • Instruction ID: 10b8c2cd6a6ff4e74fe7a36ddc1e731d3ecdecedd25a6c0fadfdae2bb3ceb333
                                    • Opcode Fuzzy Hash: 958f70fc8d6652e3dde188284a0dc305a5c5137616a985ce52c5111a28a81ed0
                                    • Instruction Fuzzy Hash: E911EDE2A156097EAB1617778CC9CAF7A6CEF866D87040026F401F1640FB34DE0582B1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1368 6cfaf7c1-6cfaf7cf call 6cfaff00 call 6cfaf52d 1372 6cfaf7d4-6cfaf7d7 1368->1372 1373 6cfaf8ae 1372->1373 1374 6cfaf7dd-6cfaf7f5 call 6cfaf432 1372->1374 1376 6cfaf8b0-6cfaf8bf 1373->1376 1378 6cfaf7fb-6cfaf80c call 6cfaf48f 1374->1378 1379 6cfaf8c0-6cfaf8c7 call 6cfafdd7 1374->1379 1384 6cfaf85b-6cfaf869 call 6cfaf8a4 1378->1384 1385 6cfaf80e-6cfaf830 call 6cfb0079 call 6cfb0032 call 6cfb0056 call 6cfb4f4c 1378->1385 1384->1373 1390 6cfaf86b-6cfaf875 call 6cfb0073 1384->1390 1385->1384 1404 6cfaf832-6cfaf839 call 6cfaf464 1385->1404 1396 6cfaf896-6cfaf89f 1390->1396 1397 6cfaf877-6cfaf880 call 6cfaf5ed 1390->1397 1396->1376 1397->1396 1403 6cfaf882-6cfaf894 1397->1403 1403->1396 1404->1384 1408 6cfaf83b-6cfaf858 call 6cfb4f21 1404->1408 1408->1384
                                    APIs
                                    • __RTC_Initialize.LIBCMT ref: 6CFAF80E
                                      • Part of subcall function 6CFB0032: InitializeSListHead.KERNEL32(6D0128F8,6CFAF818,6CFC3430,00000010,6CFAF7A9,?,?,?,6CFAF9D1,?,00000001,?,?,00000001,?,6CFC3478), ref: 6CFB0037
                                    • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6CFAF878
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                    • String ID:
                                    • API String ID: 3231365870-0
                                    • Opcode ID: bf4e8d0ba2fbdde64514db122d9262bd445b5682c64b187992ac84c4055e503f
                                    • Instruction ID: 628794ed0a2d772984373e1be495ff0294169a72a76e8e530413d0c1b1049a45
                                    • Opcode Fuzzy Hash: bf4e8d0ba2fbdde64514db122d9262bd445b5682c64b187992ac84c4055e503f
                                    • Instruction Fuzzy Hash: EC210F7264A341DEEB99ABF589027DDB7609F023ADF200919C4A43FEC1CB72054AC766

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1411 6cfb75bb-6cfb75c0 1412 6cfb75c2-6cfb75da 1411->1412 1413 6cfb75e8-6cfb75f1 1412->1413 1414 6cfb75dc-6cfb75e0 1412->1414 1416 6cfb7603 1413->1416 1417 6cfb75f3-6cfb75f6 1413->1417 1414->1413 1415 6cfb75e2-6cfb75e6 1414->1415 1418 6cfb765d-6cfb7661 1415->1418 1421 6cfb7605-6cfb7612 GetStdHandle 1416->1421 1419 6cfb75f8-6cfb75fd 1417->1419 1420 6cfb75ff-6cfb7601 1417->1420 1418->1412 1422 6cfb7667-6cfb766a 1418->1422 1419->1421 1420->1421 1423 6cfb763f-6cfb7651 1421->1423 1424 6cfb7614-6cfb7616 1421->1424 1423->1418 1426 6cfb7653-6cfb7656 1423->1426 1424->1423 1425 6cfb7618-6cfb7621 GetFileType 1424->1425 1425->1423 1427 6cfb7623-6cfb762c 1425->1427 1426->1418 1428 6cfb762e-6cfb7632 1427->1428 1429 6cfb7634-6cfb7637 1427->1429 1428->1418 1429->1418 1430 6cfb7639-6cfb763d 1429->1430 1430->1418
                                    APIs
                                    • GetStdHandle.KERNEL32(000000F6), ref: 6CFB7607
                                    • GetFileType.KERNELBASE(00000000), ref: 6CFB7619
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileHandleType
                                    • String ID:
                                    • API String ID: 3000768030-0
                                    • Opcode ID: 096a357b4be58dd7035699c34f8a19af7e8a360e22d6cf5f02c4e3eda41a4062
                                    • Instruction ID: f70562b359938bcaf24b521585b5137b1aca93141f069e0b3949fe5507a8c1c8
                                    • Opcode Fuzzy Hash: 096a357b4be58dd7035699c34f8a19af7e8a360e22d6cf5f02c4e3eda41a4062
                                    • Instruction Fuzzy Hash: 0811D33260875246DB304E3F8CC8713BAB6A747238B35071FD0B6A6DE1C330E486E665

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1431 6cfb7ee7-6cfb7ef3 1432 6cfb7f25-6cfb7f30 call 6cfb59f0 1431->1432 1433 6cfb7ef5-6cfb7ef7 1431->1433 1441 6cfb7f32-6cfb7f34 1432->1441 1435 6cfb7ef9-6cfb7efa 1433->1435 1436 6cfb7f10-6cfb7f21 RtlAllocateHeap 1433->1436 1435->1436 1437 6cfb7efc-6cfb7f03 call 6cfb8876 1436->1437 1438 6cfb7f23 1436->1438 1437->1432 1443 6cfb7f05-6cfb7f0e call 6cfb4e78 1437->1443 1438->1441 1443->1432 1443->1436
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,6CFB68C3,?,?,6CFB68C3,00000220,?,00000000,?), ref: 6CFB7F19
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: 6928d9080850ac986b3960da83bf712c0e168d0c4497cb6efb9411eb88c9cfb7
                                    • Instruction ID: 05d5aee9a0962ef84f3612ee206e2774d6e93e3579ba2e66b67366387bd07429
                                    • Opcode Fuzzy Hash: 6928d9080850ac986b3960da83bf712c0e168d0c4497cb6efb9411eb88c9cfb7
                                    • Instruction Fuzzy Hash: 63E0653264521557EA11277B8C057877A5C9F423B4F214163BC54B6D94DB30D800C2F9

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1511 6cf8e130-6cf8e45a call 6cf9d0e0 * 2 call 6cf9cc00 call 6cf8a320 call 6cf9cc00 call 6cf8ab20 call 6cf8aba0 call 6cf8ae70 call 6cf9cc00 * 2 call 6cf8af80 call 6cf8bb80 call 6cf8bf60 call 6cf9cc00 call 6cf8c6f0 call 6cf9cc00 * 3 1548 6cf8e464-6cf8e475 1511->1548 1549 6cf8e47b-6cf8e48b 1548->1549 1550 6cf8f1e7-6cf8f59e call 6cf9cc00 call 6cf89340 call 6cf9cd60 call 6cf81010 call 6cf9cc00 * 2 call 6cf81130 call 6cf9cc00 * 2 call 6cf82650 call 6cf9cc00 * 2 call 6cf82930 call 6cf9cc00 call 6cf83190 call 6cf83740 call 6cf9cd60 call 6cf9cc00 * 5 call 6cf84880 1548->1550 1554 6cf8e98d-6cf8e997 1549->1554 1555 6cf8e491-6cf8e4a1 1549->1555 1556 6cf8f5a8 1550->1556 1554->1556 1560 6cf8ea0a-6cf8ee32 call 6cf9cc00 call 6cf89340 call 6cf9cd60 call 6cf81010 call 6cf9cc00 * 2 call 6cf81130 call 6cf9cc00 * 2 call 6cf82650 call 6cf9cc00 * 2 call 6cf82930 call 6cf9cc00 call 6cf83190 call 6cf83740 call 6cf9cd60 call 6cf9cc00 * 5 call 6cf84880 1555->1560 1561 6cf8e4a7-6cf8e4b7 1555->1561 1556->1548 1560->1556 1567 6cf8e4bd-6cf8e4cd 1561->1567 1568 6cf8ee37-6cf8ee59 call 6cfaf3e0 1561->1568 1576 6cf8e99c-6cf8ea05 1567->1576 1577 6cf8e4d3-6cf8e4e3 1567->1577 1576->1556 1581 6cf8e4e9-6cf8e4f9 1577->1581 1582 6cf8ee5a-6cf8f1e2 call 6cf8d020 call 6cf9cc00 call 6cf8da60 call 6cf85d80 call 6cf85e40 call 6cf9cc00 * 2 call 6cf861e0 call 6cf9cd60 call 6cf9cc00 call 6cf86350 call 6cf9cd60 call 6cf86bc0 call 6cf9cc00 call 6cf87fc0 call 6cf9cc00 call 6cf888c0 call 6cf9cc00 * 2 call 6cf88c50 call 6cf9cc00 1577->1582 1589 6cf8e58d-6cf8e988 call 6cf8d020 call 6cf9cc00 call 6cf8da60 call 6cf85d80 call 6cf85e40 call 6cf9cc00 * 2 call 6cf861e0 call 6cf9cd60 call 6cf9cc00 call 6cf86350 call 6cf9cd60 call 6cf86bc0 call 6cf9cc00 call 6cf87fc0 call 6cf9cc00 call 6cf888c0 call 6cf9cc00 * 2 call 6cf88c50 call 6cf9cc00 1581->1589 1590 6cf8e4ff-6cf8e50f 1581->1590 1582->1556 1589->1556 1599 6cf8e51f-6cf8e588 1590->1599 1600 6cf8e515-6cf8e51a 1590->1600 1599->1556 1600->1556
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: @G@$`;@$bhhzeys$cuhodurk$eykgeeloljfhiuotxnrinwdtzdupdsnabbqeqstrehlgssbidqqzqlyv$uxsscjlytmxqvoswtotwbefomblgynufjcrvtasgkoaeqwigkbz$wqaiosmifyaaqakduqebfudtlrjisxhkvthfguphpuqqgyqacuy$xqzcuglyapbnihbg$xwajvyrnfulohgozenarroarrrowosfjvvivgplvhffoebidlqgaylskvyikefsepfszjvrqmyx$zcqfqqnntuelfghyrwojvxbgpqreqdylyo$zpgoamdtvdksltzhcsdeahaetomglmbhuhlbpgijwoxywmwzqhbktexvwycbqwyswoqvzuzibkpvhdlbhhnv$9@$c@$@
                                    • API String ID: 0-796465288
                                    • Opcode ID: 57f3f00ff9deeaef95640a15d97ce2af029b2016051e3268afab1007c62dd03b
                                    • Instruction ID: 894646637c877a7fbe8935ccf7e8cac79512d9a332735fbb487b346d243bb06e
                                    • Opcode Fuzzy Hash: 57f3f00ff9deeaef95640a15d97ce2af029b2016051e3268afab1007c62dd03b
                                    • Instruction Fuzzy Hash: CEC21CB0A112548FEB14EF28C996B9A7BF0AF45304F0281D8D4099F765DB759D88CF92

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1875 6cf93ba0-6cf93bb7 1876 6cf93bbe-6cf93bc9 1875->1876 1877 6cf9425f-6cf94266 1876->1877 1878 6cf93bcf-6cf93bdc 1876->1878 1880 6cf94312 1877->1880 1881 6cf9412a-6cf9413b 1878->1881 1882 6cf93be2-6cf93bef 1878->1882 1880->1876 1881->1880 1884 6cf93bf5-6cf93c02 1882->1884 1885 6cf94097-6cf9410d call 6cf9e000 1882->1885 1888 6cf93c08-6cf93c15 1884->1888 1889 6cf942c6-6cf942d5 call 6cf9e000 1884->1889 1885->1880 1894 6cf941bb-6cf9425a TextOutA 1888->1894 1895 6cf93c1b-6cf93c28 1888->1895 1889->1880 1894->1880 1897 6cf93e7f-6cf93f03 call 6cf9d800 1895->1897 1898 6cf93c2e-6cf93c3b 1895->1898 1897->1880 1902 6cf93f08-6cf93f0f 1898->1902 1903 6cf93c41-6cf93c4e 1898->1903 1902->1880 1905 6cf9416d-6cf941b6 1903->1905 1906 6cf93c54-6cf93c61 1903->1906 1905->1880 1908 6cf942da-6cf9430b TextOutA 1906->1908 1909 6cf93c67-6cf93c74 1906->1909 1908->1880 1911 6cf93c7a-6cf93c87 1909->1911 1912 6cf93e31-6cf93e7a 1909->1912 1914 6cf93f7d-6cf9400d call 6cf9db20 call 6cf9df40 1911->1914 1915 6cf93c8d-6cf93c9a 1911->1915 1912->1880 1914->1880 1919 6cf94140-6cf94156 1915->1919 1920 6cf93ca0-6cf93cad 1915->1920 1919->1880 1924 6cf94298-6cf942c1 call 6cf9db20 call 6cf9df40 1920->1924 1925 6cf93cb3-6cf93cc0 1920->1925 1924->1880 1928 6cf94112-6cf94119 1925->1928 1929 6cf93cc6-6cf93cd3 1925->1929 1928->1880 1934 6cf94049-6cf94092 1929->1934 1935 6cf93cd9-6cf93ce6 1929->1935 1934->1880 1937 6cf93cec-6cf93cf9 1935->1937 1938 6cf93f2f-6cf93f78 1935->1938 1940 6cf93cff-6cf93d0c 1937->1940 1941 6cf94012-6cf94019 1937->1941 1938->1880 1943 6cf9426b-6cf9427a call 6cfaf3e0 1940->1943 1944 6cf93d12-6cf93d1f 1940->1944 1941->1880 1947 6cf9427b-6cf94293 call 6cf9d800 1944->1947 1948 6cf93d25-6cf93d32 1944->1948 1947->1880 1952 6cf93d38-6cf93d45 1948->1952 1953 6cf9415b-6cf94168 1948->1953 1956 6cf93d4b-6cf93d58 1952->1956 1957 6cf9411e-6cf94125 1952->1957 1953->1880 1959 6cf93dfd-6cf93e2c call 6cf9d5b0 call 6cf9d640 1956->1959 1960 6cf93d5e-6cf93d6b 1956->1960 1957->1880 1959->1880 1964 6cf93d71-6cf93d7e 1960->1964 1965 6cf93f14-6cf93f2a 1960->1965 1968 6cf9401e-6cf94044 FillRect 1964->1968 1969 6cf93d84-6cf93d91 1964->1969 1965->1880 1968->1880 1972 6cf93da1-6cf93df8 call 6cf9dc10 FillRect 1969->1972 1973 6cf93d97-6cf93d9c 1969->1973 1972->1880 1973->1880
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: );0}$Game Over!
                                    • API String ID: 0-1869261878
                                    • Opcode ID: 8fffa93c51ff5cdb7f00fa964f8bac69d593606855c2b54d755abca90c226267
                                    • Instruction ID: b2049b501ee122c8f9bd66a485681edb2670122dd2c9d2160142f98803d30906
                                    • Opcode Fuzzy Hash: 8fffa93c51ff5cdb7f00fa964f8bac69d593606855c2b54d755abca90c226267
                                    • Instruction Fuzzy Hash: 4A02FF76A042058FEF08CFBCD5D57DEBBF2AB5A308F208519E42597BA4C73599099F01
                                    APIs
                                    • IsProcessorFeaturePresent.KERNEL32(00000017,00000000), ref: 6CFAFDE3
                                    • IsDebuggerPresent.KERNEL32 ref: 6CFAFEAF
                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CFAFEC8
                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 6CFAFED2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                    • String ID:
                                    • API String ID: 254469556-0
                                    • Opcode ID: e8a67b6c9a1cfb0315083f154cf3e7bc3968ba3edd65ee902018723d8cc2802e
                                    • Instruction ID: adb6858638557f0348e5b3643b9e2c148a75988c725b5cf212d9f97dfb818c5c
                                    • Opcode Fuzzy Hash: e8a67b6c9a1cfb0315083f154cf3e7bc3968ba3edd65ee902018723d8cc2802e
                                    • Instruction Fuzzy Hash: CC3128B5D05218DBDF61DFA4D9897CDBBB8BF08304F1041AAE40DAB240EBB09A85CF45
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: a5$a5$|ym$|ym
                                    • API String ID: 0-2035916800
                                    • Opcode ID: ac0b6b4903e0f3c9bae346a417e6af6f6f035f52b93589bdc39280b4fda1e69e
                                    • Instruction ID: 9c1e8f3a3ed15a5b93ac8e9b2c59fc3a10d7bd7be1d6b1c9719a8b629196effc
                                    • Opcode Fuzzy Hash: ac0b6b4903e0f3c9bae346a417e6af6f6f035f52b93589bdc39280b4fda1e69e
                                    • Instruction Fuzzy Hash: 97628AB6A04244CFCB04CFECD9956DEBBF1AF4A314F118129E816EB764D635E90ACB11
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: Ft5$Ft5$LSfl$Z}S-
                                    • API String ID: 0-2061360852
                                    • Opcode ID: 3a19732ae954280a8757bc5082dbe54715d27852f355da0f834127bf76cb80cf
                                    • Instruction ID: 58ea9f29a8279e71848cc658a20252ee2f745205221ef2b19ff292285e8b2ada
                                    • Opcode Fuzzy Hash: 3a19732ae954280a8757bc5082dbe54715d27852f355da0f834127bf76cb80cf
                                    • Instruction Fuzzy Hash: 2E22E476A14605CFCF04CEFCD9D53DEBBF2AB4B364F208619E422E7B94C62599068B01
                                    APIs
                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6CFB3E15
                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6CFB3E1F
                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6CFB3E2C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                    • String ID:
                                    • API String ID: 3906539128-0
                                    • Opcode ID: 88dbdece7557483a9a6a9437b381f6ff9ca78d5d02cb8636bbfb4b27fb3a7c33
                                    • Instruction ID: 1fce79840886cbd14e92c6df65abbf7373ce8dd6bb963ffa38b93ebade747e16
                                    • Opcode Fuzzy Hash: 88dbdece7557483a9a6a9437b381f6ff9ca78d5d02cb8636bbfb4b27fb3a7c33
                                    • Instruction Fuzzy Hash: 2031E6B494121DABCB61DF65D8887CDBBB8BF08314F5041DAE41CA7250EB709B89CF45
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: w}$S$S
                                    • API String ID: 0-117279510
                                    • Opcode ID: 713498fbba12c643f80b347aba861b4dc8c77fc3a8d9eab5de66291528ede333
                                    • Instruction ID: 6b6ea1c0e1dca5f07832f3eb3bdacaa9662434ba0b807422d4e5e1edcb1aed5f
                                    • Opcode Fuzzy Hash: 713498fbba12c643f80b347aba861b4dc8c77fc3a8d9eab5de66291528ede333
                                    • Instruction Fuzzy Hash: CB42DD76E442048FDF04CFACC5957DEBBF2AB4A314F209519D829EBB94D636990ACF01
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: QU|$QU|$Y.`G
                                    • API String ID: 0-3762515504
                                    • Opcode ID: f28fc7ed0f2a901e6cb4f9f3c0b367680275b5d00f72e37c72f858b628d33ace
                                    • Instruction ID: 213adeadc379b7e045bd309a8504b38ee6b2de7845a10c3ba299d07c04b64c4d
                                    • Opcode Fuzzy Hash: f28fc7ed0f2a901e6cb4f9f3c0b367680275b5d00f72e37c72f858b628d33ace
                                    • Instruction Fuzzy Hash: 02226976E04245CFCB08DFECC5A1ADEBBF6EB4A354F204119E815EB764C636A806CB45
                                    APIs
                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 6CFA78EF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_exception_destroy
                                    • String ID:
                                    • API String ID: 4194217158-0
                                    • Opcode ID: d04d7cd86f95a710087b6384f5da4281edcc00731a8cde8655f7f2d05197b483
                                    • Instruction ID: 92d2389f874f0b153ac887b996307dd0fd4c3baabe7b7f3e90e87a307289af2c
                                    • Opcode Fuzzy Hash: d04d7cd86f95a710087b6384f5da4281edcc00731a8cde8655f7f2d05197b483
                                    • Instruction Fuzzy Hash: 2861F977A415018FDF08CEFCC5A67DF7BF69747361F20921AC921DBBA8C226850A8750
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: ?=+$?=+
                                    • API String ID: 0-1499103835
                                    • Opcode ID: 335a8da96aa86d89b54891ba8c05845c4943fce2584fa371249d8e9ecdd1749a
                                    • Instruction ID: 67101196ea50b7bb240a7ebdf4f762464e4ca854bbed3b05e4c0a91872002eab
                                    • Opcode Fuzzy Hash: 335a8da96aa86d89b54891ba8c05845c4943fce2584fa371249d8e9ecdd1749a
                                    • Instruction Fuzzy Hash: 2232E137A54105DFCF04CEFCE9C57CEBBF2AB46355F20A215A821DBB54DB29890A8B04
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: n})$n})
                                    • API String ID: 0-2079505196
                                    • Opcode ID: 56ca91840024780233499f339759aeaa71fd282bb103824ee1516a6a172d5dfb
                                    • Instruction ID: 23f1a3b843e3034a2c4cec0408000b4f7702a3a13434cdfdda2c2dab4dc11d43
                                    • Opcode Fuzzy Hash: 56ca91840024780233499f339759aeaa71fd282bb103824ee1516a6a172d5dfb
                                    • Instruction Fuzzy Hash: 9922B076A45205CFCF08CEECC9917DEBBF2EB4A314F109529D815DBB94C6369A0ACB01
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: xzwgxrqwpaeddmh$ypnhmsjacpencdisyeandsmakfxhgphvnqjparg
                                    • API String ID: 0-3231256247
                                    • Opcode ID: efe11c7d61149e7b84754b229ef829089fd642f6e83c6abf49b216befda9819e
                                    • Instruction ID: 55bffb2034b795a8e4a520bdc71f5fcd0884df5c100fc90239ca3e4a987417d4
                                    • Opcode Fuzzy Hash: efe11c7d61149e7b84754b229ef829089fd642f6e83c6abf49b216befda9819e
                                    • Instruction Fuzzy Hash: C622C372625B008FCB24CE3CC99579B7BF1BB4A724B105B1DE4A6CBF94D725E8098B41
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: (3+Z$]
                                    • API String ID: 0-1318497048
                                    • Opcode ID: deace9399844f22f1f035f279f480db608a20fb8f70f0c26c26f31829ec1093c
                                    • Instruction ID: 8762435a4473f9de162db63546863ac885c0647c32cc99e69aa2581ac2076ade
                                    • Opcode Fuzzy Hash: deace9399844f22f1f035f279f480db608a20fb8f70f0c26c26f31829ec1093c
                                    • Instruction Fuzzy Hash: 3691F5B6A442098FCF08DEFCC4A53EFBBF2AB4A324F105519D811DB795C63A590A8B51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: GsNd$GsNd
                                    • API String ID: 0-3110361080
                                    • Opcode ID: a39b891d601df62d38a94dd27f7e7d0ce1021530736e1c41d9cca4dd93a8aef3
                                    • Instruction ID: 8fe387a905411c630cbe77fbc1501d7d9d58558c93293c2213533f5efa4112bd
                                    • Opcode Fuzzy Hash: a39b891d601df62d38a94dd27f7e7d0ce1021530736e1c41d9cca4dd93a8aef3
                                    • Instruction Fuzzy Hash: 709180B6A54205CFCB04CFBCC9917DEBBF2EB4A364F105219E921EBB94C735590A8B11
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: rAB#$rAB#
                                    • API String ID: 0-1807774871
                                    • Opcode ID: 48bd649f575a7063960d5e8054ecb3561da8876df10f665ada4297675e20eaad
                                    • Instruction ID: fb8a1f3ec770051701c4c62a4a4fb736cc99c7e56960ae20eac64952b6f4366a
                                    • Opcode Fuzzy Hash: 48bd649f575a7063960d5e8054ecb3561da8876df10f665ada4297675e20eaad
                                    • Instruction Fuzzy Hash: AF713576A441068FEF04DE7CC9E63EF7BF2EB57360F201219D9219BB94C62A4509EB50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: Af
                                    • API String ID: 0-370506303
                                    • Opcode ID: aa452d961d1c950397f13cbda1b92bfcbe6878c6608fb05c663498fbc2b7fd60
                                    • Instruction ID: 83031ea4fd1c2a6f84351f11a298dd1b0db1f3c23b1a51a6efe07cb4caacffd9
                                    • Opcode Fuzzy Hash: aa452d961d1c950397f13cbda1b92bfcbe6878c6608fb05c663498fbc2b7fd60
                                    • Instruction Fuzzy Hash: 2A42C172A45244CFCB08CEFCE9D53DEBBF2AB4A354F248116E412DB764C676994B8B00
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: Bp0
                                    • API String ID: 0-3634831391
                                    • Opcode ID: 6b622a0c88f5ba46ffadb53ea9ffb78fa172335ceb95a86a4c86e13e83cbc479
                                    • Instruction ID: 69be9df47b69ae76f6efdcf5628594d818e560e9f69777132ccff4371788ca3b
                                    • Opcode Fuzzy Hash: 6b622a0c88f5ba46ffadb53ea9ffb78fa172335ceb95a86a4c86e13e83cbc479
                                    • Instruction Fuzzy Hash: 27329E76E442058FEF04CEACC5957CEBBF9EB4A354F208529D829EBB54C236D946CB01
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: V?Xt
                                    • API String ID: 0-3307163574
                                    • Opcode ID: 6c8cf3a8937a94e7e6596f25bb2d6623c8ac89c155b8b1214b89b3bd4b2b9bf0
                                    • Instruction ID: 9b819a15b24754f6750d794ee9b40c781342116e7133100d355904ad93a3e97c
                                    • Opcode Fuzzy Hash: 6c8cf3a8937a94e7e6596f25bb2d6623c8ac89c155b8b1214b89b3bd4b2b9bf0
                                    • Instruction Fuzzy Hash: 0432DD76E542058FEF08DEBCD9953DE7BF2AB4A394F108115E421EBBA4C73688098F45
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: %@So
                                    • API String ID: 0-2326364046
                                    • Opcode ID: e7888ff9c0f02e3a8de56271d423ac28d2fc0b3c3a637c3d7311dd4293aa8308
                                    • Instruction ID: cc28531790e9bb9828835310428c72e624c6e9a50893fb6f9b3fdd5748978d5a
                                    • Opcode Fuzzy Hash: e7888ff9c0f02e3a8de56271d423ac28d2fc0b3c3a637c3d7311dd4293aa8308
                                    • Instruction Fuzzy Hash: 4B128B76E44119CFCB04CEFCC9D97DEBBF2AB46315F10591AD924EBB94C626880A8F41
                                    APIs
                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6CFBC230,?,?,00000008,?,?,6CFBBE33,00000000), ref: 6CFBC462
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExceptionRaise
                                    • String ID:
                                    • API String ID: 3997070919-0
                                    • Opcode ID: 1a019de1c92005a4d0cb8d34e45a16711dc6136835ca3694435de8bdc4bf9803
                                    • Instruction ID: 4c34b5456c9be2fc16d72acc0c974458b745307b283853aef289b300294bcfd8
                                    • Opcode Fuzzy Hash: 1a019de1c92005a4d0cb8d34e45a16711dc6136835ca3694435de8bdc4bf9803
                                    • Instruction Fuzzy Hash: 34B16E32210608DFD705DF29C486B667BE0FF45368F658698E8E9DF6A1C335EA81CB40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: .0J
                                    • API String ID: 0-2917085153
                                    • Opcode ID: f135dbd5d936372aa6b309a85ecd8d77804621b0d47a6473056a6d211e14b36e
                                    • Instruction ID: 27b3787807e17a9b9bb1aaf2a9614620547a5d8f676995cdeb2a14503e6c728a
                                    • Opcode Fuzzy Hash: f135dbd5d936372aa6b309a85ecd8d77804621b0d47a6473056a6d211e14b36e
                                    • Instruction Fuzzy Hash: E1F14672A541198FEF14CEBCC995BDFB7F2BB4A324F104A19D420EBB94C33A88058B55
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: +?E
                                    • API String ID: 0-2698160372
                                    • Opcode ID: 7eb2c8a7bc429087b268852fa9fff28941c90184dc2894b99856f05f5a93c5e9
                                    • Instruction ID: 195ec30163ca7cc25c169dbdd2d28a84196f6a8558400ea32b0eb50a7808b837
                                    • Opcode Fuzzy Hash: 7eb2c8a7bc429087b268852fa9fff28941c90184dc2894b99856f05f5a93c5e9
                                    • Instruction Fuzzy Hash: 13F16876E45209CFCB04CEEDC9956CEFBF6EB4A314F10911AE429EB644D635980B8F06
                                    APIs
                                    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6CFAFC09
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FeaturePresentProcessor
                                    • String ID:
                                    • API String ID: 2325560087-0
                                    • Opcode ID: 3bce202359a7a6525f768ace3f755e3dd7a3e95d511531af6586b378b8f4d7cb
                                    • Instruction ID: 76332740d82fdbe31e6eaeb7dc240b9607e40842b5ebf6b8c1792db58a3f77fe
                                    • Opcode Fuzzy Hash: 3bce202359a7a6525f768ace3f755e3dd7a3e95d511531af6586b378b8f4d7cb
                                    • Instruction Fuzzy Hash: 9B517CB1A01216CFEB59CFA6C88279EBBF4FB45354F24842AD425EB740D3749942CF90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2c27a2e880902e01699e11b8ffc3749caca2849f8f51eb3354344420469a9353
                                    • Instruction ID: 3022d67cc8373c0838cd3cf833408d9db351ba35a6c271636d6020bafca2d28a
                                    • Opcode Fuzzy Hash: 2c27a2e880902e01699e11b8ffc3749caca2849f8f51eb3354344420469a9353
                                    • Instruction Fuzzy Hash: 154194B5809219AFDB14DF6ACC88AEABBB9AF45304F1442DDE41DE3640DB349E448F50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: ~j[
                                    • API String ID: 0-3243419074
                                    • Opcode ID: d0d9bf9493ea963fbd18d1fcf4ce7543b82babe1e47a9037f6f5b7048315eb0e
                                    • Instruction ID: 112f38c93afe30c6dccbc466a30eb3b65563585dd0d771af2f635a7fdcda2075
                                    • Opcode Fuzzy Hash: d0d9bf9493ea963fbd18d1fcf4ce7543b82babe1e47a9037f6f5b7048315eb0e
                                    • Instruction Fuzzy Hash: 89A1C1B6A45245DFCB04CEECC5917DEFBF2AB4A364F204119E821ABB50C639DD0A8B50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: QS|q
                                    • API String ID: 0-2559004770
                                    • Opcode ID: 151fc473691155fe5ab7ea6b176427b3525d6d99ed3a9ca61b226f7825dc7860
                                    • Instruction ID: 93ff85f7fd590848bbcd39f522aa8aa7edd6dc615f376cec879b95a95072f9f2
                                    • Opcode Fuzzy Hash: 151fc473691155fe5ab7ea6b176427b3525d6d99ed3a9ca61b226f7825dc7860
                                    • Instruction Fuzzy Hash: 1581E476A50215CFCF04CFBCC8A57DFB7F6AB4A324F219529DD11AB780C62B59068B50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: FP
                                    • API String ID: 0-1202436026
                                    • Opcode ID: 2bd0c2487f7adeceab5a750b23553d063d96b6128dadaa099cf7c511969d8a83
                                    • Instruction ID: c03c1304dc3a6aae6a5cdb08b18da98fff4826ae1bebb1b7bda3366bcbe0fb24
                                    • Opcode Fuzzy Hash: 2bd0c2487f7adeceab5a750b23553d063d96b6128dadaa099cf7c511969d8a83
                                    • Instruction Fuzzy Hash: 9E81D476A40515CFCF04CEFCC4953DEBBF1AB4A324F245219D821EB794D729990ACB61
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: yVu:
                                    • API String ID: 0-3406181897
                                    • Opcode ID: 10b4308e83856f419e5a09c4a60c8c772c67758eec4f15737af125652f5b55f6
                                    • Instruction ID: 787464a298a7dc45145847246af6aba01c4b4a0d00aa2535d9b339ac47f57816
                                    • Opcode Fuzzy Hash: 10b4308e83856f419e5a09c4a60c8c772c67758eec4f15737af125652f5b55f6
                                    • Instruction Fuzzy Hash: 0871E172A45609CFDF08CEFCC9C13DFB7F2AB4A354F204115D821EB754C62A9A0A8B91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: 6tg
                                    • API String ID: 0-3648482971
                                    • Opcode ID: 034e90d034b5d1cee26816ff4bf7f61f10264996d3acba5d11fe9c4bea676a33
                                    • Instruction ID: e635a19206427a2b934cf3b33bac2edd5c2fa38fe22bd15e46f3f66f6ccede2f
                                    • Opcode Fuzzy Hash: 034e90d034b5d1cee26816ff4bf7f61f10264996d3acba5d11fe9c4bea676a33
                                    • Instruction Fuzzy Hash: 1D51E2B2A54109CFDF04CFECD4A57EFBBF2AB1A314F105419D424EB790D636990A8BA1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: 78
                                    • API String ID: 0-629063390
                                    • Opcode ID: 995bf0e824b1052784073ab3adc18f280585de8e6195c8dc3413d8d4c3ed2af2
                                    • Instruction ID: 5afd08ccae3ec6a10a8a15893e4dd0516583bae234e2ca4e06295304647c2beb
                                    • Opcode Fuzzy Hash: 995bf0e824b1052784073ab3adc18f280585de8e6195c8dc3413d8d4c3ed2af2
                                    • Instruction Fuzzy Hash: CB41F272A45606CFCF04CEBCC5953EFBBE5AB06324F218619C534ABAD4C23A950A8B41
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: HeapProcess
                                    • String ID:
                                    • API String ID: 54951025-0
                                    • Opcode ID: 555a100d2525182a6cf2bb926061bdcc39f68a3d370f1f7897a46ef39237bb49
                                    • Instruction ID: 4b9ae706ebddc49e62f6a5945b37ab71d0cd2acc7395ec4bf9f0676d84f719ae
                                    • Opcode Fuzzy Hash: 555a100d2525182a6cf2bb926061bdcc39f68a3d370f1f7897a46ef39237bb49
                                    • Instruction Fuzzy Hash: FDA01130F022028BABA08F328A0A3083AF8AA0B280302802AA008C0000EB2080008F02
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0849e343beb0746c405b3090b2671b417585e36cf2527bde802f823b51fbb0f9
                                    • Instruction ID: d42b4acf57a153463f421b51999ac4c22b558125d9449c05b1d8fc9321de5aa3
                                    • Opcode Fuzzy Hash: 0849e343beb0746c405b3090b2671b417585e36cf2527bde802f823b51fbb0f9
                                    • Instruction Fuzzy Hash: EB42687AA44215CFCF04CFACC5956DEBBF2AB49310F209229E815EB759D735990ACF01
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b8550e7bbd96c3f0844874fc5b16117a37db5f8e969b8d5da04577554dc1beeb
                                    • Instruction ID: a1647083ecd8ebf4d3cd04083e4e84711173e66fa84ecd91fed3d27bb9f787a6
                                    • Opcode Fuzzy Hash: b8550e7bbd96c3f0844874fc5b16117a37db5f8e969b8d5da04577554dc1beeb
                                    • Instruction Fuzzy Hash: 90F17F76B01204DFCB04CFACD9946DEBBF6EB8A314F20812AE515DB764C736A906CB50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7f8625ac49c1d67e6a9b344e77385f7cdaa0e9a43740382500ef75a85b703741
                                    • Instruction ID: 34c793296d59838f77d78d8b5b003388f6f67dae17ddd81f0bcdf70b129b0058
                                    • Opcode Fuzzy Hash: 7f8625ac49c1d67e6a9b344e77385f7cdaa0e9a43740382500ef75a85b703741
                                    • Instruction Fuzzy Hash: 76D17C76A44245CFCF04CFECC9D16DEBBF2EB4A354F10811AE821EB754D67699468B10
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5dfe1ede4925c6cbe9f3af16bcfd0820a1c52568b64679cfef5e7346ca1dae90
                                    • Instruction ID: bd5ec8959d017641246c3abb4436e6cef4e519dc2b23334b4e8e99529f0e4465
                                    • Opcode Fuzzy Hash: 5dfe1ede4925c6cbe9f3af16bcfd0820a1c52568b64679cfef5e7346ca1dae90
                                    • Instruction Fuzzy Hash: 3EB18876E052088FDF04CFACC9816DEBBF2BB49310F20851AE818EBB54D735A949CB51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 559566ac5e93e7acdf0f280fe57aaab52cd280dd11482d4ffda96a75ac1b7986
                                    • Instruction ID: cadcf5a376827fbf0cf67c1831ff0ad9ae45515845aedd6e3c30dde5a2d3ef8b
                                    • Opcode Fuzzy Hash: 559566ac5e93e7acdf0f280fe57aaab52cd280dd11482d4ffda96a75ac1b7986
                                    • Instruction Fuzzy Hash: 2CB16A75A05208DFCB04CFACC9916DEBBF2EB4A314F205159E815AB7A0C236AD0ACF51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0a80a97296b548ca9823805c9b5857ea0f1ccaa924f727215adbc35092d210c2
                                    • Instruction ID: 133689186db772d565e43a97ccd096a954b4ebfc30b01a573fbbbb3c02a21258
                                    • Opcode Fuzzy Hash: 0a80a97296b548ca9823805c9b5857ea0f1ccaa924f727215adbc35092d210c2
                                    • Instruction Fuzzy Hash: 1AA1D276A442058FDF44CFBCC8917DE7BF2EB4A364F245119E421EB7A4C23A9909CB11
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7c17a6b49177df6d4431991d0e15559b180d0a004455467792a9616ecc2c3e2a
                                    • Instruction ID: 065992f7cf8080cdd753afdba69e51dbee05a780170c5267f375b4aedce3cd27
                                    • Opcode Fuzzy Hash: 7c17a6b49177df6d4431991d0e15559b180d0a004455467792a9616ecc2c3e2a
                                    • Instruction Fuzzy Hash: 1591E376A41605CFCF04CFBCC5A57DEBBF2AB4A360F205219E921EB794C736590A8B50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d0692101a943a8b0af9ec1a5a7296356e1ab82e4a62e7551624cda0b584ff2b4
                                    • Instruction ID: a2466fa88149e59f9770a86109ce83b20c3d0bc3d0e826561719eac4db9169f1
                                    • Opcode Fuzzy Hash: d0692101a943a8b0af9ec1a5a7296356e1ab82e4a62e7551624cda0b584ff2b4
                                    • Instruction Fuzzy Hash: B891F476A4524ACFCF04CEFCC5957CEFBF2AB1A324F104116D821EBB90D269990A8F51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ae444484589fdc368ff3da1207f5df5b60db689dfaf400d34f353df82e446383
                                    • Instruction ID: 2114590aca2bf0dd1a90160ec384b22e1b14480fdf1f8d844fb3d8bd0fabff8a
                                    • Opcode Fuzzy Hash: ae444484589fdc368ff3da1207f5df5b60db689dfaf400d34f353df82e446383
                                    • Instruction Fuzzy Hash: 2F81C137B482068FEF08CFACD9963DE77F6BB4A354F148016D411E7764C22A9E099B90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 61b63f261b6f3af0ac191ca04149677946fd836891aa6614cd00a3d07a7fea5e
                                    • Instruction ID: 6d3e3878313fbeac88320ad80fcafb568b6ab6d030b35803d8b44f6e294855cd
                                    • Opcode Fuzzy Hash: 61b63f261b6f3af0ac191ca04149677946fd836891aa6614cd00a3d07a7fea5e
                                    • Instruction Fuzzy Hash: 7481F176A042098FDF48CFBCC8917DEBBF6AB9A310F10411AE811EB794D33A4909CB51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bcbb4c866d896d30c6c9e9f195517d1bace51e861c2c1a697ebb986051d73e04
                                    • Instruction ID: dd0d0ad9b92d4fc3dca50214660a62587771c4d00a570cc0884766fd840c9735
                                    • Opcode Fuzzy Hash: bcbb4c866d896d30c6c9e9f195517d1bace51e861c2c1a697ebb986051d73e04
                                    • Instruction Fuzzy Hash: 9081E476E44109CFCF08CFBCC4953DEBBF2AB0A360F118519D524AB790C336990A8B65
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 172c35e24f11742750e14d97acfaf6fe46cff814d7c28c13b18d1cbcba37ade4
                                    • Instruction ID: 1640fd02ef6d0d4b16667bcaedfeb4f4e2b72dccc322bca48774d4734ae8bdf0
                                    • Opcode Fuzzy Hash: 172c35e24f11742750e14d97acfaf6fe46cff814d7c28c13b18d1cbcba37ade4
                                    • Instruction Fuzzy Hash: 9081AD76E042058FEF08DEBCC9917DEBBF1EB4A314F209219D811AB755C33A9809CB65
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 25ece9e6fa691e288bf56f0ba0517a7300867afc353ccf69567d8f2807c1a2c2
                                    • Instruction ID: b1861be56a5ecdb1902ccc3c145493a795195a8c431692ebce33426fb9750b7e
                                    • Opcode Fuzzy Hash: 25ece9e6fa691e288bf56f0ba0517a7300867afc353ccf69567d8f2807c1a2c2
                                    • Instruction Fuzzy Hash: C681C1B6A041058FDF08CFBCC5917DEBBF2AB4A324F249115D521EB794C2369909CF61
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 756345dba17ecf7574b9e5b89146d406b695796df7666e9895bc4a5bfd944499
                                    • Instruction ID: 0a21ee85e68f19b01780243149e2a16760e9f1dda019e0dfd81212ffa2ffb026
                                    • Opcode Fuzzy Hash: 756345dba17ecf7574b9e5b89146d406b695796df7666e9895bc4a5bfd944499
                                    • Instruction Fuzzy Hash: 3971E776A405058FDF04DFBCC8D53EF7BF2AB4B324F201519D522AB7A4C62A590ACB90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c4dde8f99be67ebda789ad9acc77a8140310db84ae747daea2beb7abdf4d2720
                                    • Instruction ID: a7f77cf54eb2436d269e0ea3b4220636058f70dbdbdaed55b0da31f0f6dad743
                                    • Opcode Fuzzy Hash: c4dde8f99be67ebda789ad9acc77a8140310db84ae747daea2beb7abdf4d2720
                                    • Instruction Fuzzy Hash: 3471D132B40205CFCF04CEBDC5E93DFBBF29B4A325F109509D829EB754C62A990A8B10
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7179ef8c33e803b4529a99febb8331557da354fd6b12b295125f0c42713b089e
                                    • Instruction ID: b39b14a9ca0abdf42ea03ccb1f70cb9af5e16c283d77c6c9390f753720008713
                                    • Opcode Fuzzy Hash: 7179ef8c33e803b4529a99febb8331557da354fd6b12b295125f0c42713b089e
                                    • Instruction Fuzzy Hash: 67610576B40545CFCF04CEBCC89A3DFBBF2AB0A324F215119D5259B695C63A850E8750
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a979d0aadbc9d30a00734f84a06b3d1959721d68d8194b36fa6b4a310b40dded
                                    • Instruction ID: 56d7d456cc5d004d7a594e37b8131cf664d67c4a80341a08fc8419fcd25d4ee6
                                    • Opcode Fuzzy Hash: a979d0aadbc9d30a00734f84a06b3d1959721d68d8194b36fa6b4a310b40dded
                                    • Instruction Fuzzy Hash: 13510236A442068FEF088EBCC9D53EFBBF2BB4A344F144219D421E7795D63A59098BD1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 34ee13b6f1925ba9689ea0f72578808e4e95670d97a318abe872fbaa231572d0
                                    • Instruction ID: c21b1238d56214be6cc65ca1ba60573981352588beda938adac5d74ac766413d
                                    • Opcode Fuzzy Hash: 34ee13b6f1925ba9689ea0f72578808e4e95670d97a318abe872fbaa231572d0
                                    • Instruction Fuzzy Hash: 9B512773A441124FEF089E7CC8963DF7BE1BB47324F215619D922DB6A4D2268909CBC0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f5c88c836dab5d8b49e22c18369662be9adc1d619c67183a0fdacb4c3ade1a53
                                    • Instruction ID: a84190a831da26a77b30efaaa95c6381c80e7a58f578da26f32dc49da7912515
                                    • Opcode Fuzzy Hash: f5c88c836dab5d8b49e22c18369662be9adc1d619c67183a0fdacb4c3ade1a53
                                    • Instruction Fuzzy Hash: 0D5169B6E04609CFCF08CFACC5957DEBBF1BB4A314F108529D925AB790D235990A8F61
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f9110877dc7db21a7b6e1bf31939cee55b193308385409b588307c9dede547b2
                                    • Instruction ID: d87b73c86766c75bf897744bb42301be6bdcfccf4739d3a2a36f0c7da0b8c242
                                    • Opcode Fuzzy Hash: f9110877dc7db21a7b6e1bf31939cee55b193308385409b588307c9dede547b2
                                    • Instruction Fuzzy Hash: 1751E1B2E452098FEF04CFBCC4917DEBBF1EB0A324F209119D525EB745C6269909CB59
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5902695187a7d226880a357ed04bbdc0290bb03d3b4d6c1b3f795fc7ca757870
                                    • Instruction ID: 8e94e1981aab2165071c52341b5366255d90aae2a0bbdf077dd0e01c095028c3
                                    • Opcode Fuzzy Hash: 5902695187a7d226880a357ed04bbdc0290bb03d3b4d6c1b3f795fc7ca757870
                                    • Instruction Fuzzy Hash: 8851CF76E04609CFDF05CEECC4A57DFFBF2AB0A324F11980AD824A7B41C23959068B65
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 24715e70902f5caf6d24fbc855c8126d2d25b8791dd1cd49cf658630bb833367
                                    • Instruction ID: 828007f1a35f0c6aafaea2218149fcb0ac753d57fd53acf0403a996cc3ad9d60
                                    • Opcode Fuzzy Hash: 24715e70902f5caf6d24fbc855c8126d2d25b8791dd1cd49cf658630bb833367
                                    • Instruction Fuzzy Hash: BD41E472E44206DFCF04CEBCC5A57DFFBF2AB06364F219215D820AB795D2359A068B04
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: def488d34e388dd8607a6c290154ab2a38d41bc721a397cef5954b9e7d3b89fb
                                    • Instruction ID: af3bbdd4749a7c963983ce54a333e985fc6c9a81d4c483157f1512aa7eace154
                                    • Opcode Fuzzy Hash: def488d34e388dd8607a6c290154ab2a38d41bc721a397cef5954b9e7d3b89fb
                                    • Instruction Fuzzy Hash: 5941AE76E44215CFCF44CEACC4953EFB7F1AB4A324F105629D824EB790D23A59068BA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 494406fdb3cf6607c1b40a63eebab884fe471e6b4626f3f6f842a205a8cefefc
                                    • Instruction ID: dfbb8e90c59d8690c7c2ab011b5ef3015064336906d720ccc0b726824cbbe3fc
                                    • Opcode Fuzzy Hash: 494406fdb3cf6607c1b40a63eebab884fe471e6b4626f3f6f842a205a8cefefc
                                    • Instruction Fuzzy Hash: F6410672A40605CFDF05DEBCC4A53DFBBF29B02325F119119DD619B7A4C2268A0B8B91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1752 6cfb2fd9-6cfb3004 call 6cfb3b29 1755 6cfb300a-6cfb300d 1752->1755 1756 6cfb3378-6cfb337d call 6cfb5010 1752->1756 1755->1756 1757 6cfb3013-6cfb301c 1755->1757 1759 6cfb3119-6cfb311f 1757->1759 1760 6cfb3022-6cfb3026 1757->1760 1763 6cfb3127-6cfb3135 1759->1763 1760->1759 1762 6cfb302c-6cfb3033 1760->1762 1764 6cfb304b-6cfb3050 1762->1764 1765 6cfb3035-6cfb303c 1762->1765 1766 6cfb313b-6cfb313f 1763->1766 1767 6cfb32e1-6cfb32e4 1763->1767 1764->1759 1769 6cfb3056-6cfb305e call 6cfb2480 1764->1769 1765->1764 1768 6cfb303e-6cfb3045 1765->1768 1766->1767 1772 6cfb3145-6cfb314c 1766->1772 1770 6cfb3307-6cfb3310 call 6cfb2480 1767->1770 1771 6cfb32e6-6cfb32e9 1767->1771 1768->1759 1768->1764 1784 6cfb3312-6cfb3316 1769->1784 1788 6cfb3064-6cfb307d call 6cfb2480 * 2 1769->1788 1770->1756 1770->1784 1771->1756 1775 6cfb32ef-6cfb3304 call 6cfb337e 1771->1775 1776 6cfb314e-6cfb3155 1772->1776 1777 6cfb3164-6cfb316a 1772->1777 1775->1770 1776->1777 1778 6cfb3157-6cfb315e 1776->1778 1780 6cfb3281-6cfb3285 1777->1780 1781 6cfb3170-6cfb3197 call 6cfb29d3 1777->1781 1778->1767 1778->1777 1786 6cfb3291-6cfb329d 1780->1786 1787 6cfb3287-6cfb3290 call 6cfb222e 1780->1787 1781->1780 1795 6cfb319d-6cfb31a0 1781->1795 1786->1770 1793 6cfb329f-6cfb32a9 1786->1793 1787->1786 1788->1756 1810 6cfb3083-6cfb3089 1788->1810 1797 6cfb32ab-6cfb32ad 1793->1797 1798 6cfb32b7-6cfb32b9 1793->1798 1802 6cfb31a3-6cfb31b8 1795->1802 1797->1770 1803 6cfb32af-6cfb32b3 1797->1803 1800 6cfb32bb-6cfb32ce call 6cfb2480 * 2 1798->1800 1801 6cfb32d0-6cfb32dd call 6cfb39f7 1798->1801 1828 6cfb3317 call 6cfb4f7a 1800->1828 1819 6cfb32df 1801->1819 1820 6cfb333c-6cfb3351 call 6cfb2480 * 2 1801->1820 1807 6cfb31be-6cfb31c1 1802->1807 1808 6cfb3262-6cfb3275 1802->1808 1803->1770 1804 6cfb32b5 1803->1804 1804->1800 1807->1808 1813 6cfb31c7-6cfb31cf 1807->1813 1808->1802 1812 6cfb327b-6cfb327e 1808->1812 1815 6cfb308b-6cfb308f 1810->1815 1816 6cfb30b5-6cfb30bd call 6cfb2480 1810->1816 1812->1780 1813->1808 1818 6cfb31d5-6cfb31e9 1813->1818 1815->1816 1821 6cfb3091-6cfb3098 1815->1821 1837 6cfb30bf-6cfb30df call 6cfb2480 * 2 call 6cfb39f7 1816->1837 1838 6cfb3121-6cfb3124 1816->1838 1823 6cfb31ec-6cfb31fd 1818->1823 1819->1770 1845 6cfb3353 1820->1845 1846 6cfb3356-6cfb3373 call 6cfb2bbf call 6cfb38f7 call 6cfb3ab4 call 6cfb386e 1820->1846 1826 6cfb309a-6cfb30a1 1821->1826 1827 6cfb30ac-6cfb30af 1821->1827 1829 6cfb31ff-6cfb3210 call 6cfb34b4 1823->1829 1830 6cfb3223-6cfb3230 1823->1830 1826->1827 1835 6cfb30a3-6cfb30aa 1826->1835 1827->1756 1827->1816 1842 6cfb331c-6cfb3337 call 6cfb222e call 6cfb3668 call 6cfb08c4 1828->1842 1848 6cfb3212-6cfb321b 1829->1848 1849 6cfb3234-6cfb325c call 6cfb2f59 1829->1849 1830->1823 1833 6cfb3232 1830->1833 1841 6cfb325f 1833->1841 1835->1816 1835->1827 1837->1838 1866 6cfb30e1-6cfb30e6 1837->1866 1838->1763 1841->1808 1842->1820 1845->1846 1846->1756 1848->1829 1855 6cfb321d-6cfb3220 1848->1855 1849->1841 1855->1830 1866->1828 1868 6cfb30ec-6cfb30ff call 6cfb3680 1866->1868 1868->1842 1873 6cfb3105-6cfb3111 1868->1873 1873->1828 1874 6cfb3117 1873->1874 1874->1868
                                    APIs
                                    • type_info::operator==.LIBVCRUNTIME ref: 6CFB30F8
                                    • ___TypeMatch.LIBVCRUNTIME ref: 6CFB3206
                                    • _UnwindNestedFrames.LIBCMT ref: 6CFB3358
                                    • CallUnexpected.LIBVCRUNTIME ref: 6CFB3373
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                    • String ID: csm$csm$csm
                                    • API String ID: 2751267872-393685449
                                    • Opcode ID: edc83101e528ee1a73b11539a13e88d134947d52afd058f3219f4ccf021fa3d4
                                    • Instruction ID: 6f40f081b7780f62e428f607275f4248557ea9840b5c4f27dea505b5f8474d8a
                                    • Opcode Fuzzy Hash: edc83101e528ee1a73b11539a13e88d134947d52afd058f3219f4ccf021fa3d4
                                    • Instruction Fuzzy Hash: AFB17B75C41609EFCF05CFA6C88099EBBB5FF04318F29415AE8147BA11DB31EA59CB92
                                    APIs
                                    • _ValidateLocalCookies.LIBCMT ref: 6CFB2107
                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 6CFB210F
                                    • _ValidateLocalCookies.LIBCMT ref: 6CFB2198
                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 6CFB21C3
                                    • _ValidateLocalCookies.LIBCMT ref: 6CFB2218
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                    • String ID: csm
                                    • API String ID: 1170836740-1018135373
                                    • Opcode ID: 483a8b8ac4b0b9739be537e34f73e6ef99e17675f9522cafba3fa0a3fcc0dafe
                                    • Instruction ID: 6ebcade102a2e21d302d6ae968ca93bca3bba956d3db906e0858be5c3208c7df
                                    • Opcode Fuzzy Hash: 483a8b8ac4b0b9739be537e34f73e6ef99e17675f9522cafba3fa0a3fcc0dafe
                                    • Instruction Fuzzy Hash: F541B334E012099BCF00DF6ACC88BDE7BB5AF45318F218195E928BB751D732DA15CB91
                                    APIs
                                    • FreeLibrary.KERNEL32(00000000,?,6CFB7228,00000000,6CFB4C32,00000000,00000000,00000001,?,6CFB73A1,00000022,FlsSetValue,6CFBFA10,6CFBFA18,00000000), ref: 6CFB71DA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FreeLibrary
                                    • String ID: api-ms-$ext-ms-
                                    • API String ID: 3664257935-537541572
                                    • Opcode ID: 2928f3dfd92225119dd8a24b3ca053a5b6c848f7fc209a8f6a0e7edd002e5647
                                    • Instruction ID: 7f0400bdc585e208e6c84fdd7109abaf39a0f4f968b53681a7d820708e76620e
                                    • Opcode Fuzzy Hash: 2928f3dfd92225119dd8a24b3ca053a5b6c848f7fc209a8f6a0e7edd002e5647
                                    • Instruction Fuzzy Hash: B521BB76A06215ABDB119777DC45B4B3778EB423A4F260212E919B7A84D730E901CAF0
                                    APIs
                                    • GetLastError.KERNEL32(00000001,?,6CFB2054,6CFAF4A2,6CFAF799,?,6CFAF9D1,?,00000001,?,?,00000001,?,6CFC3478,0000000C,6CFAFACA), ref: 6CFB249C
                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6CFB24AA
                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6CFB24C3
                                    • SetLastError.KERNEL32(00000000,6CFAF9D1,?,00000001,?,?,00000001,?,6CFC3478,0000000C,6CFAFACA,?,00000001,?), ref: 6CFB2515
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLastValue___vcrt_
                                    • String ID:
                                    • API String ID: 3852720340-0
                                    • Opcode ID: 140018f256daf75084b8ae89fbfb22ba7a7c216279de409a7fb9cfeedbc7d798
                                    • Instruction ID: 91e86e54f752f86b44cd89740b854b16636ce72f1fc21d5d8a3fa8655cb6143e
                                    • Opcode Fuzzy Hash: 140018f256daf75084b8ae89fbfb22ba7a7c216279de409a7fb9cfeedbc7d798
                                    • Instruction Fuzzy Hash: 7D01B5322093116DAA1816FB6C8D69B3664DB426FDB20033AE534759D0EF3349155295
                                    Strings
                                    • C:\Users\user\Desktop\Setup_v1.29.exe, xrefs: 6CFB6366
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: C:\Users\user\Desktop\Setup_v1.29.exe
                                    • API String ID: 0-3742506953
                                    • Opcode ID: be7418057b3584397811b9b01a88e055f08e70638856695bbb8093c272126b96
                                    • Instruction ID: b06961effe8ed978113b8425dcac0baaf1e1066c4e998532b330fba49ff0df60
                                    • Opcode Fuzzy Hash: be7418057b3584397811b9b01a88e055f08e70638856695bbb8093c272126b96
                                    • Instruction Fuzzy Hash: 6B218E72604615EF9B189F67C88099BB7B9AF013A87188629F815F7B40EB31EC4187A0
                                    APIs
                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,94327FAE,00000000,?,00000000,6CFBCAE2,000000FF,?,6CFB437E,?,?,6CFB4352,?), ref: 6CFB4419
                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6CFB442B
                                    • FreeLibrary.KERNEL32(00000000,?,00000000,6CFBCAE2,000000FF,?,6CFB437E,?,?,6CFB4352,?), ref: 6CFB444D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressFreeHandleLibraryModuleProc
                                    • String ID: CorExitProcess$mscoree.dll
                                    • API String ID: 4061214504-1276376045
                                    • Opcode ID: 70f9f060eb763d06931da4f1abba2b14063d1aae8bda067df260581575c708c1
                                    • Instruction ID: 9cbfb95998f074a424b02c0313e7d4bb161c2f5a0ec5348712917ebb034c221d
                                    • Opcode Fuzzy Hash: 70f9f060eb763d06931da4f1abba2b14063d1aae8bda067df260581575c708c1
                                    • Instruction Fuzzy Hash: 6E01D131A10529EFDF029F51CC44BAEBBB8FB08758F004A26FC21B2A94DB759900CB95
                                    APIs
                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,6CFB27C8,00000000,?,00000001,?,?,?,6CFB28B7,00000001,FlsFree,6CFBEC48,FlsFree), ref: 6CFB2824
                                    • GetLastError.KERNEL32(?,6CFB27C8,00000000,?,00000001,?,?,?,6CFB28B7,00000001,FlsFree,6CFBEC48,FlsFree,00000000,?,6CFB2563), ref: 6CFB282E
                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 6CFB2856
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LibraryLoad$ErrorLast
                                    • String ID: api-ms-
                                    • API String ID: 3177248105-2084034818
                                    • Opcode ID: 144aac1e6a9fac7a9935b76c3f571c39545769742e6762056cfc8e2a33f8717d
                                    • Instruction ID: a52691a029fa9e7dc312a94707812135bd3436cc73650b1444a7f863dbee3b85
                                    • Opcode Fuzzy Hash: 144aac1e6a9fac7a9935b76c3f571c39545769742e6762056cfc8e2a33f8717d
                                    • Instruction Fuzzy Hash: 1AE04F70B4420CBBEF411A63DC49B483B75BB01B98F144431FA0CB88D8D773E4138A89
                                    APIs
                                    • GetConsoleOutputCP.KERNEL32(94327FAE,00000000,00000000,?), ref: 6CFB9684
                                      • Part of subcall function 6CFB6F18: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CFB90BF,?,00000000,-00000008), ref: 6CFB6F79
                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6CFB98D6
                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6CFB991C
                                    • GetLastError.KERNEL32 ref: 6CFB99BF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                    • String ID:
                                    • API String ID: 2112829910-0
                                    • Opcode ID: 3cf5568cc4e865d0a0493b580ea469380748079c44088218923053cbcede9505
                                    • Instruction ID: 58001fcf4cdb5b011db481c0d8e15c50ee2f6ce3bf35e3695893fe77c337746e
                                    • Opcode Fuzzy Hash: 3cf5568cc4e865d0a0493b580ea469380748079c44088218923053cbcede9505
                                    • Instruction Fuzzy Hash: 35D16875D052489FCF05CFA9C880ADDBBB5EF19314F28416AE466FBB51DB30AA42CB50
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AdjustPointer
                                    • String ID:
                                    • API String ID: 1740715915-0
                                    • Opcode ID: 7a5b57b51ae56e525844111790cac67f27e4bd14860de0a74b9fe896ad26ff19
                                    • Instruction ID: b6ea9a98225d9e15c3428c479104b5e312e767015c7987365f4b525ebb1fe4a5
                                    • Opcode Fuzzy Hash: 7a5b57b51ae56e525844111790cac67f27e4bd14860de0a74b9fe896ad26ff19
                                    • Instruction Fuzzy Hash: CC51F4766052069FDB198F17C888BEA77B4FF05318F24452DE8157BA90E733E845C790
                                    APIs
                                      • Part of subcall function 6CFB6F18: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CFB90BF,?,00000000,-00000008), ref: 6CFB6F79
                                    • GetLastError.KERNEL32 ref: 6CFB5BC8
                                    • __dosmaperr.LIBCMT ref: 6CFB5BCF
                                    • GetLastError.KERNEL32(?,?,?,?), ref: 6CFB5C09
                                    • __dosmaperr.LIBCMT ref: 6CFB5C10
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                    • String ID:
                                    • API String ID: 1913693674-0
                                    • Opcode ID: a7e528d62294ce337b999334ebac6ec421bd5a70e01415f883859a23c0bf5f14
                                    • Instruction ID: 575301f770721b55927dde4a09fc1546edbc3fdcf7e499f336db89969b2801ed
                                    • Opcode Fuzzy Hash: a7e528d62294ce337b999334ebac6ec421bd5a70e01415f883859a23c0bf5f14
                                    • Instruction Fuzzy Hash: B22162B2604605AFDB14AF77C88099BB7A9FF053687048629F855F7B40EB39EC5187A0
                                    APIs
                                    • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,6CFBA4E5,00000000,00000001,00000000,?,?,6CFB9A13,?,00000000,00000000), ref: 6CFBAD3D
                                    • GetLastError.KERNEL32(?,6CFBA4E5,00000000,00000001,00000000,?,?,6CFB9A13,?,00000000,00000000,?,?,?,6CFB9FB6,00000000), ref: 6CFBAD49
                                      • Part of subcall function 6CFBAD0F: CloseHandle.KERNEL32(FFFFFFFE,6CFBAD59,?,6CFBA4E5,00000000,00000001,00000000,?,?,6CFB9A13,?,00000000,00000000,?,?), ref: 6CFBAD1F
                                    • ___initconout.LIBCMT ref: 6CFBAD59
                                      • Part of subcall function 6CFBACD1: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6CFBAD00,6CFBA4D2,?,?,6CFB9A13,?,00000000,00000000,?), ref: 6CFBACE4
                                    • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,6CFBA4E5,00000000,00000001,00000000,?,?,6CFB9A13,?,00000000,00000000,?), ref: 6CFBAD6E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                    • String ID:
                                    • API String ID: 2744216297-0
                                    • Opcode ID: b8e6744d3615c7b95e3f57ebcecb66113b12ba8f18a60fc68fc7552ba0d1a2d0
                                    • Instruction ID: 661da9520f7b09443cee8667bea46fbedda06e856bb6e1002268d5b5c553f34c
                                    • Opcode Fuzzy Hash: b8e6744d3615c7b95e3f57ebcecb66113b12ba8f18a60fc68fc7552ba0d1a2d0
                                    • Instruction Fuzzy Hash: 8FF03036600118BBCF662FE2CC45B893F76FB0A7B5B048010FA5C95524D732C820EB95
                                    APIs
                                    • EncodePointer.KERNEL32(00000000,?), ref: 6CFB33A3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: EncodePointer
                                    • String ID: MOC$RCC
                                    • API String ID: 2118026453-2084237596
                                    • Opcode ID: f3d639aa95f56060330cb391a19473a0b59523fabe4710a6e11085225d8b8eff
                                    • Instruction ID: 2b016118f22ffc23e351e7ffc09a236785dba7a268ef0a707ab99e3f9459c920
                                    • Opcode Fuzzy Hash: f3d639aa95f56060330cb391a19473a0b59523fabe4710a6e11085225d8b8eff
                                    • Instruction Fuzzy Hash: E7418971A00209EFCF06CF95CC80ADEBBB5BF08308F248199F904BB611DB36A955DB50
                                    APIs
                                    • std::_Xinvalid_argument.LIBCPMT ref: 6CFA2160
                                      • Part of subcall function 6CFB0199: std::invalid_argument::invalid_argument.LIBCONCRT ref: 6CFB01A5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2081755812.000000006CF81000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF80000, based on PE: true
                                    • Associated: 00000000.00000002.2081741717.000000006CF80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081965580.000000006CFBD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006CFC5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2081993922.000000006D011000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2082187214.000000006D014000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cf80000_Setup_v1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Xinvalid_argumentstd::_std::invalid_argument::invalid_argument
                                    • String ID: string too long$'E[
                                    • API String ID: 1997705970-4102168377
                                    • Opcode ID: 2720ff98e80d3c66d04ff08e94cf35726af204fdb6ed6a5136c5e6dee0ca739f
                                    • Instruction ID: 458e14cfca1d4efb18c5219547c53bd6e0c830647d0001ed0c7d381e99104b73
                                    • Opcode Fuzzy Hash: 2720ff98e80d3c66d04ff08e94cf35726af204fdb6ed6a5136c5e6dee0ca739f
                                    • Instruction Fuzzy Hash: 94310236B546019FDF058EBDC8D93CE7BE69B53374F20921989348BAD4C227860A8A04

                                    Execution Graph

                                    Execution Coverage:19%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:2%
                                    Total number of Nodes:1159
                                    Total number of Limit Nodes:6
                                    execution_graph 13431 3101190 13436 31178e0 13431->13436 13433 310119e 13435 31011b7 13433->13435 13440 3117850 13433->13440 13437 3117916 GetComputerNameA 13436->13437 13439 3117939 13437->13439 13439->13433 13441 3117886 GetUserNameA 13440->13441 13443 31178c3 13441->13443 13443->13435 13444 31169f0 13462 3102260 13444->13462 13448 3116a00 13555 3101160 GetSystemInfo 13448->13555 13454 3116a21 13455 3116a26 GetUserDefaultLCID 13454->13455 13456 3117850 GetUserNameA 13455->13456 13457 3116a30 13456->13457 13458 31178e0 GetComputerNameA 13457->13458 13460 3116a43 13458->13460 13566 3115b10 13460->13566 13461 3116b16 13632 31045c0 13462->13632 13464 3102274 13465 31045c0 2 API calls 13464->13465 13466 310228d 13465->13466 13467 31045c0 2 API calls 13466->13467 13468 31022a6 13467->13468 13469 31045c0 2 API calls 13468->13469 13470 31022bf 13469->13470 13471 31045c0 2 API calls 13470->13471 13472 31022d8 13471->13472 13473 31045c0 2 API calls 13472->13473 13474 31022f1 13473->13474 13475 31045c0 2 API calls 13474->13475 13476 310230a 13475->13476 13477 31045c0 2 API calls 13476->13477 13478 3102323 13477->13478 13479 31045c0 2 API calls 13478->13479 13480 310233c 13479->13480 13481 31045c0 2 API calls 13480->13481 13482 3102355 13481->13482 13483 31045c0 2 API calls 13482->13483 13484 310236e 13483->13484 13485 31045c0 2 API calls 13484->13485 13486 3102387 13485->13486 13487 31045c0 2 API calls 13486->13487 13488 31023a0 13487->13488 13489 31045c0 2 API calls 13488->13489 13490 31023b9 13489->13490 13491 31045c0 2 API calls 13490->13491 13492 31023d2 13491->13492 13493 31045c0 2 API calls 13492->13493 13494 31023eb 13493->13494 13495 31045c0 2 API calls 13494->13495 13496 3102404 13495->13496 13497 31045c0 2 API calls 13496->13497 13498 310241d 13497->13498 13499 31045c0 2 API calls 13498->13499 13500 3102436 13499->13500 13501 31045c0 2 API calls 13500->13501 13502 310244f 13501->13502 13503 31045c0 2 API calls 13502->13503 13504 3102468 13503->13504 13505 31045c0 2 API calls 13504->13505 13506 3102481 13505->13506 13507 31045c0 2 API calls 13506->13507 13508 310249a 13507->13508 13509 31045c0 2 API calls 13508->13509 13510 31024b3 13509->13510 13511 31045c0 2 API calls 13510->13511 13512 31024cc 13511->13512 13513 31045c0 2 API calls 13512->13513 13514 31024e5 13513->13514 13515 31045c0 2 API calls 13514->13515 13516 31024fe 13515->13516 13517 31045c0 2 API calls 13516->13517 13518 3102517 13517->13518 13519 31045c0 2 API calls 13518->13519 13520 3102530 13519->13520 13521 31045c0 2 API calls 13520->13521 13522 3102549 13521->13522 13523 31045c0 2 API calls 13522->13523 13524 3102562 13523->13524 13525 31045c0 2 API calls 13524->13525 13526 310257b 13525->13526 13527 31045c0 2 API calls 13526->13527 13528 3102594 13527->13528 13529 31045c0 2 API calls 13528->13529 13530 31025ad 13529->13530 13531 31045c0 2 API calls 13530->13531 13532 31025c6 13531->13532 13533 31045c0 2 API calls 13532->13533 13534 31025df 13533->13534 13535 31045c0 2 API calls 13534->13535 13536 31025f8 13535->13536 13537 31045c0 2 API calls 13536->13537 13538 3102611 13537->13538 13539 31045c0 2 API calls 13538->13539 13540 310262a 13539->13540 13541 31045c0 2 API calls 13540->13541 13542 3102643 13541->13542 13543 31045c0 2 API calls 13542->13543 13544 310265c 13543->13544 13545 31045c0 2 API calls 13544->13545 13546 3102675 13545->13546 13547 31045c0 2 API calls 13546->13547 13548 310268e 13547->13548 13549 3119860 13548->13549 13637 3119750 GetPEB 13549->13637 13551 3119a93 LoadLibraryA LoadLibraryA 13552 3119ac3 LoadLibraryA 13551->13552 13553 3119ae6 13552->13553 13553->13448 13554 3119868 13554->13551 13556 310117c 13555->13556 13557 3101110 13556->13557 13558 3101131 VirtualAllocExNuma 13557->13558 13559 3101141 13558->13559 13638 31010a0 VirtualAlloc 13559->13638 13561 310114e 13562 3101220 13561->13562 13640 31189b0 13562->13640 13565 3101249 __aulldiv 13565->13454 13567 3115b1d 13566->13567 13642 31026a0 13567->13642 13571 3115ca3 14279 3115510 13571->14279 13573 3115cc3 14284 3117500 13573->14284 13575 3115da7 14288 3104880 13575->14288 13577 3115dbe 14292 3105960 13577->14292 13579 3115e03 13580 3105960 InternetCrackUrlA 13579->13580 13581 3115e4c 13580->13581 13582 3105960 InternetCrackUrlA 13581->13582 13583 3115e93 13582->13583 14296 3111a10 13583->14296 13585 3115eba 14326 3104fb0 13585->14326 13587 3115edb 14331 3110740 13587->14331 13589 3115f60 13590 3105960 InternetCrackUrlA 13589->13590 13591 3115fa0 13590->13591 14343 3101e80 13591->14343 13593 3115ff0 13594 3116092 13593->13594 13595 3116000 13593->13595 13596 3105960 InternetCrackUrlA 13594->13596 13597 3105960 InternetCrackUrlA 13595->13597 13598 31160bf 13596->13598 13600 311603a 13597->13600 14353 3113560 13598->14353 14349 3113dc0 13600->14349 13601 311608a 13604 311610b 13601->13604 14357 31140b0 13601->14357 13605 3116130 13604->13605 14375 3114780 13604->14375 13609 3116155 13605->13609 14379 3114bb0 13605->14379 13606 31160ec 14371 3115100 13606->14371 13611 311617a 13609->13611 14393 3114d70 13609->14393 13613 311619f 13611->13613 14401 3114f40 13611->14401 13617 31161c4 13613->13617 14407 3107710 13613->14407 13615 3116210 13621 31162b3 13615->13621 13622 3116220 13615->13622 13618 31161e9 13617->13618 14411 3115050 13617->14411 13618->13615 14415 3119010 13618->14415 13623 3105960 InternetCrackUrlA 13621->13623 13624 3105960 InternetCrackUrlA 13622->13624 13625 31162e0 13623->13625 13627 311625b 13624->13627 13626 3113560 InternetCrackUrlA 13625->13626 13629 31162ab 13626->13629 13628 3113dc0 InternetCrackUrlA 13627->13628 13628->13629 13630 3105960 InternetCrackUrlA 13629->13630 13631 311631c 13630->13631 13631->13461 13633 31045d2 RtlAllocateHeap 13632->13633 13635 3104622 VirtualProtect 13633->13635 13635->13464 13637->13554 13639 31010c2 codecvt 13638->13639 13639->13561 13641 3101233 GlobalMemoryStatusEx 13640->13641 13641->13565 13643 31045c0 2 API calls 13642->13643 13644 31026b4 13643->13644 13645 31045c0 2 API calls 13644->13645 13646 31026d7 13645->13646 13647 31045c0 2 API calls 13646->13647 13648 31026f0 13647->13648 13649 31045c0 2 API calls 13648->13649 13650 3102709 13649->13650 13651 31045c0 2 API calls 13650->13651 13652 3102736 13651->13652 13653 31045c0 2 API calls 13652->13653 13654 310274f 13653->13654 13655 31045c0 2 API calls 13654->13655 13656 3102768 13655->13656 13657 31045c0 2 API calls 13656->13657 13658 3102795 13657->13658 13659 31045c0 2 API calls 13658->13659 13660 31027ae 13659->13660 13661 31045c0 2 API calls 13660->13661 13662 31027c7 13661->13662 13663 31045c0 2 API calls 13662->13663 13664 31027e0 13663->13664 13665 31045c0 2 API calls 13664->13665 13666 31027f9 13665->13666 13667 31045c0 2 API calls 13666->13667 13668 3102812 13667->13668 13669 31045c0 2 API calls 13668->13669 13670 310282b 13669->13670 13671 31045c0 2 API calls 13670->13671 13672 3102844 13671->13672 13673 31045c0 2 API calls 13672->13673 13674 310285d 13673->13674 13675 31045c0 2 API calls 13674->13675 13676 3102876 13675->13676 13677 31045c0 2 API calls 13676->13677 13678 310288f 13677->13678 13679 31045c0 2 API calls 13678->13679 13680 31028a8 13679->13680 13681 31045c0 2 API calls 13680->13681 13682 31028c1 13681->13682 13683 31045c0 2 API calls 13682->13683 13684 31028da 13683->13684 13685 31045c0 2 API calls 13684->13685 13686 31028f3 13685->13686 13687 31045c0 2 API calls 13686->13687 13688 310290c 13687->13688 13689 31045c0 2 API calls 13688->13689 13690 3102925 13689->13690 13691 31045c0 2 API calls 13690->13691 13692 310293e 13691->13692 13693 31045c0 2 API calls 13692->13693 13694 3102957 13693->13694 13695 31045c0 2 API calls 13694->13695 13696 3102970 13695->13696 13697 31045c0 2 API calls 13696->13697 13698 3102989 13697->13698 13699 31045c0 2 API calls 13698->13699 13700 31029a2 13699->13700 13701 31045c0 2 API calls 13700->13701 13702 31029bb 13701->13702 13703 31045c0 2 API calls 13702->13703 13704 31029d4 13703->13704 13705 31045c0 2 API calls 13704->13705 13706 31029ed 13705->13706 13707 31045c0 2 API calls 13706->13707 13708 3102a06 13707->13708 13709 31045c0 2 API calls 13708->13709 13710 3102a1f 13709->13710 13711 31045c0 2 API calls 13710->13711 13712 3102a38 13711->13712 13713 31045c0 2 API calls 13712->13713 13714 3102a51 13713->13714 13715 31045c0 2 API calls 13714->13715 13716 3102a6a 13715->13716 13717 31045c0 2 API calls 13716->13717 13718 3102a83 13717->13718 13719 31045c0 2 API calls 13718->13719 13720 3102a9c 13719->13720 13721 31045c0 2 API calls 13720->13721 13722 3102ab5 13721->13722 13723 31045c0 2 API calls 13722->13723 13724 3102ace 13723->13724 13725 31045c0 2 API calls 13724->13725 13726 3102ae7 13725->13726 13727 31045c0 2 API calls 13726->13727 13728 3102b00 13727->13728 13729 31045c0 2 API calls 13728->13729 13730 3102b19 13729->13730 13731 31045c0 2 API calls 13730->13731 13732 3102b32 13731->13732 13733 31045c0 2 API calls 13732->13733 13734 3102b4b 13733->13734 13735 31045c0 2 API calls 13734->13735 13736 3102b64 13735->13736 13737 31045c0 2 API calls 13736->13737 13738 3102b7d 13737->13738 13739 31045c0 2 API calls 13738->13739 13740 3102b96 13739->13740 13741 31045c0 2 API calls 13740->13741 13742 3102baf 13741->13742 13743 31045c0 2 API calls 13742->13743 13744 3102bc8 13743->13744 13745 31045c0 2 API calls 13744->13745 13746 3102be1 13745->13746 13747 31045c0 2 API calls 13746->13747 13748 3102bfa 13747->13748 13749 31045c0 2 API calls 13748->13749 13750 3102c13 13749->13750 13751 31045c0 2 API calls 13750->13751 13752 3102c2c 13751->13752 13753 31045c0 2 API calls 13752->13753 13754 3102c45 13753->13754 13755 31045c0 2 API calls 13754->13755 13756 3102c5e 13755->13756 13757 31045c0 2 API calls 13756->13757 13758 3102c77 13757->13758 13759 31045c0 2 API calls 13758->13759 13760 3102c90 13759->13760 13761 31045c0 2 API calls 13760->13761 13762 3102ca9 13761->13762 13763 31045c0 2 API calls 13762->13763 13764 3102cc2 13763->13764 13765 31045c0 2 API calls 13764->13765 13766 3102cdb 13765->13766 13767 31045c0 2 API calls 13766->13767 13768 3102cf4 13767->13768 13769 31045c0 2 API calls 13768->13769 13770 3102d0d 13769->13770 13771 31045c0 2 API calls 13770->13771 13772 3102d26 13771->13772 13773 31045c0 2 API calls 13772->13773 13774 3102d3f 13773->13774 13775 31045c0 2 API calls 13774->13775 13776 3102d58 13775->13776 13777 31045c0 2 API calls 13776->13777 13778 3102d71 13777->13778 13779 31045c0 2 API calls 13778->13779 13780 3102d8a 13779->13780 13781 31045c0 2 API calls 13780->13781 13782 3102da3 13781->13782 13783 31045c0 2 API calls 13782->13783 13784 3102dbc 13783->13784 13785 31045c0 2 API calls 13784->13785 13786 3102dd5 13785->13786 13787 31045c0 2 API calls 13786->13787 13788 3102dee 13787->13788 13789 31045c0 2 API calls 13788->13789 13790 3102e07 13789->13790 13791 31045c0 2 API calls 13790->13791 13792 3102e20 13791->13792 13793 31045c0 2 API calls 13792->13793 13794 3102e39 13793->13794 13795 31045c0 2 API calls 13794->13795 13796 3102e52 13795->13796 13797 31045c0 2 API calls 13796->13797 13798 3102e6b 13797->13798 13799 31045c0 2 API calls 13798->13799 13800 3102e84 13799->13800 13801 31045c0 2 API calls 13800->13801 13802 3102e9d 13801->13802 13803 31045c0 2 API calls 13802->13803 13804 3102eb6 13803->13804 13805 31045c0 2 API calls 13804->13805 13806 3102ecf 13805->13806 13807 31045c0 2 API calls 13806->13807 13808 3102ee8 13807->13808 13809 31045c0 2 API calls 13808->13809 13810 3102f01 13809->13810 13811 31045c0 2 API calls 13810->13811 13812 3102f1a 13811->13812 13813 31045c0 2 API calls 13812->13813 13814 3102f33 13813->13814 13815 31045c0 2 API calls 13814->13815 13816 3102f4c 13815->13816 13817 31045c0 2 API calls 13816->13817 13818 3102f65 13817->13818 13819 31045c0 2 API calls 13818->13819 13820 3102f7e 13819->13820 13821 31045c0 2 API calls 13820->13821 13822 3102f97 13821->13822 13823 31045c0 2 API calls 13822->13823 13824 3102fb0 13823->13824 13825 31045c0 2 API calls 13824->13825 13826 3102fc9 13825->13826 13827 31045c0 2 API calls 13826->13827 13828 3102fe2 13827->13828 13829 31045c0 2 API calls 13828->13829 13830 3102ffb 13829->13830 13831 31045c0 2 API calls 13830->13831 13832 3103014 13831->13832 13833 31045c0 2 API calls 13832->13833 13834 310302d 13833->13834 13835 31045c0 2 API calls 13834->13835 13836 3103046 13835->13836 13837 31045c0 2 API calls 13836->13837 13838 310305f 13837->13838 13839 31045c0 2 API calls 13838->13839 13840 3103078 13839->13840 13841 31045c0 2 API calls 13840->13841 13842 3103091 13841->13842 13843 31045c0 2 API calls 13842->13843 13844 31030aa 13843->13844 13845 31045c0 2 API calls 13844->13845 13846 31030c3 13845->13846 13847 31045c0 2 API calls 13846->13847 13848 31030dc 13847->13848 13849 31045c0 2 API calls 13848->13849 13850 31030f5 13849->13850 13851 31045c0 2 API calls 13850->13851 13852 310310e 13851->13852 13853 31045c0 2 API calls 13852->13853 13854 3103127 13853->13854 13855 31045c0 2 API calls 13854->13855 13856 3103140 13855->13856 13857 31045c0 2 API calls 13856->13857 13858 3103159 13857->13858 13859 31045c0 2 API calls 13858->13859 13860 3103172 13859->13860 13861 31045c0 2 API calls 13860->13861 13862 310318b 13861->13862 13863 31045c0 2 API calls 13862->13863 13864 31031a4 13863->13864 13865 31045c0 2 API calls 13864->13865 13866 31031bd 13865->13866 13867 31045c0 2 API calls 13866->13867 13868 31031d6 13867->13868 13869 31045c0 2 API calls 13868->13869 13870 31031ef 13869->13870 13871 31045c0 2 API calls 13870->13871 13872 3103208 13871->13872 13873 31045c0 2 API calls 13872->13873 13874 3103221 13873->13874 13875 31045c0 2 API calls 13874->13875 13876 310323a 13875->13876 13877 31045c0 2 API calls 13876->13877 13878 3103253 13877->13878 13879 31045c0 2 API calls 13878->13879 13880 310326c 13879->13880 13881 31045c0 2 API calls 13880->13881 13882 3103285 13881->13882 13883 31045c0 2 API calls 13882->13883 13884 310329e 13883->13884 13885 31045c0 2 API calls 13884->13885 13886 31032b7 13885->13886 13887 31045c0 2 API calls 13886->13887 13888 31032d0 13887->13888 13889 31045c0 2 API calls 13888->13889 13890 31032e9 13889->13890 13891 31045c0 2 API calls 13890->13891 13892 3103302 13891->13892 13893 31045c0 2 API calls 13892->13893 13894 310331b 13893->13894 13895 31045c0 2 API calls 13894->13895 13896 3103334 13895->13896 13897 31045c0 2 API calls 13896->13897 13898 310334d 13897->13898 13899 31045c0 2 API calls 13898->13899 13900 3103366 13899->13900 13901 31045c0 2 API calls 13900->13901 13902 310337f 13901->13902 13903 31045c0 2 API calls 13902->13903 13904 3103398 13903->13904 13905 31045c0 2 API calls 13904->13905 13906 31033b1 13905->13906 13907 31045c0 2 API calls 13906->13907 13908 31033ca 13907->13908 13909 31045c0 2 API calls 13908->13909 13910 31033e3 13909->13910 13911 31045c0 2 API calls 13910->13911 13912 31033fc 13911->13912 13913 31045c0 2 API calls 13912->13913 13914 3103415 13913->13914 13915 31045c0 2 API calls 13914->13915 13916 310342e 13915->13916 13917 31045c0 2 API calls 13916->13917 13918 3103447 13917->13918 13919 31045c0 2 API calls 13918->13919 13920 3103460 13919->13920 13921 31045c0 2 API calls 13920->13921 13922 3103479 13921->13922 13923 31045c0 2 API calls 13922->13923 13924 3103492 13923->13924 13925 31045c0 2 API calls 13924->13925 13926 31034ab 13925->13926 13927 31045c0 2 API calls 13926->13927 13928 31034c4 13927->13928 13929 31045c0 2 API calls 13928->13929 13930 31034dd 13929->13930 13931 31045c0 2 API calls 13930->13931 13932 31034f6 13931->13932 13933 31045c0 2 API calls 13932->13933 13934 310350f 13933->13934 13935 31045c0 2 API calls 13934->13935 13936 3103528 13935->13936 13937 31045c0 2 API calls 13936->13937 13938 3103541 13937->13938 13939 31045c0 2 API calls 13938->13939 13940 310355a 13939->13940 13941 31045c0 2 API calls 13940->13941 13942 3103573 13941->13942 13943 31045c0 2 API calls 13942->13943 13944 310358c 13943->13944 13945 31045c0 2 API calls 13944->13945 13946 31035a5 13945->13946 13947 31045c0 2 API calls 13946->13947 13948 31035be 13947->13948 13949 31045c0 2 API calls 13948->13949 13950 31035d7 13949->13950 13951 31045c0 2 API calls 13950->13951 13952 31035f0 13951->13952 13953 31045c0 2 API calls 13952->13953 13954 3103609 13953->13954 13955 31045c0 2 API calls 13954->13955 13956 3103622 13955->13956 13957 31045c0 2 API calls 13956->13957 13958 310363b 13957->13958 13959 31045c0 2 API calls 13958->13959 13960 3103654 13959->13960 13961 31045c0 2 API calls 13960->13961 13962 310366d 13961->13962 13963 31045c0 2 API calls 13962->13963 13964 3103686 13963->13964 13965 31045c0 2 API calls 13964->13965 13966 310369f 13965->13966 13967 31045c0 2 API calls 13966->13967 13968 31036b8 13967->13968 13969 31045c0 2 API calls 13968->13969 13970 31036d1 13969->13970 13971 31045c0 2 API calls 13970->13971 13972 31036ea 13971->13972 13973 31045c0 2 API calls 13972->13973 13974 3103703 13973->13974 13975 31045c0 2 API calls 13974->13975 13976 310371c 13975->13976 13977 31045c0 2 API calls 13976->13977 13978 3103735 13977->13978 13979 31045c0 2 API calls 13978->13979 13980 310374e 13979->13980 13981 31045c0 2 API calls 13980->13981 13982 3103767 13981->13982 13983 31045c0 2 API calls 13982->13983 13984 3103780 13983->13984 13985 31045c0 2 API calls 13984->13985 13986 3103799 13985->13986 13987 31045c0 2 API calls 13986->13987 13988 31037b2 13987->13988 13989 31045c0 2 API calls 13988->13989 13990 31037cb 13989->13990 13991 31045c0 2 API calls 13990->13991 13992 31037e4 13991->13992 13993 31045c0 2 API calls 13992->13993 13994 31037fd 13993->13994 13995 31045c0 2 API calls 13994->13995 13996 3103816 13995->13996 13997 31045c0 2 API calls 13996->13997 13998 310382f 13997->13998 13999 31045c0 2 API calls 13998->13999 14000 3103848 13999->14000 14001 31045c0 2 API calls 14000->14001 14002 3103861 14001->14002 14003 31045c0 2 API calls 14002->14003 14004 310387a 14003->14004 14005 31045c0 2 API calls 14004->14005 14006 3103893 14005->14006 14007 31045c0 2 API calls 14006->14007 14008 31038ac 14007->14008 14009 31045c0 2 API calls 14008->14009 14010 31038c5 14009->14010 14011 31045c0 2 API calls 14010->14011 14012 31038de 14011->14012 14013 31045c0 2 API calls 14012->14013 14014 31038f7 14013->14014 14015 31045c0 2 API calls 14014->14015 14016 3103910 14015->14016 14017 31045c0 2 API calls 14016->14017 14018 3103929 14017->14018 14019 31045c0 2 API calls 14018->14019 14020 3103942 14019->14020 14021 31045c0 2 API calls 14020->14021 14022 310395b 14021->14022 14023 31045c0 2 API calls 14022->14023 14024 3103974 14023->14024 14025 31045c0 2 API calls 14024->14025 14026 310398d 14025->14026 14027 31045c0 2 API calls 14026->14027 14028 31039a6 14027->14028 14029 31045c0 2 API calls 14028->14029 14030 31039bf 14029->14030 14031 31045c0 2 API calls 14030->14031 14032 31039d8 14031->14032 14033 31045c0 2 API calls 14032->14033 14034 31039f1 14033->14034 14035 31045c0 2 API calls 14034->14035 14036 3103a0a 14035->14036 14037 31045c0 2 API calls 14036->14037 14038 3103a23 14037->14038 14039 31045c0 2 API calls 14038->14039 14040 3103a3c 14039->14040 14041 31045c0 2 API calls 14040->14041 14042 3103a55 14041->14042 14043 31045c0 2 API calls 14042->14043 14044 3103a6e 14043->14044 14045 31045c0 2 API calls 14044->14045 14046 3103a87 14045->14046 14047 31045c0 2 API calls 14046->14047 14048 3103aa0 14047->14048 14049 31045c0 2 API calls 14048->14049 14050 3103ab9 14049->14050 14051 31045c0 2 API calls 14050->14051 14052 3103ad2 14051->14052 14053 31045c0 2 API calls 14052->14053 14054 3103aeb 14053->14054 14055 31045c0 2 API calls 14054->14055 14056 3103b04 14055->14056 14057 31045c0 2 API calls 14056->14057 14058 3103b1d 14057->14058 14059 31045c0 2 API calls 14058->14059 14060 3103b36 14059->14060 14061 31045c0 2 API calls 14060->14061 14062 3103b4f 14061->14062 14063 31045c0 2 API calls 14062->14063 14064 3103b68 14063->14064 14065 31045c0 2 API calls 14064->14065 14066 3103b81 14065->14066 14067 31045c0 2 API calls 14066->14067 14068 3103b9a 14067->14068 14069 31045c0 2 API calls 14068->14069 14070 3103bb3 14069->14070 14071 31045c0 2 API calls 14070->14071 14072 3103bcc 14071->14072 14073 31045c0 2 API calls 14072->14073 14074 3103be5 14073->14074 14075 31045c0 2 API calls 14074->14075 14076 3103bfe 14075->14076 14077 31045c0 2 API calls 14076->14077 14078 3103c17 14077->14078 14079 31045c0 2 API calls 14078->14079 14080 3103c30 14079->14080 14081 31045c0 2 API calls 14080->14081 14082 3103c49 14081->14082 14083 31045c0 2 API calls 14082->14083 14084 3103c62 14083->14084 14085 31045c0 2 API calls 14084->14085 14086 3103c7b 14085->14086 14087 31045c0 2 API calls 14086->14087 14088 3103c94 14087->14088 14089 31045c0 2 API calls 14088->14089 14090 3103cad 14089->14090 14091 31045c0 2 API calls 14090->14091 14092 3103cc6 14091->14092 14093 31045c0 2 API calls 14092->14093 14094 3103cdf 14093->14094 14095 31045c0 2 API calls 14094->14095 14096 3103cf8 14095->14096 14097 31045c0 2 API calls 14096->14097 14098 3103d11 14097->14098 14099 31045c0 2 API calls 14098->14099 14100 3103d2a 14099->14100 14101 31045c0 2 API calls 14100->14101 14102 3103d43 14101->14102 14103 31045c0 2 API calls 14102->14103 14104 3103d5c 14103->14104 14105 31045c0 2 API calls 14104->14105 14106 3103d75 14105->14106 14107 31045c0 2 API calls 14106->14107 14108 3103d8e 14107->14108 14109 31045c0 2 API calls 14108->14109 14110 3103da7 14109->14110 14111 31045c0 2 API calls 14110->14111 14112 3103dc0 14111->14112 14113 31045c0 2 API calls 14112->14113 14114 3103dd9 14113->14114 14115 31045c0 2 API calls 14114->14115 14116 3103df2 14115->14116 14117 31045c0 2 API calls 14116->14117 14118 3103e0b 14117->14118 14119 31045c0 2 API calls 14118->14119 14120 3103e24 14119->14120 14121 31045c0 2 API calls 14120->14121 14122 3103e3d 14121->14122 14123 31045c0 2 API calls 14122->14123 14124 3103e56 14123->14124 14125 31045c0 2 API calls 14124->14125 14126 3103e6f 14125->14126 14127 31045c0 2 API calls 14126->14127 14128 3103e88 14127->14128 14129 31045c0 2 API calls 14128->14129 14130 3103ea1 14129->14130 14131 31045c0 2 API calls 14130->14131 14132 3103eba 14131->14132 14133 31045c0 2 API calls 14132->14133 14134 3103ed3 14133->14134 14135 31045c0 2 API calls 14134->14135 14136 3103eec 14135->14136 14137 31045c0 2 API calls 14136->14137 14138 3103f05 14137->14138 14139 31045c0 2 API calls 14138->14139 14140 3103f1e 14139->14140 14141 31045c0 2 API calls 14140->14141 14142 3103f37 14141->14142 14143 31045c0 2 API calls 14142->14143 14144 3103f50 14143->14144 14145 31045c0 2 API calls 14144->14145 14146 3103f69 14145->14146 14147 31045c0 2 API calls 14146->14147 14148 3103f82 14147->14148 14149 31045c0 2 API calls 14148->14149 14150 3103f9b 14149->14150 14151 31045c0 2 API calls 14150->14151 14152 3103fb4 14151->14152 14153 31045c0 2 API calls 14152->14153 14154 3103fcd 14153->14154 14155 31045c0 2 API calls 14154->14155 14156 3103fe6 14155->14156 14157 31045c0 2 API calls 14156->14157 14158 3103fff 14157->14158 14159 31045c0 2 API calls 14158->14159 14160 3104018 14159->14160 14161 31045c0 2 API calls 14160->14161 14162 3104031 14161->14162 14163 31045c0 2 API calls 14162->14163 14164 310404a 14163->14164 14165 31045c0 2 API calls 14164->14165 14166 3104063 14165->14166 14167 31045c0 2 API calls 14166->14167 14168 310407c 14167->14168 14169 31045c0 2 API calls 14168->14169 14170 3104095 14169->14170 14171 31045c0 2 API calls 14170->14171 14172 31040ae 14171->14172 14173 31045c0 2 API calls 14172->14173 14174 31040c7 14173->14174 14175 31045c0 2 API calls 14174->14175 14176 31040e0 14175->14176 14177 31045c0 2 API calls 14176->14177 14178 31040f9 14177->14178 14179 31045c0 2 API calls 14178->14179 14180 3104112 14179->14180 14181 31045c0 2 API calls 14180->14181 14182 310412b 14181->14182 14183 31045c0 2 API calls 14182->14183 14184 3104144 14183->14184 14185 31045c0 2 API calls 14184->14185 14186 310415d 14185->14186 14187 31045c0 2 API calls 14186->14187 14188 3104176 14187->14188 14189 31045c0 2 API calls 14188->14189 14190 310418f 14189->14190 14191 31045c0 2 API calls 14190->14191 14192 31041a8 14191->14192 14193 31045c0 2 API calls 14192->14193 14194 31041c1 14193->14194 14195 31045c0 2 API calls 14194->14195 14196 31041da 14195->14196 14197 31045c0 2 API calls 14196->14197 14198 31041f3 14197->14198 14199 31045c0 2 API calls 14198->14199 14200 310420c 14199->14200 14201 31045c0 2 API calls 14200->14201 14202 3104225 14201->14202 14203 31045c0 2 API calls 14202->14203 14204 310423e 14203->14204 14205 31045c0 2 API calls 14204->14205 14206 3104257 14205->14206 14207 31045c0 2 API calls 14206->14207 14208 3104270 14207->14208 14209 31045c0 2 API calls 14208->14209 14210 3104289 14209->14210 14211 31045c0 2 API calls 14210->14211 14212 31042a2 14211->14212 14213 31045c0 2 API calls 14212->14213 14214 31042bb 14213->14214 14215 31045c0 2 API calls 14214->14215 14216 31042d4 14215->14216 14217 31045c0 2 API calls 14216->14217 14218 31042ed 14217->14218 14219 31045c0 2 API calls 14218->14219 14220 3104306 14219->14220 14221 31045c0 2 API calls 14220->14221 14222 310431f 14221->14222 14223 31045c0 2 API calls 14222->14223 14224 3104338 14223->14224 14225 31045c0 2 API calls 14224->14225 14226 3104351 14225->14226 14227 31045c0 2 API calls 14226->14227 14228 310436a 14227->14228 14229 31045c0 2 API calls 14228->14229 14230 3104383 14229->14230 14231 31045c0 2 API calls 14230->14231 14232 310439c 14231->14232 14233 31045c0 2 API calls 14232->14233 14234 31043b5 14233->14234 14235 31045c0 2 API calls 14234->14235 14236 31043ce 14235->14236 14237 31045c0 2 API calls 14236->14237 14238 31043e7 14237->14238 14239 31045c0 2 API calls 14238->14239 14240 3104400 14239->14240 14241 31045c0 2 API calls 14240->14241 14242 3104419 14241->14242 14243 31045c0 2 API calls 14242->14243 14244 3104432 14243->14244 14245 31045c0 2 API calls 14244->14245 14246 310444b 14245->14246 14247 31045c0 2 API calls 14246->14247 14248 3104464 14247->14248 14249 31045c0 2 API calls 14248->14249 14250 310447d 14249->14250 14251 31045c0 2 API calls 14250->14251 14252 3104496 14251->14252 14253 31045c0 2 API calls 14252->14253 14254 31044af 14253->14254 14255 31045c0 2 API calls 14254->14255 14256 31044c8 14255->14256 14257 31045c0 2 API calls 14256->14257 14258 31044e1 14257->14258 14259 31045c0 2 API calls 14258->14259 14260 31044fa 14259->14260 14261 31045c0 2 API calls 14260->14261 14262 3104513 14261->14262 14263 31045c0 2 API calls 14262->14263 14264 310452c 14263->14264 14265 31045c0 2 API calls 14264->14265 14266 3104545 14265->14266 14267 31045c0 2 API calls 14266->14267 14268 310455e 14267->14268 14269 31045c0 2 API calls 14268->14269 14270 3104577 14269->14270 14271 31045c0 2 API calls 14270->14271 14272 3104590 14271->14272 14273 31045c0 2 API calls 14272->14273 14274 31045a9 14273->14274 14275 3119c10 14274->14275 14276 311a036 8 API calls 14275->14276 14278 3119c20 14275->14278 14277 311a0cc 14276->14277 14277->13571 14278->14276 14282 3115521 14279->14282 14280 31152c0 InternetCrackUrlA InternetOpenA InternetConnectA HttpOpenRequestA HttpSendRequestA 14280->14282 14281 31157dc 14281->13573 14282->14280 14282->14281 14283 31151f0 InternetCrackUrlA InternetOpenA InternetConnectA HttpOpenRequestA HttpSendRequestA 14282->14283 14283->14282 14285 3117548 GetVolumeInformationA 14284->14285 14287 3117591 14285->14287 14287->13575 14289 3104899 14288->14289 14419 31047b0 14289->14419 14291 31048a5 codecvt 14291->13577 14293 3105979 14292->14293 14294 31047b0 InternetCrackUrlA 14293->14294 14295 3105985 codecvt 14294->14295 14295->13579 14297 3111a26 14296->14297 14298 3117500 GetVolumeInformationA 14297->14298 14299 3111b96 14298->14299 14423 3117690 14299->14423 14301 3111c1e 14302 3117850 GetUserNameA 14301->14302 14303 3111d14 14302->14303 14304 31178e0 GetComputerNameA 14303->14304 14305 3111d8e 14304->14305 14430 3117a30 14305->14430 14307 3111e84 14434 3117b90 14307->14434 14309 3111f80 14438 3119470 14309->14438 14311 3112091 14442 3117e00 14311->14442 14313 3112119 14447 3117ed0 GetSystemInfo 14313->14447 14315 311220f 14449 3118100 14315->14449 14317 3112289 14453 3118320 14317->14453 14319 31124d3 14320 3118320 6 API calls 14319->14320 14321 3112568 14320->14321 14466 3118680 14321->14466 14323 3112620 14473 3115190 14323->14473 14325 3112699 14325->13585 14327 3104fd0 RtlAllocateHeap 14326->14327 14328 3104ff0 14327->14328 14329 3105070 KiUserExceptionDispatcher 14328->14329 14330 31050a0 14328->14330 14329->14328 14330->13587 14332 3110759 14331->14332 14333 3110a38 14332->14333 14336 311077d 14332->14336 14511 3110250 14333->14511 14335 3110a4e 14335->13589 14341 3110843 14336->14341 14491 310fb00 14336->14491 14338 3110a2d 14338->13589 14339 311096b 14339->14338 14503 3110030 14339->14503 14341->14339 14497 310fd60 14341->14497 14347 3101e8f 14343->14347 14344 3101f37 14618 3101310 14344->14618 14346 3101f4d 14346->13593 14347->14344 14614 31016d0 14347->14614 14351 3113dcf 14349->14351 14350 3113e18 14350->13601 14351->14350 14622 3113c90 14351->14622 14354 3113587 14353->14354 14355 31136eb 14354->14355 14631 3112e30 14354->14631 14355->13601 14358 31140da codecvt 14357->14358 14640 3113ea0 14358->14640 14360 3114185 14361 3113ea0 InternetCrackUrlA 14360->14361 14362 31141af 14361->14362 14363 3113ea0 InternetCrackUrlA 14362->14363 14364 31141d9 14363->14364 14365 3113ea0 InternetCrackUrlA 14364->14365 14366 3114203 14365->14366 14367 3113ea0 InternetCrackUrlA 14366->14367 14368 311422d 14367->14368 14369 3113ea0 InternetCrackUrlA 14368->14369 14370 3114257 codecvt 14369->14370 14370->13606 14372 3115113 14371->14372 14373 3115190 InternetCrackUrlA 14372->14373 14374 3115163 14373->14374 14374->13604 14376 311479a codecvt 14375->14376 14378 31148af codecvt 14376->14378 14644 3114570 14376->14644 14378->13605 14380 3114bca codecvt 14379->14380 14648 3114910 14380->14648 14382 3114c3d 14383 3114910 InternetCrackUrlA 14382->14383 14384 3114c72 14383->14384 14385 3114910 InternetCrackUrlA 14384->14385 14386 3114ca8 14385->14386 14387 3114910 InternetCrackUrlA 14386->14387 14388 3114cdd 14387->14388 14389 3114910 InternetCrackUrlA 14388->14389 14390 3114d13 14389->14390 14391 3114910 InternetCrackUrlA 14390->14391 14392 3114d48 codecvt 14391->14392 14392->13609 14394 3114d8d 14393->14394 14395 3114910 InternetCrackUrlA 14394->14395 14396 3114dff 14395->14396 14397 3114910 InternetCrackUrlA 14396->14397 14398 3114e8b 14397->14398 14399 3114910 InternetCrackUrlA 14398->14399 14400 3114f17 14399->14400 14400->13611 14402 3114f5a codecvt 14401->14402 14403 3114910 InternetCrackUrlA 14402->14403 14404 3114ff3 14403->14404 14405 3114910 InternetCrackUrlA 14404->14405 14406 3115028 codecvt 14405->14406 14406->13613 14408 310771d codecvt 14407->14408 14409 3115190 InternetCrackUrlA 14408->14409 14410 3107e77 codecvt 14408->14410 14409->14410 14410->13617 14412 311506a codecvt 14411->14412 14413 3114910 InternetCrackUrlA 14412->14413 14414 31150dd codecvt 14413->14414 14414->13618 14417 3119027 codecvt 14415->14417 14416 311904d 14416->13615 14417->14416 14418 3115190 InternetCrackUrlA 14417->14418 14418->14416 14420 31047c6 14419->14420 14421 3104848 InternetCrackUrlA 14420->14421 14422 3104867 14421->14422 14422->14291 14424 31176aa 14423->14424 14477 31177a0 14424->14477 14427 31176c6 RegOpenKeyExA 14428 31176bd 14427->14428 14429 31176e7 RegQueryValueExA 14427->14429 14428->14301 14429->14428 14431 3117a69 GetTimeZoneInformation 14430->14431 14433 3117a92 14431->14433 14433->14307 14437 3117bcc 14434->14437 14435 3117c46 GetLocaleInfoA 14435->14437 14436 3117d18 14436->14309 14437->14435 14437->14436 14439 311948a 14438->14439 14440 3119493 K32GetModuleFileNameExA 14439->14440 14441 31194b5 14439->14441 14440->14441 14441->14311 14443 3117e3d RegOpenKeyExA 14442->14443 14445 3117e68 RegQueryValueExA 14443->14445 14446 3117e87 14443->14446 14445->14446 14446->14313 14448 3117f1c 14447->14448 14448->14315 14450 3118136 14449->14450 14451 311814d GlobalMemoryStatusEx 14450->14451 14452 3118163 __aulldiv 14451->14452 14452->14317 14485 311a740 14453->14485 14455 311835c RegOpenKeyExA 14456 31183d0 14455->14456 14462 31183ae 14455->14462 14457 31183f8 RegEnumKeyExA 14456->14457 14456->14462 14458 311843f RegOpenKeyExA 14457->14458 14457->14462 14460 31184c1 RegQueryValueExA 14458->14460 14458->14462 14461 3118601 RegCloseKey 14460->14461 14463 31184fa 14460->14463 14461->14462 14462->14319 14463->14461 14464 311856e RegQueryValueExA 14463->14464 14464->14461 14465 31185a3 14464->14465 14465->14461 14467 311a740 14466->14467 14468 31186bc CreateToolhelp32Snapshot Process32First 14467->14468 14469 31186e8 Process32Next 14468->14469 14470 311875d CloseHandle 14468->14470 14469->14470 14472 31186fd 14469->14472 14471 3118776 14470->14471 14471->14323 14472->14469 14474 31151b5 14473->14474 14487 3105100 14474->14487 14476 31151cf 14476->14325 14480 3117720 14477->14480 14479 31176b9 14479->14427 14479->14428 14481 311773a RegOpenKeyExA 14480->14481 14483 3117765 RegQueryValueExA 14481->14483 14484 3117780 14481->14484 14483->14484 14484->14479 14486 311a750 14485->14486 14486->14455 14488 3105119 14487->14488 14489 31047b0 InternetCrackUrlA 14488->14489 14490 3105125 codecvt 14489->14490 14490->14476 14492 310fb16 14491->14492 14515 310be70 14492->14515 14494 310fc9a 14526 310ec30 14494->14526 14496 310fd0c 14496->14341 14498 310fd76 14497->14498 14499 310be70 InternetCrackUrlA 14498->14499 14500 310ff61 14499->14500 14501 310ec30 InternetCrackUrlA 14500->14501 14502 310ffd3 14501->14502 14502->14339 14504 3110046 14503->14504 14506 311021e 14504->14506 14554 31126c0 14504->14554 14506->14338 14507 3110138 14507->14506 14568 310da80 14507->14568 14509 311019f 14576 310f6b0 14509->14576 14514 3110266 14511->14514 14512 31106c4 14512->14335 14513 3115190 InternetCrackUrlA 14513->14512 14514->14512 14514->14513 14517 310be86 14515->14517 14516 310bf04 14516->14494 14517->14516 14519 310be70 InternetCrackUrlA 14517->14519 14520 310a790 InternetCrackUrlA 14517->14520 14522 3115190 InternetCrackUrlA 14517->14522 14530 310a260 14517->14530 14534 310aef0 14517->14534 14538 310b4f0 14517->14538 14542 310ba80 14517->14542 14546 310b230 14517->14546 14519->14517 14520->14517 14522->14517 14528 310ec3f 14526->14528 14527 310ecf9 14527->14496 14528->14527 14550 310e430 14528->14550 14533 310a276 14530->14533 14531 310a6f7 14531->14517 14532 3115190 InternetCrackUrlA 14532->14531 14533->14531 14533->14532 14537 310af06 14534->14537 14535 3115190 InternetCrackUrlA 14536 310b1b9 14535->14536 14536->14517 14537->14535 14537->14536 14541 310b506 14538->14541 14539 3115190 InternetCrackUrlA 14540 310ba11 14539->14540 14540->14517 14541->14539 14541->14540 14545 310ba96 14542->14545 14543 3115190 InternetCrackUrlA 14544 310bdf4 14543->14544 14544->14517 14545->14543 14545->14544 14547 310b246 14546->14547 14548 310b47d 14547->14548 14549 3115190 InternetCrackUrlA 14547->14549 14548->14517 14549->14548 14552 310e44d 14550->14552 14551 310e4b1 14551->14528 14552->14551 14553 310de10 InternetCrackUrlA 14552->14553 14553->14552 14555 31126d6 14554->14555 14567 3112c1b 14554->14567 14581 31060a0 14555->14581 14557 3112b61 14558 31060a0 InternetCrackUrlA 14557->14558 14559 3112b88 14558->14559 14560 31060a0 InternetCrackUrlA 14559->14560 14561 3112bac 14560->14561 14562 31060a0 InternetCrackUrlA 14561->14562 14563 3112bd3 14562->14563 14564 31060a0 InternetCrackUrlA 14563->14564 14565 3112bf7 14564->14565 14566 31060a0 InternetCrackUrlA 14565->14566 14566->14567 14567->14507 14569 310da96 14568->14569 14570 310dafa 14569->14570 14575 310da80 InternetCrackUrlA 14569->14575 14585 310cef0 14569->14585 14589 310d400 14569->14589 14593 310c990 14569->14593 14597 310d780 14569->14597 14570->14509 14575->14569 14577 310f6c6 14576->14577 14578 310f72d 14577->14578 14579 310f6b0 InternetCrackUrlA 14577->14579 14601 310f4a0 14577->14601 14578->14506 14579->14577 14582 31060b9 14581->14582 14583 31047b0 InternetCrackUrlA 14582->14583 14584 31060c5 codecvt 14583->14584 14584->14557 14586 310cf06 14585->14586 14587 310d36f 14586->14587 14588 3115190 InternetCrackUrlA 14586->14588 14587->14569 14588->14587 14592 310d416 14589->14592 14590 310d6e7 14590->14569 14591 3115190 InternetCrackUrlA 14591->14590 14592->14590 14592->14591 14596 310c9a4 14593->14596 14594 310ce7f 14594->14569 14595 3115190 InternetCrackUrlA 14595->14594 14596->14594 14596->14595 14599 310d796 14597->14599 14598 310d9ee 14598->14569 14599->14598 14600 3115190 InternetCrackUrlA 14599->14600 14600->14598 14603 310f4bf 14601->14603 14602 310f653 14602->14577 14603->14602 14605 310f300 14603->14605 14606 310f313 14605->14606 14608 310f43c 14606->14608 14609 310ed20 14606->14609 14608->14602 14611 310ed31 14609->14611 14610 310ed6a 14610->14608 14611->14610 14612 3115190 InternetCrackUrlA 14611->14612 14613 310ed20 InternetCrackUrlA 14611->14613 14612->14611 14613->14611 14616 31016e6 codecvt 14614->14616 14615 3101932 14615->14347 14616->14615 14617 3115190 InternetCrackUrlA 14616->14617 14617->14616 14619 310132d 14618->14619 14620 3115190 InternetCrackUrlA 14619->14620 14621 31014d2 14619->14621 14620->14621 14621->14346 14623 3113caa 14622->14623 14625 3113d32 codecvt 14623->14625 14626 31138b0 14623->14626 14625->14351 14628 31138d2 codecvt __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 14626->14628 14627 3113909 14627->14623 14628->14627 14629 31138b0 InternetCrackUrlA 14628->14629 14630 3115190 InternetCrackUrlA 14628->14630 14629->14628 14630->14628 14632 3112e46 14631->14632 14633 311315a 14632->14633 14634 3113398 14632->14634 14636 31131e5 14632->14636 14637 3113047 14632->14637 14633->14354 14635 31060a0 InternetCrackUrlA 14634->14635 14635->14633 14639 31060a0 InternetCrackUrlA 14636->14639 14638 31060a0 InternetCrackUrlA 14637->14638 14638->14633 14639->14633 14642 3113ec9 codecvt 14640->14642 14641 3113eef codecvt 14641->14360 14642->14641 14643 3115190 InternetCrackUrlA 14642->14643 14643->14642 14646 3114586 codecvt 14644->14646 14645 31145d2 codecvt 14645->14378 14646->14645 14647 3115190 InternetCrackUrlA 14646->14647 14647->14645 14651 3114932 codecvt 14648->14651 14649 3114958 14649->14382 14650 3114910 InternetCrackUrlA 14650->14651 14651->14649 14651->14650 14652 3115190 InternetCrackUrlA 14651->14652 14652->14651 14653 3116af3 14655 3116ab1 14653->14655 14654 3115b10 41 API calls 14656 3116b16 14654->14656 14655->14654 14657 3110765 14658 311076e 14657->14658 14659 3110a38 14658->14659 14662 311077d 14658->14662 14660 3110250 InternetCrackUrlA 14659->14660 14661 3110a4e 14660->14661 14663 310fb00 InternetCrackUrlA 14662->14663 14667 3110843 14662->14667 14663->14667 14664 3110a2d 14665 311096b 14665->14664 14666 3110030 InternetCrackUrlA 14665->14666 14666->14664 14667->14665 14668 310fd60 InternetCrackUrlA 14667->14668 14668->14665 14669 3113bdb 14672 3113916 codecvt __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 14669->14672 14670 3113baa 14671 31138b0 InternetCrackUrlA 14671->14672 14672->14670 14672->14671 14673 3115190 InternetCrackUrlA 14672->14673 14673->14672 14674 31183dc 14675 31183eb 14674->14675 14676 31183f8 RegEnumKeyExA 14675->14676 14681 3118485 14675->14681 14677 311843f RegOpenKeyExA 14676->14677 14676->14681 14679 31184c1 RegQueryValueExA 14677->14679 14677->14681 14680 3118601 RegCloseKey 14679->14680 14682 31184fa 14679->14682 14680->14681 14682->14680 14683 311856e RegQueryValueExA 14682->14683 14683->14680 14684 31185a3 14683->14684 14684->14680

                                    Control-flow Graph

                                    APIs
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,031205B7), ref: 031186CA
                                    • Process32First.KERNEL32(?,00000128), ref: 031186DE
                                    • Process32Next.KERNEL32(?,00000128), ref: 031186F3
                                    • CloseHandle.KERNELBASE(?), ref: 03118761
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                    • String ID:
                                    • API String ID: 420147892-0
                                    • Opcode ID: 91a28774da90537830b3cbaea8e762de4e5220cdac2744791b0d5bfea46271f7
                                    • Instruction ID: 3c479647aafe10dbe3ee5d0a0fb3f94f4455682b3d68a14145662f91e3cdcb71
                                    • Opcode Fuzzy Hash: 91a28774da90537830b3cbaea8e762de4e5220cdac2744791b0d5bfea46271f7
                                    • Instruction Fuzzy Hash: A5318276942218ABCB24EF90CC50FEEBB7CEF49711F0041A9E109A6190DF706B55CFA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 385 31045c0-3104695 RtlAllocateHeap 402 31046a0-31046a6 385->402 403 31046ac-310474a 402->403 404 310474f-31047a9 VirtualProtect 402->404 403->402
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,031169FB), ref: 0310460E
                                    • VirtualProtect.KERNELBASE(?,00000004,00000100,00000000), ref: 0310479C
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeapProtectVirtual
                                    • String ID:
                                    • API String ID: 1542196881-0
                                    • Opcode ID: 7dfd5ba896443b7ae9256566fa0bf48f7273d5df111318bd38fdcd32cf45c242
                                    • Instruction ID: 916eae662332728ef7f0f2c4adb57caef476404afc881775dc292fd9cda4bda5
                                    • Opcode Fuzzy Hash: 7dfd5ba896443b7ae9256566fa0bf48f7273d5df111318bd38fdcd32cf45c242
                                    • Instruction Fuzzy Hash: 3241A975740214EFC71CFBE4E9CDA9CBF76AB4D617B408044F92299149CBB0D5A19B32
                                    APIs
                                    • GetLocaleInfoA.KERNELBASE(?,00000002,?,00000200), ref: 03117C62
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InfoLocale
                                    • String ID:
                                    • API String ID: 2299586839-0
                                    • Opcode ID: 927d682ec6bfed238d8d39327663468a1562ca4ec6bc93d5cc99eec8bcfea568
                                    • Instruction ID: 26cfa0aabd36d3ef344e4fb83b560d50ecc8f7e428224dffb890cbc1f6ef3dbf
                                    • Opcode Fuzzy Hash: 927d682ec6bfed238d8d39327663468a1562ca4ec6bc93d5cc99eec8bcfea568
                                    • Instruction Fuzzy Hash: 42414B7594121CABDB24DB94DC98BEEB778FF48711F1041A9E00A66280DB746F96CFA0
                                    APIs
                                    • GetTimeZoneInformation.KERNELBASE(?,?,?,?,00000000,00000000,?,?,00000000,?,03120E10,00000000,?,00000000,00000000,?), ref: 03117A7D
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InformationTimeZone
                                    • String ID:
                                    • API String ID: 565725191-0
                                    • Opcode ID: 13a277229e3b6b11f7f957095603f2bbe2a7c0ee2f26b706147c6ae4c980168a
                                    • Instruction ID: 225428a14394093c350f813f31c3f942b459e5c158ef2301dade12fe64a419b2
                                    • Opcode Fuzzy Hash: 13a277229e3b6b11f7f957095603f2bbe2a7c0ee2f26b706147c6ae4c980168a
                                    • Instruction Fuzzy Hash: 9C1182B1945228DFEB10DB54DC45FAABBBCF704712F0047A5E516932C0DB742A40CF51
                                    APIs
                                    • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0311789F
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: NameUser
                                    • String ID:
                                    • API String ID: 2645101109-0
                                    • Opcode ID: ecbd1248566743285912b0113b24280d3852effd1db67af16634d94baf0514a3
                                    • Instruction ID: 8831e8759d4175ff4f82bea2ab4f6620455dd9cc5b5e6711e9f3475add39ee31
                                    • Opcode Fuzzy Hash: ecbd1248566743285912b0113b24280d3852effd1db67af16634d94baf0514a3
                                    • Instruction Fuzzy Hash: 5DF04FB5944208AFC714DF98D985BAEBFFCEB09712F10026AFA15A2680C77425048BA1
                                    APIs
                                    • GetSystemInfo.KERNELBASE(03120E2C), ref: 03117F00
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InfoSystem
                                    • String ID:
                                    • API String ID: 31276548-0
                                    • Opcode ID: 4c97fef05afd22c441b9106895c02af6834e8a10802b5874f429f7e319cfa822
                                    • Instruction ID: 49b001de72f4c4829d05b416916f36a7968dde98e13f36915e9fdb2b9f806102
                                    • Opcode Fuzzy Hash: 4c97fef05afd22c441b9106895c02af6834e8a10802b5874f429f7e319cfa822
                                    • Instruction Fuzzy Hash: 02F0F0B1A40218EFCB10DF84EC45FEAFBBCFB48A20F000669F52592280D77929148BE0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 3119c10-3119c1a 1 3119c20-311a031 0->1 2 311a036-311a0ca LoadLibraryA * 8 0->2 1->2 3 311a146-311a14d 2->3 4 311a0cc-311a141 2->4 5 311a153-311a211 3->5 6 311a216-311a21d 3->6 4->3 5->6 8 311a298-311a29f 6->8 9 311a21f-311a293 6->9 13 311a2a5-311a332 8->13 14 311a337-311a33e 8->14 9->8 13->14 17 311a344-311a41a 14->17 18 311a41f-311a426 14->18 17->18 19 311a4a2-311a4a9 18->19 20 311a428-311a49d 18->20 26 311a4ab-311a4d7 19->26 27 311a4dc-311a4e3 19->27 20->19 26->27 31 311a515-311a51c 27->31 32 311a4e5-311a510 27->32 36 311a612-311a619 31->36 37 311a522-311a60d 31->37 32->31 46 311a61b-311a678 36->46 47 311a67d-311a684 36->47 37->36 46->47 50 311a686-311a699 47->50 51 311a69e-311a6a5 47->51 50->51 61 311a6a7-311a703 51->61 62 311a708-311a709 51->62 61->62
                                    APIs
                                    • LoadLibraryA.KERNELBASE(?,?,03115CA3,?,00000034,00000064,03116600,?,0000002C,00000064,031165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0311A03D
                                    • LoadLibraryA.KERNELBASE(?,?,03115CA3,?,00000034,00000064,03116600,?,0000002C,00000064,031165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0311A04E
                                    • LoadLibraryA.KERNELBASE(?,?,03115CA3,?,00000034,00000064,03116600,?,0000002C,00000064,031165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0311A060
                                    • LoadLibraryA.KERNELBASE(?,?,03115CA3,?,00000034,00000064,03116600,?,0000002C,00000064,031165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0311A072
                                    • LoadLibraryA.KERNELBASE(?,?,03115CA3,?,00000034,00000064,03116600,?,0000002C,00000064,031165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0311A083
                                    • LoadLibraryA.KERNELBASE(?,?,03115CA3,?,00000034,00000064,03116600,?,0000002C,00000064,031165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0311A095
                                    • LoadLibraryA.KERNELBASE(?,?,03115CA3,?,00000034,00000064,03116600,?,0000002C,00000064,031165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0311A0A7
                                    • LoadLibraryA.KERNELBASE(?,?,03115CA3,?,00000034,00000064,03116600,?,0000002C,00000064,031165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0311A0B8
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 8a255c84f5bb227e0bc6ace18671707ba2287f72a7034f6cacbdb36ef5c0a10d
                                    • Instruction ID: adc55835145c9a38dd47d6d3d12d7928a664b16a5f6dc1836dfa8bbc352158de
                                    • Opcode Fuzzy Hash: 8a255c84f5bb227e0bc6ace18671707ba2287f72a7034f6cacbdb36ef5c0a10d
                                    • Instruction Fuzzy Hash: 8062D7BE5D4240AFD364FBA8E6C89563FFDE788702B14851AB6198324CDF39B441DB60

                                    Control-flow Graph

                                    APIs
                                    • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00020019,00000000,031205B6), ref: 031183A4
                                    • RegEnumKeyExA.KERNELBASE(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 03118426
                                    • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00020019,00000000), ref: 0311847B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Open$Enum
                                    • String ID: ?
                                    • API String ID: 462099255-1684325040
                                    • Opcode ID: 4f18666261df95548d4870c2c3544609662d9b297d54b07eb042929f025ae170
                                    • Instruction ID: 830df93a118898f24daa689a669c4b6874459ec4ab07fef929e622182dc237fc
                                    • Opcode Fuzzy Hash: 4f18666261df95548d4870c2c3544609662d9b297d54b07eb042929f025ae170
                                    • Instruction Fuzzy Hash: 3F81FB7595121C9BEB24EB50CD94FEABBBCBF08711F0082A8E109A6140DF716B96CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 188 3117500-311754a 190 3117553-31175c7 GetVolumeInformationA call 3118d00 * 3 188->190 191 311754c 188->191 198 31175d8-31175df 190->198 191->190 199 31175e1-31175fa call 3118d00 198->199 200 31175fc-3117617 198->200 199->198 206 3117619-3117626 call 311a740 200->206 207 3117628-3117658 call 311a740 200->207 211 311767e-311768e 206->211 207->211
                                    APIs
                                    • GetVolumeInformationA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0311757F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InformationVolume
                                    • String ID: :$C$\
                                    • API String ID: 2039140958-3809124531
                                    • Opcode ID: 58da1bc9dd6f06ca3f46bf34b1a82f5bb1affd849f960be5f592e10c3ef0cb84
                                    • Instruction ID: c4d97a6a4cba049642d802d075439a7cf0d76d487e2e8642712f639232fe50ec
                                    • Opcode Fuzzy Hash: 58da1bc9dd6f06ca3f46bf34b1a82f5bb1affd849f960be5f592e10c3ef0cb84
                                    • Instruction Fuzzy Hash: C04184B5D40358ABDF10DF94DC84BDEBBB8EF0C700F0041A9E50967280D7756A54CBA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 214 3118100-3118161 call 31189b0 GlobalMemoryStatusEx 219 3118163-311818b call 311da00 * 2 214->219 220 311818d-3118194 214->220 222 311819b-31181e3 219->222 220->222
                                    APIs
                                    • GlobalMemoryStatusEx.KERNELBASE(00000040,00000040,00000000), ref: 03118158
                                    • __aulldiv.LIBCMT ref: 03118172
                                    • __aulldiv.LIBCMT ref: 03118180
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __aulldiv$GlobalMemoryStatus
                                    • String ID: @
                                    • API String ID: 2185283323-2766056989
                                    • Opcode ID: 37be7348d3f614fcd4d6718ee19d7b499ab0440d64640b7c564776521c0b6c2b
                                    • Instruction ID: f92fd8b64153f9b54be002a6a6b7c0f8f54eb26d7705415bb35bfa193e438139
                                    • Opcode Fuzzy Hash: 37be7348d3f614fcd4d6718ee19d7b499ab0440d64640b7c564776521c0b6c2b
                                    • Instruction Fuzzy Hash: B5213BB1E44218ABDB00DFD4DC49FAEBBB8FB48B00F104219F605BB280D77869008BA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 228 3101220-3101247 call 31189b0 GlobalMemoryStatusEx 231 3101273-310127a 228->231 232 3101249-3101271 call 311da00 * 2 228->232 234 3101281-3101285 231->234 232->234 236 3101287 234->236 237 310129a-310129d 234->237 239 3101292 236->239 240 3101289-3101290 236->240 239->237 240->237 240->239
                                    APIs
                                    • GlobalMemoryStatusEx.KERNELBASE(00000040,?,00000000,00000040), ref: 0310123E
                                    • __aulldiv.LIBCMT ref: 03101258
                                    • __aulldiv.LIBCMT ref: 03101266
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __aulldiv$GlobalMemoryStatus
                                    • String ID: @
                                    • API String ID: 2185283323-2766056989
                                    • Opcode ID: c658ac2e9ec366f88f06a5d475e8f4c405b87cfc3196fe38ed21ce18a889d11c
                                    • Instruction ID: b65e84bbaac5f7d15a75d6c95d667d6040ba8a33e81540a0fbfb79d80508bab0
                                    • Opcode Fuzzy Hash: c658ac2e9ec366f88f06a5d475e8f4c405b87cfc3196fe38ed21ce18a889d11c
                                    • Instruction Fuzzy Hash: 290112B4D84308FBEB10DBD4DC49B9DBB78AB0C705F248064E705BA1C0D7B895458759

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 031047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 03104849
                                    • InternetOpenA.WININET(03120DFE,00000001,00000000,00000000,00000000,03120DFB), ref: 031062E1
                                    • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 03106335
                                    • HttpOpenRequestA.WININET(00000000,03121A28,?,?,00000000,00000000,00400100,00000000), ref: 03106385
                                    • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 031063D1
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Internet$HttpOpenRequest$ConnectCrackSend
                                    • String ID:
                                    • API String ID: 612470270-0
                                    • Opcode ID: 07f23bd075dbbc4c886fc1a9aaa5e417ad2a5faf03951ea9652040342162c9b8
                                    • Instruction ID: 6eedc08a3e0de508e9a197e55a29d28f80621bcabfa975d66d18e8554d0ddfe2
                                    • Opcode Fuzzy Hash: 07f23bd075dbbc4c886fc1a9aaa5e417ad2a5faf03951ea9652040342162c9b8
                                    • Instruction Fuzzy Hash: 57713275A40318ABDB14EFA0DC84BDE7B78FF48711F104168E509AB1C4DBB56A95CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 325 3119860-3119874 call 3119750 328 3119a93-3119af2 LoadLibraryA * 3 325->328 329 311987a-3119a8e call 3119780 325->329 335 3119af4-3119b08 328->335 336 3119b0d-3119b14 328->336 329->328 335->336 337 3119b46-3119b4d 336->337 338 3119b16-3119b41 336->338 341 3119b68-3119b6f 337->341 342 3119b4f-3119b63 337->342 338->337 345 3119b71-3119b84 341->345 346 3119b89-3119b90 341->346 342->341 345->346 347 3119bc1-3119bc2 346->347 348 3119b92-3119bbc 346->348 348->347
                                    APIs
                                    • LoadLibraryA.KERNELBASE(?,?,03116A00), ref: 03119A9A
                                    • LoadLibraryA.KERNELBASE(?,?,03116A00), ref: 03119AAB
                                    • LoadLibraryA.KERNELBASE(?,?,03116A00), ref: 03119ACF
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 63262dd5c7f5ce388d1f20fa1c3712480bf850e878fc72eae22451574feaecb9
                                    • Instruction ID: a796b03ecece38d9042131e4ccb7253f856adbb43e8cc6006a54042df1e04415
                                    • Opcode Fuzzy Hash: 63262dd5c7f5ce388d1f20fa1c3712480bf850e878fc72eae22451574feaecb9
                                    • Instruction Fuzzy Hash: 73A1F7BE5842409FE364FFA8EAD8A663BFDE74C302B14451AB6158324CDF39B441DB50

                                    Control-flow Graph

                                    APIs
                                    • InternetCrackUrlA.WININET(00000000,00000000), ref: 03104849
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CrackInternet
                                    • String ID: <
                                    • API String ID: 1381609488-4251816714
                                    • Opcode ID: 5380c8a85fa9aa139f5c5778f0bca32cdd2e26ac1fbcb43e4bb5aeae71b92b49
                                    • Instruction ID: d795e4383779a8acd8ec13ebeeacd1dbb67a7a35777d002bf1d3e06457e84c2f
                                    • Opcode Fuzzy Hash: 5380c8a85fa9aa139f5c5778f0bca32cdd2e26ac1fbcb43e4bb5aeae71b92b49
                                    • Instruction Fuzzy Hash: 90212CB5D00209ABDF14EFA4E945BDD7B78FF44320F108225F915AB280EB706A15CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 422 3104fb0-310501a RtlAllocateHeap call 311aad0 428 3105021-3105028 422->428 429 31050a0-31050fb call 311a800 428->429 430 310502a-3105051 428->430 433 3105062-310506e 430->433 435 3105070-310509c KiUserExceptionDispatcher 433->435 436 310509e 433->436 438 3105053-310505c 435->438 436->428 438->433
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000), ref: 03104FD1
                                    • KiUserExceptionDispatcher.NTDLL(00000000,?,00000001), ref: 0310508A
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateDispatcherExceptionHeapUser
                                    • String ID:
                                    • API String ID: 3515689010-0
                                    • Opcode ID: 324a966da08ac198da0aa8521ceb50bbefa77ff7a4a40a1c294bcf4eed01a12c
                                    • Instruction ID: f320229dc9e8f9773d4654522f24496f9944d8f7114a02a21edd4992c451f637
                                    • Opcode Fuzzy Hash: 324a966da08ac198da0aa8521ceb50bbefa77ff7a4a40a1c294bcf4eed01a12c
                                    • Instruction Fuzzy Hash: D8311DB4A40218ABDB24DF54DD84BDDBBB8FB48704F1081D8F709A7284CB706AC58F98

                                    Control-flow Graph

                                    APIs
                                    • RegEnumKeyExA.KERNELBASE(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 03118426
                                    • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00020019,00000000), ref: 0311847B
                                    • RegQueryValueExA.KERNELBASE(00000000,?,00000000,000F003F,?,00000400), ref: 031184EC
                                    • RegQueryValueExA.KERNELBASE(00000000,?,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,03120B34), ref: 03118599
                                    • RegCloseKey.KERNELBASE(00000000), ref: 03118608
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: QueryValue$CloseEnumOpen
                                    • String ID:
                                    • API String ID: 2041898428-0
                                    • Opcode ID: 2a5c273e10cb349612824afa00daee871aa66ce92eb272ffc5c1fde1c7c75292
                                    • Instruction ID: 94fb0f17a846d26a71f627acca76523d3291e42bf1de546a2d43590979cae84b
                                    • Opcode Fuzzy Hash: 2a5c273e10cb349612824afa00daee871aa66ce92eb272ffc5c1fde1c7c75292
                                    • Instruction Fuzzy Hash: 7B21077595022CABDB24DB54DC84FE9B7B8FB48705F00C1E8E609A6140DF716A86CFD4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 489 3117e00-3117e66 RegOpenKeyExA 492 3117e87-3117e8c 489->492 493 3117e68-3117e85 RegQueryValueExA 489->493 495 3117eb6-3117ec6 492->495 494 3117e8e-3117e9b 493->494 494->495
                                    APIs
                                    • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020119,?), ref: 03117E5E
                                    • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,000000FF,000000FF), ref: 03117E7F
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: OpenQueryValue
                                    • String ID:
                                    • API String ID: 4153817207-0
                                    • Opcode ID: de733d9f09baaaf1b6b4159d9fc2cc523be156df96ab1dcddbe2ade132799dd8
                                    • Instruction ID: 81badc1ea4e7b73b493ebe2a51702b13969b2871a48126d0a76f4d781ac7e4f3
                                    • Opcode Fuzzy Hash: de733d9f09baaaf1b6b4159d9fc2cc523be156df96ab1dcddbe2ade132799dd8
                                    • Instruction Fuzzy Hash: 66114FB5A84205EBD714DB94D989FBBBBBCEB08711F104119F615A7284DB7468108BA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 497 3117690-31176bb call 31177a0 502 31176c6-31176e5 RegOpenKeyExA 497->502 503 31176bd-31176c2 497->503 505 3117704-311770e 502->505 506 31176e7-31176fe RegQueryValueExA 502->506 504 3117711-3117714 503->504 505->504 506->505
                                    APIs
                                    • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020119,00000000), ref: 031176DD
                                    • RegQueryValueExA.KERNELBASE(00000000,?,00000000,00000000,?,000000FF), ref: 031176FE
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: OpenQueryValue
                                    • String ID:
                                    • API String ID: 4153817207-0
                                    • Opcode ID: 5ab138794aaf71d2ce886e6fcbc48e238f249dc1e7f5b81905501e36c81bf298
                                    • Instruction ID: 8697948ac3592515edd12d39efd18d96156588e4da809af36299c41e24ebade4
                                    • Opcode Fuzzy Hash: 5ab138794aaf71d2ce886e6fcbc48e238f249dc1e7f5b81905501e36c81bf298
                                    • Instruction Fuzzy Hash: 7001F4B9A40204BBE710EBE4E989FADBBBCEB48701F104554FA0597284EB74A954CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 508 3117720-3117763 RegOpenKeyExA 511 3117780-311779f call 3118940 508->511 512 3117765-311777a RegQueryValueExA 508->512 512->511
                                    APIs
                                    • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020119,031176B9), ref: 0311775B
                                    • RegQueryValueExA.KERNELBASE(031176B9,03120AAC,00000000,00000000,?,000000FF), ref: 0311777A
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: OpenQueryValue
                                    • String ID:
                                    • API String ID: 4153817207-0
                                    • Opcode ID: a1680e996c98956815709199574889b4dc0326ef6860a0d9a58456f3ccf6e863
                                    • Instruction ID: d11258e4525516a4307fc88916dfdc95dc09633ce0c01df24429520b67d16d9b
                                    • Opcode Fuzzy Hash: a1680e996c98956815709199574889b4dc0326ef6860a0d9a58456f3ccf6e863
                                    • Instruction Fuzzy Hash: 420144B9A40308BBE710EBE4DC89FAEBBBCEB48701F004154FA05A7285DB7065108F50
                                    APIs
                                      • Part of subcall function 03101160: GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,03116A17,03120AEF), ref: 0310116A
                                      • Part of subcall function 03101110: VirtualAllocExNuma.KERNELBASE(00000000,?,?,03116A1C), ref: 03101132
                                      • Part of subcall function 03101220: GlobalMemoryStatusEx.KERNELBASE(00000040,?,00000000,00000040), ref: 0310123E
                                      • Part of subcall function 03101220: __aulldiv.LIBCMT ref: 03101258
                                      • Part of subcall function 03101220: __aulldiv.LIBCMT ref: 03101266
                                    • GetUserDefaultLCID.KERNELBASE ref: 03116A26
                                      • Part of subcall function 03117850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0311789F
                                      • Part of subcall function 031178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0311792F
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: NameUser__aulldiv$AllocComputerDefaultGlobalInfoMemoryNumaStatusSystemVirtual
                                    • String ID:
                                    • API String ID: 3178950686-0
                                    • Opcode ID: 54f7d80db9a5658be5fa3abb2e993098554651c53910f2695a1a388aeefd24ff
                                    • Instruction ID: 892345e466967d0f495602552e27dea82bae2b80c5d28cbcd8f0fb0c74d144f0
                                    • Opcode Fuzzy Hash: 54f7d80db9a5658be5fa3abb2e993098554651c53910f2695a1a388aeefd24ff
                                    • Instruction Fuzzy Hash: BA312B79A41308ABDB04FBF0D955BEE7B78AF0C351F404538E512AA180DFB46A66C6A1
                                    APIs
                                    • GetComputerNameA.KERNEL32(?,00000104), ref: 0311792F
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ComputerName
                                    • String ID:
                                    • API String ID: 3545744682-0
                                    • Opcode ID: 4177277cb7dc41aaafbb3ed5d72981487e1938b9ecba21f78fc831dfabc5e7be
                                    • Instruction ID: b7be004b2ef5783dec0c50deeceba4166c9a3ab57e4e056ef2745211fd9fce34
                                    • Opcode Fuzzy Hash: 4177277cb7dc41aaafbb3ed5d72981487e1938b9ecba21f78fc831dfabc5e7be
                                    • Instruction Fuzzy Hash: 1E0186B1944208EFC704DF94D945BAEBBBCF708B22F104269F545E3380C77455048BA1
                                    APIs
                                    • K32GetModuleFileNameExA.KERNEL32(00000000,00000000,?,00000104), ref: 031194A5
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileModuleName
                                    • String ID:
                                    • API String ID: 514040917-0
                                    • Opcode ID: d14f046b92af6dce29fed023aa7df32fa1b08d8df0224ecedfe315f879867fb3
                                    • Instruction ID: a28654bee0b5d634036f7c8737d2cb8b61774104e11a438094e9bdae9a894943
                                    • Opcode Fuzzy Hash: d14f046b92af6dce29fed023aa7df32fa1b08d8df0224ecedfe315f879867fb3
                                    • Instruction Fuzzy Hash: 67F0547994020CFBDB15EF94D989FED7778EB08311F004454FA1957180DBB46A85CB90
                                    APIs
                                    • VirtualAllocExNuma.KERNELBASE(00000000,?,?,03116A1C), ref: 03101132
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocNumaVirtual
                                    • String ID:
                                    • API String ID: 4233825816-0
                                    • Opcode ID: 91de3f723e7a398606df9fd0f88adfdd7c52191b88515ba15617ad0bb5901506
                                    • Instruction ID: 9942d4c94d8538218513af9f220e8caca440bf6f00d210832f85430d32441ffd
                                    • Opcode Fuzzy Hash: 91de3f723e7a398606df9fd0f88adfdd7c52191b88515ba15617ad0bb5901506
                                    • Instruction Fuzzy Hash: 89E0E6799C5308FBE710BBA1DD4AB097A7CEB04B06F504154F7097A1C4DBF536009699
                                    APIs
                                    • GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,03116A17,03120AEF), ref: 0310116A
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InfoSystem
                                    • String ID:
                                    • API String ID: 31276548-0
                                    • Opcode ID: 0c29e6d9602c313d8366c5b7a7c69e20ada27658708a1be639f8732ec5fe9c10
                                    • Instruction ID: 70cabf7b134c1218bca55f16517685ba7b468da1717161b32cb4ea481944e6b8
                                    • Opcode Fuzzy Hash: 0c29e6d9602c313d8366c5b7a7c69e20ada27658708a1be639f8732ec5fe9c10
                                    • Instruction Fuzzy Hash: 90D017789402089BCB14EBE0D98969DBB7CEB08312F000594E90562240EB3064818AA5
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,17C841C0,00003000,00000004,?,?,?,0310114E,?,?,03116A1C), ref: 031010B3
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: d0173d2bb2d9784c6219375105ed74d4cce3b6c064ec0f6a67a3c4634a50c2fb
                                    • Instruction ID: dcae4200eb5f6f176f60df263a672d2ac6759a551ef56e13417ed809373f28c3
                                    • Opcode Fuzzy Hash: d0173d2bb2d9784c6219375105ed74d4cce3b6c064ec0f6a67a3c4634a50c2fb
                                    • Instruction Fuzzy Hash: CFF0E275681308BBE714EBA4AD89FAAB7ECE709B15F300458F544E7280D671AE00CAA0
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                    • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                    • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                    • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                    APIs
                                    • __getptd.LIBCMT ref: 0311C74E
                                      • Part of subcall function 0311BF9F: __getptd_noexit.LIBCMT ref: 0311BFA2
                                      • Part of subcall function 0311BF9F: __amsg_exit.LIBCMT ref: 0311BFAF
                                    • __getptd.LIBCMT ref: 0311C765
                                    • __amsg_exit.LIBCMT ref: 0311C773
                                    • __lock.LIBCMT ref: 0311C783
                                    • __updatetlocinfoEx_nolock.LIBCMT ref: 0311C797
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2543891438.0000000003100000.00000040.00000400.00020000.00000000.sdmp, Offset: 03100000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_3100000_aspnet_regiis.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                    • String ID:
                                    • API String ID: 938513278-0
                                    • Opcode ID: c59355314600c45a940292a0e986561b24c3c2deb7bdb94575c59f4849290505
                                    • Instruction ID: 5d135d6e731f1fb5b42b57c7b303dfed0620e8666f0db687ed46f61fcd02e86b
                                    • Opcode Fuzzy Hash: c59355314600c45a940292a0e986561b24c3c2deb7bdb94575c59f4849290505
                                    • Instruction Fuzzy Hash: 1CF024779897119FD720FBF854017CE37A06F0C720F148168E000AE1C0DFA458B08BD6